WO2021239015A1 - 一种设备控制方法和系统 - Google Patents
一种设备控制方法和系统 Download PDFInfo
- Publication number
- WO2021239015A1 WO2021239015A1 PCT/CN2021/096186 CN2021096186W WO2021239015A1 WO 2021239015 A1 WO2021239015 A1 WO 2021239015A1 CN 2021096186 W CN2021096186 W CN 2021096186W WO 2021239015 A1 WO2021239015 A1 WO 2021239015A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- user
- smart
- control
- lock
- door
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G05—CONTROLLING; REGULATING
- G05B—CONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
- G05B15/00—Systems controlled by a computer
- G05B15/02—Systems controlled by a computer electric
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00571—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V20/00—Scenes; Scene-specific elements
- G06V20/50—Context or environment of the image
- G06V20/52—Surveillance or monitoring of activities, e.g. for recognising suspicious objects
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
-
- G—PHYSICS
- G05—CONTROLLING; REGULATING
- G05B—CONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
- G05B2219/00—Program-control systems
- G05B2219/20—Pc systems
- G05B2219/26—Pc applications
- G05B2219/2642—Domotique, domestic, home control, automation, smart house
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
- G07C2009/00507—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks keyless data carrier having more than one function
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C2009/00753—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys
Definitions
- This application relates to the field of device control, and in particular to a device control method and system.
- smart devices for example, smart locks, smart speakers, smart curtains, smart lamps, etc.
- Smart devices are widely used in access control systems, home equipment, security, transportation and other fields.
- How to conveniently and effectively realize the individual and linkage control of smart devices for example, the control of the state of the smart device (for example, the arming state, the disarming state, etc.), the mode of the smart device (for example, the electronic lock mode, the administrator mode, etc.)
- the control and effective use of smart devices to improve safety prevention and control have important practical application value. Therefore, it is desirable to provide an effective smart device control method and system.
- One of the embodiments of the present application provides a device control method, including: determining one or more sets, the one or more sets having corresponding preset rules; adding the first device to the first device according to the information of the first device To a first set of the one or more sets; and according to a preset rule corresponding to the first set, control the first device in the first set to perform a corresponding operation.
- the device control method further includes: receiving a management instruction; performing corresponding management operations according to the management instruction, wherein the management instruction is used to instruct to manage at least one of the following: collection, collection The device, the user account associated with the device in the collection.
- the device control further includes: receiving a sharing request from the first device, wherein the sharing request carries an identifier of the first device and a first set corresponding to the first device The identification and configuration information of the first device, the setting information of the original user account corresponding to the first device; the identification of the first set corresponding to the first device is used as the set identification to create a new set; wherein, the new set The configuration information of is set as the configuration information of the first set; the first device is added under the new set, and the control authority of the first device is set so that the control authority conforms to all The requirements for setting information of the original user account corresponding to the first device are described.
- the device control method further includes: acquiring a control instruction used by a user to control the first device; verifying whether the control instruction satisfies a preset condition to obtain a verification result; and according to the verification result, The state of the first device and the control instruction determine whether to control the first device to perform an operation corresponding to the control instruction.
- control instruction is sent by the user through the first terminal; the verifying whether the control instruction satisfies a preset condition includes: verifying whether the first terminal can perform an operation corresponding to the control instruction permission.
- control instruction is generated based on the user's operation of the operating component on the first device; the verifying whether the control instruction satisfies a preset condition includes: verifying whether the operating component is located in a preset Set location.
- control instruction is used to control the on and/or off of the preset mode of the first device.
- the preset mode includes one or more of the following modes: a safe mode, a do not disturb mode, a specific user control mode, or a user self-setting mode.
- the device control method further includes: after controlling the first device to perform an operation corresponding to the control instruction, judging whether a preset scene occurs through an image collected by an image collecting device; and responding to When the preset scene appears, the image acquisition device is controlled to perform an image acquisition operation in accordance with a preset image acquisition rule.
- the first device includes a smart lock
- the device control method further includes: detecting a user's door opening action or closing action behavior; in response to detecting the door opening action or closing action behavior, monitoring all The action of the trigger part of the door lock; and in response to the action of the trigger part satisfying a predetermined condition, controlling the first device to be in an armed state.
- the detecting the user's door opening action or door closing action behavior includes: detecting the action of the door inner or outer door operator of the smart lock, or detecting the user's door opening action or closing the door through a sensor Action behavior.
- the monitoring the action of the triggering part of the door lock includes: monitoring the action of the door outer operating member or the lock body of the door lock; the action in response to the triggering part satisfies a predetermined condition, Including: detecting the locking action of the outer operating element of the door lock or the lock body.
- monitoring the action of the triggering component of the door lock includes: responding to detecting the door opening action or closing action of the user Behavior, monitoring the action of the triggering component of the door lock within a set time; the action responsive to the triggering component satisfies a predetermined condition, including: detecting the triggering component within the set time The action meets the set conditions.
- the device control method further includes: detecting indoor temperature; determining whether the indoor temperature exceeds a temperature threshold; and in response to the indoor temperature exceeding the temperature threshold, controlling the smart lock to unlock.
- controlling the first device in the first set to perform a corresponding operation further includes: detecting whether there is an abnormal situation; and in response to detecting In an abnormal situation, the first device in the first set is controlled to perform a corresponding operation according to a preset rule corresponding to the abnormal situation.
- the detecting whether there is an abnormal situation includes: obtaining information; analyzing the information to obtain characteristics of the information; obtaining an analysis result matching the characteristics; determining whether there is an abnormality according to the analysis result Condition.
- the device control method further includes: in response to detecting an abnormal situation, sending the abnormal situation to one or more terminals.
- the information includes a sound signal
- the characteristics of the information include characteristic information of the sound signal
- the characteristic information includes one or more of the following: timbre, pitch, vibration amplitude, vibration frequency And duration.
- One of the embodiments of the present application provides a device control system, including: a set determination module, a device determination module, and a control module; the set determination module is used to determine one or more sets, and the one or more sets have corresponding Preset rules; the device determining module is used to add the first device to the first set of the one or more sets according to the information of the first device; and the control module is used to add the first device to the first set of the one or more sets; The preset rule corresponding to the first set controls the first device in the first set to perform corresponding operations.
- One of the embodiments of the present application provides a method for controlling a device, which is applied to a first client, and the method includes: receiving a device addition instruction for instructing to add a device to be added to a designated house, where all The device to be added is a device bound under the user account corresponding to the first client, and the specified house is configured with corresponding scene rules; according to the device adding instruction, the device to be added is added to the Under a designated house; wherein the devices added under the designated house are controlled by the first client according to the scene rules corresponding to the designated house.
- the method before receiving the device addition instruction for instructing to add the device to be added to the designated house, the method further includes: receiving a house creation instruction; and creating at least one house according to the house creation instruction A house, and a corresponding scene rule is configured for the at least one house, wherein the at least one house includes the designated house.
- the method further includes: receiving a management instruction, and performing corresponding management operations according to the management instruction, wherein the management instruction is used to instruct to manage at least one of the following: a house, a device under the house , The user account associated with the device under the house.
- the receiving the management instruction and executing the corresponding management operation according to the management instruction includes: receiving a movement instruction of the house to which the device belongs, wherein the movement instruction carries the original house identification of the device to be moved and the target house ID; delete the device to be moved under the house corresponding to the original house ID, and add the device to be moved under the house corresponding to the target house ID; modify the configuration information of the device to be moved, and/or The configuration information of the house corresponding to the target house identifier so that the current configuration information of the device to be moved matches the scene rule under the house corresponding to the target house identifier.
- the receiving a management instruction and executing a corresponding management operation according to the management instruction includes: receiving a first device deletion instruction for instructing to delete the device to be deleted from a corresponding house, wherein the The first device deletion instruction comes from a first target user account, and the first target user account has the highest control authority over the device to be deleted; according to the first device deletion instruction, the house to which the device to be deleted belongs is determined, And delete the device to be deleted from the house to which the device to be deleted belongs.
- the method further includes: sending a second device delete instruction for instructing to delete the device to be deleted to the second client, so that the second client deletes the device according to the second device delete instruction, Delete the device to be deleted from the house to which the device to be deleted belongs.
- the receiving a management instruction and executing a corresponding management operation according to the management instruction includes: receiving a user account deletion instruction for instructing to delete a second target user account, wherein the second target user account It is associated with the first device added to the house, and the control authority of the second target user account on the first device is not the highest control authority; according to the user account deletion instruction, associate from the first device Delete the second target user account from the user account; send a control authority deletion instruction to the server, where the control authority deletion instruction is used to control the server to delete the second target user account’s access to the first device Control authority.
- the method further includes: receiving a sharing request of the device sent by the server; wherein, the sharing request carries the identity of the shared device, the identity of the original house corresponding to the shared device, and configuration information , The setting information of the original user account corresponding to the shared device; use the identity of the original house corresponding to the shared device as the house identity to create a new house; wherein the configuration information of the new house is set to The configuration information of the original house corresponding to the shared device; add the shared device under the new house, and set the control authority of the shared device so that the control authority conforms to the shared device Requirements for sharing the setting information of the original user account corresponding to the device.
- One of the embodiments of the present application provides a device for controlling equipment, which is applied to a first client, and the device includes: a first receiving unit for receiving instructions for instructing to add equipment to be added under a designated house A device adding instruction, wherein the device to be added is a device bound under a user account corresponding to the first client, and the specified house is configured with corresponding scenario rules; and the adding unit is configured to add according to the device Instruction to add the device to be added to the designated house; wherein the device to be added to the designated house is controlled by the first client according to the scene rule corresponding to the designated house.
- the device further includes: a second receiving unit, configured to receive a house creation instruction; and a configuration unit, configured to create at least one house according to the house creation instruction, and configure the at least one house The corresponding scene rule, wherein the at least one house includes the designated house.
- the device further includes: an execution unit configured to receive a management instruction and execute corresponding management operations according to the management instruction, wherein the management instruction is used to instruct to manage at least one of the following: , The device under the house, and the user account associated with the device under the house.
- the apparatus further includes: a sixth receiving unit, configured to receive a sharing request of the device sent by the server; wherein, the sharing request carries the identifier of the shared device, and the corresponding The identification and configuration information of the original house, and the setting information of the original user account corresponding to the shared device; a creation unit for creating a new house using the original house identification corresponding to the shared device as the house identifier; wherein , The configuration information of the new house is set as the configuration information of the original house corresponding to the shared device; The control authority of the device is set so that the control authority meets the requirements of the setting information of the original user account corresponding to the shared device.
- One of the embodiments of the present application provides a smart lock control method, which is applied to a controller in a smart lock, and the smart lock control method includes: acquiring a smart lock control instruction, and verifying that the legality of the smart lock control instruction is verified Result; the smart lock control instruction includes a local control instruction or a control instruction received through communication; obtains the state of the smart lock; responds according to the verification result, the state of the smart lock, and the preset control instruction Rule to determine whether to respond to the smart lock control instruction.
- the smart lock control instruction is a control instruction for opening a preset mode, acquiring the smart lock control instruction, and verifying the legitimacy of the smart lock control instruction to obtain the verification result includes: acquiring The control instruction of the preset mode, and determine whether the instruction to turn on the preset mode is sent by the preset terminal, and obtain the verification result; the control instruction includes the opening rule of the preset mode; or, obtain the response to the user operation A control instruction generated by the operating component on the smart lock for opening the preset mode, and it is determined whether the control instruction is generated when the operating component corresponding to the preset mode is adjusted to a position that characterizes the opening of the preset mode, and the verification result is obtained .
- determining whether to respond to the smart lock control instruction according to the verification result, the current state, and the preset control instruction response rule includes: determining whether the current state is a locked state, and determining Whether the verification result is the first preset result; if the state is the locked state and the verification result is the first preset result, it is determined to respond to the smart lock control instruction; if the state is not the locked state, Or the verification result is not the first preset result, and the smart lock control instruction is filtered.
- the method further includes: controlling the smart lock to be in the working state of the preset mode.
- the method further includes: judging whether the preset scene occurs through the image collected by the preset image acquisition device; if it occurs, controlling the preset scene It is assumed that the image acquisition device performs an image acquisition operation according to a preset image acquisition rule.
- the smart lock control instruction is a control instruction for turning off the preset mode
- the acquiring the smart lock control instruction and verifying the validity of the smart lock control instruction to obtain the verification result includes: acquiring To close the control instruction of the preset mode, and determine whether the control instruction is sent by the preset terminal, and obtain the verification result; the control instruction includes the closing rule of the preset mode; or, obtain the setting on the smart lock
- the preset component After the preset component is triggered, it generates a control instruction for closing the preset mode, and determines whether the control information of the control instruction meets the preset rules, and obtains the verification result; or, obtains the smart lock state change instruction, and determines all Whether the state change trend in the state change instruction of the smart lock is changed from the locked state to the unlocked state, and the verification result is obtained; or, obtain the control instruction input by the user on the smart lock panel to close the preset mode, and determine the Whether the content in the control instruction is the preset content, the verification result is obtained.
- determining whether to respond to the smart lock control instruction according to a preset control instruction response rule includes: determining whether the state is Normal working state and judging whether the verification result is the second preset result; if the state is the normal working state and the verification result is the second preset result, determining to respond to the smart lock control instruction; if If the verification result is not the second preset result, the smart lock control instruction is filtered.
- the method further includes: controlling the smart lock to be in a working state in a non-preset mode.
- the smart lock control instruction is a control instruction for turning off the preset mode
- the acquiring the smart lock control instruction and verifying the legitimacy of the smart lock control instruction to obtain the verification result includes: acquiring a user The input local unlocking instruction, the local unlocking instruction includes unlocking information; verifying whether the unlocking information is unlocking information with unlocking authority; if so, verifying whether the unlocking information is unlocking information corresponding to the preset user ID, and obtaining the verification result .
- the method further includes: responding to the local unlocking instruction, performing an unlocking operation, and after successfully performing the unlocking operation, turning off the preset mode.
- determining that the unlocking operation is successfully performed includes: determining whether the preset bolt is retracted; if so, determining that the unlocking operation is successfully performed.
- the smart lock control device includes: an instruction verification module for acquiring a smart lock control instruction and verifying the smart lock control The legality of the instruction is verified; the smart lock control instruction includes a local control instruction or a control instruction received through communication; a state acquisition module is used to acquire the state of the smart lock; an instruction judgment module is used to determine the state of the smart lock The verification result, the state of the smart lock, and the preset control command response rule determine whether to respond to the smart lock control command.
- One of the embodiments of the present application provides a smart lock control method, which is applied to a smart lock, the method includes: detecting a user's going out action behavior; in response to the going out action behavior, monitoring the action of a safety trigger component of the smart lock ; If it is detected that the action of the safety trigger component meets the set conditions, the smart lock is controlled to be in the armed state, wherein, when the smart lock is in the armed state, if the smart lock detects a preset action, it will execute Alarm operation.
- the monitoring the action of the safety triggering component of the smart lock includes: monitoring the operation action of the arming operation member of the smart lock; the detecting that the action of the safety triggering component satisfies a set condition includes: : It is detected that the arming operation member is triggered.
- the monitoring the action of the safety triggering component of the smart lock includes: monitoring the action of the door outer operating member or the lock body of the smart lock; the detected action of the safety triggering component satisfies the setting The condition includes: detecting the locking action of the outer door operating member or the lock body.
- the detecting the user's going out action behavior includes: detecting the door opening action of the door operating element of the smart lock; or detecting the door opening action of the door operating element of the smart lock and passing The designated sensor senses that the user is out of the house.
- the method further includes: if it is detected that the action of the safety trigger component satisfies a set condition, sending an arming request to the server, so that the server controls at least one smart device to be in arming based on the arming request State, wherein, when the smart device is in an armed state, if the smart device senses a set anti-theft abnormal behavior, an alarm operation is executed.
- the smart lock is further integrated with a camera device; the method further includes: if it is detected that the action of the safety trigger component meets a set condition, controlling the camera device integrated in the smart lock to be in an armed state , Wherein, when the camera device is in an armed state, the camera device performs image capture, and performs an alarm operation when it is determined that there is an abnormal person based on the captured image.
- the monitoring the action of the safety trigger component of the smart lock in response to the action of going out includes: in response to the action of going out, starting a timer, and setting the timer correspondingly Monitoring the action of the safety trigger component of the smart lock within a time period; the detecting that the action of the safety trigger component meets a set condition includes: detecting that the action of the safety trigger component meets the set condition within the set time period .
- the method further includes: in the case of detecting that the doorbell button associated with the smart lock is pressed, sending a doorbell reminder message to the server, so that the server binds the smart lock A predetermined user terminal sends the doorbell reminder message, and the doorbell reminder message is used to prompt someone to press the doorbell.
- the method further includes: sensing an indoor temperature through a temperature sensor in the smart lock; and when the indoor temperature exceeds a set threshold, controlling the smart lock to perform an unlocking operation.
- the method further includes: when the indoor temperature exceeds a set threshold, sending a risk alarm to the user terminal bound to the smart lock, the risk alarm being used to remind the user that the indoor temperature exists Security risks.
- One of the embodiments of the present application provides a smart lock control method applied to a server.
- the method includes: obtaining an arming request sent by the smart lock, where the arming request is that after the smart lock detects a user's going out action, Generated when it is detected that the action of the safety trigger component of the smart lock satisfies a set condition; in response to the arming request, instructing the smart lock to enter the arming state, wherein the smart lock is in the arming state If the smart lock detects a preset action, it will execute an alarm operation.
- One of the embodiments of the present application provides a smart lock control device, which is applied to a server, and includes: a request obtaining unit for obtaining an arming request sent by the smart lock, and the arming request is that the smart lock detects a user's exit Action behavior, and it is generated when it is detected that the action of the safety trigger component of the smart lock satisfies a set condition; an arming indication unit is used to instruct the smart lock to enter the arming state in response to the arming request, wherein, When the smart lock is in the armed state, if the smart lock detects a preset action, an alarm operation is performed.
- One of the embodiments of the present application provides a computer-readable medium on which a computer program is stored, wherein the program is executed by a processor to implement the method described in any of the embodiments of the present application.
- One of the embodiments of the present application provides a processor, the processor is used to run a program, wherein the program executes the method as described in any embodiment of the present application when the program runs.
- One of the embodiments of the present application provides a smart lock, including: one or more processors; a storage device on which one or more programs are stored; when the one or more programs are processed by the one or more When the processor executes, the one or more processors implement the method described in any embodiment of the present application.
- One of the embodiments of the present application provides an information processing device, including: a sound collection module, a sound processing module, and a data transmission module; the sound collection module, the sound processing module, and the data transmission module are connected in sequence; the sound The collection module collects the sound signal of the smart device; the sound processing module obtains the sound analysis result corresponding to the sound signal; the data transmission module outputs the sound analysis result to the first terminal.
- the sound processing module when used to obtain a sound analysis result corresponding to the sound signal, it is specifically used to: parse the sound signal to obtain characteristic information of the sound signal; The sound analysis result matching the information; the sound analysis result includes the sound processing result, the push method of the sound processing result, and the push object of the sound processing result.
- the information processing device further includes a second terminal; the second terminal is connected to the data transmission module; the sound processing module sends the sound signal to the second terminal; the second terminal The terminal obtains the sound analysis result corresponding to the sound signal and sends it to the sound processing module.
- the sound processing module is further configured to: control a target linkage device associated with the smart device to execute a target action corresponding to the smart device.
- the sound processing module is further configured to: if the information fed back by the first terminal is not received through the data transmission module within a preset time period, control the data transmission module to output the sound analysis The result is to the third terminal.
- the characteristic information includes at least one of the following: timbre, pitch, vibration frequency, and duration.
- the sound collection module includes a microphone.
- the smart device includes at least one of the following: a smoke alarm, a flood alarm, and a combustible gas alarm.
- the data transmission module includes a wireless transmission module and a wired transmission module.
- the sound processing module includes a controller.
- One of the embodiments of the present application provides an information processing method, which is characterized in that it is applied to a sound processing module as described in any of the embodiments of the present application, and the information processing method includes: acquiring a smart device collected by the sound collection module Obtain the sound analysis result corresponding to the sound signal; output the sound analysis result to the first terminal through the data transmission module.
- obtaining a sound analysis result corresponding to the sound signal includes: analyzing the sound signal to obtain characteristic information of the sound signal; acquiring a sound analysis result that matches the characteristic information;
- the sound analysis result includes the sound processing result, the push method of the sound processing result, and the push object of the sound processing result.
- obtaining a sound analysis result corresponding to the sound signal includes: sending the sound signal to a second terminal; and receiving feedback from the second terminal after obtaining the sound analysis result corresponding to the sound signal The result of the sound analysis.
- the method further includes: controlling a target linkage device associated with the smart device to execute a target action corresponding to the smart device.
- the method further includes: if the information fed back by the first terminal is not received through the data transmission module within a preset time period, controlling the data transmission module to output the sound analysis result to the first terminal Three terminals.
- FIG. 1 is a schematic diagram of an application scenario of a method and system for controlling a smart device according to some embodiments of the present application;
- FIG. 2 is a block diagram of an exemplary computing device that implements the specific system disclosed in this application;
- Fig. 3 is a schematic diagram of exemplary hardware and/or software of a smart lock control system according to some embodiments of the present application
- Fig. 4 is an exemplary flowchart of a device control method according to some embodiments of the present application.
- Fig. 5A is a schematic diagram of an apparatus for controlling equipment according to some embodiments of the present application.
- Fig. 5B is a schematic diagram of an apparatus for controlling equipment according to some embodiments of the present application.
- FIG. 5C is a schematic diagram of an execution unit of an apparatus for controlling equipment according to some embodiments of the present application.
- Fig. 5D is a schematic diagram of an execution unit of an apparatus for controlling equipment according to some embodiments of the present application.
- Fig. 5E is a schematic diagram of an execution unit of an apparatus for controlling equipment according to some embodiments of the present application.
- Figure 5F is a schematic diagram of a device for controlling equipment according to some embodiments of the present application.
- Fig. 6 is an exemplary flowchart of a collection creation method according to some embodiments of the present application.
- Fig. 7 is an exemplary flowchart of a method for adding a device to a collection according to some embodiments of the present application.
- Figure 8 is a schematic diagram of the relationship between a house and equipment according to some embodiments of the present application.
- Fig. 9 is an exemplary flowchart of a method for moving devices in a set according to some embodiments of the present application.
- FIG. 10 is an exemplary flowchart of a collection creation method according to some embodiments of the present application.
- FIG. 11 is an exemplary flowchart of a method for device sharing between different accounts according to some embodiments of the present application.
- FIG. 12 is an exemplary flowchart of a method for deleting an account corresponding to a device according to some embodiments of the present application.
- Fig. 13 is a schematic diagram of a device control apparatus according to some embodiments of the present application.
- Fig. 14 is an exemplary flowchart of a device control method according to some embodiments of the present application.
- FIG. 15 is an exemplary flowchart of a method for verifying a user's unlocking authority according to some embodiments of the present application.
- FIG. 16 is a schematic diagram of an application scenario of a control system for a smart lock according to some embodiments of the present application.
- Figure 17 is a schematic diagram of a smart lock control device according to some embodiments of the present application.
- Fig. 18 is an exemplary flowchart of a smart lock control method according to some embodiments of the present application.
- FIG. 19 is a schematic diagram of an application scenario of a control system for a smart lock according to some embodiments of the present application.
- Fig. 20 is an exemplary flowchart of a smart lock control method according to some embodiments of the present application.
- FIG. 21 is an exemplary flowchart of a smart lock control method according to some embodiments of the present application.
- Figure 22 is a schematic diagram of a smart lock control device according to some embodiments of the present application.
- Figure 23 is an exemplary flow chart of a smart lock arming control method according to some embodiments of the present application.
- Fig. 24 is an exemplary flowchart of a smart lock control method according to some embodiments of the present application.
- Figure 25 is a schematic diagram of an application scenario of a smart lock control system according to some embodiments of the present application.
- FIG. 26 is an exemplary flowchart of a doorbell reminding method of a smart lock according to some embodiments of the present application.
- FIG. 27 is an exemplary flowchart of a doorbell reminding method of a smart lock according to some embodiments of the present application.
- FIG. 28 is a schematic diagram of an exemplary system architecture of an information processing apparatus according to some embodiments of the present application.
- FIG. 29 is an exemplary flowchart of an abnormal situation analysis method according to some embodiments of the present application.
- first, second, third, etc. may be used herein to describe various elements, these elements should not be limited by these terms. These terms are only used to distinguish one element from another element.
- first element may be referred to as the second element, and similarly, the second element may be referred to as the first element.
- the device control method and system involved in the embodiments of the present application can be applied to the management of hardware resources.
- this system can be applied to the management and control of smart home equipment, vehicle-mounted equipment and other equipment.
- Smart home devices can include, but are not limited to, smart locks, safes, portable storage cabinets, gun cabinets, lockboxes, smart express cabinets, cameras, sensors, locks, doorbells, peepholes, air conditioners, refrigerators, curtains, TVs, gas stoves, stereos, windows , Lamps, etc.
- the system can be applied to the management and control of software resources.
- this system can be applied to the management and control of software resource systems such as security systems, access control systems, music, videos, and texts.
- the system can be applied to the management and control of resources combined with software and hardware.
- the following describes the application of this system mainly by taking the management and control of hardware resources as an example. This is not intended to limit, the system can be applied to other aspects.
- Fig. 1 is a schematic diagram of an application scenario of a method and system for controlling a smart device according to some embodiments of the present application.
- the smart device control system 100 can be used for smart locks, smart cameras, smart doorbells, smart speakers, smart gas stoves, etc. in various production and living areas such as residential houses, office buildings, factories, schools, hospitals, hotels, rental houses, etc. Control and management of equipment.
- the control system 100 of the smart device can also be applied to an in-vehicle system.
- control system 100 can control one or more devices (for example, the first device) in the set to perform corresponding operations according to a preset rule of the set (for example, the first set). For another example, the control system 100 can verify whether a user's control instruction for controlling one or more devices meets a preset condition. According to the verification result, the status of one or more devices and the control instruction, the control system 100 can determine whether to control one or more devices to perform operations corresponding to the control instruction (for example, arming operation, abnormal situation detection, alarm operation). For another example, the control system 100 may determine whether an abnormal situation exists according to information of the device (for example, sound signal, status information, etc.).
- information of the device for example, sound signal, status information, etc.
- control system 100 may include a server 110, a smart device 130, a user terminal 140, and a network 120.
- the server 110 may obtain and process the associated information of the smart device 130, process the associated information of the smart device, and determine the operation instruction information of the smart device to perform one or more functions described in this application.
- the associated information may include smart device information and/or communication status of the smart device.
- the smart device information may be understood as the device information of the smart device, and the smart device information may include component information, power information, operation information, etc. of the smart device.
- the device information of the smart device may be the working status of the smart device.
- the device information of the smart device may be the location information of one or more components of the smart device.
- the server 110 may perform part of the functions in the system 100. Specifically, in some embodiments, the server 110 may receive management instructions. In some embodiments, the server 110 may perform corresponding management operations according to management instructions. For example, the server 110 may be used to instruct to manage or control the collection, the devices in the collection, and the user accounts associated with the devices in the collection according to the management instruction.
- the server 110 may be a single server or a server group (for example, a group including multiple servers such as servers 110-1, 110-2).
- the server group may be centralized or distributed (for example, the server 110 may be a distributed system).
- the server 110 may be local or remote.
- the server 110 may access the smart device 130 and the user terminal 140 through the network 120.
- the server 110 may be directly connected to the smart device 130 and the user terminal 140 to access stored information and/or data.
- the server 110 may be implemented on a cloud platform.
- the cloud platform may include private cloud, public cloud, hybrid cloud, community cloud, distributed cloud, inter-cloud, multiple clouds, etc., or any combination of the foregoing examples.
- the server 110 may be implemented on a computing device (for example, the computing device 200 in FIG. 2).
- the server 110 may be implemented on a mobile device.
- the server 110 may include a processing device 112.
- the processing device 112 can process at least some functions of the server 110.
- the processing device 112 may obtain user instructions (for example, management instructions, control instructions for controlling the device, etc.), device information (for example, the account information corresponding to the device, the status of the device, the actions of the device or its components, and the sound of the device. Signal etc.).
- the processing device 112 may determine whether to control the device to perform related operations (for example, move, add, arm, disarm, alarm, turn on/off the anti-lock mode, etc.) according to user instructions and device information.
- the processing device 112 may include one or more processing engines (for example, a single-core processing engine or a multi-core processor).
- the processing device 112 may include a central processing unit (CPU), an application specific integrated circuit (ASIC), an application specific instruction set processor (ASIP), a graphics processing unit (GPU), a physical processing unit (PPU), and a digital signal processor.
- DSP Field Programmable Gate Array
- FPGA Field Programmable Gate Array
- PLD Programmable Logic Device
- Controller Microcontroller Unit
- RISC Reduced Instruction Set Computer
- the network 120 may be used for the exchange of information and/or data.
- One or more components (the server 110, the smart device 130, and the user terminal 140) in the system can send information/data to other components through the network 120.
- the smart device 130 may upload data information such as the working status and component information of the smart device to the server 110 via the network 120.
- the server 110 may issue data information such as a password and an activation code to the user terminal 140 via the network 120.
- the network 120 may be any one or a combination of a wired network or a wireless network.
- the network 120 may include a cable network, a wired network, an optical fiber network, a telecommunication network, an intranet, the Internet, a local area network (LAN), a wide area network (WAN), a wireless local area network (WLAN), a metropolitan area network (MAN), and a public switched telephone.
- Network PSTN
- General Packet Radio Network GPRS
- Mobile Phone Network Bluetooth Network
- ZigBee Network ZigBee Network
- NFC Near Field Communication
- Narrowband Internet of Things NB-IoT/LoRa may include one or more network access points.
- the network 120 may include wired or wireless network access points, such as base stations and/or Internet exchange points 120-1, 120-2, and so on. Through the access point, one or more components of the system 100 may be connected to the network 120 to exchange data and/or information.
- network access points such as base stations and/or Internet exchange points 120-1, 120-2, and so on.
- the access point Through the access point, one or more components of the system 100 may be connected to the network 120 to exchange data and/or information.
- the smart device 130 may include some smart home devices installed in the house.
- the smart device 130 may include, but is not limited to, smart home devices, in-vehicle devices, and the like.
- Smart home equipment may include smart lock 130-1, smart electrical equipment (for example, air conditioners, refrigerators, TVs, gas stoves, stereos, etc.) and their control equipment 130-2, safes, portable storage cabinets, gun cabinets, lockboxes, smart express delivery Cabinets, smart lighting equipment, smart surveillance (e.g. smart cameras, cameras, cat’s eyes, etc.) equipment, walkie-talkies, smart sensors (e.g. gyroscopes, accelerometers, motion sensors, positioning systems (e.g.
- the smart device 130 may receive instructions from the server 110 and/or the user terminal 140 and execute the instructions.
- the smart lock may receive an instruction from the server 110 and close or open based on the instruction.
- the smart lock may receive an instruction from the server 110 and enter the armed state based on the instruction.
- the smart lock can enter the safe mode (or cancel the safe mode after disarming) based on the safe, safe, etc. entering the armed state.
- the smart device 130 may also transmit its own working status information to the server 110.
- the smart lock 130-1 may transmit the status information of the do not disturb mode to the server 110.
- the smart device 130 may be bound to one or more programs on the user terminal 140.
- the configuration information for example, identification, location, function, etc.
- the user can control the operation of the smart device 130 through the user terminal 140.
- the smart device 130 may include a controller.
- the controller may be used to obtain a control instruction used by the user to control the device 130; verify whether the control instruction meets a preset condition to obtain a verification result; and determine whether the control device 130 performs an operation corresponding to the control instruction.
- the server 110 may serve as a controller of the smart device.
- the smart device 130 may also include a storage device for storing data locally. Specifically, when the data upload server of the smart device fails, the smart device can locally store the data to be uploaded to the server, and when the data transmission communication between the smart device and the server is good, then upload the locally stored data to server.
- the user terminal 140 may include user terminals of all related users of the house where the smart device 130 is installed. Specifically, related users may include managers of houses, such as merchants who rent out houses; related users may also include users of houses, such as tenants of rented houses; related users may also include owners of houses; and related users may also include Including house cleaning staff, property staff, etc.
- the user terminal includes, but is not limited to, the user terminal of a person in any role described above.
- the user terminal 140 may be a user terminal of a hotel manager, or a user terminal of a hotel occupant, or a user terminal of a landlord of a rental house, or a user terminal of a tenant of the rental house.
- the user terminal 140 can receive information or data sent by the server 110 and the smart device 130 via the network 120.
- the user terminal 140 may receive a doorbell reminder message sent by the server 110.
- the user terminal 140 may receive an alarm sent by the smart device 130 that an abnormal situation occurs.
- different user terminals can receive different information.
- the server 110 may send the information only to the user terminal of the rental landlord according to a predetermined rule, or only to the user terminal of the rental house tenant, or simultaneously to all user terminals associated with the smart device.
- the server 110 may send the information to one or more of the homeowner, the administrator, the user of the device, etc. according to a predetermined rule.
- the server 110 may send information to one or more of the vehicle owner, the contact person set by the vehicle owner, and the actual user of the vehicle according to a predetermined rule.
- the user terminal 140 may be used to display the recorded data of the smart device control system 100, the working status of the smart device 130, unlocking records, abnormal conditions and other related information.
- the user terminal 140 can also be used to operate the smart device 130 directly or through a server, and receive the operation result fed back by the server 110 or the smart device 130 in the system 100.
- the user can remotely open the electronic lock anti-lock instruction to the smart door lock through the user terminal, and display the anti-lock result on the user terminal.
- the user terminal 140 may include, but is not limited to, a smart phone 140-1, a tablet computer 140-2, a notebook computer 140-3, a desktop computer, a personal digital assistant (PDA), a handheld game console, Smart glasses, smart watches, wearable devices, virtual display devices, display enhancement devices, etc. or any combination thereof.
- PDA personal digital assistant
- the server 110, the smart device 130, and the user terminal 140 may each be provided with storage devices.
- An independent storage device may also be provided in the system 100 to store data and/or instructions.
- the storage device may include mass memory, removable memory, volatile read-write memory, read-only memory (ROM), etc., or any combination of the foregoing examples.
- Exemplary mass storage devices may include magnetic disks, optical disks, solid state drives, and the like.
- Exemplary removable storage may include flash disks, floppy disks, optical disks, memory cards, compact hard disks, magnetic tapes, and the like.
- An exemplary volatile read-only memory may include random access memory (RAM).
- Exemplary random access memory may include dynamic random access memory (DRAM), double data rate synchronous dynamic random access memory (DDRSDRAM), static random access memory (SRAM), thyristor random access memory (T-RAM), and zero capacitance memory (Z-RAM) )Wait.
- Exemplary read-only memory may include masked read-only memory (MROM), programmable read-only memory (PROM), erasable programmable read-only memory (EPROM), electrically erasable programmable read-only memory (EEPROM) , Compact hard disk read-only memory (CD-ROM) and digital multi-function hard disk read-only memory, etc.
- the storage device can also be implemented on a cloud platform.
- the cloud platform may include private cloud, public cloud, hybrid cloud, community cloud, distributed cloud, inter-cloud, multiple clouds, etc., or any combination of the foregoing examples.
- one or more components in the system may be separately arranged.
- the smart home devices are at home, and the management can be done on the user's mobile phone.
- the phone can, Bluetooth TM, ZigBee TM, Near Field Communication (NFC) such as direct and communicating smart home devices, smart home device is controlled by a local area network, while the server (eg, server 110) in synchronization update smart home equipment related Information (for example, configuration information, etc.).
- the server can be connected to the smart home device to obtain related information of the home device, and transmit the smart home related information to the mobile phone.
- the mobile phone can send management instructions to the server.
- the server can control the smart home equipment.
- the system can be installed on a certain terminal as a whole.
- the files to be managed are all in the mobile phone, and the management is also done on the user's mobile phone.
- the system may include a central control system and one or more subsystems.
- the central control system may be arranged in the server 110, and one or more subsystems may include processing devices arranged locally (for example, in a house, an office building, a car, etc.).
- One or more subsystems can control some equipment within a certain range (such as equipment in a house, equipment in an office building, equipment in a car, etc.).
- the central control system can control one or more subsystems.
- the central control system can also directly control the device through one or more subsystems.
- FIG. 2 is a block diagram of an exemplary computing device (eg, server 110, server 1620, server 1920, server 2520, server 2740, etc.) that implements the specific system disclosed in this application.
- the specific system can use a functional block diagram to explain a hardware platform that includes one or more user interfaces.
- the computer may be a computer with general or specific functions. Both types of computers can be configured to implement any particular system according to some embodiments of the application.
- the computing device 200 may be configured to implement any component that provides the information required for device management disclosed in this specification.
- the server 110 may be implemented by a computer hardware device such as a computing device 200, a software program, firmware, or any combination thereof.
- the computing device 200 used to implement the server 110 may manage one or more devices based on the received device management instruction sent by the user.
- the computing device 200 may determine whether a preset scene (for example, an abnormal situation) occurs by analyzing a sound signal and an image.
- Figure 2 only depicts a computer.
- computer functions that perform device control and management can be implemented by a group of similar platforms in a distributed mode to distribute the processing load of the system.
- the computing device 200 may include a communication terminal 250 connected to a network that can realize data communication.
- the computing device 200 may also include a central processing device 220 configured to execute instructions and including one or more processors.
- An exemplary computer platform may include an internal communication bus 210, different types of program storage units and data storage units (e.g., hard disk 270, read only memory (ROM) 230, random access memory (RAM) 240), suitable for computer processing and / Or various data files for communication and some program instructions that may be executed by the CPU.
- the computing device 200 may also include an input/output device 260, which may support the input and output of data streams between the computer and other components (for example, the user interface 280).
- the input/output device 260 may enable a user to interact with the server 110.
- the input/output device 260 may include an input device and an output device.
- Exemplary input devices may include keyboards, mice, touch screens, microphones, trackballs, etc., or combinations thereof.
- Exemplary output devices may include display devices, speakers, printers, projectors, etc., or combinations thereof.
- Exemplary display devices may include liquid crystal displays (LCD), light emitting diode (LED)-based displays, flat panel displays, curved screens, television equipment, cathode ray tubes (CRT), etc., or combinations thereof.
- LCD liquid crystal displays
- LED light emitting diode
- CRT cathode ray tubes
- the input/output device 260 can sense character instructions, voice instructions, gesture instructions, and/or biological information (such as facial images, voiceprints, fingerprints, etc.) input by the user, or the like, or any combination.
- a user for example, an operator of the server 110 may input the content of a management instruction for the device through the input/output device 260, for example, a request for sharing, moving, deleting, controlling, and managing the device.
- a user (for example, an operator) of the server 110 can use the input/output device 260 to determine whether the user who provided the management instruction has the authority to manage the device through the input/output device 260.
- the input information may include passwords (for example, character passwords), biological information (for example, facial images, voiceprints included in voice commands, fingerprints, etc.), and the like.
- the input/output device 260 can also display the collection, the devices in the collection, the user account associated with the devices in the collection, the information of the device, and the condition detected by the device (for example, the image taken by the image acquisition device, the abnormal condition detected by the device) , Equipment alarm information, etc.
- Fig. 3 is a schematic diagram of exemplary hardware and/or software of a smart lock control system according to some embodiments of the present application.
- the system 300 may include a set determination module 310, a device determination module 320, and a control module 330.
- the set determination module 310 may be used to determine one or more sets.
- One or more sets have corresponding preset rules.
- the preset rules refer to the working mode of the collection.
- the preset rules may include safe mode, outing mode, party mode, sleep mode, reading mode, do not disturb mode, night mode, warm mode, armed mode, specific user control mode, user-defined mode, etc. or a combination thereof.
- the security mode may include a mode in which measures such as anti-theft and monitoring are taken in a certain specific scenario to protect the personal and property safety of users or others.
- the out-of-office mode may include a mode in which all or part of the devices and/or components enter a standby or shutdown state when the user is not in a certain scenario within a certain period of time.
- the party mode can include a mode that controls all or part of the device status to support the party scene in a certain specific scene.
- the sleep mode may include a mode in which the user is forbidden to visit by others when sleeping at night (or other time), so that all or part of the equipment and/or components enter a specific state (such as shutdown, sleep, standby, arming, etc.).
- the reading mode may include a mode of controlling all or part of the equipment and/or components to create an atmosphere suitable for reading (for example, turning on aromatherapy, softening the light, etc.) in a certain specific scene.
- the do-not-disturb mode may include a mode in which the user does not want to be disturbed by others and/or notifications during a certain period of time, and controls all or part of the devices and/or components to enter the silent state.
- the night mode may include a mode in which all or part of the equipment and/or components are controlled during the night time period to facilitate the user's needs at night (for example, turning on the lights of the toilet at night, turning on the low beam or high beam of the vehicle at night).
- the warm mode may include a mode in which all or part of the equipment and/or components are controlled to create a warm atmosphere (for example, starting a music player to play warm music, soft lighting, etc.) in a certain specific scene.
- the arming mode can include a mode in which the user controls all or part of the equipment and/or components to monitor the occurrence of abnormal conditions in a specific scenario in order to protect their own lives and property, and immediately alarms.
- the specific user control mode may include a mode in which the user allows others to use and/or control all or part of the equipment and or components by setting permissions in a certain specific scenario.
- the user-defined mode may include a mode in which the user customizes the state of all or part of the equipment and/or components according to requirements.
- the device determining module 320 may add the first device to the first set of one or more sets according to the information of the first device.
- the information of the first device may include the number, name, type, location, connection mode, code, device ID, bound account number, etc. or a combination of the first device.
- the first device may be a device manually added by the user, a device determined by the processing device 112 according to the first set of preset rules, or a device selected by the user from devices recommended by the processing device 112 or recorded in history.
- the first device may be a device that is moved and/or shared from other terminals.
- control module 330 may be configured to control the first device in the first set to perform corresponding operations according to a preset rule corresponding to the first set. In some embodiments, the control module 330 may determine the configuration information of the first device in the first set according to a preset rule corresponding to the first set.
- the configuration information of the first device may include the working mode, volume, sound effect, brightness, frequency, etc. of the first device, or a combination thereof. The control module 330 may control the first device to perform corresponding operations according to the configuration information of the first device.
- the set determination module 310, the device determination module 320, and the control module 330 in FIG. 3 may be different modules in a system, or one module may implement the functions of two or more modules mentioned above.
- the set determination module 310 and the device determination module 320 may be two modules, or one module may have both a set determination function and a device determination function.
- each module may share a storage module, and each module may also have its own storage module.
- Fig. 4 is an exemplary flowchart of a device control method according to some embodiments of the present application.
- the process 400 may be executed by processing logic, which may include hardware (for example, circuits, dedicated logic, programmable logic, microcode, etc.), software (running on a processing device to perform hardware simulation). Instruction), etc., or any combination thereof.
- processing logic may include hardware (for example, circuits, dedicated logic, programmable logic, microcode, etc.), software (running on a processing device to perform hardware simulation). Instruction), etc., or any combination thereof.
- One or more operations for creating a set shown in FIG. 4 may be implemented by the device control system 100 shown in FIG. 1.
- the process 400 may be stored in a storage device in the form of instructions, and called and/or executed by the processing device 112.
- step 401 the processing device 112 may determine one or more sets. In some embodiments, step 401 may be performed by the set determination module 310 in the system 300.
- a collection refers to a device collection created on a user terminal (for example, the user terminal 140) and includes one or more devices.
- the collection can include multiple forms, for example, a "house” for accommodating one or more devices in a house, a “vehicle” for accommodating on-board equipment, and a “house” for accommodating one or more devices. Workshop” etc.
- the collection may also include an "area” for accommodating vehicles, a "community” for accommodating a cell, a "folder” for accommodating files, and so on.
- one or more sets may include a set "master bedroom” corresponding to the master bedroom in the user's house, a set “second bedroom” corresponding to the second bedroom in the user's house, and children in the user's house Room corresponding to the collection "children's room”.
- the processing device 112 may determine one or more sets according to instructions input by the user through the user terminal. For details on the determination of the set, please refer to Figure 6 for the method for creating the set and its related description.
- each of the one or more sets has a corresponding preset rule.
- the preset rules refer to the working mode of the collection.
- the preset rules may include safe mode, outing mode, party mode, sleep mode, reading mode, do not disturb mode, night mode, warm mode, armed mode, specific user control mode, user-defined mode, etc. or a combination thereof.
- the preset rules corresponding to one or more sets may be manually determined by the user, or automatically determined by the processing device 112, or semi-automatically determined by the processing device 112.
- the user can input the name, working time, working mode, etc. or a combination of each of one or more collections through the user terminal 140.
- the processing device 112 may recommend one or more sets to the user, and the user may select a set that needs to be determined from the sets recommended by the processing device 112.
- step 402 the processing device 112 may add the first device to the first set of the one or more sets according to the information of the first device.
- step 402 may be performed by the device determination module 320 in the system 300.
- the information of the first device may include the number, name, type, location, connection mode, code, device ID, bound account number, etc. or a combination of the first device.
- the processing device 112 may communicate with the first device directly or through a network (for example, the network 120) to obtain information of the first device.
- the user may input the information of the first device through the user terminal, and send the information of the first device to the processing device 112.
- the information (for example, quantity, type, etc.) of the first device may be determined according to specific conditions.
- the first device may be a device manually added by the user, a device determined by the processing device 112 according to the first set of preset rules, or a device selected by the user from devices recommended by the processing device 112 or recorded in history.
- the first device may be a device that is moved and/or shared from other terminals. For details about device movement and sharing, please refer to Figures 9 and 11 and related descriptions respectively.
- the processing device 112 may add the first device to the first set based on the information of the first device.
- the first set can be the "master bedroom".
- the processing device 112 may, based on the location information of the first device, convert the first device located in the master bedroom, for example, the TV in the master bedroom, the air conditioner in the master bedroom, the curtains in the master bedroom, and the first device in the master bedroom.
- the lamps, the door locks of the master bedroom, etc. or their combinations are added to the first set. For details of adding equipment, see Figure 7 and its related descriptions.
- step 403 the processing device 112 may control the first device in the first set to perform a corresponding operation according to a preset rule corresponding to the first set. In some embodiments, step 403 may be performed by the control module 330 in the system 300.
- the processing device 112 and/or the user may determine the configuration information of the first device in the first set according to a preset rule corresponding to the first set.
- the configuration information of the first device may include the working mode, volume, sound effect, brightness, frequency, etc. of the first device, or a combination thereof.
- the first device when the first set is a living room, the first device may be a speaker in the living room, a lamp in the living room, a projector in the living room, and so on.
- the preset rules corresponding to the first set may include the home theater mode.
- the processing device 112 may control the living room’s audio to select stereo sound effects, control the living room’s projector to select the movie playback mode, and adjust the brightness of the living room’s lamps to relatively low.
- the processing device 112 may control the first device in the first set to perform corresponding operations according to a preset rule corresponding to the first set. For example, the processing device 112 may control the speakers in the living room to play sound with stereo sound effects, control the projector in the living room to play movies, and control the lamps in the living room to illuminate with relatively low brightness.
- most accounts are bound to multiple devices (for example, smart bulbs, smart routers, air purifiers, cameras, etc.), and the control permissions of multiple devices are obtained through account authorization, and according to needs Separately control and/or manage each of multiple devices.
- This device control method causes multiple devices added under one account to be unable to form a whole, and it is impossible to set the mode of each device based on various scenarios.
- the device control method and system provided in this application can form a whole with multiple devices added under an account, and can set the mode of each device under each whole based on various scenarios.
- the process 400 may also include receiving management instructions, and performing corresponding management operations according to the management instructions.
- the management instruction is used to instruct the management of the collection, the devices in the collection, the user accounts associated with the devices in the collection, etc., or a combination thereof.
- the management of the collection may include deleting the created collection, modifying the scene rules corresponding to the created collection, and modifying the identifier of the created collection.
- the management of the devices in the collection can include: deleting the devices from the corresponding collection and moving the devices from the corresponding collection to other collections; the management of the user accounts associated with the devices in the collection can include: deleting the collection One or more user accounts associated with the devices under the device; the user accounts associated with the devices under the set can be understood as the device bound to the user account, and the user account belongs to the user account associated with the device.
- the process of receiving management instructions and performing corresponding management operations according to the management instructions is proposed in this embodiment, the process of adding instructions to receiving devices, and adding devices to a specified set, and receiving set creation instructions, The process of creating a collection according to a collection creation instruction and configuring corresponding scene rules for the collection does not have a sequence of execution. It can also be understood that these three processes are processing flows that are executed in parallel and do not depend on each other. For details about collection and/or device management, please refer to Figure 6-12 and related descriptions.
- the embodiment of this application can group resources in user accounts, adjust resources based on changes in preset rules in the group, and implement management operations such as adding, deleting, sharing, and moving resources to cross-account resources. Group management across preset rules.
- Resources can be smart locks, smart curtains, smart electrical equipment (for example, air conditioners, refrigerators, TVs, gas stoves, stereos, etc.) and their control equipment, safes, portable storage cabinets, gun cabinets, lockboxes, smart express cabinets, smart lighting equipment , Smart surveillance (e.g. smart cameras, cameras, cat’s eyes, etc.) equipment, walkie-talkies, smart sensors (e.g. gyroscopes, accelerometers, motion sensors, positioning systems (e.g.
- In-vehicle devices such as smart seats, smart driving recorders, smart navigators, etc., can also be various file resources such as music, video, and text.
- the grouping can be flexibly selected according to the actual situation. For example, group home equipment by houses, group vehicle-mounted devices by vehicles, and group file resources by folders.
- the preset rules can be rules applicable to scenes such as parties, sleeping, overtaking, parking, etc., or rules for managing file resources. For example, music can only be placed in a music folder.
- Fig. 5A is a schematic diagram of an apparatus for controlling equipment according to some embodiments of the present application.
- the apparatus 500 may be applied to a first terminal (for example, the user terminal 140).
- the apparatus 500 may include a first receiving unit 501 and an adding unit 502.
- the first receiving unit 501 may be configured to receive a device addition instruction for instructing to add a device to be added to a specified set (for example, a new set).
- the device to be added may be one or more devices bound under the user account corresponding to the first terminal.
- the specified set is configured with corresponding scene rules.
- the adding unit 502 may be used to add the device to be added to the specified set according to the device adding instruction. Among them, the devices added to the specified set are controlled by the first terminal according to the scenario rules corresponding to the specified set.
- FIG. 7 For details of the working process of the first receiving unit 501 and the second receiving unit 502, refer to FIG. 7 and related descriptions.
- the first receiving unit 501 of the apparatus 500 receives a device addition instruction for instructing to add the device to be added to the specified set. And use the adding unit 502 to add the device to be added to the specified set according to the device adding instruction, which can realize the integration of one or more devices added under the account, and set each overall download based on various scenarios. The purpose of the model of each device.
- Fig. 5B is a schematic diagram of an apparatus for controlling equipment according to some embodiments of the present application.
- the device 550 may include a second receiving unit 503 and a configuration unit 504.
- the second receiving unit 503 may be configured to receive a collection creation instruction.
- the configuration unit 504 may be configured to create at least one set according to the set creation instruction, and configure corresponding scene rules for the at least one set. Among them, at least one set includes a specified set. For details of the working process of the second receiving unit 503 and the configuration unit 504, refer to FIG. 6 and related descriptions.
- Fig. 5C is a schematic diagram of an execution unit of an apparatus for controlling a device according to some embodiments of the present application.
- the apparatus for controlling a device may include an execution unit 5000.
- the execution unit 5000 may be used to receive management instructions and execute corresponding management operations according to the management instructions.
- the management instruction may be used to instruct the management of the collection, the devices in the collection, the user accounts associated with the devices in the collection, etc., or a combination thereof.
- the execution unit 5000 may include a third receiving unit 5001, an adding unit 5002, and a modifying unit 5003.
- the third receiving unit 5001 may be used to receive a movement instruction for moving a device in a collection (for example, a house).
- the move instruction carries the identification of the first set of the device to be moved (for example, one or more devices in the first device) (that is, the set where the mobile device is before moving, which may also be referred to as the original set).
- the new set that is, the set where the mobile device is to be moved, which may also be referred to as the target set).
- the adding unit 5002 may be used to delete the device to be moved under the set corresponding to the first set identifier, and add the device to be moved under the set corresponding to the target set identifier.
- the modifying unit 5003 can be used to modify the configuration information of the device to be moved, the configuration information of the first set, the configuration information of the new set, etc. or a combination thereof, so that the current configuration information of the device to be moved matches the scene rule of the new set .
- Fig. 5D is a schematic diagram of an execution unit of an apparatus for controlling a device according to some embodiments of the present application.
- the execution unit 5100 may include a fourth receiving unit 5101 and a determining unit 5102.
- the execution unit 5100 may receive management instructions, and execute corresponding management operations according to the management instructions.
- the fourth receiving unit 5101 may receive the first device deletion instruction used to instruct to delete the device to be deleted from the corresponding set.
- the first device deletion instruction may be sent by the first target user account.
- the first target user account has higher control authority for the device to be deleted, for example, the highest control authority.
- the determining unit 5102 may be configured to determine the set to which the device to be deleted belongs according to the first device deletion instruction, and delete the device to be deleted from the set to which the device to be deleted belongs. For details of the working process of the fourth receiving unit 5101 and the determining unit 5102, refer to FIG. 10 and related descriptions.
- the apparatus for controlling a device may further include: a first sending unit.
- the first sending unit may be configured to send a second device deletion instruction for instructing to delete the device to be deleted to the second terminal, so that the second terminal deletes the device to be deleted from the set to which the device to be deleted belongs according to the second device deletion instruction .
- Fig. 5E is a schematic diagram of an execution unit of an apparatus for controlling equipment according to some embodiments of the present application.
- the execution unit 5200 may include a fifth receiving unit 5201, a deleting unit 5202, and a second sending unit 5203.
- the fifth receiving unit 5201 may be configured to receive a user account deletion instruction for instructing to delete the second target user account.
- the second target user account is associated with the first device added to the collection.
- the control authority of the second target user account to the first device is lower than the control authority of the first target user account.
- the deleting unit 5202 may be configured to delete the second target user account from the user account associated with the first device according to the user account deletion instruction.
- the second sending unit 5203 may be configured to send a control authority deletion instruction to the processing device 112.
- control authority deletion instruction may be used to control the processing device 112 to delete the control authority of the second target user account to the first device.
- Fig. 5F is a schematic diagram of an apparatus for controlling equipment according to some embodiments of the present application.
- the apparatus 5300 may include a sixth receiving unit 5301, a creating unit 5302, and a setting unit 5303.
- the sixth receiving unit 5301 may be configured to receive a device sharing request sent by a user terminal (for example, a second user terminal).
- the sharing request carries the identification of the shared device, the identification and configuration information of the first set corresponding to the shared device, the setting information of the original user account corresponding to the shared device, etc., or a combination thereof.
- the creating unit 5302 may be used to create a new set using the identifier of the first set corresponding to the shared device as the set identifier.
- the creating unit 5302 may determine the configuration information of the first set corresponding to the shared device as the configuration information of the new set.
- the setting unit 5303 can be used to add a shared device to the new collection and set the control authority of the shared device so that the control authority of the shared device meets the requirements of the setting information of the original user account corresponding to the shared device.
- the above description of the device control device, modules and units thereof is only for convenience of description, and does not limit the present application within the scope of the embodiments mentioned. It can be understood that for those skilled in the art, after understanding the principle of the system, it is possible to arbitrarily combine various modules, or form a subsystem to connect with other modules without departing from this principle.
- Different modules can also be one module to realize the functions of the two or more modules mentioned above.
- the adding unit 502, the adding unit 5002, the determining unit 5102, and the deleting unit 5202 may be different modules in a system, or one module may realize the functions of two or more modules mentioned above.
- the configuration unit 504, 5302, and the setting unit 5303 may be different modules in a system, or a module may implement the functions of two or more modules mentioned above.
- each module may share a storage module, and each module may also have its own storage module. Such deformations are all within the protection scope of this application.
- Fig. 6 is an exemplary flowchart of a collection creation method according to some embodiments of the present application.
- the process 600 may be an exemplary implementation of step 401 in the process 400.
- the process 600 may be executed by processing logic, which may include hardware (for example, circuits, dedicated logic, programmable logic, microcode, etc.), software (running on a processing device to perform hardware simulation). Instruction), etc., or any combination thereof.
- processing logic may include hardware (for example, circuits, dedicated logic, programmable logic, microcode, etc.), software (running on a processing device to perform hardware simulation). Instruction), etc., or any combination thereof.
- One or more operations for creating a collection shown in FIG. 6 may be implemented by the device control system 100 shown in FIG. 1.
- the process 600 may be stored in a storage device in the form of instructions, and called and/or executed by the processing device 112.
- the process 600 may be executed before receiving a device addition instruction for instructing to add the device to be added to the specified set.
- the process 600 may be executed before receiving a device addition instruction to add a smart home device to the house (for example, the process 700 in FIG. 7).
- the process 600 may be executed before receiving an add instruction for adding the on
- step 601 the processing device 112 may receive a house creation instruction. In some embodiments, step 601 may be performed by the second receiving unit 503.
- the user can use the user account to log in to the server at the first terminal to create at least one house.
- the user can create a house according to the actual situation of the user. For example, if the user has two houses at home, the user can create two houses in the server, which is not limited here. Specifically, when the user uses the first terminal to create a house, he can also select a preset room type pre-stored in the first terminal. If the preset room type pre-stored in the first terminal does not have his own room type, he can Add or draw the user's own room type.
- step 602 at least one house is created according to the house creation instruction, and corresponding scene rules are configured for the at least one house.
- the scene rule of the house (also referred to as the preset rule) can be understood as the working mode of the house determined based on the name, application scene, type, location, use time and other information of the house.
- the scene rule describes the working mode of the house, and each device under the house needs to work according to the working mode of the house. It is understandable that the relationship between the scene rule and the house is preset, that is, the first terminal creates a house, and the scene rule of the house is automatically configured. Of course, the scene rules of the created house can be modified by the user through the first terminal. In some embodiments, different houses have the same or different scene rules. For example, both the first house and the second house are bedrooms, and the scene rule of the first house may be a reading mode. The scene rule of the second house may be the sleep mode.
- FIG. 8 is a schematic diagram of the relationship between the house and the equipment according to some embodiments of the present application.
- houses 821, 822, ..., 82n are created on the terminal 810.
- the houses 821, 822, ..., 82n respectively have corresponding scene rules.
- Devices 821-1, 821-2, ..., 821-n’ are added under the house 821 respectively.
- the equipment 821-1, 821-2, ..., 821-n' can work according to the scene rules of the house 821.
- a device 822-1 is added under the house 82n.
- the device 822-1 can work according to the scene rules of the house 82n.
- the same device cannot be added to multiple houses at the same time, that is, the same device can only be in one house, and can be adjusted or deleted according to actual conditions.
- the same device can be added to multiple houses at the same time.
- Fig. 7 is an exemplary flowchart of a method for adding a device to a collection according to some embodiments of the present application.
- the process 700 may be an exemplary implementation of step 402 in the process 400.
- the method for adding devices in the set may be applied to the first terminal (also may be referred to as the first client).
- the process 700 may be executed by processing logic, which may include hardware (for example, circuits, dedicated logic, programmable logic, microcode, etc.), software (running on a processing device to perform hardware simulation). Instruction), etc., or any combination thereof.
- processing logic may include hardware (for example, circuits, dedicated logic, programmable logic, microcode, etc.), software (running on a processing device to perform hardware simulation). Instruction), etc., or any combination thereof.
- One or more operations for adding devices to the set shown in FIG. 7 can be implemented by the device control system 100 shown in FIG. 1.
- the process 700 may be stored in a storage device in the form of instructions, and called and/or executed by the processing device 112.
- the processing device 112 may receive a device addition instruction for instructing to add a device to be added (for example, the first device in FIG. 4) to a designated collection (for example, a house). Step 701 may be performed by the first receiving unit 501.
- the device to be added may be a device bound under the user account corresponding to the first terminal.
- the specified set may be configured with corresponding scene rules.
- the devices to be added may include cameras, smart locks, doorbells, smart peepholes, smart air conditioners, smart refrigerators, smart curtains, smart TVs, smart speakers, gas stoves, and other smart home devices and their control devices, safes, and portables.
- the first terminal may receive the identity of the device that the user binds through the gateway, binds through the base station, or binds through Bluetooth.
- the processing device 112 may generate configuration information of the device, and the configuration information of the device may be used to control the operation of the device.
- the user when a user binds a device under his own account, the user may be the owner of the bound device and has the highest authority to the device.
- the scope of the highest authority can be reflected in that only the owner of the device can share the device with other users.
- the configuration information of the shared device when the device is shared with other users, may also be shared together.
- the first terminal may be an application program (APP) installed on multiple types of devices that can control the devices in the collection, or other software that can control the devices in the collection.
- Devices that can install the first terminal may include, but are not limited to, smart phones, tablet computers, personal computers, notebook computers, virtual reality terminal devices, augmented reality terminal devices, and the like.
- the terminal is named the first terminal, and the terminal can also be named the second terminal or the third terminal. This is just to distinguish multiple terminals and has no actual meaning.
- the first terminal, the second terminal and the third terminal The functions of the terminals are the same or similar, and can have more terminals, such as a fourth terminal, a fifth terminal, etc., which are not limited here.
- the first terminal may receive various operation instructions in real time.
- step 702 is executed.
- step 702 the processing device 112 may add the device to be added to the specified set according to the device addition instruction.
- Step 702 may be performed by the second receiving unit 502.
- the devices added to the specified set may be controlled by the first terminal according to the scene rule corresponding to the specified set.
- the first terminal may use the scene rules under each set to control the devices added under the set.
- the scene rules under each set may be several types of preset scene rules, such as party mode, warm mode, night mode, etc., or scene rules customized by the user in advance.
- the processing device 112 can change the configuration information of the newly added device in the collection according to the scene rules of the current collection to make it conform to the scene rules in the current collection, and add to each collection.
- the management of the identification of the equipment can be understood as storing the identification of the equipment added to each collection, so that the equipment can be called, deleted and other operations.
- the scene rules of the first set may include a do not disturb mode, and the device to be added may work in the sleep mode in the do not disturb mode in the first set.
- the specified set of scene rules may include a party mode.
- the devices to be added added to the specified collection can work in party mode in party mode.
- the device to be added may be a smart lamp.
- the configuration information of the smart lamp may be soft light and low brightness.
- the configuration information of the smart lamps can be multi-color mode, flash mode, etc.
- the scene rules of the first set may include a normal mode, and the device to be added may work in the normal prevention and control mode in the normal mode of the first set.
- the scenario rules of the specified set may include a safety mode, and the devices to be added in the specified set may work in the safe mode in the safe mode.
- the device to be added may be a smart lock (for example, a safe, a portable safe-keeping cabinet, a gun cabinet, a lockbox, a smart courier cabinet, a smart lock for a room door, etc.).
- the configuration information of the smart lock can be in a normal protection mode (for example, the mode in which the administrator or other users can open the smart lock).
- the configuration information of the smart lock can be in a safe mode (for example, only the administrator can open the smart lock mode, only the mechanical key or other specified methods can open the smart lock mode, etc.).
- the device to be added may be added to the specified set according to the location information of the specified set in the device adding instruction. In some embodiments, the device to be added can only be added to a designated set.
- Fig. 9 is an exemplary flowchart of a method for moving a device in a set according to some embodiments of the present application.
- the process 900 may be executed by processing logic, which may include hardware (for example, circuits, dedicated logic, programmable logic, microcode, etc.), software (running on a processing device to perform hardware simulation). Instruction), etc., or any combination thereof.
- processing logic may include hardware (for example, circuits, dedicated logic, programmable logic, microcode, etc.), software (running on a processing device to perform hardware simulation). Instruction), etc., or any combination thereof.
- One or more operations for adding devices to the collection shown in FIG. 9 can be implemented by the device control system 100 shown in FIG. 1.
- the process 900 may be stored in a storage device in the form of instructions, and called and/or executed by the processing device 112.
- the processing device 112 may receive a movement instruction of a device to be moved in the set (for example, one or more devices in the first device). Step 901 may be performed by the third receiving unit 5001.
- the move instruction can carry the identification of the original set of devices to be moved (also can be understood as the set where the device is located before the move) and the target set (also can be understood as the set where the device is located after the move, which can also be referred to as designated Collection or new collection).
- the movement instruction may be a movement instruction issued by the server (for example, the server 110) to the first terminal, a movement instruction issued by the user using the first terminal, or another terminal (for example, the second terminal, the third terminal). Terminal, etc.) the movement instructions sent.
- the movement instruction may be a movement instruction input by the user through the input/output device through the first terminal (or other terminal).
- the user can input a movement instruction by long pressing and dragging the identification of the device to be moved.
- the user can select a move button in the menu corresponding to the device to input a move instruction.
- the user can input the information of the device that needs to be moved, the target set, and other information through voice, thereby inputting a movement instruction.
- the movement instruction is a movement instruction issued by the user using the first terminal, that is, the user is setting the collection under his own account
- the user can freely set the device in each collection under his own account.
- Move, and freely modify the configuration information of the device For example, the user can move the lamp in the original collection to the target collection.
- the user can input a movement request through the front-end interface of the first terminal, generate a movement instruction according to the user's input request, and send the movement instruction to the first terminal, that is, the terminal to which the user belongs, and can modify the location of the device in different locations. Different configuration information under different scenarios.
- the light of the desk lamp can be set to a warmer color
- the light of the desk lamp can flicker according to the preset flicker frequency.
- the smart lock or door can be opened for a certain preset time, while in the safe mode, the smart lock or door can only be opened by the administrator.
- the movement instruction may be sent by another terminal, such as a movement instruction sent by the second terminal.
- the processing device 112 may first need to determine whether the second terminal has the authority to move the device in the first terminal. For example, the user of the user account corresponding to the first terminal (hereinafter referred to as the user of the first terminal) is the owner of the device. Then when the second terminal sends a movement instruction to the first terminal, it needs to obtain the consent of the user of the first terminal, and the device needs to follow the scene rules in the set under the first terminal by default.
- the user of the second terminal If the user of the user account corresponding to the second terminal (hereinafter referred to as the user of the second terminal) is the owner of the device, then the first terminal may not need to verify the authority information of the device's movement instruction, but it needs to follow the first According to the scenario rules in the set under the terminal, the user of the second terminal can apply to the user of the first terminal to move or modify the device.
- the movement instruction may be a movement instruction sent by the server, and the user of the first terminal needs to follow the movement instruction sent by the server.
- step 902 the device to be moved is deleted under the set corresponding to the original set identifier, and the device to be moved is added under the set corresponding to the target set identifier.
- Step 902 may be performed by the adding unit 5002.
- a device can be added to different collections. In some embodiments, the same device can only be added to one collection. In this case, when adding the identity of the device to be moved under the set corresponding to the target set identity, it is necessary to delete the identity of the device to be moved under the set corresponding to the original set identity.
- a pop-up window, voice or other means may be used to remind the user that the identity of the device to be moved will be deleted under the set corresponding to the original set identity.
- the user may set that when adding the identity of the device to be moved under the set corresponding to the target set identity, the identity of the device to be moved is deleted under the set corresponding to the original set identity by default. For details about deleting the identification of the device to be moved under the original set, refer to FIG. 10 and its related description.
- the processing device 112 may modify the configuration information of the device to be moved, and/or the configuration information of the set corresponding to the target set identifier, so that the current configuration information of the device to be moved corresponds to the scene rule in the set corresponding to the target set identifier Match.
- Step 903 may be performed by the modification unit 5003.
- the devices added to each collection will follow the scene rules under the collection, and the scene rules of different collections may not be exactly the same. If the scene rules of the original collection to which the device to be moved belongs are the same The scenario rules of the target set to be moved are different, so you need to modify the configuration information of the device to be moved, or modify the configuration information of the set corresponding to the target set identifier, or modify the configuration information of the mobile device and the set corresponding to the target set identifier. Configuration information, so that the current configuration information of the device to be moved matches the current scene rule under the set corresponding to the target set identifier. For example, the processing device 112 can modify the location of the collection of the mobile device, the connection with other devices, the bound account number, the working mode, and so on.
- the configuration information of the collection corresponds to the scene rules of the collection
- the scene rules corresponding to the collection can be generated by using the configuration information of the collection.
- the configuration information of a collection can be understood as the information related to the collection or the devices in the collection, such as the number of devices, the type of the device, the location of the device, the function of the device, the terminal where the collection is located, the user account related to the collection, and the work of the collection Mode, etc. or a combination thereof. After the configuration information of the set corresponding to the target set identifier is modified, the scene rule corresponding to the set is also adjusted accordingly.
- the above description is only for convenience of description, and does not limit the present application within the scope of the listed embodiments. It can be understood that for those skilled in the art, after understanding the principle of the system, various modifications and changes in form and detail can be made to the above method and system without departing from this principle.
- the same device can be located in different sets.
- the smart curtain can be located in the set corresponding to the bedroom or the set corresponding to the security mode.
- whether to delete the identification of the device to be moved in the original set may be manually determined by the user of the terminal 130, or automatically determined by the processing device 112, or semi-automatically.
- the processing device 112 may determine whether to delete the identification of the device to be moved in the original set according to the user's historical operations, user preferences, and the like.
- the user can set a rule whether to delete the identification of the device to be moved in the original set, and the processing device 112 can semi-automatically determine whether to delete the identification of the device to be moved in the original set according to the user's setting.
- Fig. 10 is an exemplary flowchart of a collection creation method according to some embodiments of the present application.
- the process 1000 may be executed by processing logic, which may include hardware (for example, circuits, dedicated logic, programmable logic, microcode, etc.), software (running on a processing device to perform hardware simulation) Instruction), etc., or any combination thereof.
- processing logic may include hardware (for example, circuits, dedicated logic, programmable logic, microcode, etc.), software (running on a processing device to perform hardware simulation) Instruction), etc., or any combination thereof.
- One or more operations for adding devices to the collection shown in FIG. 10 can be implemented by the device control system 100 shown in FIG. 1.
- the process 1000 may be stored in a storage device in the form of instructions, and called and/or executed by the processing device 112.
- step 1001 the processing device 112 may receive a first device deletion instruction for instructing to delete the device to be deleted from the corresponding set. Step 1001 may be performed by the fourth receiving unit 5101.
- the first device deletion instruction comes from the first target user account.
- the first target user account may be the owner of the bound device.
- the first target user account may be an administrator of device control.
- the first target user account has relatively high control rights over the device. For example, the first target user account has the highest control authority for the device to be deleted.
- the delete instruction of the first device may be input by the user on the human-computer interaction interface of the first terminal.
- the user account corresponding to the first terminal is the first target user account.
- the delete instruction of the first device may also be another terminal, and correspondingly, the user account corresponding to the terminal is the first target user account.
- the processing device 112 may determine the set to which the device to be deleted belongs according to the first device deletion instruction, and delete the device to be deleted from the set to which the device to be deleted belongs. Step 1002 may be performed by the determining unit 5102.
- the first device deletion instruction may carry the configuration information of the device to be deleted (for example, the identification, location, name, bound account, connection with other devices, etc.) of the device to be deleted.
- the terminal parses the instruction to obtain the configuration information of the device to be deleted, then searches the created set for the device to be deleted, and determines the set to which the device to be deleted belongs; finally, it is selected from the set to be deleted.
- Delete the device to be deleted For example, when a user of the second terminal shares a device in a collection on the second terminal for the user of the first terminal, the user of the first terminal will create a collection that is the same as the collection to which the shared device belongs.
- the user of the second terminal can send a delete instruction to the user of the first terminal ,
- the delete instruction carries the configuration information of the device to be deleted.
- the first terminal searches for the identification of the device to be deleted among all the sets created by the first terminal, determines the set to which the device to be deleted belongs, and deletes the set to which the device to be deleted belongs. Remove the device.
- the user or the processing device 112 may delete the set. In some embodiments, the user or the processing device 112 may determine whether there are any devices added by the user in the current set based on the number of devices added in the set. If it is determined that the number of devices in the current set is zero, it is determined All devices added to the collection are deleted, and the collection can be deleted. In other words, the user or the processing device 112 can determine whether any set under the user account is necessary, and it needs to determine whether there are devices added by the user under the set. If all the devices added by the user in a set are deleted, then Delete the collection. Optionally, the user or the processing device 112 may also determine whether a collection needs to be deleted according to actual needs, for example, a collection that contains devices or a collection that does not contain devices.
- the process 1000 further includes the following steps.
- the first terminal (also referred to as the first client) can send a second device deletion instruction for instructing the deletion of the device to be deleted to the second terminal (also can be referred to as the second client), so that the second terminal can be 2.
- Device deletion instruction delete the device to be deleted from the set to which the device to be deleted belongs. For example, when the user of the first terminal shares a device in its own collection for the user of the second terminal, the user of the second terminal will create a collection that belongs to the shared device and add the shared device to In the created collection.
- the user of the first terminal can send a delete instruction to the user of the second terminal,
- the deletion instruction carries the identification of the device to be deleted.
- the second terminal After the second terminal receives the instruction to delete the second device, it searches for the device to be deleted among all the collections (for example, houses) created by the second terminal, and determines the collection to which the device to be deleted belongs, and then assigns the device to be deleted. Delete the device to be deleted from the collection.
- Fig. 11 is an exemplary flowchart of a method for device sharing between different accounts according to some embodiments of the present application.
- the process 1100 may be executed by processing logic.
- the processing logic may include hardware (for example, circuits, dedicated logic, programmable logic, microcode, etc.), software (running on a processing device to perform hardware simulation). Instruction), etc., or any combination thereof.
- One or more operations for adding a device to the set shown in FIG. 11 can be implemented by the device control system 100 shown in FIG. 1.
- the process 1100 may be stored in a storage device in the form of instructions, and called and/or executed by the processing device 112.
- the processing device 112 may receive a sharing request from the first device.
- Step 1101 may be performed by the sixth receiving unit 5301.
- the sharing request may carry the identification of the first device, the identification and configuration information of the first set corresponding to the first device, the setting information of the original user account corresponding to the first device, etc., or a combination thereof.
- the sharing request of the first device may be sent by the server (for example, the processing device 112).
- the user who shares the device may have multiple sets of information. Therefore, the user of the first terminal needs to specify the device to be shared. Which set of (for example, houses) of.
- the user of the shared device can set the control authority of the shared device under different users, for example: if the shared user is a visitor, the shared user does not have the authority to change any configuration information of the shared device; if The shared user is a family member, and the shared user has the authority to change the configuration information of the shared device. Because the setting information of the user account of the user sharing the device is used to describe the control authority of the shared device under different users, the sharing request of the device also needs to carry the setting information of the original user account corresponding to the shared device.
- step 1102 using the identifier of the first set corresponding to the first device as the set identifier, the processing device 112 or the user (for example, the second terminal) may create a new set.
- Step 1102 may be performed by the creation unit 5302.
- the user of the processing device 112 or the second terminal may use the identifier of the first set corresponding to the first device as the set identifier to create a new set in the second terminal.
- the processing device 112 may set the configuration information of the new set to the configuration information of the first set (that is, the original set). Specifically, as the shared terminal, the second terminal uses the original collection identifier corresponding to the shared device as the collection identifier after receiving the sharing request of the device to create a new collection. The configuration information of the set created by the second terminal also needs to be set as the configuration information of the first set corresponding to the shared device.
- the user for example, the user of the second terminal
- the processing device 112 may add the first device to be shared under the new set, and check the configuration information of the first device of the shared device (for example, control authority, The location, name, identification, etc.) are set so that the control authority meets the requirements of the setting information of the original user account corresponding to the first device to be shared.
- Step 113 may be performed by the setting unit 5303.
- the second terminal After the second terminal creates the set, it adds the identity of the first device to be shared to the created new set.
- the setting information of the original user account corresponding to the first device describes the control authority of the user of the second terminal to the shared device, and the second terminal can use the requirements of the setting information of the original user account corresponding to the shared device , Set the control authority of the shared device, and determine whether the second terminal itself has the authority to modify the configuration information of the shared device. If the second terminal has the authority to modify the configuration information of the shared device, the configuration information of the shared device can be modified by interacting with the user of the first terminal.
- the first terminal shares a device, such as a desk lamp (such as a smart desk lamp), with the second terminal, the second terminal sends a request to share the desk lamp to the first terminal to the server, and the server receives the sharing request Then, the sharing request is sent to the first terminal.
- the first terminal creates a and The table lamp belongs to the same set in the first terminal, and the configuration information of this newly created set is consistent with the configuration information of the first terminal.
- the second terminal adds the identification of the desk lamp under this newly created house, and sets the control authority of the desk lamp so that the control authority of the desk lamp conforms to the setting information of the desk lamp in the corresponding account of the first terminal.
- the first terminal shares a device with the second terminal, for example, a smart lock
- the second terminal sends a request to share the smart lock with the first terminal to the server.
- the server sends the sharing request to the first terminal.
- the smart lock in the sharing request belongs to the collection in the first terminal (for example, a vehicle, a safe, a safe, a portable storage cabinet, a gun cabinet, a lockbox, a smart express cabinet) Etc.), create a set in the second terminal that is the same as the set to which the smart lock belongs in the first terminal, and the configuration information of this newly created set is consistent with the configuration information of the first terminal.
- the second terminal adds the identification of the smart lock under this newly created set, and sets the control authority of the smart lock so that the control authority of the smart lock conforms to the setting information of the smart lock in the corresponding account of the first terminal.
- Fig. 12 is an exemplary flowchart of a method for deleting an account corresponding to a device according to some embodiments of the present application.
- the process 1200 may be executed by processing logic, which may include hardware (for example, circuits, dedicated logic, programmable logic, microcode, etc.), software (running on a processing device to perform hardware simulation). Instruction), etc., or any combination thereof.
- processing logic may include hardware (for example, circuits, dedicated logic, programmable logic, microcode, etc.), software (running on a processing device to perform hardware simulation). Instruction), etc., or any combination thereof.
- One or more operations for adding devices to the collection shown in FIG. 12 can be implemented by the device control system 100 shown in FIG. 1.
- the process 1200 may be stored in a storage device in the form of instructions, and called and/or executed by the processing device 112.
- the processing device 112 may receive a user account deletion instruction for instructing to delete the second target user account.
- the second target user account is associated with the first device added to the collection (for example, a house), and the control authority of the second target user account to the first device is not the highest control authority, for example, the first device 2.
- the control authority of the target account on the first device is lower than the control authority of the first target account (that is, the user account corresponding to the first terminal) on the first device.
- a device if a device is bound to a user account, the device will be associated with the user account.
- a device can be associated with one or more user accounts, that is, bound by multiple user accounts.
- the user accounts of the bound device may form a user account list, and the list may record multiple user accounts established by the device.
- the account list may be stored in the storage device of the first terminal, the second terminal, and/or the device. For example, the list of accounts bound to the device may be stored in the configuration information of the device.
- the user account in the list can also be deleted, that is, the binding relationship between the device and the user account is released. In some embodiments, after the binding relationship between the device and the user account is released, the terminal corresponding to the user account cannot perform any control operations on the device.
- the user account deletion instruction may be input by the user on the human interaction interface of the first terminal, and the deletion instruction may include the second target user account that needs to be deleted.
- the first terminal corresponds to the account, it has higher control authority over the first device, for example, the highest control authority.
- step 1202 the processing device 112 may delete the second target user account from the user account associated with the first device. Step 1202 may be performed by the deleting unit 5202.
- the first target user account sends a control authority deletion instruction to the server (for example, the processing device 112).
- the control authority deletion instruction is used to control the server to delete the control authority of the second target user account on the first device.
- the user of the second terminal comes to the home of the user of the first terminal, the user of the second terminal wants to use the smart device in the current house of the user of the first terminal, such as a smart air conditioner.
- the user of the first terminal shares the control authority to the user of the second terminal so that they can use the smart air conditioner.
- the user of the first terminal can find the target account with the control authority of the smart air conditioner in the add list of the smart air conditioner, that is, the target account of the user of the second terminal.
- the user account in the addition list of the smart air conditioner, deletes the target user account of the user of the second terminal, and sends a deletion instruction to the processing device 112, and the processor 112 is used to delete the control authority of the second terminal to the smart air conditioner.
- the device control system and method provided in the present application can implement security management of the device through instructions.
- the instruction may be a control instruction such as turning on a certain mode, turning off a certain mode, etc., and may be a semantic result obtained by parsing a human voice, and so on.
- the equipment can be smart locks, smart car locks, smart cabinet locks and other locks, or smart lathes, smart robots and other devices that need to be protected.
- Security management can include disabling electronic control of the device, verifying the user's identity and authority when the user applies for control of the device, and verifying the legality of the information requested by the user.
- the system and method can be applied to locks to realize the safety management of locks.
- the system can be applied to a smart door lock at home.
- the user's instruction is to open the safe mode.
- the system checks the user's identity and authority, and then opens the safe mode after the check is passed, otherwise the safe mode is not opened.
- the system and method can be applied to equipment that needs to be protected, so as to realize the safety management of the equipment.
- this system can be applied to smart lathes in industrial workshops.
- the administrator can set the smart lathes to enter the safe mode during the off-duty hours every day to avoid accidental touch by personnel and damage to personnel and machines.
- the following describes the application of this system with the application of locks and the realization of the safety management of the locks as an example. This is not intended to limit, the system can be applied to other aspects.
- Fig. 13 is a schematic diagram of a device control apparatus according to some embodiments of the present application.
- the device control apparatus 1300 may include an instruction verification module 1311, a state acquisition module 1312, and an instruction judgment module 1313.
- the instruction verification module 1311 may obtain a control instruction used by the user to control the first device, and verify whether the control instruction meets a preset condition.
- the first device control instruction may include a local control instruction or a control instruction received through a communication method (for example, a wired communication method, a wireless communication method, etc., or a combination thereof).
- the first control instruction may be a control instruction for turning on the preset mode.
- the preset mode may include a safety mode, a do not disturb mode, a specific user control mode, or a user self-setting mode.
- the preset mode may be an electronic anti-lock mode of the smart lock.
- the preset mode may be an arming mode.
- the preset mode may be a fire monitoring mode.
- the preset mode may be a safe mode (for example, only an administrator can open, only a mechanical key or a specific method can open, etc.).
- the first control instruction may also be used as an instruction for the management of the smart device.
- the first control instruction can be used to turn on, turn off, lock, or other user-defined functions of the smart device, which is not limited in this application.
- the instruction verification module 1311 may be specifically configured to obtain a control instruction for turning on the preset mode, and determine whether the instruction for turning on the preset mode is sent by a preset terminal, and obtain the verification result.
- the control instruction includes the opening and/or closing rule of the preset mode.
- the instruction verification module 1311 may obtain the control instruction for turning on and/or turning off the preset mode generated in response to the user operating the operating component on the first device, and determine whether the control instruction corresponds to the preset mode. Is generated when the operating component of the is adjusted to the position that characterizes the opening and/or closing of the preset mode, and the verification result is obtained.
- the status obtaining module 1312 may be used to obtain the status of the first device.
- the instruction judgment module 1313 may be used to determine whether to respond to the first device control instruction according to the verification result, the state of the first device, and the control instruction.
- the instruction judgment module 1313 may be used to judge whether the current state of the first device is the locked state, and to judge whether the verification result is the first preset result (for example, the control command to turn on the preset mode is controlled by the authorized person
- the control instruction issued by the first terminal is generated based on the user's operation of the operating component on the first device, etc.). If the state is the locked state and the verification result is the first preset result, it is determined to respond to the smart lock control instruction. If the state is not the locked state, or the verification result is not the first preset result, the smart lock control command is filtered.
- the device control apparatus 1300 may include a first working state control module and an image acquisition module.
- the first working state control module may be used to control the working state of the first device in a preset mode.
- the image acquisition module can be used to determine whether a preset scene appears from the images collected by the preset image acquisition device, and if it does, control the preset image acquisition device to perform image acquisition operations in accordance with the preset image acquisition rules.
- the first device control instruction may be a control instruction for turning off the preset mode.
- the instruction verification module 1311 may be specifically configured to obtain a control instruction for closing the preset mode, and determine whether the control instruction is sent by a preset terminal, and obtain the verification result.
- the control instruction may include a closing rule of the preset mode.
- the instruction verification module 1311 may obtain the control instruction for turning off the preset mode generated after the preset component set on the first device is triggered, and determine whether the control information of the control instruction meets the preset rule, Get the verification result.
- the instruction verification module 1311 may obtain the state change instruction of the first device, and determine whether the state change trend in the state change instruction of the first device is changed from the locked state to the unlocked state, and obtain the verification result. In some embodiments, the instruction verification module 1311 may obtain a control instruction for closing the preset mode input by the user through an input/output device (for example, a smart lock panel), and determine whether the content in the control instruction is preset content, Get the verification result.
- an input/output device for example, a smart lock panel
- the instruction judging module 1313 may be specifically used to judge whether the state of the first device is a normal working state, and to judge whether the verification result is the second preset result. In response to the state of the first device being the normal working state and the verification result being the second preset result, the instruction judgment module 1313 may determine to respond to the smart lock control instruction. In response to the verification result being not the second preset result, the instruction determining module 1313 may filter the control instruction of the first device.
- the second preset result may be that the control instruction to close the preset mode is issued by the first terminal with authority, the control instruction is generated based on the user's operation of the operating component on the first device, and the state change trend in the smart lock state change instruction It is the change from the locked state to the unlocked state, and the content in the control instruction input by the user contains preset content, etc.
- the device control apparatus 1300 may include a second working state control module and a third working state control module.
- the second working state control module may be used to control the working state of the first device in a non-preset mode.
- the first device control instruction may be used to turn off the control instruction of the preset mode.
- the instruction verification module 1311 may be used to obtain a local unlocking instruction input by the user.
- the local unlocking instruction may include unlocking information.
- the instruction verification module 1311 can verify whether the unlocking information is unlocking information with unlocking authority. If so, the instruction verification module 1311 can verify whether the unlocking information is unlocking information corresponding to the preset user ID, and obtain the verification result.
- the third working state control module may be used to respond to the local unlocking instruction to perform an unlocking operation, and after the unlocking operation is successfully performed, turn off the preset mode. For example, when the third working state control module determines that the unlocking operation is successfully performed, it can determine whether the preset bolt of the smart lock is retracted. If the preset bolt of the smart lock is successfully retracted, it is determined that the unlocking operation is successfully performed.
- the first device control instruction acquired in this embodiment may be a local control instruction or a control instruction received through communication. Then, based on the verification result of the first device control instruction and the state of the first device, it is determined whether to respond to the first device control instruction .
- the first device control instruction can be either a local control instruction or a control instruction received through communication. The methods are diverse and flexible, and the method suitable for the user can be selected according to the user's needs, and the user experience is better.
- the first device device control apparatus 1300 may include a chip, a component, a module, etc., or a combination thereof. In some embodiments, the first device control apparatus 1300 may further include a processor and a memory.
- the instruction verification module 1311, the state acquisition module 1312, the instruction judgment module 1313, the first, second, or third state control modules can all be stored as program units in the memory, and the above program units stored in the memory are executed by the processor. Realize the corresponding function.
- the processor may contain a kernel, and the kernel will call the corresponding program unit from the memory.
- the kernel can be set with one or more.
- the first device control instruction can be either a local control instruction or a control instruction received through communication.
- the methods are diverse and flexible, and can be selected according to user needs. The way of the user, the user experience is better.
- the memory may include non-permanent memory in computer readable media, random access memory (RAM) and/or non-volatile memory, such as read-only memory (ROM) or flash memory (flash RAM), and the memory includes at least one Memory chip.
- RAM random access memory
- ROM read-only memory
- flash RAM flash memory
- the first device may be provided with a control password.
- the user of the first device may set a temporary control password for the temporary user. After the temporary password is leaked, the first device may be illegally controlled, and the security is low.
- the first device is a smart lock as an example for description.
- the user of the smart lock (for example, the owner of the smart lock) can set an unlocking password for the smart lock.
- the owner of the smart lock may set a temporary password for temporary users, such as visitors or cleaning staff. After the temporary password is leaked, the smart lock may be opened illegally, and the security is low.
- the temporary password refers to a password or a Bluetooth key that the administrator provides for members to open the door in a short period of time, and is valid within the validity period.
- smart locks include, but are not limited to, smart door locks, smart locks on safes, indoor smart locks, window locks, garage locks, car door locks, and the like.
- Temporary passwords or passwords include but are not limited to text passwords (for example, numeric passwords, letter passwords, etc.), biometric passwords (for example, facial recognition passwords, iris recognition passwords, voiceprint recognition passwords, fingerprint recognition passwords, etc.), gesture action passwords, Voice password, etc.
- the security mode can be electronic anti-lock, or vacation mode (disable the preset password), etc., so that when you don’t want to be disturbed or want to improve the security of opening the door, you can turn on the safe mode functions, such as the electronic anti-lock, so that non-administrators Other users cannot open the smart lock.
- the electronic anti-locking refers to the electronic unlocking method of the smart lock is locked, and only a mechanical key or a specific method can open the door.
- the administrator refers to the owner of the smart lock, that is, the user under which the smart lock is bound.
- the present application provides a method and system for electronic lock control through local control instructions or control instructions received through communication.
- the control method of the smart lock provided in the present application can be applied to the controller of the first device, and the controller of the first device can turn on or turn off the preset mode by responding to the preset control instruction rules set in advance. Take the electronic anti-lock as an example in the security mode.
- the smart lock control method can be applied to safes, portable safekeeping cabinets, gun cabinets, lockboxes, smart express cabinets, house doors, windows, garages, car doors, and other devices with smart locks to achieve the same Control function.
- Fig. 14 is an exemplary flowchart of a device control method according to some embodiments of the present application.
- the process 1400 may be executed by processing logic, which may include hardware (for example, circuits, dedicated logic, programmable logic, microcode, etc.), software (running on a processing device to perform hardware simulation). Instruction), etc., or any combination thereof.
- processing logic may include hardware (for example, circuits, dedicated logic, programmable logic, microcode, etc.), software (running on a processing device to perform hardware simulation). Instruction), etc., or any combination thereof.
- One or more operations of the smart lock control method shown in FIG. 14 can be implemented by the device control system 100 shown in FIG. 1.
- the process 1400 may be stored in a storage device in the form of instructions, and called and/or executed by the processing device 112.
- the process 1400 may be used to control a smart lock.
- the process 1400 may be applied to a controller in a smart lock.
- step 1401 the processing device 112 may obtain a control instruction used by the user to control the first device.
- Step 1401 may be performed by the instruction verification module 1311.
- the control instruction of the first device may include an instruction to control the turning on and/or turning off of the preset mode of the first device.
- the preset mode of the first device may include a safety mode, a do not disturb mode, a specific user control mode, a user self-setting mode, and the like.
- the first device may include a smart lock.
- the preset mode can be a certain mode of the smart lock, such as an electronic anti-lock function mode, a security mode that only supports the administrator to open the door, or a security mode set by the user.
- the actual application function corresponding to the mode is included.
- the electronic anti-lock function mode there are two corresponding functions, which are to turn on and turn off the electronic anti-lock function.
- Smart lock control commands include local control commands or control commands received through communication.
- the communication method may include a wired communication method, a wireless communication method, etc., or a combination thereof. Wired communication methods may include metal cables, optical cables, hybrid cables, etc., or any combination thereof.
- the wireless communication method may include a local area network (LAN), a wide area network (WAN), Bluetooth TM , ZigBee TM , near field communication (NFC), etc., or any combination thereof.
- the local control instruction may be generated based on the user's operation of the operating component on the first device.
- the user operates the button used to control the electronic anti-lock function, or the user enters the local function code for controlling the electronic anti-lock function on the smart lock panel, and the user is bound to the smart lock
- the terminal input controls the electronic anti-lock function and other operations.
- the smart lock can also be connected to an external terminal through wired communication or wireless communication.
- External terminals include, but are not limited to, smart devices such as mobile phones, notebooks, smart watches, and speakers.
- the external terminal may communicate with the first device and issue a control instruction.
- the control instruction may be an instruction to control the opening or closing of the preset mode of the first device, and the instruction may also carry an opening or The time period for closing, such as opening every Sunday, etc.
- the control command can also carry the opening method, such as turning on immediately, starting on a specific day, turning on according to a fixed cycle, or turning on every day, etc., turning off is similar.
- step 1402 the processing device 112 may verify whether the control instruction meets a preset condition to obtain a verification result. Step 1402 may be performed by the instruction verification module 1311.
- verifying whether the control instruction satisfies a preset condition may include verifying whether the first terminal has the authority to perform an operation corresponding to the control instruction.
- the control instruction of the first device is a control instruction for turning on the preset mode
- the verification of whether the control instruction satisfies the preset condition may include the following steps.
- the processing device 112 may obtain the control instruction for starting the preset mode, and determine whether the control instruction is sent by the preset terminal, and obtain the verification result.
- the control instruction sent by the first terminal may be received through communication with the first terminal (for example, an external terminal, etc.).
- the first terminal is the preset terminal in this embodiment.
- the first device can be controlled by the first device control software program on the first terminal, such as APP control, that is, only the first device control APP is installed and the first device is registered in the APP. Only the first terminal of the information has the authority to control the first device.
- the processing device 112 receives the control instruction for turning on the preset mode, and determines whether it is sent by the first terminal with the first device control APP installed and the first device information registered in the APP. If it is, it is considered that the control command meets the preset condition.
- the control instruction used to turn on the preset mode generally carries the identity of the sender, and if the sender is a mobile phone as an example, it will carry information such as the ID number of the mobile phone.
- the processing device 112 can verify whether the ID number is the ID number of the first terminal where the first device control APP is installed and the information of the first device is registered in the APP. If so, the processing device 112 can determine that the control instruction satisfies the preset condition. , The verification result is the first preset result, and the verification is passed; if not, the processing device 112 may determine that the control instruction does not meet the preset condition, and the verification fails.
- the processing device 112 may parse the content of the control command.
- the control command may include a rule for turning on the preset mode, which may be activated in real time or The preset time period is turned on.
- verifying whether the control instruction satisfies a preset condition includes verifying whether the operating component is located at a preset position.
- the verification of whether the control instruction satisfies the preset condition may include the following steps.
- the operating component on the first device for starting the preset mode may include a button, a knob, a paddle switch, etc., or a combination thereof.
- the operating component in this embodiment can also be a knob-type component.
- the operating component has two different flags. One flag bit indicates that the electronic anti-lock function is turned on, and the other flag bit indicates that the electronic anti-lock function is turned off.
- the electronic anti-lock function when the user adjusts the operating part to the flag position for turning on the electronic anti-lock function, the electronic anti-lock function is turned on, and when the user adjusts the operating component to the flag position to turn off the electronic anti-lock function, the electronic anti-lock function is turned off.
- the electronic anti-lock function can be turned on or off by turning left and right.
- the operating component can also be a physical button or paddle. When it is dialed upward, it means that the electronic anti-locking function is turned on, and when it is dialed down, it means that the electronic anti-locking function is turned off.
- the operating component can also be a paddle. Turning the red arrow on the paddle to the same direction as the handle indicates that the electronic anti-lock function is turned on, and turning the red arrow on the paddle to the opposite direction of the handle indicates that the electronic anti-lock function is turned off.
- the operation component is a button as an example for description. Assuming that the button is generally in an unpressed state, when the button is pressed by the user, it is explained that the button is adjusted to the position that indicates that the preset mode is turned on. At this time, the processing device 112 may Acquire a control instruction for opening the preset mode generated in response to a user operating an operating component on the smart lock, and the control instruction is a control instruction for opening the preset mode.
- the processing device 112 After the processing device 112 receives the control instruction, it will determine the identity information of the sender of the control instruction.
- the control instruction may carry identification information of the sender, for example, ID information, password information used by the user, and so on.
- the processing device 112 may determine whether the control instruction is generated when the operating component (also referred to as a preset component) is adjusted to the position that indicates that the preset mode is turned on according to the identification information. If so, the processing device 112 may determine that the control instruction satisfies the preset condition.
- the first preset result represents legality and the verification is passed; if not, the processing device 112 may determine that the control instruction does not meet the preset condition, and the verification fails.
- the first implementation method belongs to the automatic opening of the preset mode, such as the electronic anti-lock function
- the second implementation method belongs to the manual opening of the preset mode, such as the electronic anti-lock function
- the opening of the preset mode can also support remote control, for example, through Software-as-a-Service (SaaS) in response to the user's configuration request, it can support remote opening, ensuring that when the user is away from the first device Control the reliability and timeliness of the preset mode.
- the preset mode can also be controlled by means of a local instruction to close the preset mode, such as an electronic anti-lock function, issued by a user with administrator authority.
- the verification of whether the control instruction satisfies the preset condition may include the following steps.
- the processing device 112 may obtain the control instruction for closing the preset mode, and verify whether the control instruction is sent by the preset terminal, and obtain the verification result; the control instruction includes the closing rule of the preset mode.
- control instruction used to turn off the preset mode is similar to the above control instruction used to turn on the preset mode. The difference is that one is used to turn on the preset mode, such as the electronic anti-lock function, and the other is to turn off the preset mode, such as electronic Anti-lock function.
- the preset mode such as the electronic anti-lock function
- electronic Anti-lock function the preset mode
- the mobile terminal software program can be connected to the first device in a wired or wireless manner to control the first device, turn on or off the preset function of the first device, and realize the preset function of the first device. Switch between on and off state.
- the opening period and the opening time period can be input in the display interface for setting the on or off of the preset function of the first device, and the OK button can be clicked to send the setting data to the processing device 112.
- the processing device 112 may turn off the preset function of the first device in the set period and on time period.
- the processing device 112 when the processing device 112 detects that the door is opened inward, it can turn off the preset mode, such as turning off the electronic anti-lock function. Specifically, when the user performs a door opening operation indoors, the processing device 112 can release the electronic anti-lock state, that is, turn off the electronic anti-lock mode, and synchronize to the APP.
- the method of detecting that the smart lock is opened from the room can be implemented by sensors and other devices, which can be specifically as follows:
- a magnet to the operating element (for example, handle, knob, handle, etc.) installed in the door, and place a reed pipe around the operating element.
- the reed pipe or The inside opening of the door can be detected by pressing the button or infrared.
- reed pipes and permanent magnets can be used to detect the door opening.
- a button can be set inside or outside the door so that the user can confirm that the door is opened inside by pressing the button.
- the above-mentioned magnets, reed switches, infrared sensors, transmitters, and receivers can be used as the operating components provided on the smart lock in this embodiment.
- the smart lock can generate a control instruction to close the preset mode.
- the processing device 112 receives the control instruction, it will verify whether the control instruction is generated by the user's operation on the operating component, and determine the control Whether the control information of the instruction meets the preset conditions, the verification result is obtained. If the control instruction satisfies the preset condition, the verification result is the second preset result, and the second preset result represents legality, and the verification is passed. If the control command does not meet the preset conditions, the verification fails.
- the operating component is a transmitting device and a receiving device.
- the transmitting device and the receiving device keep moving away from each other.
- the strength of the signal received by the receiving device keeps decreasing. Therefore, the changing law of the transmitting device and the receiving device is that the strength of the received signal keeps decreasing. If this law is met, it is considered that the preset conditions are met.
- other operating components may also have corresponding change rules, and the processing device 112 may determine whether the preset rules are met by judging whether the change rules are met.
- the door when there is a fingerprint or password outside the door for authentication and unlocking, the door is considered to be open, and when there is no fingerprint or password authentication, the door is opened directly, and the door is considered to be opened. At this time, the smart lock anti-lock mode is also closed. .
- control instruction for closing the preset mode can be generated only by operating the preset component.
- an electronic key may be provided on the smart lock. Only when the electronic key and the operating components are activated at the same time, the control command for turning off the preset mode can be generated.
- the processing device 112 may determine a state change of the first device (for example, an operating component of the first device). In response to the state change of the first device satisfying the preset condition, the processing device 112 may determine that the verification is passed.
- a state change of the first device for example, an operating component of the first device.
- the processing device 112 may obtain the smart lock state change instruction, and determine whether the state change trend in the smart lock state change instruction is changed from the locked state to the unlocked state, and obtain the verification result.
- a sensor is provided on the bolt of the smart lock, and the sensor is placed on the inner bolt of the door.
- the sensor detects the change when the bolt is retracted.
- the door is considered to be opened inside.
- the data output by the sensor to the processing device is the smart lock state change instruction, and the smart lock state change instruction carries the state change trend of the bolt. If the state change trend is changed from the locked state to the unlocked state, that is It is considered that the door is opened inward, and the verification result is passed verification. If it is not changed from the locked state to the unlocked state, the verification is deemed to have failed.
- the user may input a control instruction for turning off the preset mode (for example, through a panel of a smart lock, a button, etc.).
- the processing device 112 may determine that the verification is passed.
- the online unlock code number is 1001 ⁇ 1050
- the activation code code number is 3001-3048.
- the user can set an activation code password in the APP
- the activation code password is a number in the above 3001-3048
- the activation code password is used to turn on or turn off the preset mode, such as turning off the electronic anti-lock function .
- the activation code password can also be used to control the mode (for example, the current mode (for example, the first device is currently executing) of one or more devices in the first device (for example, the smart device 130 in FIG. Mode), user-defined mode, safe mode, do not disturb mode, etc.).
- the activation code password can be used to turn on and/or turn off the first device.
- the activation code password can be used to turn on/or turn off the mode of the first device.
- the user can enter a string of numbers on the smart lock panel of the smart lock.
- the processing device 112 receives a control instruction for turning off the preset mode.
- the instruction carries the number entered by the user.
- the processing device 112 determines whether the data is Pre-set preset content, such as the activation code password set by the user, if it is, the verification is passed. If it is not changed from the locked state to the unlocked state, the verification is deemed to have failed.
- the dynamic password and Bluetooth cannot open the door. But the fingerprint can open the door normally.
- the normal online password, activation code, employee password, activation code, tenant password, temporary password, and one-time password cannot be opened.
- all passwords can be used to open the door.
- the processing device 112 may obtain a local unlocking instruction input by the user.
- the local unlocking instruction may include unlocking information.
- the processing device 112 may verify whether the unlocking information is unlocking information with unlocking authority. If so, that is, in response to the unlocking information being unlocking information with unlocking authority, the processing device 112 may verify whether the unlocking information is unlocking information corresponding to the preset user ID, and obtain the verification result.
- the user can control the area corresponding to the smart lock (for example, the smart lock control area on the door where the smart lock is installed, the smart lock display on the safe, the display on the express cabinet, and the smart lock has a signal Enter fingerprints, passwords and other information on the connected additional control area, etc.).
- This information is called unlocking information.
- this embodiment can also be extended to a scenario of Bluetooth unlocking or radio frequency card unlocking.
- the controller After the user enters the unlocking information, the controller will A local unlocking instruction including unlocking information is received.
- the unlocking information is the unlocking information corresponding to the preset user ID, the verification is passed.
- the unlocking authority please refer to Figure 15 and its related descriptions.
- the processing device 112 may determine whether to control the first device to perform an operation corresponding to the control instruction according to the verification result, the state of the first device (for example, a smart lock), and the control instruction.
- the state of the first device may include the working mode of the first device (for example, the lock mode of the smart lock, the shooting mode of the camera, the anti-lock mode of the smart lock, etc.).
- the working mode of the first device for example, the lock mode of the smart lock, the shooting mode of the camera, the anti-lock mode of the smart lock, etc.
- the processing device 112 may obtain whether the state of the operating component provided on the first device satisfies a preset condition.
- the processing device 112 may collect the state of the first device in real time, and collect the state of the first time at a preset time interval (for example, every 3 seconds, 5 seconds, 10 seconds, etc.). For example, the processing device 112 may obtain the state of the bolt collected by the bolt sensor of the smart lock, and determine whether the smart lock is in the locked state or the unlocked state. For example only, the processing device 112 may obtain the latest bolt state stored in history collected by the sensor, and determine it as the state of the smart lock.
- a preset time interval for example, every 3 seconds, 5 seconds, 10 seconds, etc.
- the smart lock control command is a control command used to open or close the preset mode. Therefore, in this embodiment, it is necessary to combine the verification result, the state of the smart lock, and the preset control command response rule to determine whether it is necessary Execute smart lock control instructions, specifically whether it is necessary to turn on or off the control instructions of the preset mode.
- determining whether the smart lock control command needs to be executed includes the following steps.
- the processing device 112 may determine whether the state of the smart lock is a locked state, and determine whether the verification result is verified. In response to the state of the smart lock being the locked state and the verification result is that the verification is passed, the processing device 112 may determine to respond to the smart lock control instruction. In response to the state of the smart lock being not the locked state or the verification result is that the verification is not passed, the processing device 112 may filter the smart lock control command.
- the smart lock if the preset mode is turned on, taking the electronic anti-lock function as an example, when the electronic anti-lock function is turned on, the smart lock must be in the locked state, that is, the electronic anti-lock function is allowed to be turned on only in the locked state.
- the smart lock control instruction In response to the verification result being the first preset result, that is, only when the current state is the locked state and the verification result is the first preset result, will it respond to the smart lock control instruction, turn on the preset mode, and control the smart lock to be in the preset mode
- the working status such as turning on the electronic anti-lock function.
- the control command sent by the preset terminal includes a preset mode, such as the opening rule of the electronic anti-lock function.
- the opening rule may include the first type of opening rule.
- the first opening rule may be a real-time opening rule. That is to say, after receiving the control instruction and determining that the control instruction is sent by the preset terminal, if it is determined that the state of the smart lock is the locked state and the verification result is the first preset result, then the control instruction is The content is analyzed. If the rule is activated in real time, the preset mode, such as the electronic anti-lock function, will be activated immediately.
- the opening rule may include a second type of opening rule.
- the second type of opening rule can be the opening rule for a preset time period, that is, the electronic anti-lock function is valid within the preset time period.
- Valid within the preset time period means that the processing device 11 receives the control instruction sent by the preset terminal, verifies whether the control instruction meets the preset conditions, and the smart lock is in the locked state, then records the effective time and the expiration time (that is, the corresponding effective Time range, the effective time range is the time range for opening the preset mode), then the preset mode is activated (such as turning on the electronic anti-lock function) and ending the preset mode (such as ending the electronic anti-lock function) according to the preset rules.
- the user can set the electronic lock or safety mode to be turned on from 0 o'clock to 6 o'clock every night.
- the user can set a time period and period. For example, it will automatically turn on from 20:00 to 8:00 in the morning every night. If the local time of the smart lock is within this range, the electronic anti-lock will be turned on. End electronic anti-lock.
- the above-mentioned control on the first device can be applied to the control of other devices.
- the first device may be a cleaning robot, and the processing device 112 may control the cleaning robot to perform operations corresponding to the control instruction (for example, charging , Sweeping, mopping, etc.).
- the controller of the smart lock still recognizes the information carried by the unlocking instruction such as fingerprint password during the period when the preset mode (such as electronic anti-locking) is turned on, but the non-administrator does not respond.
- the content carried by the control instruction is that the control smart lock is always in the electronic lockout state, but the effective execution time period of the electronic lockout and the execution invalid time period are set.
- the effective execution time period if the smart lock is The state is the locked state, and the verification result is the first preset result. Only the password and key of the administrator identity can unlock the lock, and the unlock command can be responded to during the execution invalid time period.
- the door cannot be opened without the identity of the administrator or the key is unlocked.
- the image capture device such as a camera
- the image capture device can be controlled for monitoring.
- the image capture device can be integrated with the smart lock or separately.
- the monitoring level of the camera can be increased (for example, the resolution, the shooting angle, etc.) can be increased to enhance the monitoring.
- the image capture device can capture images.
- the processing device 112 may receive the image collected by the image acquisition device, and determine whether a preset scene appears based on the image collected by the image acquisition device.
- the preset scenes may include abnormal scenes, user-defined scenes, etc., or a combination thereof.
- Abnormal conditions can include strangers unlocking the door, strangers indoors and/or outdoors, unauthorized users controlling equipment, fires, gas leaks, floods, smoke, and accidents on objects (such as monitored elderly, children, pets, etc.) Etc. or a combination thereof.
- the processing device 112 may determine whether there is a person in the image based on the image collected by the image acquisition device, that is, determine whether there is a person outside the door, and if there is a person, it is considered that a preset scene has appeared.
- the preset image capture device is controlled to perform image capture operations in accordance with preset image capture rules. If the recording function of the preset image acquisition device is turned on, the recording time can be longer than the usual recording time. At this time, the controller will also push a strong reminder to the user's APP, so that the user can instantly understand the unlocking situation and improve security.
- the processing device 112 may not turn on the preset mode, and the processing device 112 may filter the smart lock control command, or check the validity of the smart lock control command. The nature is set to invalid to avoid false control commands.
- control instruction of the smart lock is a control instruction for turning off the preset mode, and determining whether the smart lock performs an operation corresponding to the control instruction may include the following steps.
- the processing device 112 may determine whether the state of the smart lock is a normal working state, and determine whether the verification result is the second preset result. In response to the state of the smart lock being the normal working state and the verification result being the second preset result, the processing device 112 may determine to respond to the smart lock control instruction. In response to the verification result of the smart lock being not the second preset result, the processing identification 112 may filter the smart lock control instruction.
- the state of the smart lock is not limited, as long as the smart lock has not failed, that is, it is in a normal working state, specifically whether it is in a locked state or an unlocked state. There is no limitation in this embodiment.
- the processing device 112 may determine to respond to the control instruction. Specifically, the processing device 112 may control the smart lock to be in a working state in a non-preset mode. In response to the verification result being that the verification is not passed, the processing device 112 may filter the control instruction.
- the administrator in the case of obtaining the local unlocking instruction input by the user, the administrator has the highest unlocking authority. As long as the administrator unlocks and the smart lock is in a normal working state, Regardless of the preset mode, such as the state of electronic anti-lock, directly unlock. When it is not the administrator to open the lock, it will consider the status of the electronic lock and whether the smart lock is in the normal working state. When the electronic lock is on, unlocking is prohibited. When the electronic lock is off, if the smart lock is in the normal working state , Unlocking is allowed.
- the unlocking operation is not performed. If the unlocking information has the unlocking authority and corresponds to the preset user ID, it is proved that the administrator unlocked at this time. If the smart lock is in a normal working state, it will respond to the local unlocking instruction and perform the unlocking operation, specifically by driving the motor to rotate to open the door operate. In some embodiments, after the unlocking operation is successfully performed, the preset mode can still be opened, and temporary users are not allowed to open the door. In some embodiments, after the unlocking operation is successfully performed, a preset mode, such as an electronic anti-lock function, is turned off to allow a temporary user to open the door. Among them, when determining whether the unlocking operation is successfully performed, the state of the bolt can be judged, specifically, it is determined whether the preset bolt is retracted; if it is, it is determined that the unlocking operation is successfully performed.
- the unlocking information has the unlocking authority but does not correspond to the preset user ID, it means that the unlocking may be a temporary user at this time.
- the processing device 112 may not respond to the local unlocking command at this time. Specifically, the local unlocking command may be discarded, and the unlocking operation will not be performed.
- the electronic lockout state is closed, it means that the user allows temporary users to enter the door. The lock is in a normal working state, and the processing device 112 can perform an unlocking operation at this time.
- the smart lock controller judges the correctness of the information. If the input is correct, the electronic anti-lock status is obtained once, and the status is judged. If the electronic anti-lock is opened, then The controller further determines whether the administrator unlocks the lock and whether the smart lock is in a normal working state, and if so, unlocks the lock and turns off the electronic anti-lock function. If not, the controller will not control the rotation of the motor. In addition, if the electronic anti-lock is closed, the smart lock controller will control the rotation of the motor to open the door.
- the embodiment of the present invention can disable all smart unlocking methods of smart locks, including Bluetooth, fingerprint, password, RFID, etc., by enabling the electronic anti-lock function described above. Aiming at some hackers using illegal means to crack the smart lock password, or crack the smart lock Bluetooth unlocking key, this design can completely prohibit all electronic unlocking methods, even if the smart lock password is known, the unlocking operation cannot be performed.
- the smart lock supports issuing temporary passwords, periodic passwords and other short-term password methods.
- the user issues a temporary password to a nanny or cleaning staff, or wants to not be issued within a certain period of time
- a person with a password enters his home, he can use the electronic anti-lock function to lock the smart lock and disable all electronic unlocking methods.
- the above embodiment uses fingerprints, digital passwords and other electronic means to unlock.
- it can also be unlocked with a key, as long as the key can be inserted into the keyhole and unlocked, and the smart lock is in normal operation at this time.
- Status the unlocking is considered successful, and the preset mode is also activated at this time, such as turning on the electronic anti-locking function.
- the smart lock control command acquired in this embodiment may be a local control command or a control command received through communication. Then, based on the verification result of the smart lock control command and the state of the smart lock, it is determined whether to respond to the smart lock control command.
- the smart lock control command can be either a local control command or a control command received through communication.
- the modes are diverse and flexible, and the mode suitable for the user can be selected according to the user's needs to realize the mode opening or Closed, the user experience is better.
- Fig. 15 is an exemplary flowchart of a method for verifying a user's unlocking authority according to some embodiments of the present application.
- step 1501 the processing device 112 may obtain pre-stored legal unlocking information with unlocking authority.
- the smart lock (for example, the controller of the smart lock) may be pre-stored with legal unlocking information with unlocking authority.
- the legal unlocking information with unlocking authority may be input by the user through the mobile phone APP or input on the local input interface.
- the user can set legal unlocking information with unlocking authority, user identification corresponding to the corresponding set legal unlocking information (for example, administrator, family member, ordinary user, temporary user, etc.), or whether it is a temporary password, etc.
- the processing device 112 may determine whether the legal unlocking information includes unlocking information.
- the unlocking information may be unlocking information corresponding to a preset user logo.
- the corresponding preset user can be the smart lock administrator.
- the corresponding preset user can be a smart lock administrator, a normal user, a temporary user, etc. If the legal unlocking information includes unlocking information, step 1503 is executed. If the legal unlocking information does not include the unlocking information, step 1504 is executed.
- step 1503 the processing device 112 may determine that the unlocking information is unlocking information with unlocking authority.
- step 1504 the processing device 112 may determine that the unlocking information is not unlocking information with unlocking authority.
- the processing device 112 may determine whether the legal unlocking information includes unlocking information. If it does, the unlocking information is unlocking information with unlocking authority; if not, the unlocking information is not unlocking information with unlocking authority.
- the processing device 112 determines that the unlocking information is unlocking information with unlocking authority, it will verify whether the unlocking information is unlocking information corresponding to the preset user ID, and obtain the verification result.
- the process of verifying whether the unlocking information is the unlocking information corresponding to the preset user ID is similar to the process of whether the unlocking information is the unlocking information with the unlocking authority, specifically:
- the processing device 112 can obtain the target unlocking information corresponding to the preset user ID, and determine whether the target unlocking information includes unlocking information. Set the unlock information of the user ID to obtain the verification result.
- the device management system and method provided in this application can also be used for the arming and disarming of the device, as well as the collection of information by sensors to ensure the safety of the device and/or the scene in which the device is used.
- the equipment can be smart door locks, smart car locks, smart device locks and other locks, smart cameras, smart anti-theft devices, and other security devices, or smart safes, smart gun cabinets, and other boxes that protect specific items.
- the sensor can be a temperature sensor, a battery level sensor, an infrared sensor, a sound sensor, and other different types of sensors.
- the scene can be the theft prevention and protection of homes, cars, etc., or the protection of smart devices such as safes and gun cabinets.
- the system can perform arming and disarming operations locally. In some embodiments, the system can complete the arming and disarming operations by executing the server's arming and disarming instructions. In some embodiments, the system can combine with the server locally to complete the arming and disarming operations.
- the system can manually arm and disarm. In some embodiments, the system can automatically arm and disarm. In some embodiments, the system can be manually and automatically combined to complete the arming and disarming operations.
- the system can be applied to locks to realize anti-theft and protection of homes, automobiles, etc.
- this system can be applied to smart door locks in the home, to arm the smart door locks, and to detect whether there are voices in the house through the sound sensor, which can realize the monitoring and alarm of abnormal conditions such as human voices in the door and lock picking outside the door.
- the temperature sensor can detect whether the temperature in the house is too high, whether the carbon monoxide concentration exceeds the standard, and whether the smoke concentration exceeds the standard, and prompt a fire alarm.
- the system can be applied to security equipment to realize theft prevention and protection of homes, automobiles, etc.
- the system can be applied to the security equipment in the car.
- the smart camera and the smart anti-theft device in the car enter the armed state to monitor in real time whether there are strangers approaching, the car body shakes and other abnormal situations occur.
- the system can be applied to a box that protects specific items to protect the box.
- the system can be applied to safes, to arm the safe box, and to monitor in real time whether there are abnormal situations such as severe knocks and long-distance transportation.
- Fig. 16 is a schematic diagram of an application scenario of a control system for a smart lock according to some embodiments of the present application.
- control system 1600 may include a smart lock 1610, a server 1620, a network 1630, a communication gateway 1640, and a smart device 1650.
- one or more components in the control system 1600 may communicate in a wired or wireless manner.
- the smart lock 1610 may include a smart door lock, a smart car lock, a smart device lock (for example, the lock of the smart device 130 in FIG. 1) and other locks.
- the smart lock 1610 may include a lock module 1611 and a communication module 1612.
- the lock module 1611 may include a lock body control chip 1611-1 and a lock body 1611-2.
- the smart lock is an example of a smart door lock.
- the smart lock 1610 may also include an inner door operating member (for example, an inner door handle) 1611-3 and an outer door operating member (for example, an outer door handle) 1611-4 connected to the lock body.
- the operating part inside the door refers to the part that is in the room when the door is closed and used by the user to operate to control the smart lock.
- the outer door operating part refers to the operating part of the smart lock that is outside when the door is closed.
- the inner door operating member 1611-3 may include a door handle, a display screen, a button, a knob, a key, a sensing device, etc., or a combination thereof.
- the outer door operating member 1611-4 may include a display screen, an outer door handle, buttons, keys, knobs, etc., or a combination thereof.
- the lock module 1611 may also be called a door lock module
- the lock body control chip 1611-1 may also be called a door lock control chip.
- the lock body 1611-2 may include a main body, a lock tongue, and a lock core (not shown in the figure).
- the lock body control chip 1611-2 can control the contraction and ejection of the bolt in the lock body to realize the unlocking and locking of the door lock.
- Locking refers to using the smart lock 1610 to control the door in a locked state.
- the door inner operating member 1611-3 refers to one or more components of the smart lock 1610 that is installed indoors when the smart lock 1610 is installed on the door and the door is in the closed state.
- the outer door operating member 1611-4 refers to one or more components of the smart lock 1610 that is installed on the door body and is located outdoors when the door is closed.
- the user can use the inner door operating member 1611-3 to open the door by rotating the door inner operating member 1611-3.
- the user can control the smart lock 1610 to open or close the lock through electronic verification (for example, password, biometric information, Bluetooth, NFC, local area network, etc.).
- the user implements the locking of the smart lock 1610 through the outer door operating member 1611-4 (such as lifting the outer door handle). It is understandable that, since the smart lock 1610 may not be provided with an operating member outside the door, in this case, the smart lock 1610 can be locked by operating a touchpad outside the door or the like.
- the user can be locked through an electronic verification method (such as biometric identification, password verification, card swiping, mobile phone Bluetooth, etc.). In some embodiments, the smart lock 1610 can be automatically locked.
- the smart lock 1610 may also be provided with different kinds of sensors to sense the state of the bolt of the smart lock, or to sense the operation behavior of the user on the smart lock, or to sense the indoors of the place where the smart lock door is located. Temperature etc.
- the smart lock 1610 may further include a motor for powering the smart lock 1610, and a display screen for displaying information such as prompt information and a password keyboard.
- the smart lock 1610 may also include a monitoring device.
- the monitoring device may be a camera to collect images inside and outside the door through the camera.
- the monitoring device can also be other human body sensing devices (for example, infrared cameras, ultrasonic devices, radio positioning devices, radar positioning devices, laser detection devices, sensors (for example, sound sensors, odor sensors, motion sensors, etc.), etc. or a combination thereof) Wait, there is no restriction on this.
- the smart device 1650 may be installed in a room corresponding to the door where the smart lock 1610 is located.
- the smart device 1650 may be installed in a room corresponding to the door where the smart lock 1610 is located.
- the smart device 1650 refers to the smart device 130 in FIG. 1 and its related description.
- the smart device 1650 and the server 1620 may realize a communication connection through the network 1630.
- the server 1620 can obtain the lock body state of the smart lock 1610, such as the locked state of the lock body, the unlocked state of the lock body, and the like.
- the server 1620 can control the working state of the smart device 1650 according to the lock body state of the smart lock.
- the server 1600 may be the same as or similar to the server 110 in FIG. 1. In some embodiments, the server 1600 may be a specific embodiment of the server 110. In some embodiments, the server 1620 may be hardware or software. When the server 1620 is hardware, it can be implemented as a distributed server cluster composed of multiple servers, or as a single server. When the server 1620 is software, it can be implemented as multiple software or software modules (for example, to provide distributed services), or it can be implemented as a single software or software module. There is no specific limitation here. In some embodiments, the user may not deploy smart devices indoors. In this case, the control system 1600 may not include the server 1620.
- the communication module 1612 of the smart lock 1610 may establish a communication connection with the server 1620 via the network 1630.
- the communication module 1612 of the smart lock 1610 may be a short-range wireless communication module.
- the communication gateway 1640 may include a short-range wireless communication gateway.
- the short-range wireless communication module of the smart lock 1610 can communicate with the short-range wireless communication gateway through the short-range wireless network, and the short-range wireless communication gateway can establish a communication connection with the server 1620 through the network 1630.
- the smart lock 1620 can establish a communication connection with the server 1620 through the short-range wireless communication gateway.
- the short-range wireless communication module of the smart lock 1610 may be a Bluetooth module, and correspondingly, the short-range wireless communication gateway may be a Bluetooth gateway.
- the Bluetooth module of the smart lock can communicate with the Bluetooth gateway, and the Bluetooth gateway can establish a communication connection with the server 1620 through the network 1630.
- the short-range wireless communication module of the smart lock may also be a ZigBee module, and the short-range wireless communication gateway may be a ZigBee gateway.
- the ZigBee module uses ZigBee technology, which is a short-distance, low-complexity, low-power, low-rate, low-cost two-way wireless communication technology.
- the smart lock 1610, the network 1630, and the server 1620 in FIG. 16 are only schematic. In practical applications, the composition structure of the smart lock may also have other components. Similarly, the number of the network 1630 and the server 1620 is also acceptable. Set as needed.
- Smart locks can provide users with intelligent access control management. Due to the high security of the smart lock, the anti-theft door with the smart lock can effectively reduce the situation of illegal persons entering the room through the anti-theft door. However, after the user goes out, even if the smart lock of the anti-theft door is locked, illegal persons such as thieves can still enter the room through other channels and open the smart door lock indoors, which affects the security of indoor properties.
- Some embodiments of the present application provide a smart lock control system, which can conveniently use the smart lock to reduce the situation of unauthorized persons unlocking indoors and improve the user's life and property when the user needs to go out.
- Fig. 17 is a schematic diagram of a smart lock control device according to some embodiments of the present application.
- smart locks may include locks such as door locks, car locks, and cabinet locks.
- the smart lock is a door lock as an example.
- the smart lock control device 1700 may include a door exit detection unit 1701, an action monitoring unit 1702, and an arming control unit 1703.
- the going out detection unit 1701 is configured to detect the user's going out action behavior.
- the action monitoring unit 1702 is configured to monitor the actions of trigger components (for example, anti-theft trigger components, arming operation components, etc.) of the smart lock in response to the user's going out action behavior.
- the arming control unit 1703 is configured to control the smart lock to be in the arming state if it detects that the action of the trigger component meets the set conditions, where, when the smart lock is in the arming state, if the smart lock detects an unlocking action in the door, Perform an alert action.
- step 1801, step 1802, and step 1803 in the corresponding embodiment in FIG. 18, respectively.
- the relevant description of the example will not be repeated here.
- the exit detection unit 1701 may include a first exit detection unit and/or a second exit detection unit.
- the first door exit detection unit is configured to detect the door opening action of the door operating element of the smart lock.
- the second exit detection unit is configured to detect the opening action of the operating element in the door of the smart lock and/or sense that the user exits the door through a designated sensor.
- the motion monitoring unit 1702 may include a first motion monitoring unit.
- the arming control unit 1703 may include a first arming control unit.
- the first action monitoring unit is configured to monitor the action (for example, key press action) of the triggering component of the smart lock in response to the user's going out action action.
- the first arming control unit is configured to control the smart lock to be in an arming state if it is detected that the trigger component is touched.
- the motion monitoring unit 1702 may include a second motion monitoring unit.
- the arming control unit 1703 may include a second arming control unit.
- the second motion monitoring unit is configured to respond to the user's going out motion behavior for monitoring the motion of the external operating member of the smart lock.
- the second arming control unit is configured to control the smart lock to be in an arming state if the door locking action of the operating member outside the door is detected.
- the action monitoring unit 1702 is configured to start a timer in response to the action of going out, and monitor the action of the trigger component of the smart lock within a set time period corresponding to the timer.
- the arming control unit 1703 is configured to detect that the action of the triggering component (for example, the safety triggering component, the arming triggering component, etc.) meets the set conditions within the set time period, and control the smart lock to be in the armed state.
- the smart lock control device 1700 may further include an arming request unit.
- the arming request unit is configured to detect that the action of a trigger component (for example, a safety trigger component, an arming trigger component, etc.) meets a set condition, and send an arming request to the server, so that the server controls at least one smart device to be in position based on the arming request.
- a trigger component for example, a safety trigger component, an arming trigger component, etc.
- the arming request unit is configured to detect that the action of a trigger component (for example, a safety trigger component, an arming trigger component, etc.) meets a set condition, and send an arming request to the server, so that the server controls at least one smart device to be in position based on the arming request.
- Armed state When the smart device is in the armed state, if the smart device senses a set abnormal situation (for example, abnormal anti-theft behavior), it can perform an alarm operation.
- the smart lock control device 1700 may further include a doorbell reminding unit.
- the doorbell reminder unit is configured to send a doorbell reminder message to the server when the doorbell button associated with the smart lock is detected to be touched, so that the server sends a doorbell reminder message to the user terminal bound to the smart lock, and the doorbell reminder message Used to remind someone to press the doorbell.
- the smart lock control device 1700 may further include a doorbell output unit.
- the doorbell output unit is configured to output the doorbell ringtone through the speaker of the smart lock if it is detected that the current moment does not belong to the set doorbell do not disturb time period.
- the smart lock control device 1700 may be a chip, a component, a module, etc., or a combination thereof.
- the smart lock control device 1700 can include a processor and a memory.
- the exit detection unit 1701, the action monitoring unit 1702, the arming control unit 1703, the arming request unit, the doorbell reminding unit, the doorbell output unit, etc. can be stored in the memory as a program unit and processed by The processor executes the above-mentioned program units stored in the memory to realize the corresponding functions.
- the processor may contain a kernel, and the kernel will call the corresponding program unit from the memory.
- One or more kernels can be set, and the kernel parameters can be adjusted to promptly output alarms for illegal people's indoor unlocking behavior, which is helpful to reduce the situation of illegal people's indoor unlocking.
- the memory may include non-permanent memory in computer readable media, random access memory (RAM) and/or non-volatile memory, such as read-only memory (ROM) or flash memory (flash RAM), and the memory includes at least one Memory chip.
- RAM random access memory
- ROM read-only memory
- flash RAM flash memory
- the smart lock control device 1700 detects the user's exit action behavior through the exit detection unit 1701, for example, the action monitoring unit 1702 detects that the action of the trigger component (for example, the safety trigger component) satisfies the setting Condition, the smart lock is controlled by the arming control unit 1703 to be in the arming state, which realizes that the user only needs to perform corresponding operations on the trigger component after going out, so that the smart lock can perform an alarm operation after detecting the indoor unlocking action, so that it can be timely
- the alarm is output for the indoor unlocking behavior of illegal persons, which is beneficial to reduce the situation of illegal indoor unlocking.
- the exit detection unit 1701 may also be used to detect a user's door opening action or door closing action behavior. Such deformations are all within the protection scope of this application.
- Fig. 18 is an exemplary flowchart of a smart lock control method according to some embodiments of the present application.
- the smart lock control method 1800 may be executed by the smart lock control device 1700.
- the processing device 112 may detect a door-going action (or door-opening action) behavior or a door-closing action behavior of the user. In some embodiments, the processing device 112 may detect the user's going out action. For example, when the smart lock is a door lock or a car lock (for example, when the user unlocks the lock from the inside of the car), the processing device 112 may detect the user's exit action behavior.
- the processing device 112 may Detect the user's closing action behavior.
- the control method of the door lock is taken as an example for description, and is not intended to limit the protection scope of the present application.
- the control method of the smart lock can be applied to other locks such as car locks and cabinet locks.
- Step 1801 may be performed by the exit detection unit 1701 in the smart lock control device 1700.
- the processing device 112 may detect the user's going out movement by detecting the opening movement of the door operating element of the door lock, sensing the user's going out through a sensor, etc., or a combination thereof.
- the execution body for the smart lock control method can sense the actions of the operating elements in the door, so that the user can be sensed
- the door-opening action of opening the door by the operating element inside the door For example, the sensor on the operating element inside the door senses the rotating motion of the operating element inside the door. After detecting the rotating motion of the operating element inside the door, the sensor can transmit the sensed information to the processing device 112, and the processing device 112 can determine the detection based on this. To open the door action.
- the processing device 112 may determine that the door opening motion of the operating member in the door is detected. For another example, when the user presses down on the operating element in the door with his hand, the oblique tongue of the smart lock will retract, thereby opening the door. Therefore, the rotation of the operating element in the door can indicate that the user needs to open the door, and also indicates that the user exists Going out needs or intentions.
- the execution subject of the door lock control method can sense the user's action behavior through at least one sensor of the smart lock, and obtain the user's out-of-home action behavior.
- At least one sensor may include an infrared sensor, a gyroscope, an accelerometer, a motion sensor, a positioning system (such as a global positioning system GPS, Beidou satellite navigation system, etc.), a sound sensor, a pressure sensor, a light sensor, a temperature sensor, an image sensor, a fingerprint sensor , Iris sensor, etc. or a combination thereof.
- the user's going out action behavior may include at least one action of the smart lock determining that the user is going out.
- the actions involved in the user's going out may include the user operating the operating elements in the door (for example, the user pressing the door handle, pressing the unlock button, rotating the unlock knob, etc.), and the user passes the electronic verification (for example, password, biological information, Bluetooth, etc.). , NFC, local area network, etc.) unlock the door, the user opens the door, and the user passes through the door frame. Therefore, the user’s going out action can include one or more of these actions.
- an infrared sensor may obtain an infrared image of the user, and based on the obtained infrared image, the processing device 112 may determine the user's action behavior.
- a sensor such as an infrared sensor is installed in the lock slot of the smart lock. If the sensor detects a human body, it is determined that the user goes out.
- a position sensor can be provided on the bolt of a smart lock. The position sensor can detect the ejection and retraction of the bolt. The position sensor senses that the bolt is retracted, and it is determined that the door of the smart lock has been opened. To the user to go out.
- the smart lock when the smart lock detects that the user goes out, can be equipped with a gyroscope. The gyroscope can detect the angle of the door.
- the accelerometer can be set in the smart lock.
- the accelerometer can detect the acceleration of the door.
- the acceleration of the door meets the preset condition, it is determined that the door of the smart lock has been opened. To the user to go out.
- step 1802 in response to the user's going out action behavior, the processing device 112 may monitor the action of the triggering component of the smart lock. Step 1802 may be performed by the action monitoring unit 1702.
- the processing device 112 After the processing device 112 detects the action of going out, it will start the monitoring of the actions of the triggering components (for example, the safety triggering component, the arming triggering component, the prevention and control triggering component, etc.), so as to subsequently determine whether the smart lock is Need to enter the armed state used to prevent preset actions such as indoor unlocking.
- the triggering components for example, the safety triggering component, the arming triggering component, the prevention and control triggering component, etc.
- the triggering component may be an arming operation member provided in the smart lock for triggering entering the arming state.
- the user's operation action on the arming operating member can characterize whether the user wants to enter the arming state.
- the triggering component can also be an external operating element of a smart lock or a lock body. It is understandable that after the user goes out, the lock body is controlled to perform the locking action by locking the door through the door operation element or other methods, so that the main lock body pops up, which means that the user is currently out and there is no one in the room. In this case, It is necessary to prevent illegal persons such as thieves from unlocking the room after entering the room.
- the action of the monitoring trigger component may also be a control instruction sent by the user terminal monitoring the door lock for controlling the action of the safety protection component.
- the user terminal sends an action instruction to trigger the safety prevention and control component to the door lock through the door lock-related application on the user terminal.
- step 1803 in response to the action of the triggering component meeting a predetermined condition, the processing device 211 may control the first device to be in an armed state.
- the predetermined condition that the action of the trigger component needs to meet is to indicate that the condition for entering the armed state is currently met.
- the predetermined condition will be different depending on the trigger component.
- the trigger component may include an external door operating member or a lock body, and the predetermined condition may include a locking action of the door external operating member or the lock body.
- the trigger component may include an arming button, and the predetermined condition may include that the arming button is at a position corresponding to the arming.
- the processing device 112 can detect whether there is an abnormal situation.
- one or more smart devices for example, the first device in the first set in FIG. 4 are controlled to perform corresponding operations according to a preset rule corresponding to the abnormal situation.
- the preset action may be indicative of an illegal indoor operation, such as an illegal person opening a door after entering the room, or an illegal person performing a risky operation on indoor objects or equipment indoors.
- the preset action can be an unlocking action inside the door.
- the preset action may also be the detection of an illegal person entering the room or being indoors through a monitoring device such as a camera device.
- the door lock can monitor the lock body and related components of the door lock regularly or in real time. If a preset action such as an unlocking action inside the door is monitored, an alarm operation will be executed.
- the method of detecting the unlocking in the door by the door lock may include sensing the rotation of the operating member in the door by a sensor on the operating member in the door, and using the knob on the door lock knob. The sensor senses the unlocking action of the inner lock of the door, and detects other unlocking operations other than unlocking the outer door.
- the door lock determines that there are other possible situations in which the door is unlocked, and this application does not impose restrictions on this.
- the alarm operation performed by the door lock in the armed state may also have multiple possibilities.
- the alarm operation performed by the door lock may include outputting an alarm bell (or alarm voice), one or more user terminals bound to the door lock, a security department (such as a security guard or office in a building, a police station, etc.) and/or
- the server (such as the processing device 112) sends an indoor unlocking alarm, controls delayed unlocking, and controls (for example, linkage control) one or more other smart devices to perform corresponding operations, etc. or a combination thereof.
- the processing device 112 may determine the specific abnormal situation based on the sound signal and/or other information of the smart device (for example, the sound of an alarm). For the detection of abnormal conditions, refer to Figure 28 and Figure 29 and related descriptions.
- the door lock may be integrated with a monitoring device such as a camera device.
- the present application may also control the camera device integrated in the door lock to be in an armed state when it is detected that the action of the trigger component meets a set condition.
- the camera device when the camera device is in the armed state, the camera device can perform image collection, and perform an alarm operation when it is determined that there is an abnormal person based on the collected image.
- the camera device can capture the image of the side of the door lock facing the room. Therefore, the camera device can monitor the indoor status in real time or regularly. If the presence of people in the room is detected or the presence does not belong to the setting when the armed state is not released The user’s personnel, it is determined that there are abnormal personnel such as illegal entry into the room.
- the camera device can also collect images of the side that is intelligently facing the outdoors, and the images collected by the camera device can detect whether there are abnormal behaviors such as lock picking or setting unauthorized persons other than the user to unlock the lock.
- the door lock after the door lock detects the user’s going out action, if it detects that the action of the trigger component meets the set conditions, it will control the door lock to be in the armed state. Therefore, the user only needs to respond to the trigger component after going out.
- the operation can make the door lock perform an alarm operation after detecting the preset action such as indoor unlocking action, so that the door lock can promptly output an alarm for illegal behavior such as indoor unlocking behavior of illegal persons through a simple operation, which is beneficial to Reduce indoor unlocking by illegal personnel.
- this application can control the door lock to be in the armed state only after detecting the user's out-of-home action, so as to reduce the accidental or malicious operation of the anti-theft touch component by others outdoors to trigger the door lock to enter the armed state and reduce the misoperation. .
- step 1802 in response to detecting the user's door opening action (or door closing action), the processing device 112 may automatically trigger the arming operation of the first device according to a preset rule. For example, after detecting the user's door opening action, the processing device 112 may control the first device to enter the armed state after a certain preset time.
- the processing device 112 may control the first device to enter the armed state after detecting the user's door opening action and door exit action.
- the processing device 112 may control the first device to enter the armed state after detecting the door opening and closing actions of the user.
- Fig. 19 is a schematic diagram of an application scenario of a smart lock control system according to some embodiments of the present application.
- the control system 1900 may include a smart lock 1910, a server 1920, a network 1930, a communication gateway 1940, and a smart device 1950.
- the smart lock 1910 includes a lock body control chip 1911-1, a lock body 1911-2, and parts of the door inner operating member 1911-3 and the door outer operating member 1911-4 connected to the lock body. Or in addition to all, it may also include an arming operation piece 1911-5 and an arming prompt light 1911-6.
- the arming operation member 1911-5 may include arming buttons, arming touch areas, arming knobs, and so on.
- the arming operation member 1911-5 may be provided with the smart lock on the side of the smart lock outside the door.
- the arming operation member 1911-5 can be connected with the lock body control chip 1911-1.
- the arming operating member 1911-5 may be disposed on the same side of the door body as the door outer operating member 1911-4. That is, when the smart lock 1910 is installed on the door, the arming operation member 1911-5 is installed on the side of the door facing the outdoors.
- the arming operating member 1911-5 can be connected to the lock body control chip 1911-1 of the smart lock 1910 and set on the side of the door that is outdoors, or the arming operating member 1911-5 can be set on the smart lock 1910.
- the lock body 1911-2 is on the same side of the lock body 1911-2 as the outer door operating member 1911-4.
- the smart lock 1910 can control the arming prompt light 1911-6 to flash after detecting the user's going out action to remind the user that the smart lock 1910 can be set to enter the arming state.
- Fig. 20 is an exemplary flowchart of a smart lock control method according to some embodiments of the present application.
- the smart lock control method 2000 can be applied to door locks.
- the smart lock control method 2000 may be executed by the smart lock control device 1700.
- step 2001 the processing device 112 may detect the opening action of the operating element in the door of the smart lock. Step 2001 may be executed by the exit detection unit 1701 in the smart lock control device 1700.
- step 1801 For the detection of the door opening action of the operating element in the door of the smart lock, reference may be made to step 1801 and related descriptions.
- step 2002 the processing device 112 responds to the opening action of the operating element in the door, controls the arming prompt light to flash, and monitors the operation action of the triggering part (for example, the arming operating element) of the smart lock.
- the triggering part for example, the arming operating element
- the processing device 112 can control the arming prompt light to flash to attract the attention of the user who has gone out, thereby prompting the user to set the arming state of the smart lock.
- the user will generally leave the house in a short time after going out. Therefore, if the operation of the arming operation member of the smart lock is not detected for a long time, it means that the user may only go out for a short time. There is no need to set the arming state of the smart lock.
- the execution body of the smart lock control method of this embodiment can also detect After the opening action of the operating element in the door, the timer is started, and the arming indicator light is controlled to flash within the set time corresponding to the timer, and the operating action of the arming operating element is monitored.
- controlling the flashing of the arming reminder light only serves as a reminder to the user. In actual applications, this operation may not be performed as needed.
- step 2003 in response to detecting that the arming operation member is triggered, the smart lock is controlled to be in an arming state. Step 2003 may be executed by the arming control unit 1703.
- the triggering of the arming operation means that there is an operation behavior on the operation arming operation part that is used to trigger the start of the arming state. For example, if the arming operating element is an arming button, if it is detected that the arming button is pressed, it means that the arming operating element is triggered.
- the processing device 112 can monitor the operation of the arming operation member within the set time period corresponding to the timer, and the execution body of this embodiment detects the arming operation within the set time period corresponding to the timer. If the device is triggered, the smart lock will be controlled to be in the armed state.
- the smart lock control method in this embodiment highlights that the smart lock implements arming control based on the triggering action of a triggering component (for example, an arming operation member). Since the trigger part is arranged on the outside of the door, after detecting the opening action of the operating part inside the door, if it is detected that the trigger part is touched, it means that the user has gone out and wants to activate the arming mode of the smart lock. Therefore, the solution of this embodiment can enable the user to manually control the smart lock to enter the armed state by manually touching the trigger component after opening the door through the operating element inside the door, thereby achieving a more convenient control of the smart lock's armed state.
- a triggering component for example, an arming operation member
- this embodiment will respond to the triggering action of the trigger part only after detecting the opening action of the operating part in the door, thereby effectively ensuring that the user goes out to actively set the arming state of the smart lock and avoid Misoperation or malicious operation by others causes the smart lock to enter the armed state.
- Fig. 21 is an exemplary flowchart of a smart lock control method according to some embodiments of the present application.
- the smart lock control method 2100 can be applied to door locks.
- the smart lock control method 2100 may be executed by the smart lock control device 1700.
- step 2101 the processing device 112 may detect the opening action of the operating element in the door of the smart lock.
- Step 2001 may be executed by the exit detection unit 1701 in the smart lock control device 1700.
- step 1801 For the detection of the door opening action of the operating element in the door of the smart lock, reference may be made to step 1801 and related descriptions.
- the execution body can detect the opening action of the operating element in the door of the smart lock and sense the user to leave the door through the designated sensor. For details, please refer to the embodiment of FIG. 20.
- step 2102 in response to the door opening action of the operating element inside the door, the processing device 211 may monitor the action of the operating element outside the door of the smart lock. Step 2102 may be performed by the action monitoring unit 1702.
- the execution body of this embodiment monitors the action of the operating element outside the door to determine whether the user needs to lock the door to go out.
- the processing device 112 may control the smart lock to be in the armed state when detecting the locking action of the operating member outside the door.
- the locking action of the operating member outside the door actually triggers the locking action of the door.
- the locking action of the operating member outside the door may include lifting the operating member outside the door.
- the rotation of the outer door handle can be sensed by the sensor on the operating member outside the door to determine that the lifting of the operating member outside the door is sensed.
- the locking action of the outer door operating element will also be different, and this application does not impose restrictions on this.
- the processing device 112 may detect the action of the triggering component of the door lock within a set time period.
- the execution subject of this embodiment can start a timer in response to the door opening action, and monitor the action of the operating element outside the door within a set time period corresponding to the timer.
- the execution main body detects the door locking action of the outer door operating element within the time set by the timer, it will control the smart lock to be in the armed state.
- the door lock control method in this embodiment highlights that the smart lock can detect the door opening action of the operating member inside the door, and then detect the operating member outside the door. When the door is locked, it will automatically enter the armed state.
- the smart lock can detect the door opening action of the operating member inside the door, and then detect the operating member outside the door. When the door is locked, it will automatically enter the armed state.
- the user after the user opens the door through the operating element inside the door, the user can perform the door lock operation through the operating element outside the door, so that the smart lock can automatically enter the arming state, which improves the convenience and flexibility of setting the arming state of the smart lock sex.
- only the user can trigger the smart lock to enter the armed state after the user goes out and then lock the door through the external operating element, and it can also reduce the setting of the smart lock to enter the armed state due to misoperation.
- the processing device 112 may monitor the action of the lock body of the smart lock, and after detecting the locking action of the lock body, control the smart lock to enter the armed state.
- the triggering component of the smart lock may also include the main bolt of the smart lock, where the main bolt refers to the locking part of the smart lock that needs to be operated outside the door through the inner door, the outer door, or the operation of the smart lock (such as the locking verification component outside the door or the touch operation area, etc.) The bolt that can be ejected only after the door is locked.
- the main bolt may be a three-linked bolt controlled by an operating member inside the door and an operating member outside the door.
- the processing device 112 After the processing device 112 detects the opening action of the operating element inside the smart lock, it can monitor the action of the main bolt of the smart lock. If it is detected that the main bolt is ejected, the processing device 112 can control the smart lock to be in an armed state.
- the main lock tongue needs to be controlled by the door inner operating member or the door outer operating member, and the user locks the door inside the door, there is no need to open the door through the door operating member first, and then use the door operating member to perform the lock
- the door is operated to cause the main bolt to pop out. Therefore, after detecting the opening action of the operating element of the smart lock, if the main bolt is detected to pop out, it can be confirmed that the locking action is input outside the door. In this case, it means that the user has gone out and can control the smart lock to enter the armed state.
- the present application can also monitor the action of the main lock tongue after detecting the opening action of the operating element in the door of the smart lock and detecting that the user goes out. After the tongue pops out, the smart lock is controlled to enter the armed state.
- the timer can be started, and the action of the trigger component of the smart lock can be monitored within the set time period corresponding to the timer. If it is detected that the action of the trigger component meets the set conditions within the set time period, the smart lock control enters the arming state.
- Fig. 22 is a schematic diagram of a smart lock control device according to some embodiments of the present application.
- the smart lock control device 2200 may include a request obtaining unit 2201 and an arming instruction unit 2202.
- the request obtaining unit 2201 is configured to obtain an arming request sent by the smart lock.
- the arming request is generated by the smart lock after detecting the user's out-of-home action and/or when the action of the triggering component of the smart lock is detected to meet the set conditions.
- the arming indication unit 2202 is configured to instruct the smart lock to enter the arming state in response to the arming request. In some embodiments, when the smart lock is in the armed state, if the smart lock detects an unlocking action in the door, an alarm operation can be performed.
- the smart lock control device 2200 may further include an arming deployment module.
- the arming deployment module is configured to, in response to the arming request, indicate that at least one smart device (for example, at least one of the first devices in the first set in FIG. 4) is in an arming state.
- the smart device When the smart device is in the armed state, if the smart device senses a set abnormal situation, the smart device can perform a corresponding operation (for example, an alarm operation) according to a preset rule corresponding to the abnormal situation.
- the smart lock control device 2200 may further include a message obtaining unit, a doorbell reminding unit, and the like.
- the message obtaining unit may be used to obtain a doorbell reminder message sent by the smart lock, and the doorbell reminder message is used to prompt someone to press the doorbell.
- the doorbell reminder message may be generated when the smart lock detects that the doorbell button associated with the smart lock is pressed.
- the doorbell reminder unit may be used to send a doorbell reminder message to the user terminal bound to the smart lock and/or other smart devices (for example, smart speakers, etc.), so that the user terminal and/or other smart devices output the doorbell reminder message.
- the doorbell reminding unit may include a time detection subunit, a doorbell reminding subunit, and so on.
- the time detection subunit can be used to detect whether the current time belongs to the doorbell do not disturb time period corresponding to the smart lock.
- the doorbell do not disturb time period corresponding to the smart lock can be configured by the user terminal and stored in the server, processing device 112, or storage device of the smart lock.
- the doorbell reminder subunit can be used to send doorbell reminder messages to the user terminal and/or other smart devices bound to the smart lock and send doorbell reminder messages to other smart devices if the current moment does not belong to the doorbell do not disturb time period corresponding to the smart lock Operation.
- the smart lock control device 2200 may further include a power obtaining unit, information, saving unit, query receiving unit, power feedback unit, and the like.
- the power obtaining unit may be used to obtain the remaining power of the lock module, doorbell module, or other modules sent by the smart lock.
- the information storage unit may be used to store the remaining power of the lock module, the doorbell module, and/or other modules.
- the inquiry receipt can be used to receive power inquiry requests sent by other smart devices or user terminals.
- the power feedback unit can be used to respond to the power query request and return information about the remaining power of the lock module, the doorbell module and/or the remaining power of other modules to other smart devices or user terminals, so that other smart devices can play the lock module, Information about the remaining power of the doorbell module or other modules.
- Fig. 23 is an exemplary flowchart of a method for arming a smart lock according to some embodiments of the present application.
- the smart lock arming control method 2300 can be applied to door locks.
- the smart lock arming control method 2300 may be executed by the smart lock control device 2200.
- the way for the smart lock to enter the armed state may include the smart lock directly switching to the armed mode; it may also be that the smart lock sends an arming request to the server (for example, server 110, server 1620, server 1920, etc.), and the server After indicating that the smart lock enters the armed state, the smart lock enters the armed state.
- the server for example, server 110, server 1620, server 1920, etc.
- the server After indicating that the smart lock enters the armed state, the smart lock enters the armed state.
- the server for example, server 110, server 1620, server 1920, etc.
- the server can obtain the arming request sent by the smart lock.
- Step 2301 may be performed by the request obtaining unit 2201.
- the arming request can be used to request to indicate that the smart lock enters the arming state.
- the arming request may be generated by the smart lock after detecting the user's out-of-home action behavior, and when it is detected that the action of the triggering component of the smart lock meets the set condition. As shown in the embodiment in FIG. 18, when the smart lock detects that the action of the trigger component meets the set condition in response to the user's going out action, the smart lock can generate an arming request.
- the server may directly obtain the arming request sent by the smart lock. In some embodiments, the server may obtain the arming request issued by the smart lock through a short-range wireless communication gateway that has a communication connection with the smart lock.
- step 2302 in response to the arming request, the server instructs the smart lock to enter the arming state.
- the smart lock When the smart lock is in the armed state, if the smart lock detects a preset action, it will perform an alarm operation.
- This embodiment mainly highlights that the server is used to control the smart lock to enter the arming state, so that the server can obtain the state of the smart lock in time, and is beneficial for the server to reasonably control other smart devices based on the arming state of the smart lock.
- Fig. 24 is an exemplary flowchart of a smart lock control method according to some embodiments of the present application.
- the smart lock detects the door opening action of the door operating element of the smart lock.
- the smart lock starts a timer in response to the opening action of the operating element in the door, and monitors the operating action of the arming operating element within the set time period corresponding to the timer. It can be understood that if the timer is not started, the action of directly monitoring the arming operation element is also applicable to this embodiment. It should be noted that, for ease of understanding, the embodiment of the present application takes the detection of the user's exit action as the detection of the door opening action of the operating element in the door as an example, and takes the trigger component as the arming operating element as an example.
- the smart lock detects the touch action of the arming operation member within the set time period, controls the smart lock to enter the arming state, and sends an arming request to the server.
- the smart lock controls itself to enter the armed state as an example, but the same applies to this embodiment for sending an arming request to the server so that the server instructs the smart lock to enter the armed state.
- the arming request is used to request that the smart device be set to an arming state.
- the server indicates that at least one smart device is in an armed state.
- the smart device may be set on the smart device in the room corresponding to the smart lock.
- Smart devices may include smart speakers, camera devices, alarms, projection devices, etc. or a combination thereof.
- the smart device when the smart device is in an armed state, if the smart device senses a set abnormal situation, it will perform an alarm operation.
- the abnormal situation may include anti-theft abnormal behavior.
- the smart device senses the set anti-theft abnormal behavior, which indicates that there are preset behaviors such as illegal entry into the room. For example, taking the smart device as a smart camera as an example, when the smart camera is in the armed state, the smart camera can continuously collect indoor images and analyze the indoor images; if there are users or suspicious persons based on indoor image analysis, determine If there is abnormal anti-theft behavior, an alarm operation will be executed.
- the abnormal situation refer to Figure 14 and its related descriptions.
- the way the smart device performs the alarm operation is similar to the way the smart lock performs the alarm operation, for example, the smart device can send an alarm message to the bound user terminal, etc.
- the smart device can send an alarm message to the bound user terminal, etc.
- the smart device after the smart device enters the armed state, it sends an arming request to the server, so that the server controls at least one smart device to be in the armed state based on the arming request, so that the smart device senses the setting
- the anti-theft abnormal behavior will execute the alarm operation, which realizes a more comprehensive and reliable anti-theft defense, which is beneficial to reduce the abnormal situation such as indoor theft.
- Fig. 25 is a schematic diagram of an application scenario of a control system for a smart lock according to some embodiments of the present application.
- the smart lock control system 2500 may include a smart lock 2510, a server 2520, a network 2530, a Bluetooth gateway 2540, a smart device 2550, and a user terminal 2560.
- one or more components in the control system 2500 may be connected in a wired or wireless manner.
- the smart lock 2510 may include a lock module 2511, a Bluetooth module 2512, and a doorbell module 2513.
- the lock module 2511 may include a lock body control chip 2511-1, a lock body 2511-2, and an inner door operating member 2511-3 connected to the lock body, an outer door operating member 2511-4, and an arming operating member. 2511-5 and arming reminder light 2511-6.
- a lock body control chip 2511-1 for details of the lock module 2511, please refer to the lock module 1911 in FIG. 19 and its related description.
- the doorbell module 2513 may include a doorbell control chip 2513-1, a speaker 2513-2, and a doorbell button 2513-3.
- the doorbell control chip 2513-1 is at least configured to control the speaker 2513-2 to play a ringtone in response to the key action of the doorbell button 2513-3.
- the communication module of the smart lock 2510 is a Bluetooth module 2512.
- the short-range wireless communication gateway of the smart lock control system 2500 is a Bluetooth gateway 2540.
- the Bluetooth gateway 2540 may establish a long-distance communication connection with the server 2520.
- the Bluetooth module 2512 is connected to the lock body control chip 2511-2 of the lock module 2511 and the doorbell control chip 2513-1 of the doorbell module 2513.
- the Bluetooth gateway 2540 may receive the information broadcast by the smart lock in the designated range via Bluetooth.
- the server 2520 may establish a communication connection with the communication module (ie, the Bluetooth module 2512) of the smart lock 2510 through the network 2530.
- the Bluetooth gateway 2540 may forward the information broadcast by the smart lock to the server 2520.
- the smart lock 2510 can realize long-distance communication with the server 2520 through the Bluetooth gateway 2540.
- the user terminal 2560 may establish a communication connection with the server 2520 through the network 2530.
- an application for establishing a communication connection with the server 2520 may be installed and run in the user terminal 2560, and the communication connection between the user terminal 2520 and the server 2520 is realized through the application.
- the user terminal 2560 establishes a binding with the smart lock 2510 and the Bluetooth gateway 2540, that is, establishes a binding relationship.
- establishing a binding relationship refers to configuring an association relationship between two devices. For details about the user terminal, refer to the user terminal 140 in FIG. 1 and its related description.
- the smart lock 2510 is configured to send a doorbell reminder message to the server 2520 when it detects that the doorbell button 2513-3 associated with the smart lock 2510 is touched.
- the server 2520 in response to the doorbell reminding message, sends the bell reminding message to the user terminal 2560 bound to the smart lock, and the doorbell reminding message is used to prompt someone to press the doorbell.
- the smart device 2550 may include at least a smart speaker.
- the user terminal 2560 may configure the doorbell reminder rules to the server 2520, such as strong doorbell reminder sound, doorbell reminder duration, doorbell not disturb time period for doorbell reminder, etc.
- the server 2520 may send a doorbell reminder message to the smart speaker and the user terminal 2560 according to the configured doorbell reminder rule.
- Fig. 26 is an exemplary flowchart of a doorbell reminding method for a smart lock according to some embodiments of the present application.
- step 2601 the smart lock sends a doorbell reminder message to the server when it detects that the doorbell button associated with the smart lock is pressed.
- the doorbell reminder message is used to prompt someone to press the doorbell.
- the doorbell reminding message may be a message including a doorbell ringtone, or a message including a prompt language for prompting that the doorbell is touched.
- the smart lock can generate a doorbell reminder message after detecting that the doorbell button is pressed through the doorbell control chip in the doorbell module. Then, the doorbell control chip transmits the doorbell reminder message to the server through the communication module in the smart lock.
- the user terminal may also configure the doorbell do not disturb time period in the smart lock, where the doorbell do not disturb time period refers to the time period that the user does not want to be disturbed by the doorbell set by the user terminal, for example, suppose the user If you don’t want to be disturbed by the doorbell between 22:00 and 5:00 a.m. every day, you can set the doorbell do not disturb time period to the time period between 22:00 and 5:00.
- the doorbell ringtone can be output through the smart lock speaker. If the current time belongs to the set doorbell do not disturb time period, the speaker will not be controlled to output the doorbell ringtone.
- the server detects whether the current moment belongs to the doorbell do not disturb time period corresponding to the smart lock.
- the doorbell do not disturb time period corresponding to the smart lock may be manually determined by the user, or automatically determined by the processing device 112 or the server of the smart lock control system, or determined by the processing device 112 or the server of the smart lock control system .
- the doorbell do not disturb time period can be configured by the user terminal bound to the smart lock and stored in the server.
- the user terminal may configure the doorbell reminder rule of the smart lock bound to the user terminal, and the doorbell reminder rule may include the doorbell do not disturb time period during which the user does not want to be disturbed.
- the user terminal can also set information about smart devices such as smart speakers that need to output doorbell reminders.
- the server can store the doorbell reminder rules corresponding to different smart doorbells. On this basis, after the server receives the doorbell reminder message of the smart lock, it can query the doorbell reminder rules of the smart lock and obtain the doorbell. Remind the doorbell in the rules not to disturb the time.
- step 2603 if the server determines that the current moment does not belong to the doorbell do not disturb time period corresponding to the smart lock, it sends the doorbell reminder message to the user terminal and smart speaker bound to the smart lock.
- the smart speaker bound to the smart lock may be pre-bound, and is the smart speaker in the room corresponding to the smart lock.
- the smart speaker plays the doorbell reminder message.
- the smart speaker may play the doorbell reminder message through voice or the like, so that the user knows that the doorbell is touched in time.
- the doorbell reminder message is voiced, if the smart speaker has a display screen, the prompt content corresponding to the doorbell reminder message can also be output on the display screen.
- the user terminal outputs the doorbell reminding message.
- the user terminal may output the doorbell reminder message on the display screen, or output the doorbell reminder message by voice, or use both methods to output the doorbell reminder message, or output the doorbell reminder message in other ways .
- the smart lock can send a doorbell reminder message to the server after detecting that the doorbell button is pressed, so that the server can send the doorbell reminder message to the user terminal and the smart speaker through the server.
- the user terminal and the smart speaker broadcast the doorbell reminder information to the user in time, so that the user can learn the information of the doorbell being touched in a relatively timely manner, and reduce the situation that the user cannot hear the doorbell in time or even cannot hear the doorbell because the ringtone output by the doorbell speaker is too small .
- the smart lock may send a doorbell reminder message to the server through the short-range wireless communication gateway.
- the short-range wireless communication module of the smart lock broadcasts a doorbell reminder message.
- the short-range wireless gateway After the short-range wireless gateway receives the doorbell reminder message broadcast by the smart lock, it transmits the doorbell reminder message to the server.
- Fig. 27 is a schematic diagram of a doorbell reminding system of a smart lock according to some embodiments of the present application.
- the smart lock 2710 may include a doorbell module 2713 and a lock module 2711.
- the doorbell module 2713 and the lock module 2710 please refer to the doorbell module 2513 and the lock module 2511 in FIG. 25 and related descriptions, respectively.
- the smart lock 2710 may communicate with the server 2740 through a short-range wireless communication gateway.
- the short-range wireless communication gateway may be a Bluetooth gateway 2720, and correspondingly, the communication module of the smart lock 2710 may be a Bluetooth module.
- the Bluetooth gateway 2720 may be configured with information such as the address of the server 2740.
- the user terminal 2730 may establish a binding relationship with the smart lock 2710.
- the user terminal 2730 can configure the doorbell reminding rule in the server 2740.
- the user terminal 2730 may send 2740 a configuration request to the server, the configuration request carries the doorbell do not disturb time period corresponding to the smart lock 2710, and the smart speaker is configured as a doorbell reminder device and other information.
- the server 2740 may respond to the configuration request and save the configuration information in the configuration request as the doorbell reminding rule of the smart lock 2710.
- the user terminal 2730 may configure the doorbell do not disturb time period in the doorbell of the smart lock 2710.
- the user terminal 2730 can control the doorbell module 2713 of the smart lock 2710 to turn on or off the do not disturb mode, and set the doorbell ringtone corresponding to the doorbell module 2713 in the smart lock.
- the user terminal 2730 may also set the doorbell module 2713 of the smart lock 2710 to mute during the doorbell-free time period.
- the user terminal 2730 may set the doorbell module 2713 to remain silent at any time.
- the doorbell of the smart lock 2710 after the doorbell of the smart lock 2710 detects that the doorbell button is pressed, it can broadcast a broadcast packet in the set format through the Bluetooth module.
- the broadcast package may include an identifier of the doorbell of the smart lock and a doorbell reminder message for prompting that the doorbell is touched.
- the Bluetooth gateway 2720 After receiving the broadcast packet, the Bluetooth gateway 2720 can deliver the broadcast packet to the server 2740.
- the server 2740 After receiving the broadcast packet, the server 2740 obtains the doorbell reminder message in the broadcast packet and the doorbell identifier of the smart lock 2710.
- the server 2740 can query the doorbell reminding rules corresponding to the doorbell of the smart lock 2710 according to the smart doorbell identifier in the broadcast package. If the current time does not fall within the doorbell do not disturb time period set in the doorbell reminder rule, the server 2740 can send the doorbell reminder message to the user terminal bound to the doorbell of the smart lock and other smart devices set in the doorbell reminder rule (for example, Smart audio 2750, etc.) to make other smart devices perform corresponding operations. For example, make the smart speaker 2750 play a doorbell reminder message; if the current moment belongs to the set doorbell do not disturb time period, it will not continue to send doorbell reminder messages to other smart devices and user terminals.
- the smart lock 2710 after the smart lock 2710 detects that the doorbell button is pressed, it can send a doorbell reminder message to the server 2740, so that the server 2740 sends a doorbell reminder message to the user terminal bound to the smart lock to remind the user that there is someone Touch the doorbell to reduce the situation that users cannot be notified of the doorbell being touched in time.
- the doorbell do not disturb time period corresponding to the smart lock 2710 can be set in the smart lock 2710 and the server 2740 through the user terminal 2730, the server 2740 and the smart lock 2710 only perform the doorbell reminder operations when they are not in the doorbell do not disturb time period. , Can avoid the doorbell from causing interference to users.
- both the lock module 2711 and the doorbell module 2713 of the smart lock 2710 require power supply.
- the lock module 2711 and the doorbell module 2713 may have different power supplies.
- the smart lock 2710 can also obtain the remaining power of the lock module 2711 and/or the remaining power of the doorbell module 2713, and send it to the server 2740.
- the smart lock 2710 may send the remaining power information of the lock module 2711 and the doorbell module 2713 to the server 2740 through the Bluetooth gateway 2720.
- the server 2740 may save the remaining power of the lock module 2711 and/or the remaining power of the doorbell module 2713 sent by the smart lock 2710.
- the user may send the lock module 2711 and/or the doorbell module 2713 power query instructions to other smart devices (for example, the smart speaker 2750).
- other smart devices can send a power query request to the server 2740, and the power query request is used to request the power status corresponding to the smart lock.
- the server 2740 can query the remaining power of the lock module 2711 and/or the remaining power of the doorbell module 2713 in the smart lock 2710, and send information about the remaining power of the lock module 2711 and the remaining power of the doorbell module 2713 To other smart devices.
- other smart devices can play or display information about the remaining power of the lock module 2711 and/or the remaining power of the doorbell module 2713.
- the smart lock 2710 can detect whether there is an abnormal situation. In response to detecting an abnormal situation, the processing device 112 or the server 2740 controls the smart lock 2710 and/or other smart devices to perform corresponding operations according to a preset rule corresponding to the abnormal situation.
- the smart lock 2710 may also be provided with a temperature sensor.
- the temperature sensor may be a device independent of the lock body control chip (for example, the lock body control chip 2511-1), or may be integrated in the lock body control chip.
- a temperature sensor can be used to sense indoor temperature.
- the smart lock 2710 may have two panels, including an outer panel installed outdoors and an inner panel installed indoors.
- the temperature sensor in order to monitor the indoor temperature more accurately, can be arranged on the inner panel and as close as possible to the surface of the inner panel, so that the temperature detected by the temperature sensor is closer to the ambient temperature of the inner panel, and the specific location is not limited.
- the processing device 112 described in this application can also activate one or more of the abnormalities (for example, the temperature exceeds a temperature threshold) when an abnormality is detected indoors.
- One operation for example, controlling the smart lock 2710 to perform an unlocking operation, starting indoor and outdoor alarms, and sending an alarm to one or more user terminals 2730, servers (such as processing equipment 112), and/or security agencies bound to the smart lock 2710 ) In order to open the door and remind and/or assist the user to leave in time.
- the smart lock 2710 determines that the indoor temperature exceeds the temperature threshold, the The user terminal 2730 bound to the smart lock 2710 sends a risk alert.
- the risk alert can be used to remind the user that there is a safety hazard in the indoor temperature.
- the smart lock 2710 may also output a risk alarm bell through a speaker when it is determined that the indoor temperature exceeds a temperature threshold, or use the smart lock 2710 to control a light prompt connected to the smart lock. It is understandable that after the smart lock 2710 is in the armed state, the user terminal 2730 bound to the smart lock can also cancel the armed state of the smart lock 2710 as needed. For example, the user can cancel the arming state through biometric verification, or the user can send an unlocking arming instruction to the smart lock through the user terminal to cancel the arming state of the smart lock, etc.
- the smart lock 2710 After the smart lock is in the armed state, if there are abnormal unlocking behaviors such as indoor or outdoor unlocking by illegal persons other than the user (for example, administrator, owner, etc.) bound to the smart lock 2710, it may bring risks to indoor finances .
- abnormal unlocking behaviors such as indoor or outdoor unlocking by illegal persons other than the user (for example, administrator, owner, etc.) bound to the smart lock 2710
- the smart lock 2710 will also collect video images through the camera device in the smart lock, and mark the collected video images as abnormal images.
- the smart lock 2710 may also send an alarm message to the user terminal 2730 bound to the smart lock 2710. The alarm message can be used to indicate that there is an unlocking action.
- the smart lock 2710 after the smart lock 2710 is in the armed state and an unlocking action is detected, the smart lock collects images and marks them as abnormal images, which facilitates subsequent timely acquisition and analysis of images containing unauthorized persons unlocking the lock.
- the smart lock 2710 after the smart lock 2710 sends an alarm message to the user terminal 2730 bound to the smart lock, if the video viewing instruction sent by the user terminal 2730 is detected, the smart lock 2710 can also establish the smart lock 2710 and the user terminal 2730. Live video channel between.
- the smart lock 2710 can establish a live video channel with an application on the user terminal 2730 through the server 2740.
- the smart lock 2710 can transmit the video images collected by the smart lock 2710 to the user terminal 2730 through the live video channel.
- the duration of establishing the live video channel between the smart lock 2710 and the user terminal 2730 can be set as required.
- the duration of the live video channel can be 4 seconds, 10 seconds, 30 seconds, 1 minute, 5 minutes, etc.
- the doorbell reminding system of the smart lock can also be used to arm safes, gun cabinets, etc.
- the system can manually trigger the safety trigger component to arm the system when the user opens the cabinet door and then closes the cabinet door within a limited time.
- the system can automatically arm the cabinet when the user opens the cabinet door and then closes and locks the cabinet door within a limited time.
- the specific workflow of the system for arming safes, gun cabinets, etc. may include (the safe is described as an example below):
- the system can sense the user's action behavior through at least one sensor of the smart safe, and obtain the user's action behavior of opening the smart safe.
- the action of the user to open the smart safe may include one or more of the actions of the user opening the door of the smart safe, unlocking the lock, and passing the user's body part through the cabinet frame.
- the above-mentioned executive body after detecting the action of the user to open the smart safe, the above-mentioned executive body will start the monitoring of the action of the safety triggering component, so as to subsequently determine whether the smart safe needs to enter to prevent moving the box and knocking.
- the armed state of preset actions such as the cabinet and several consecutive wrong passwords.
- the safety triggering component may be an arming operation part set in the smart safe for triggering the entry into the arming state.
- the user's operation action on the arming operating member can characterize whether the user wants to enter the arming state.
- the safety trigger component can also be a handle outside the box of the smart safe or the main lock body. It is understandable that after the user closes the smart safe, close the safe through the handle outside the box or control the lock body to perform the locking action by other means, so that the main lock body pops out, which means that the user has finished using the smart safe. In this case, it is necessary to prevent illegal persons such as thieves from violently unlocking and stealing the smart safe.
- the safety trigger component may be an identification device of a smart safe.
- the identity and/or authority of the current operator is verified through the identification device, and the defense is carried out.
- the user taps a certain area on the outer surface of the smart safe with a predetermined number and/or frequency to trigger the safety trigger component.
- a user may perform identity and/or authority verification through a fingerprint verification device, a face verification device, a voice recognition device, and other biometric devices installed on the outer surface of the smart safe, and the security trigger component can be triggered.
- detecting the action of the safety trigger component may also be a control instruction sent by the user terminal monitoring the smart safe for controlling the action of the safety trigger component.
- the user terminal sends an action instruction to trigger the safety trigger component to the smart safe through an application related to the smart safe on the user terminal.
- the action of monitoring the safety triggering component of the smart safe may be performed before the user closes the safe, when the user closes the safe, and/or after the user closes the safe.
- the smart safe is controlled to be in an armed state.
- controlling the smart safe to be in the armed state may be performed after the user closes the safe.
- the setting condition that the action of the safety triggering component needs to meet is to indicate that the conditions for entering the armed state are currently met. In actual applications, the setting conditions will be different depending on the safety triggering component. .
- the smart safe can monitor the lock body and related components of the smart safe regularly or in real time. If a preset action like a mobile box is monitored, an alarm operation will be executed.
- the smart safe detects the mobile box in one or more of the following situations: the smart safe detects the box through the sensor. The swaying of the smart safe; the sensor on the foot of the smart safe detects the change in the position coordinates; other mobile operations other than the mobile box are detected.
- the smart safe determines that there is a mobile box, and this application does not impose restrictions on this.
- the arming prompt mode may be a mode that requires arming a prompt horn, arming a prompt display screen and other local devices.
- the arming reminder may be a short message reminder, an APP message push reminder, or other methods that need to be performed by the network.
- the smart safe will give an alarm (for example, send an alarm to the user) in the event of a violent unlocking, a foreign object entering the lock body, etc., which damages the lock.
- the smart safe will alarm (for example, send an alarm to the user) when the password is incorrectly entered several times in a row or the face recognition fails.
- the smart safe will give an alarm (such as sending an alarm to the user) in the event of damage to the box such as knocking on the box, foreign matter adsorption of the box, or excessive temperature of the box.
- the smart safe will give an alarm (for example, send an alarm to the user) in the event of a moving case such as a displacement of the case or a shaking of the case.
- the security device of the smart safe will alarm when it detects an abnormality (for example, send an alarm to the user).
- the camera detects that someone is approaching and will alarm, and infrared detects that someone is near the smart safe and will alarm (such as sending an alarm to the user).
- the smart safe can also send an alert to a contact preset by the user.
- the smart safe can also send alarms to police officers.
- This system can well protect the smart safe.
- the system can also be connected to the network. If the lock enters the armed state, the cabinet can also be adjusted to enter the armed state. The overall reliability, intelligence and safety of the smart safe is increased to protect the safety of users’ property. After opening the cabinet door, the user closes the cabinet door within a limited time. The user can manually arm the cabinet through the safety trigger control without locking it. If the user locks it, the smart safe is automatically armed.
- the system also allows users to issue defense and disarm commands through the network, which increases the convenience of users and can be applied to a variety of application scenarios.
- the smart safe can be automatically disarmed after opening the door.
- the smart safe can be manually disarmed after entering the designated password. For example, enter the special password for disarming in the password input area to disarm without opening the cabinet door.
- the smart safe can also be disarmed by receiving a disarming instruction issued by the user terminal.
- Fig. 28 is a schematic diagram of an exemplary system architecture of an information processing apparatus according to some embodiments of the present application.
- the system 2800 may acquire the sounds and/or other information of various entities, and process the acquired information, for example, process the information based on a database and/or a machine learning model to obtain processing corresponding to the entity As a result, the processing result is pushed to the user terminal (for example, the first terminal, the second terminal, the third terminal, etc.).
- the user terminal for example, the first terminal, the second terminal, the third terminal, etc.
- the system 2800 may be installed on a certain device as a whole.
- the system 2800 may be set on a user terminal (for example, a mobile phone), complete the acquisition and processing of sound and/or other information on the user terminal, and push the processing result to the user terminal or other user terminals.
- the system 2800 may be provided separately.
- the voice and/or other information obtained in city A is transmitted to a processing device located in city B for processing through the network, and then the processing result is transmitted to a terminal located in city C through the network.
- the system 2800 may be applied to identify which device and/or sensor issued an alarm based on the sound of the device and/or sensor and/or other information.
- the system 2800 can be applied to fire protection monitoring, vehicle-mounted equipment monitoring, emergency alerting, behavior monitoring, and the like.
- the system 2800 may be applied to identify the source of sound based on sound and/or other information. For example, identifying who is speaking, identifying musical instruments in concerts, identifying the lyrics of songs, and so on.
- the application of the system 2800 is described below by taking as an example the identification of which device and/or sensor issued an alarm based on the sound of the device and/or sensor and/or other information. This is not intended to be limiting, and the system 2800 can be applied to other aspects.
- the system 2800 may include a sound collection module 2801, a sound processing module 2802, and a data transmission module 2803.
- the sound collection module 2801, the sound processing module 2802, and the data transmission module 2803 may be connected in sequence.
- the system 2800 may further include an information collection module 2804 and an information processing module 2805. There may be signal connections (such as electrical connections) between the information processing module 2805 and the information collection module 2804 and with other modules (such as the sound collection module 2801, the sound processing module 2802 or the data transmission module 2803).
- signal connections such as electrical connections
- other modules such as the sound collection module 2801, the sound processing module 2802 or the data transmission module 2803.
- the sound collection module 2801 may include devices such as microphones and local alarm pickups for collecting sounds from smart devices (for example, smoke alarms, flood alarms, combustible gas alarms, smart door locks, etc.).
- the information collection module 2804 may include a system monitor for collecting status information of sensors (for example, a temperature sensor, a flammable gas concentration sensor, an air humidity sensor, etc.).
- the information collection module 2804 may be used to collect state information of sensors of smart devices (for example, smoke alarms, fire alarms, combustible gas alarms, smart door locks, etc.).
- the information collection module 2804 may be a data collection device for collecting data information in a gateway of the Internet of Things.
- the sound collection module 2502 and the information collection module 2804 can be run at the same time, or only one of them can be run, which can be flexibly selected according to the actual situation, and this application is not limited here.
- the data transmission module 2803 may include devices such as a controller.
- the data transmission module 2803 may be a wired transmission module or a wireless transmission module.
- the wireless transmission module may be NFC (Near Field Communication), Bluetooth TM , ZigBee TM , and local area network. , Satellite, etc.
- the sound collection module 2801 can collect sound signals of smart devices (for example, smoke alarms, flood alarms, combustible gas alarms, etc.), such as collecting alarm sounds.
- smart devices such as smoke detection alarms, intrusion alarms, etc.
- each type of alarm has its own fixed alarm sound and frequency, and the decibels, frequency and other parameters of the alarm sound emitted by various alarms There will be a difference, that is, the sound of each alarm is different, and then you can confirm which device is issuing which alarm based on the alarm sound and so on.
- the information collection module 2804 may be connected to sensors and/or devices through the data transmission module 2803. In some embodiments, the information collection module 2804 can collect the status information of the sensor and/or the sensor of the device through the data transmission module 2803. For example, the information collection module 2804 can be connected to the temperature sensor via Bluetooth to collect the information of the temperature sensor. .
- the sensor can detect and collect external signals, physical conditions (such as light, heat, humidity) or chemical composition (such as smoke), and can transform the detected and collected information into electrical signals or other required forms according to certain rules
- the status information of each sensor that is, the status information of each sensor is different, and then according to the status information of the sensor, you can confirm which type of alarm or what alarm is issued by which device.
- the information collection module 2804 can collect the gateway data information of the Internet of Things.
- Devices and/or sensors with remote communication functions transmit data to the outside world through the gateway of the Internet of Things, and each device and/or sensor is in the network. There is a unique identifier for data transmission on the Internet, so the analysis of the data can get which device and/or sensor alarms.
- the information collection module 2804 can collect information in real time. In some embodiments, the information collection module may collect information regularly, for example, the information collection module collects information every 10 seconds. In some embodiments, the information collection module may be based on big data and adopt different information collection frequencies at different times and different scenarios. For example, in winter when the temperature is relatively low, people rely on burning coal for heating, which is prone to fires and production. For gases such as carbon monoxide and sulfur dioxide that are harmful to the human body, the information collection module can collect the information of the temperature sensor and the information of the harmful gas sensor in real time, and can collect the information of the humidity sensor at intervals or even not.
- the information collection module 2804 can actively collect information. In some embodiments, the information collection module can passively receive information from the device and/or sensor. For example, the information collection module is only provided with a receiving module and can receive information from the device and/or sensor.
- the sound processing module 2802 can obtain the sound analysis result corresponding to the sound signal; the sound analysis result is the sound analysis result of the smart device, and the data transmission module 2803 outputs the sound analysis result to one or more user terminals (for example, the first terminal) .
- Sound is produced by vibration, and different sound signals have different values of characteristic indicators.
- the sound processing module 2802 can analyze locally to obtain the sound analysis result.
- the sound signal is analyzed to obtain the characteristic information of the sound signal.
- the characteristic information of the sound signal may include timbre, pitch, vibration frequency, duration, etc. or a combination thereof.
- the sound color, pitch, vibration frequency, and duration of different smart devices stored in the database of the sound processing module 2802 are used to obtain information corresponding to the analyzed characteristic information from the database.
- the smart device can obtain the sound analysis result of the specific smart device.
- the sound analysis result may be that a smoke alarm has alarmed and so on.
- the information processing apparatus further includes a second terminal.
- the second terminal is connected to the data transmission module 2803.
- the sound processing module 2802 sends the sound signal to the second terminal.
- the second terminal obtains the sound analysis result corresponding to the sound signal, and sends/feeds back the sound analysis result to the sound processing module 2802.
- the information processing module 2805 may process the information and transmit the processing result to one or more user terminals. In some embodiments, the information processing module 2805 can determine which device and/or sensor reports what alarms by matching local and/or cloud databases, and output the processing results to the user terminal through the data transmission module 2803. For example, the information processing module 2805 matches the information obtained by the information collection module 2804 with a local and/or cloud database, and the processing result is that the combustible gas concentration sensor has issued an alarm, and the processing result is transmitted to the first terminal. In some embodiments, the information processing module 2805 may use a machine learning model to determine which device and/or sensor reported which alarm, and output the result to the user terminal through the data transmission module 2803.
- the output result of the machine learning model is the similarity of various alarms of various devices and/or sensors, and the information processing module 2805 selects the highest similarity value as the result, and transmits the result to the user terminal.
- the information processing module 2805 may process and summarize the sound analysis results from the sound processing module 2802, and transmit the processing results to the user terminal.
- the information processing module 2805 may transmit the obtained information to the user terminal.
- the information processing module 2805 may aggregate the information from the information collection module and push it to the first terminal.
- the information processing module may summarize and process the information of the information collection module 2804, and transmit the processing result to the first terminal.
- the information summarized by the information processing module is that the smoke sensor detects that the smoke concentration is too high, and the temperature sensor detects that the temperature is normal room temperature, then the processing result of the information processing module may be that the fire is small.
- the information processing module 2805 may aggregate the processing results of the information processing module and the sound analysis results from the sound processing module 2802 and transmit them to the user terminal.
- the sound analysis result may not only include the type of smart device obtained by the analysis (which may be referred to as the sound processing result in this embodiment), but also the push method of the sound processing result and the push object (in this embodiment) Refers to the first terminal).
- the push method refers to the method used to push, such as wireless, wired, mobile signal (SMS), APP push messages, and so on.
- Pushing the object refers to determining which terminal the sound processing result is sent to.
- the push method and push object corresponding to the obtained sound processing result may be determined based on the corresponding relationship between the pre-acquired sound processing result and the push method and push object.
- the information processing module 2805 may use the push methods and push objects included in the sound analysis result from the sound processing module 2802. In some embodiments, the information processing module 2805 may only retain the sound processing results in the sound analysis results from the sound processing module 2802, and the information processing module 2805 may determine a new push method and push objects to push.
- the information processing module 2805 may determine the push method and the push object based on the state of the user terminal connected to the network. In some embodiments, the information processing module 2805 may obtain the network connection status of the first terminal based on the data transmission module 2803, and determine the push mode and the push object.
- the information processing module 2805 may determine the first terminal as the push target, and the determined push method may be SMS, Bluetooth and other methods that do not require data transmission via the Internet;
- the local community security room or the local police station, that is, the third terminal, can be determined as the push target, and the determined push method may be wireless, wired, mobile signal (short message), APP push message, and so on.
- the information processing module 2805 may determine the push method and the push object based on the type of the information processing result. For example, the information processing module 2805 may classify the sound processing results of the sound processing module 2802, and determine the push method and the push object based on the classification result. For example only, the information processing module 2805 may obtain the sound processing result of the sound processing module 2802, and classify the sound processing result into prompts and alarms.
- the first terminal can be determined as the push target, and the methods that will not cause too much interference to the user, such as SMS, APP push messages, etc., can be determined as the push method; for alarms, the first terminal and the third terminal can be determined as the push
- the distance information collection module 2804 and/or the terminal device within a certain distance of the first terminal can be determined as the push target, and the wireless, wired, mobile signal (SMS), APP push message, etc. can be determined as the push target.
- Push method The sound analysis result in this embodiment may include the above-mentioned sound processing result, push method, and push object. However, when the sound processing result is pushed, only the content of the sound processing result may be pushed. In addition, the push method and push The content of the object is also pushed.
- the smart device corresponding to the feature information can be obtained from the database.
- the data stored in the database is not comprehensive, and the smart device corresponding to the feature information cannot be obtained from the database, at this time
- the received sound and the characteristic information corresponding to the sound can be pushed to the user terminal (such as the aforementioned first terminal), so that the user can understand the current state of the device through the user terminal.
- the linked device actions related to the device can be manually remotely controlled, for example, the camera at the location of the sound source can be activated to take pictures, or the window can be opened when the device is a smoke alarm, and so on.
- the processor 112 may output to the first terminal through the data transmission module 2803.
- the first terminal is the user's terminal device, such as a mobile phone, a tablet, a notebook, etc.
- the data transmission module 2803 outputs the sound analysis result, it can be pushed according to the above-determined push method.
- the system 2800 will also be docked with the third terminal. If the resident does not process the alarm message in time, for example, if the information feedback from the first terminal is not received through the data transmission module 2803 within the preset time period, the processing equipment 112 can forward the sound analysis result to the third terminal, that is, when the user cannot process the alarm message in time, there can also be related agencies to process the emergency alarm message, so as to improve safety and protect the user's property from damage.
- the sound processing module 2802 can control the target linkage device associated with the smart device to execute the target action corresponding to the smart device, and specifically can control the corresponding smart device
- the alarm eliminates the action of the equipment to prevent further expansion of the hazard. For example, when the home flood alarm sounds, it will automatically cut off the home's power supply to avoid causing another disaster. When the smoke alarm sounds, the window is controlled to open, etc.
- it can also be used to control the camera device to adopt image information of a smart device. For example, when the anti-pry alarm of the window sounds, the user's cameras are all in a state of alert, start to take pictures, and send the images and videos to the user, which helps the user to track down and understand the specific situation.
- a device with a radio function is always online and always keeps receiving the early warning or alarm sound of other sensors.
- This device is also a device that can be connected to the Internet, and the meaning of the sound signal is parsed through the network or locally. And then convey the meaning of its alarm to the user. Even if the user is not at home, he can know the alarm status at home through the Internet, and then he can deal with the emergency alarm as soon as possible.
- the device may also send the sound signal to a second terminal, such as the cloud, so that the second terminal parses the sound signal, obtains characteristic information, and determines the sound analysis result corresponding to the characteristic information. That is to say, "the sound processing module 2802 sends the sound signal to the second terminal; the second terminal obtains the sound analysis result corresponding to the sound signal and sends it to the sound processing module 2802".
- controlling the target linkage device associated with the smart device to execute the target action corresponding to the smart device can also be achieved through the second terminal.
- the specific process refer to the processing process of the sound processing module 2802. Repeat it again.
- the smart device as a smoke alarm as an example
- the smoke concentration is high, and the alarm threshold of the smoke alarm is exceeded, and the smoke alarm emits a warning sound.
- the sound collection module 2801 in the processing device can collect the warning sound, and then send it to the sound processing module 2802 for analysis.
- the result of the sound processing is a smoke alarm, the push method is SMS, and the push terminal is the user’s mobile phone.
- SMS the message "the smoke alarm at home has alarmed" is sent to the user’s mobile phone as a text message to inform the user that a fire may have occurred in the home. If the user does not reply to the text message for a long time, it means that the user may not have seen the text message. At this time, the short message can be sent to the security personnel in the community, and the security personnel can deal with the fire in time after seeing it.
- the above description of the information processing equipment, modules and units thereof is only for convenience of description, and does not limit the present application within the scope of the cited embodiments. It can be understood that for those skilled in the art, after understanding the principle of the system, it is possible to arbitrarily combine various modules, or form a subsystem to connect with other modules without departing from this principle.
- the sound collection module 2801 and the information collection module 2804 may be different modules of an information processing device, or the same module may implement the functions of the sound collection module and the information collection module.
- the sound processing module 2802 and the information processing module 2805 may be different modules of the information processing device, or one module may implement the functions of the above two modules. Such deformations are all within the protection scope of this application.
- the target linkage device corresponding to the smoke alarm can also be found, such as a camera and a water spray device, control the water spray device to spray water, and control the camera in the shooting room.
- a camera and a water spray device control the water spray device to spray water, and control the camera in the shooting room.
- the image or video collected by the camera can be sent to the user's mobile phone in real time, so that the user can view the situation at home in real time.
- the sound collection module 2801 collects the sound signal of the smart device, and the sound processing module 2802 obtains the sound analysis result corresponding to the sound signal; the data transmission module 2803 outputs the sound analysis result to the first terminal, and the sound analysis result is the smart device
- the analysis result of the sound that is, which device has issued the alarm, realizes that the user understands the content of the alarm sound.
- the user if the user is not at the location where the smart device is located, it can be output to the user's first terminal through the data transmission module 2803, so that the user can understand the sound analysis results in a timely manner, with a higher degree of intelligence and a better user experience.
- alarm signal analysis and sound analysis result output can be performed in time through the information processing device.
- the information processing device in the present invention may be an independent device. It can also be integrated into existing smart terminals, such as door locks, cat eyes, and smart audio equipment.
- the device in the embodiment of the present invention can pick up sound based on the user’s original equipment alarm, and the cost of modification is relatively low, without destroying the original home smart equipment, and can achieve complete compatibility and adaptation. The user does not need to repurchase a complete set of smart devices to support this solution, and the user's cost investment is less, and resources can be reused.
- Existing smart devices such as smoke alarms, flood alarms, combustible gas alarms, and smart door locks, etc.
- local smart devices that is, when the early warning or alarm conditions are reached, they will give an alarm.
- a smoke alarm detects the concentration of smoke and alarms when the concentration reaches a certain concentration.
- the warning sound made by the door lock when an abnormal person is detected, the low battery warning sound of the door lock, etc., this kind of alarm reminder is more the sound of the local alarm reminder, and the user may not know exactly what it is.
- the specific content corresponding to the alarm sound such as only the alarm sound is heard, but it is not clear which smart device the sound belongs to. Or for users who are not in the local area, they cannot receive the sound of the alarm at all.
- the modification of local smart devices into devices that can support remote alarms or prompts will result in higher overall costs.
- the sensor sensor built into the device can perceive the current state of the environment, and generate the early warning or alarm according to the dynamic change of the environmental state.
- smart devices and smoke alarms can detect the concentration of smoke in the room through the built-in sensor, and generate early warning or alarm sound prompts according to the change of smoke concentration.
- each type of alarm prompt (such as smoke alarm, fire alarm, flooding alarm, tamper-proof alarm, door lock prompt, etc.) sounds different.
- the embodiment of the present invention can identify the sound signal of the smart device that is alarming, analyze the sound signal, and extract the meaning of the alarm content contained in the alarm sound signal.
- FIG. 29 is an exemplary flowchart of an abnormal situation analysis method according to some embodiments of the present application.
- the process 2900 may be executed by processing logic, which may include hardware (for example, circuits, dedicated logic, programmable logic, microcode, etc.), software (running on a processing device to perform hardware simulation). Instruction), etc., or any combination thereof.
- processing logic may include hardware (for example, circuits, dedicated logic, programmable logic, microcode, etc.), software (running on a processing device to perform hardware simulation). Instruction), etc., or any combination thereof.
- One or more operations for creating a set shown in FIG. 29 can be implemented by the device control system 100 shown in FIG. 1 and the system 2800 shown in FIG. 28.
- the process 2900 may be stored in a storage device in the form of instructions, and called and/or executed by the processing device 112.
- the process 2900 takes as an example the determination of the abnormal situation based on the sound signal to illustrate the method of determining the abnormal situation based on the sound of the device and/or
- step 2910 the processing device 112 may collect information.
- Information can include sound signals, light signals, electrical signals, and other information.
- step 2910 may be performed by the sound collection module 2801 in the system 2800.
- the sound signal may include the sound of any entity, for example, the sound of various devices (for example, a siren), the sound of a person's speech, the sound of a musical instrument, and so on.
- the sound signal may be emitted by one or more components in a smart device (for example, the smart device 130 in FIG. 1).
- the sound signal may be an alarm sound issued by a smart door lock, a smoke alarm, a noise alarm, a smoke alarm, a fire alarm, a combustible gas alarm, etc.
- the sound signal may also include status information of the device, gateway information, and related information on the network.
- the sound signal may be picked up by one or more sound signal pickup components (eg, microphones, local alarm pickups, etc.).
- the processing device 112 may obtain sound signals from one or more sound pickup devices and/or storage devices (for example, the storage device of the smart device 130) in a wired or wireless manner.
- the one or more sound pickup components may be, for example, a sound pickup component on a smart device, or an external sound pickup component.
- the processing device 112 can acquire sound signals in real time. In some embodiments, the processing device 112 may acquire the sound signal every certain time interval (for example, 10 seconds, 20 seconds, 30 seconds, 1 minute, etc.). In some embodiments, the time interval for signal acquisition may be set by the user, or set or adjusted by the processing device 112 according to actual conditions. For example, when the processing device 112 determines that an abnormality has occurred, the time interval for signal acquisition can be shortened. In some embodiments, the time interval for signal acquisition may be set by the user, or set or adjusted by the processing device 112 according to actual conditions. In some embodiments, when the processing device 112 determines that an abnormality has occurred, the time interval for signal acquisition can be shortened or cancelled.
- the processing device 112 may adopt different information collection frequencies at different times and different scenarios based on big data.
- people rely on burning coal for heating, which is prone to fires and produce carbon monoxide, sulfur dioxide and other harmful gases to the human body.
- the processing device 112 can collect the sound signals of the temperature sensor and/or harmful gases in real time.
- the sound signal of the sensor can collect the sound signal of the humidity sensor at intervals.
- step 2920 the processing device 112 may parse the information to obtain the characteristics of the information.
- the processing device 112 may parse the acquired sound signal to obtain characteristic information of the sound signal.
- step 2910 may be performed by the sound collection module 2801 in the system 2800.
- the characteristic information of the sound signal may include timbre, pitch, vibration amplitude, vibration frequency, duration, amplitude, etc., or a combination thereof.
- the processing device 112 may extract feature information of the sound signal from the sound signal based on various sound signal feature extraction techniques.
- the feature information extraction technology of an exemplary sound signal may include Mel-Frequency Cepstral Coefficient (MFCC), Perceptual Linear Prediction (Packet Level Protocol, PLP), filter bank, etc., or a combination thereof.
- the processing device 112 may obtain an analysis result that matches the characteristic information.
- the processing device 112 may obtain characteristic information that matches the characteristic information of the sound signal.
- Step 2930 may be performed by the sound processing module 2802 in the system 2800.
- the processing device 112 may interact with, for example, the characteristic information of the sound signals of different smart devices stored in a database built in the sound processing module 2802, and obtain the smart device corresponding to the analyzed characteristic information from the database. .
- the processing device 112 may first filter out all the sound analysis results that match the first information in the characteristic information, and then obtain all the sound analysis results that match the second information from the filtered sound analysis results... until Obtain a sound analysis result that simultaneously satisfies each of the characteristic information.
- the processing device may also traverse the database to find a sound analysis result that completely matches the above-mentioned characteristic information.
- the processing device pre-trains a neural network model, which is trained based on a large number of characteristic information samples (for example, normal samples, abnormal samples, etc.) and the sound analysis results corresponding to the characteristic information samples, and inputs the above-mentioned characteristic information In the neural network model, the corresponding sound analysis results can be output.
- the embodiment of the present invention may also adopt other methods besides the above-mentioned methods to achieve "acquiring the sound analysis result matching the characteristic information", as long as it is a method that can realize the sound analysis result matching the characteristic information. It is within the protection scope of the embodiment of the present invention.
- the processing device 112 may obtain the sound analysis result of a specific smart device.
- the sound analysis result may be that a smoke alarm has alarmed and so on.
- the processing device 112 can determine which device and/or sensor reported which alarm by matching a local and/or cloud database.
- the information processing module 2805 matches the information obtained by the information collection module 2804 with a local and/or cloud database, and the processing result is that the combustible gas concentration sensor has issued an alarm.
- the processing device 112 may use a machine learning model to determine which device and/or sensor reported which alarm.
- the output result of the machine learning model is the similarity of various alarms of various devices and/or sensors, and the processing device 112 selects the highest similarity value as the result.
- step 2940 the processing device 112 and/or the user may determine whether there is an abnormal situation according to the analysis result. For example, the processing device 112 and/or the user may determine whether there is an abnormal situation based on the sound analysis result. Step 2940 may be performed by the information processing module 2805 in the system 2800.
- abnormal situations may include strangers opening door locks, strangers appearing indoors and/or outdoors, unauthorised user control equipment, fires, floods, smoke, and objects (for example, monitored elderly, children, pets, etc.) Accident occurred), etc. or a combination thereof.
- the processing device 112 and/or the user can determine whether there is an abnormal situation based on the analysis result. For example, when the analysis result is a fire alarm issued by a fire alarm, the processing device 112 and/or the user may determine that there is an abnormal situation. For another example, when the analysis result is that a stranger is indoors, the processing device 112 and/or the user may determine that there is an abnormal situation.
- the processing device 112 and/or the user may determine whether an abnormal situation exists according to the characteristic information of the sound signal. For example, the processing device 112 may determine whether the frequency of the sound signal is greater than a frequency threshold. When the processing device 112 and/or the user determines that the frequency of the sound signal is greater than the frequency threshold, the processing device 112 and/or the user may determine that there is an abnormal situation. For another example, the processing device 112 and/or the user may determine whether the amplitude of the sound signal is greater than the amplitude threshold. When the processing device 112 and/or the user determines that the amplitude of the sound signal is greater than the amplitude threshold, the processing device 112 and/or the user may determine that there is an abnormal situation.
- the threshold for example, frequency threshold, amplitude threshold, duration threshold, etc.
- the threshold corresponding to the sound feature information may be a predetermined value or a value determined by the processing device 112 and/or the user according to the situation.
- step 2940 can be omitted from the process 2900.
- the process 2900 may include one or more additional steps.
- the processing device 112 may transmit the sound signal, the characteristic information on which the sound signal is placed, the sound analysis result, and/or the abnormal situation to one or more user terminals.
- the processing device 112 may transmit the sound signal, the characteristic information on which the sound signal is placed, the sound analysis result, and/or the abnormal situation to one or more user terminals.
- the user terminal such as the first terminal mentioned above.
- the processing device 112 may separately transmit characteristic information of the sound signal, sound analysis results, abnormal conditions, etc., or a combination thereof to one or more user terminals.
- the processing device 112 may obtain the sound signals of one or more devices, and transmit the sound analysis results of the one or more devices that match the characteristic information and/or the abnormal conditions determined based on the analysis results to one Or multiple user terminals.
- the sound analysis result may include the sound processing result, the push method of the sound processing result, and the push object of the sound processing result.
- the processing device 112 may respectively send the sound signals, feature information, sound analysis results, and/or determined abnormal conditions of one or more devices to one or more user terminals.
- the processing device 112 may process and summarize the sound analysis results of one or more devices, and transmit the processing results to one or more terminals.
- the processing device 112 may determine that the fire intensity is small according to the smoke sensor detecting that the smoke concentration is too high and the temperature sensor detecting that the temperature is normal room temperature.
- the push method refers to the method used to push, such as wireless, wired, mobile signal (SMS), APP push messages, and so on.
- Push object refers to determining which terminal the sound processing result is sent to.
- the push method corresponding to the sound processing result obtained can be determined based on the corresponding relationship between the sound processing result obtained in advance, the push method and the push object, respectively And push objects.
- the processing device 112 may determine the push method and the push object based on the state of the first terminal connected to the network. In some embodiments, the processing device 112 may determine the push method and the push object according to the network connection status of the user terminal. For example, processing device 112 determines that the first terminal is not connected to the Internet, a first terminal may be determined to be an object push, push manner may be determined SMS, Bluetooth TM, NFC, etc. without data transmission through the Internet. In some embodiments, the processing device 112 may determine a third terminal (for example, a local community security room, a local police station, a property steward, etc.) as the push object, and the push method may include wireless, wired, mobile signal (text message), APP push messages and so on.
- a third terminal for example, a local community security room, a local police station, a property steward, etc.
- the processing device 112 may determine the push method and the push object based on the type of the sound analysis result. In some embodiments, the processing device 112 may classify the sound analysis results, and determine the push method and the push object based on the classification results. For example, the processing device 112 may categorize the sound processing results into prompts and alarms. Regarding the prompt, the processing device 112 may determine the first terminal as the push target, and determine a method that does not cause too much interference to the user through a short message, APP, etc., as a push method. For the alarm, the processing device 112 may determine the first terminal and the third terminal as the push target.
- the distance information collection module 2804 and/or the terminal device within a certain distance of the first terminal may also determine the distance information collection module 2804 and/or the terminal device within a certain distance of the first terminal as the push target , Determine wireless, wired, mobile signal (SMS), APP push messages, etc. as push methods.
- the sound analysis result in this embodiment may include the above-mentioned sound processing result, push method, and push object. However, when the sound processing result is pushed, only the content of the sound processing result may be pushed. In addition, the push method and push The content of the object is also pushed.
- the processing device 112 will also be docked with the third terminal. If the resident does not process the alarm message in time, for example, within a preset time period, the processing device 112 does not receive the information fed back by the first terminal. The result of the sound analysis will be forwarded to the third terminal, that is, when the user cannot process the alarm message in time, the relevant agency can also process the emergency alarm message, so as to improve safety and protect the user's property from damage.
- the information collection module 2804 can collect the distance between the system 2800 and the first terminal. In some embodiments, the information processing module 2805 may determine whether the user is nearby based on the collected distance information. In some embodiments, the information processing module 2805 may compare the collected distance information with a preset distance range, and if the collected distance exceeds the preset distance range, it is determined that the user is not nearby.
- the information processing module 2805 outputs the sound analysis result to the first terminal through the data transmission module 2803 and determines whether the user is nearby. If the user is nearby, the sound analysis result is not forwarded to the third terminal. If it is not nearby, the sound analysis result is forwarded to the third terminal.
- the user can check whether there is a false alarm in time according to the alarm, and take measures to reduce the workload for firefighters, police personnel, etc.; when the user is not nearby, the user will be notified in time regardless of whether there is a false alarm or not. Firefighters, police officers, etc., to avoid danger.
- the processing device 112 or the user may perform corresponding operations on one or more devices.
- the processing device 112 may cooperate with the device (for example, the first device) in the control set (for example, the first set) to perform corresponding operations.
- the processing device 112 may activate the camera at the location of the sound source to take pictures, control the power supply and/or turn off the gas stove.
- the processing device 112 determines that the temperature in the house is too high, it can control the door lock to open, the window to open, and so on.
- the processing device 112 can control the target linkage device associated with the smart device to execute the target action corresponding to the smart device, and specifically can control the alarm corresponding to the smart device. Eliminate equipment actions to prevent further expansion of the hazard. For example, when the home flood alarm sounds, it will automatically cut off the home's power supply to avoid causing another disaster. When the smoke alarm sounds, the window is controlled to open, etc. In addition, it can also be used to control the camera device to adopt image information of a smart device. For example, when the anti-pry alarm of the window sounds, the user's camera devices are all in a state of alert, start to take pictures, and send the images and videos to the user, which helps the user to track down and understand the specific situation.
- a scenario embodiment is now provided for illustration.
- the smart device as a smoke alarm as an example
- the smoke concentration is high, and the alarm threshold of the smoke alarm is exceeded, and the smoke alarm emits a warning sound.
- the sound collection module in the processing device can collect the warning sound, and then send it to the sound processing module for analysis.
- the result of the sound processing is a smoke alarm.
- the push method is SMS, and the push terminal is the user’s mobile phone. At this time, it will be sent via SMS.
- a period of time such as 3 minutes, 5 minutes, etc.
- the target linkage equipment corresponding to the smoke alarm such as a camera and a water spray device, control the water spray device to spray water, and control the camera to shoot indoor images.
- the camera can be controlled to shoot indoors from different angles, and then the fire location can be analyzed from the captured images, and the water spray device can be controlled to spray water to the fire location to eliminate the fire as soon as possible.
- the image or video collected by the camera can be sent to the user's mobile phone in real time, so that the user can view the situation at home in real time.
- the sound signal of the smart device is collected through the sound collection module, and the sound processing module obtains the sound analysis result corresponding to the sound signal; the data transmission module outputs the sound analysis result to the first terminal, and the sound analysis result is the sound emitted by the smart device
- the result of the analysis that is, which device issued the alarm, realizes that the user understands the content of the alarm sound.
- the user if the user is not at the location where the smart device is located, it can be output to the user's first terminal through the data transmission module, so that the user can understand the sound analysis results in a timely manner, with a higher degree of intelligence and a better user experience.
- the embodiment of the present invention can perform alarm signal analysis and sound analysis result output in time.
- the device in the embodiment of the present invention can pick up sound based on the user’s original equipment alarm, and the cost of modification is relatively low, without destroying the original home smart equipment, and can achieve complete compatibility and adaptation.
- the user does not need to repurchase a complete set of smart devices to support this solution, and the user's cost investment is less, and resources can be reused.
- a sound signal is used as an example to describe the process of the abnormal situation analysis method.
- the abnormal situation analysis method can also be executed based on other types of signals or information.
- the abnormal situation analysis method can also be applied to optical signals, electromagnetic wave signals, radar signals, and so on.
- numbers describing the number of ingredients and attributes are used. It should be understood that such numbers used in the description of the embodiments use modifiers "about”, “approximately” or “substantially” in some examples. To modify. Unless otherwise stated, “approximately”, “approximately” or “substantially” indicates that the number is allowed to vary by ⁇ 20%.
- the numerical data used in the description and claims are approximate values, and the approximate values can be changed according to the required characteristics of individual embodiments. In some embodiments, the numerical data should consider the prescribed effective digits and adopt the method of general digit retention. Although the numerical ranges and data used to confirm the breadth of the range in some embodiments of the present application are approximate values, in specific embodiments, the setting of such numerical values is as accurate as possible within the feasible range.
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Multimedia (AREA)
- Theoretical Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- General Engineering & Computer Science (AREA)
- Automation & Control Theory (AREA)
- Lock And Its Accessories (AREA)
- Selective Calling Equipment (AREA)
Abstract
本申请实施例公开了一种设备控制方法和系统。所述设备控制方法包括:确定一个或多个集合,所述一个或多个集合具有对应的预设规则;根据第一设备的信息,将所述第一设备加入到所述一个或多个集合中的第一集合中;以及根据与所述第一集合对应的预设规则,控制所述第一集合中的所述第一设备执行相应的操作。
Description
交叉引用
本申请要求2020年5月26日提交的中国申请202010454856.1的优先权,2020年7月30日提交的中国申请202021553185.6的优先权,2020年7月30日提交的中国申请202010750449.5的优先权,2020年12月31日提交的中国申请202011624116.4的优先权,以及2020年12月31日提交的中国申请202011621279.7的优先权,全部内容通过引用并入本文。
本申请涉及设备控制领域,特别涉及一种设备的控制方法和系统。
随着科技的进步与发展,智能设备(例如,智能锁、智能音响、智能窗帘、智能灯具等)已进入大众的日常生活。智能设备广泛应用于门禁系统、居家设备、安防、交通工具等领域。如何便捷、有效地实现智能设备的单独和联动控制,例如,智能设备的状态(例如,布防状态、解防状态等的)控制、智能设备的模式(例如,电子反锁模式、管理员模式等)的控制以及有效利用智能设备提高安全防控等具有重要的实际应用价值。因此,期望提供一种有效的智能设备的控制方法及系统。
发明内容
本申请实施例之一提供一种设备控制方法,包括:确定一个或多个集合,所述一个或多个集合具有对应的预设规则;根据第一设备的信息,将所述第一设备加入到所述一个或多个集合中的第一集合中;以及根据与所述第一集合对应的预设规则,控制所述第一集合中的所述第一设备执行相应的操作。
在一些实施例中,所述设备控制方法进一步包括:接收管理指令;根据所述管理指令执行相应的管理操作,其中,所述管理指令用于指示对以下至少一项进行管理:集合、集合中的设备、集合中的设备所关联的用户账户。
在一些实施例中,所述设备控制进一步包括:接收所述第一设备的分享请求,其中,所述分享请求中携带有所述第一设备的标识、所述第一设备对应的第一集合的标识和配置信息、所述第一设备对应的原始用户账户的设置信息;以所述第一设备对应的第一集合的标识作为集合标识,创建一个新的集合;其中,所述新的集合的配置信息被设置为所述第一集合的配置信息;在所述新的集合下添加所述第一设备,并对所述第一设备的控制权限进行设置,以使得所述控制权限符合所述第一设备对应的原始用户账户的设置信息的要求。
在一些实施例中,所述设备控制方法进一步包括:获取用户用于控制所述第一设备的控制指令;验证所述控制指令是否满足预设条件以得到验证结果;以及根据所述验证结果、所述第一设备的状态和所述控制指令,确定是否控制所述第一设备执行与所述控制指令对应的操作。
在一些实施例中,所述控制指令由所述用户通过第一终端发送;所述验证所述控制指令是否满足预设条件包括:验证所述第一终端是否具有执行与所述控制指令对应操作的权限。
在一些实施例中,所述控制指令基于所述用户对所述第一设备上的操作部件的操作生成;所述验证所述控制指令是否满足预设条件包括:验证所述操作部件是否位于预设位置。
在一些实施例中,所述控制指令用于控制所述第一设备的预设模式的开启和/或关闭。
在一些实施例中,所述预设模式包括以下模式中的一种或几种:安全模式、勿扰模式、特定用户控制模式或用户自设定模式。
在一些实施例中,所述设备控制方法进一步包括:在控制所述第一设备执行与所述控制指令对应的操作之后,通过图像采集装置所采集的图像判断是否出现预设场景;以及响应于出现所述预设场景,控制所述图像采集装置按照预设图像采集规则进行图像采集操作。
在一些实施例中,所述第一设备包括智能锁,所述设备控制方法进一步包括:检测用户的开门动作行为或关门动作行为;响应于检测到所述开门动作行为或关门动作行为,监测所述门锁的触发部件的动作;以及响应于所述触发部件的动作满足预定条件,控制所述第一设备处于布防状态。
在一些实施例中,所述检测用户的开门动作行为或关门动作行为包括:检测所述智能锁的门内操作件或门外操作件的动作,或者,通过传感器检测用户的开门动作行为或关门动作行为。
在一些实施例中,所述监测所述门锁的触发部件的动作包括:监测所述门锁的门外操作件或者锁体的动作;所述响应于所述触发部件的动作满足预定条件,包括:检测到所述门锁的门外操作件或者锁体的上锁动作。
在一些实施例中,所述响应于检测到所述开门动作行为或关门动作行为,监测所述门锁的触发部件的动作包括:响应于检测到所述用户的所述开门动作行为或关门动作行为,在设定时长内,监测所述门锁的所述触发部件的动作;所述响应于所述触发部件的动作满足预定条件,包括:在所述设定时长内检测到所述触发部件的动作满足设定条件。
在一些实施例中,所述设备控制方法进一步包括:检测室内温度;判断所述室内温度是否超过温度阈值;以及响应于所述室内温度超过所述温度阈值,控制所述智能锁解锁。
在一些实施例中,根据与所述第一集合对应的预设规则,控制所述第一集合中的所述第一设备执行相应的操作进一步包括:检测是否有异常情况;以及响应于检测到异常情况,根据与所述异常情况对应的预设规则,控制所述第一集合中的第一设备执行相应的操作。
在一些实施例中,所述检测是否有异常情况包括:获取信息;解析所述信息,得到所述信息的特征;获取与所述特征相匹配的分析结果;根据所述分析结果确定是否有异常情况。
在一些实施例中,所述设备控制方法还包括:响应于检测到异常情况,将所述异常情况发送给一个或多个终端。
在一些实施例中,所述信息包括声音信号,所述信息的特征包括所述声音信号的特征信息,所述特征信息包括以下中的一种或多种:音色、音调、振动幅度、振动频率和时长。
本申请实施例之一提供一种设备控制系统,包括:集合确定模块、设备确定模块和控制模块;所述集合确定模块用于确定一个或多个集合,所述一个或多个集合具有对应的预设规则;所述设备确定模块用于根据第一设备的信息,将所述第一设备加入到所述一个或多个集合中的第一集合中;和所述控制模块用于根据与所述第一集合对应的预设规则,控制所述第一集合中的所述第一设备执行相应的操作。
本申请实施例之一提供一种用于控制设备的方法,应用于第一客户端,所述方法包括: 接收用于指示将待添加设备添加到指定的房屋下的设备添加指令,其中,所述待添加设备是所述第一客户端对应的用户账户下绑定的设备,所述指定的房屋配置有对应的场景规则;根据所述设备添加指令,将所述待添加设备添加到所述指定的房屋下;其中,所述指定的房屋下添加的设备被所述第一客户端以所述指定的房屋对应的场景规则进行控制。
在一些实施例中,在所述接收用于指示将待添加设备添加到指定的房屋下的设备添加指令之前,所述方法还包括:接收房屋创建指令;根据所述房屋创建指令,创建至少一个房屋,并为所述至少一个房屋配置对应的场景规则,其中,所述至少一个房屋包括所述指定的房屋。
在一些实施例中,所述方法还包括:接收管理指令,根据所述管理指令执行相应的管理操作,其中,所述管理指令用于指示对以下至少一项进行管理:房屋、房屋下的设备、房屋下的设备所关联的用户账户。
在一些实施例中,所述接收管理指令,根据所述管理指令执行相应的管理操作,包括:接收设备所属房屋的移动指令,其中,所述移动指令携带有待移动设备的原始房屋标识和目标房屋标识;在所述原始房屋标识对应的房屋下删除所述待移动设备,并在所述目标房屋标识对应的房屋下添加所述待移动设备;修改所述待移动设备的配置信息,和/或所述目标房屋标识对应的房屋的配置信息,以使所述待移动设备的当前配置信息与所述目标房屋标识对应的房屋下的场景规则相匹配。
在一些实施例中,所述接收管理指令,根据所述管理指令执行相应的管理操作,包括:接收用于指示将待删除设备从对应的房屋下删除的第一设备删除指令,其中,所述第一设备删除指令来源于第一目标用户账户,所述第一目标用户账户对所述待删除设备的控制权限最高;根据所述第一设备删除指令,确定所述待删除设备所属的房屋,并从所述待删除设备所属的房屋下删除所述待删除设备。
在一些实施例中,若所述第一目标用户账户为所述第一客户端对应的用户账户,且与所述第一客户端通信的第二客户端创建的房屋下添加有所述待删除设备,则所述方法还包括:向所述第二客户端发送用于指示删除所述待删除设备的第二设备删除指令,以使所述第二客户端根据所述第二设备删除指令,从所述待删除设备所属的房屋下删除所述待删除设备。
在一些实施例中,所述接收管理指令,根据所述管理指令执行相应的管理操作,包括:接收用于指示删除第二目标用户账户的用户账户删除指令,其中,所述第二目标用户账户与被添加到房屋下的第一设备相关联,且所述第二目标用户账户对所述第一设备的控制权限不是最高控制权限;根据所述用户账户删除指令,从所述第一设备关联的用户账户中删除所述第二目标用户账户;向服务器发送控制权限删除指令,其中,所述控制权限删除指令用于控制所述服务器删除所述第二目标用户账户对所述第一设备的控制权限。
在一些实施例中,所述方法还包括:接收服务器发送的设备的分享请求;其中,所述分享请求中携带有被分享设备的标识、所述被分享设备对应的原始房屋的标识和配置信息、所述被分享设备对应的原始用户账户的设置信息;以所述被分享设备对应的原始房屋的标识作为房屋标识,创建一个新的房屋;其中,所述新的房屋的配置信息被设置为所述被分享设备对应的原始房屋的配置信息;在所述新的房屋下添加所述被分享设备,并对所述被分享设备的控制权限进行设置,以使得所述控制权限符合所述被分享设备对应的原始用户账户的设置信息的要求。
本申请实施例之一提供一种用于控制设备的装置,应用于第一客户端,所述装置包括:第一接收单元,用于接收用于指示将待添加设备添加到指定的房屋下的设备添加指令,其中,所述待添加设备是所述第一客户端对应的用户账户下绑定的设备,所述指定的房屋配置有对应的场景规则;添加单元,用于根据所述设备添加指令,将所述待添加设备添加到所述指定的房屋下;其中,所述指定的房屋下添加的设备被所述第一客户端以所述指定的房屋对应的场景规则进行控制。
在一些实施例中,所述装置,还包括:第二接收单元,用于接收房屋创建指令;配置单元,用于根据所述房屋创建指令,创建至少一个房屋,并为所述至少一个房屋配置对应的场景规则,其中,所述至少一个房屋包括所述指定的房屋。
在一些实施例中,所述装置还包括:执行单元,用于接收管理指令,根据所述管理指令执行相应的管理操作,其中,所述管理指令用于指示对以下至少一项进行管理:房屋、房屋下的设备、房屋下的设备所关联的用户账户。
在一些实施例中,所述装置还包括:第六接收单元,用于接收服务器发送的设备的分享请求;其中,所述分享请求中携带有被分享设备的标识、所述被分享设备对应的原始房屋的标识和配置信息、所述被分享设备对应的原始用户账户的设置信息;创建单元,用于以所述被分享设备对应的原始房屋的标识作为房屋标识,创建一个新的房屋;其中,所述新的房屋的配置信息被设置为所述被分享设备对应的原始房屋的配置信息;设置单元,用于在所述新的房屋下添加所述被分享设备,并对所述被分享设备的控制权限进行设置,以使得所述控制权限符合所述被分享设备对应的原始用户账户的设置信息的要求。
本申请实施例之一提供一种智能锁控制方法,应用于智能锁中的控制器,所述智能锁控制方法包括:获取智能锁控制指令,并验证所述智能锁控制指令的合法性得到验证结果;所述智能锁控制指令包括本地控制指令或通过通信方式接收到的控制指令;获取所述智能锁的状态;根据所述验证结果、所述智能锁的状态以及所述预设控制指令响应规则,确定是否响应所述智能锁控制指令。
在一些实施例中,所述智能锁控制指令是用于开启预设模式的控制指令,获取智能锁控制指令,并验证所述智能锁控制指令的合法性得到验证结果,包括:获取用于开启预设模式的控制指令,并确定所述开启预设模式指令是否是预设终端发送,得到验证结果;所述控制指令包括所述预设模式的开启规则;或,获取响应于用户操作所述智能锁上的操作部件生成的用于开启预设模式的控制指令,并确定所述控制指令是否是将预设模式对应的操作部件调整至表征开启预设模式的位置时生成的,得到验证结果。
在一些实施例中,根据所述验证结果、所述当前状态以及所述预设控制指令响应规则,确定是否响应所述智能锁控制指令,包括:判断所述当前状态是否是锁定状态、以及判断所述验证结果是否是第一预设结果;若所述状态是锁定状态、以及所述验证结果是第一预设结果,则确定响应所述智能锁控制指令;若所述状态不是锁定状态、或所述验证结果不是第一预设结果,过滤所述智能锁控制指令。
在一些实施例中,在确定响应所述智能锁控制指令之后,还包括:控制所述智能锁处于所述预设模式的工作状态。
在一些实施例中,在控制所述智能锁处于所述预设模式的工作状态之后,还包括:通过预设图像采集装置采集的图像判断是否出现预设场景;若出现,则控制所述预设图像采集 装置按照预设图像采集规则进行图像采集操作。
在一些实施例中,所述智能锁控制指令是用于关闭预设模式的控制指令,所述获取智能锁控制指令,并验证所述智能锁控制指令的合法性得到验证结果,包括:获取用于关闭预设模式的控制指令,并确定所述控制指令是否是预设终端发送,得到验证结果;所述控制指令包括所述预设模式的关闭规则;或,获取设置在所述智能锁上的预设部件被触发后生成的用于关闭预设模式的控制指令,并判断所述控制指令的控制信息是否满足预设规则,得到验证结果;或,获取智能锁状态变化指令,并确定所述智能锁状态变化指令中的状态变化趋势是否是由锁定状态更改为解锁状态,得到验证结果;或,获取用户在智能锁面板上输入的用于关闭预设模式的控制指令,并判断所述控制指令中的内容是否是预设内容,得到验证结果。
在一些实施例中,在所述验证结果和所述当前状态符合预设条件的情况下,根据预设控制指令响应规则,确定是否响应所述智能锁控制指令,包括:判断所述状态是否是正常工作状态、以及判断所述验证结果是否是第二预设结果;若所述状态是正常工作状态、以及所述验证结果是第二预设结果,则确定响应所述智能锁控制指令;若所述验证结果不是第二预设结果,则过滤所述智能锁控制指令。
在一些实施例中,在确定响应所述智能锁控制指令之后,还包括:控制所述智能锁处于非预设模式的工作状态。
在一些实施例中,所述智能锁控制指令是用于关闭预设模式的控制指令,所述获取智能锁控制指令,并验证所述智能锁控制指令的合法性得到验证结果,包括:获取用户输入的本地解锁指令,所述本地解锁指令包括解锁信息;验证所述解锁信息是否是具有开锁权限的解锁信息;若是,验证所述解锁信息是否是对应预设用户标识的解锁信息,得到验证结果。
在一些实施例中,在确定需要响应所述智能锁控制指令之后,还包括:响应所述本地解锁指令,执行开锁操作,并在成功执行开锁操作后,关闭预设模式。
在一些实施例中,确定成功执行开锁操作包括:确定预设锁舌是否收回;若是,则确定成功执行开锁操作。
本申请实施例之一提供一种智能锁控制装置,应用于智能锁中的控制器,所述智能锁控制装置包括:指令验证模块,用于获取智能锁控制指令,并验证所述智能锁控制指令的合法性得到验证结果;所述智能锁控制指令包括本地控制指令或通过通信方式接收到的控制指令;状态获取模块,用于获取所述智能锁的状态;指令判断模块,用于根据所述验证结果、所述智能锁的状态以及所述预设控制指令响应规则,确定是否响应所述智能锁控制指令。
本申请实施例之一提供一种智能锁控制方法,应用于智能锁,所述方法包括:检测用户的出门动作行为;响应于所述出门动作行为,监测所述智能锁的安全触发部件的动作;如检测到所述安全触发部件的动作满足设定条件,控制所述智能锁处于布防状态,其中,在所述智能锁处于布防状态下,如所述智能锁检测到预设动作,则执行警报操作。
在一些实施例中,所述监测所述智能锁的安全触发部件的动作,包括:监测所述智能锁的布防操作件的操作动作;所述检测到安全触发部件的动作满足设定条件,包括:检测到所述布防操作件被触发。
在一些实施例中,所述监测所述智能锁的安全触发部件的动作,包括:监测所述智能锁的门外操作件或者锁体的动作;所述检测到安全触发部件的动作满足设定条件,包括:检测到所述门外操作件或者锁体的上锁动作。
在一些实施例中,所述检测用户的出门动作行为,包括:检测到所述智能锁的门内操作件的开门动作;或者,检测到所述智能锁的门内操作件的开门动作且通过指定传感器感应到用户出门。
在一些实施例中,所述方法还包括:如检测到所述安全触发部件的动作满足设定条件,向服务器发送布防请求,以使得所述服务器基于所述布防请求控制至少一个智能设备处于布防状态,其中,在所述智能设备处于布防状态下,如所述智能设备感应到设定的防盗异常行为,执行警报操作。
在一些实施例中,所述智能锁还集成有摄像装置;所述方法还包括:如检测到所述安全触发部件的动作满足设定条件,控制所述智能锁中集成的摄像装置处于布防状态,其中,在所述摄像装置处于布防状态下,所述摄像装置执行图像采集,并基于采集到的图像确定出存在异常人员的情况下,执行警报操作。
在一些实施例中,所述响应于所述出门动作行为,监测所述智能锁的安全触发部件的动作,包括:响应于所述出门动作行为,启动定时器,并在定时器对应的设定时长内监测智能锁的安全触发部件的动作;所述检测到所述安全触发部件的动作满足设定条件,包括:在所述设定时长内检测到所述安全触发部件的动作满足设定条件。
在一些实施例中,所述方法还包括:在检测到所述智能锁关联的门铃按键被触按的情况下,向所述服务器发送门铃提醒消息,以使得所述服务器向所述智能锁绑定的用户终端发送所述门铃提醒消息,所述门铃提醒消息用于提示有人触按门铃。
在一些实施例中,所述方法还包括:通过所述智能锁内的温度传感器感应室内温度;在所述室内温度超过设定阈值的情况下,控制所述智能锁执行解锁操作。
在一些实施例中,所述方法还包括:在所述室内温度超过设定阈值的情况下,向所述智能锁绑定的用户终端发送风险警报,所述风险警报用于提醒用户室内温度存在安全隐患。
本申请实施例之一提供一种智能锁控制方法,应用于服务器,所述方法包括:获得智能锁发送的布防请求,所述布防请求为所述智能锁在检测到用户的出门动作行为后,在检测到所述智能锁的安全触发部件的动作满足设定条件的情况下生成的;响应于所述布防请求,指示所述智能锁进入布防状态,其中,在所述智能锁处于布防状态下,如所述智能锁检测到预设动作,则执行警报操作。
本申请实施例之一提供一种智能锁控制装置,应用于服务器,包括:请求获得单元,用于获得智能锁发送的布防请求,所述布防请求为所述智能锁在检测到的用户的出门动作行为,且检测到所述智能锁的安全触发部件的动作满足设定条件的情况下生成的;布防指示单元,用于响应于所述布防请求,指示所述智能锁进入布防状态,其中,在所述智能锁处于布防状态下,如所述智能锁检测到预设动作,则执行警报操作。
本申请实施例之一提供一种计算机可读介质,其上存储有计算机程序,其中,所述程序被处理器执行时实现如本申请任一实施例所述的方法。
本申请实施例之一提供一种处理器,所述处理器用于运行程序,其中,所述程序运行时实现如本申请任一实施例所述的方法。
本申请实施例之一提供一种智能锁,包括:一个或多个处理器;存储装置,其上存储有一个或多个程序;当所述一个或多个程序被所述一个或多个处理器执行时,使得所述一个或多个处理器实现如本申请任一实施例所述的方法。
本申请实施例之一提供一种信息处理装置,包括:声音采集模块、声音处理模块和数据传输模块;所述声音采集模块、所述声音处理模块和所述数据传输模块依次连接;所述声音采集模块采集智能设备的声音信号;所述声音处理模块得到与所述声音信号对应的声音分析结果;所述数据传输模块输出所述声音分析结果至第一终端。
在一些实施例中,所述声音处理模块用于得到与所述声音信号对应的声音分析结果时,具体用于:解析所述声音信号,得到所述声音信号的特征信息;获取与所述特征信息相匹配的声音分析结果;所述声音分析结果包括声音处理结果、声音处理结果的推送方式以及声音处理结果的推送对象。
在一些实施例中,所述信息处理装置还包括第二终端;所述第二终端与所述数据传输模块连接;所述声音处理模块将所述声音信号发送至第二终端;所述第二终端得到所述声音信号对应的声音分析结果,并发送至所述声音处理模块。
在一些实施例中,所述声音处理模块还用于:控制与所述智能设备相关联的目标联动设备执行与所述智能设备相对应的目标动作。
在一些实施例中,所述声音处理模块还用于:若预设时间段内未通过所述数据传输模块接收到所述第一终端反馈的信息,控制所述数据传输模块输出所述声音分析结果至第三终端。
在一些实施例中,所述特征信息包括至少以下一个:音色、音调、振动频率和时长。
在一些实施例中,所述声音采集模块包括麦克风。
在一些实施例中,所述智能设备包括至少以下一个:烟雾报警器、水灾报警器和可燃气体报警器。
在一些实施例中,所述数据传输模块包括无线传输模块和有线传输模块。
在一些实施例中,所述声音处理模块包括控制器。
本申请实施例之一提供一种信息处理方法,其特征在于,应用于如本申请任一实施例所述的声音处理模块,所述信息处理方法包括:获取所述声音采集模块采集的智能设备的声音信号;得到与所述声音信号对应的声音分析结果;将所述声音分析结果通过所述数据传输模块输出至第一终端。
在一些实施例中,得到与所述声音信号对应的声音分析结果,包括:解析所述声音信号,得到所述声音信号的特征信息;获取与所述特征信息相匹配的声音分析结果;所述声音分析结果包括声音处理结果、声音处理结果的推送方式以及声音处理结果的推送对象。
在一些实施例中,得到与所述声音信号对应的声音分析结果,包括:将所述声音信号发送至第二终端;接收所述第二终端在得到所述声音信号对应的声音分析结果后反馈的所述声音分析结果。
在一些实施例中,所述方法还包括:控制与所述智能设备相关联的目标联动设备执行与所述智能设备相对应的目标动作。
在一些实施例中,所述方法还包括:若预设时间段内未通过所述数据传输模块接收到所述第一终端反馈的信息,控制所述数据传输模块输出所述声音分析结果至第三终端。
附加的特征将在下面的描述中部分地阐述,并且对于本领域技术人员来说,通过查阅以下内容和附图将变得显而易见,或者可以通过实例的产生或操作来了解。本发明的特征可以通过实践或使用以下详细实例中阐述的方法、工具和组合的各个方面来实现和获得。
本申请将以示例性实施例的方式进一步说明,这些示例性实施例将通过附图进行详细描述。这些实施例并非限制性的,在这些实施例中,相同的编号表示相同的结构,其中:
图1所示为根据本申请的一些实施例所示的一种智能设备的控制方法及系统的应用场景示意图;
图2是实现本申请中公开的特定系统的示例性计算设备的框图;
图3是根据本申请的一些实施例所示的智能锁控制系统的示例性硬件和/或软件的示意图;
图4是根据本申请一些实施例所示的设备控制方法的示例性流程图;
图5A为根据本申请一些实施例所示的用于控制设备的装置示意图;
图5B为根据本申请一些实施例所示的用于控制设备的装置示意图;
图5C为根据本申请一些实施例所示的用于控制设备的装置的执行单元的示意图;
图5D为根据本申请一些实施例所示的用于控制设备的装置的执行单元的示意图;
图5E为根据本申请一些实施例所示的用于控制设备的装置的执行单元的示意图;
图5F为根据本申请一些实施例所示的用于控制设备的装置的示意图;
图6为根据本申请一些实施例所示的集合创建方法的示例性流程图;
图7为根据本申请一些实施例所示的在集合中设备添加方法的示例性流程图;
图8为根据本申请的一些实施例所示的房屋与设备的关系示意图;
图9为根据本申请一些实施例所示的移动集合中设备的方法的示例性流程图;
图10为根据本申请一些实施例所示的集合创建方法的示例性流程图;
图11为根据本申请一些实施例所示的不同账号间设备分享的方法的示例性流程图;
图12为根据本申请一些实施例所示的删除设备对应账号的方法的示例性流程图;
图13为根据本申请一些实施例所示的设备控制装置的示意图;
图14为根据本申请一些实施例所示的设备控制方法的示例性流程图;
图15为根据本申请一些实施例所示的用户开锁权限验证方法的示例性流程图;
图16所示为根据本申请一些实施例所示的智能锁的控制系统的应用场景示意图;
图17为根据本申请一些实施例所示的智能锁控制装置的示意图;
图18为根据本申请一些实施例所示的智能锁控制方法的示例性流程图;
图19所示为根据本申请一些实施例所示的智能锁的控制系统的应用场景示意图;
图20为据本申请一些实施例所示的智能锁控制方法的示例性流程图;
图21为据本申请一些实施例所示的智能锁控制方法的示例性流程图;
图22为根据本申请一些实施例所示的智能锁控制装置的示意图;
图23为根据本申请一些实施例所示的智能锁布防控制方法的示例性流程图;
图24为根据本申请一些实施例所示的智能锁控制方法的示例性流程图;
图25为根据本申请一些实施例所示的智能锁的控制系统的应用场景示意图;
图26为根据本申请一些实施例所示的智能锁的门铃提醒方法的示例性流程图;
图27为根据本申请一些实施例所示的智能锁的门铃提醒方法的示例性流程图;
图28是根据本申请一些实施例所示的信息处理装置的示例性系统架构的示意图;以 及
图29是根据本申请一些实施例所示的异常情况分析方法的示例性流程图。
为了更清楚地说明本申请的实施例的技术方案,下面将对实施例描述中所需要使用的附图作简单的介绍。显而易见地,下面描述中的附图仅仅是本申请的一些示例或实施例,对于本领域的普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图将本申请应用于其他类似情景。应当理解,给出这些示例性实施例仅仅是为了使相关领域的技术人员能够更好地理解进而实现本发明,而并非以任何方式限制本发明的范围。除非从语言环境中显而易见或另做说明,图中相同标号代表相同结构或操作。
如本申请和权利要求书中所示,除非上下文明确提示例外情形,“一”、“一个”、“一种”和/或“该”等词并非特指单数,也可包括复数。一般说来,术语“包括”与“包含”仅提示包括已明确标识的步骤和元素,而这些步骤和元素不构成一个排它性的罗列,方法或者设备也可能包含其他的步骤或元素。术语“基于”是“至少部分地基于”。术语“一个实施例”表示“至少一个实施例”;术语“另一实施例”表示“至少一个另外的实施例”。应当理解,本文使用的术语“数据块”、“系统”、“引擎”、“单元”、“组件”、“模块”和/或“块”是用以区分不同级别的不同组件、元件、部件、部分或组件的一种方法。然而,如果其他词语可以实现相同的目的,则可通过其他表达来替换所述词语。
应该理解,尽管在本文中可以使用术语“第一”,“第二”,“第三”等来描述各种元件,但是这些元件不应受到这些术语的限制。这些术语仅用于将一个元件与另一个元件区分开。例如,在不脱离本公开的示例性实施例的范围的情况下,第一元件可以被称为第二元件,并且类似地,第二元件可以被称为第一元件。
本说明书中使用了流程图用来说明根据本说明书的实施例的系统所执行的操作。应当理解的是,前面或后面操作不一定按照顺序来精确地执行。相反,可以按照倒序或同时处理各个步骤。同时,也可以将其他操作添加到这些过程中,或从这些过程移除某一步或数步操作。
本申请实施例所涉及的设备控制方法与系统可以应用于硬件资源的管理。例如,本系统可以应用于智能家居设备、车载设备等设备的管理控制。智能家居设备可以包括但不限于智能锁、保险箱、便携式保管柜、枪柜、lockbox、智能快递柜、摄像头、传感器、锁具、门铃、猫眼、空调、冰箱、窗帘、电视、煤气灶、音响、窗户、灯具等。在一些实施例中,本系统可以应用于软件资源的管理控制。例如,本系统可以应用于安防系统、门禁系统、音乐、视频、文本等软件资源系统的管理控制。在一些实施例中,本系统可以应用于软硬件结合资源的管理控制。为方便描述,下文主要以硬件资源的管理控制为例描述本系统的应用。这并不旨在限定,本系统可以应用于其它方面。
图1所示为根据本申请的一些实施例所示的一种智能设备的控制方法及系统的应用场景示意图。
智能设备的控制系统100可以用于居民住宅、办公楼、厂区、学校、医院、酒店、出租房屋等各类生产生活区域内的智能锁、智能摄像头、智能门铃、智能音响、智能燃气灶等智能设备的控制以及管理。在一些实施例中,智能设备的控制系统100还可以应用于车载系 统中。
例如,控制系统100能够根据集合(例如,第一集合)的预设规则,控制集合中的一个或多个设备(例如,第一设备)执行相应的操作。又例如,控制系统100可以验证用户用于控制一个或多个设备的控制指令是否满足预设条件。根据验证结果、一个或多个设备的状态以及控制指令,控制系统100可以确定是否控制一个或多个设备执行与控制指令对应的操作(例如,布防操作、异常情况检测、警报操作)。再例如,控制系统100可以根据设备的信息(例如,声音信号、状态信息等),确定是否有异常情况存在。
如图1所示,控制系统100可以包括服务器110、智能设备130、用户终端140和网络120。
服务器110可以获取处理智能设备130的关联信息,并对智能设备的关联信息进行处理,确定智能设备的操作指示信息,以执行一个或多个本申请中描述的功能。所述关联信息可以包括智能设备信息和/或智能设备的通信状态。智能设备信息可以理解为智能设备的设备信息,所述智能设备信息可以包括智能设备的部件信息、电量信息、操作信息等。例如,智能设备的设备信息可以是智能设备的工作状态。又例如,智能设备的设备信息可以是智能设备的一个或多个部件的位置信息。
服务器110可以执行系统100中的部分功能。具体的,在一些实施例中,服务器110可以接收管理指令。在一些实施例中,服务器110可以根据管理指令执行相应的管理操作。例如,服务器110可以根据管理指令用于指示对集合、集合中的设备、集合中的设备所关联的用户账户等进行管理或控制。
在一些实施例中,服务器110可以是一个单个的服务器或者一个服务器群组(例如,包括服务器110-1、110-2等多个服务器的群组)。所述服务器群可以是集中式的或分布式的(例如,服务器110可以是一个分布式的系统)。在一些实施例中,服务器110可以是本地的或远程的。例如,服务器110可以通过网络120访问智能设备130和用户终端140。再例如,服务器110可以直接连接到智能设备130、用户终端140以访问存储的信息和/或数据。在一些实施例中,服务器110可以在一个云平台上实现。仅仅举个例子,所述云平台可以包括私有云、公共云、混合云、社区云、分布云、云之间、多重云等或上述举例的任意组合。在一些实施例中,服务器110可以在计算设备(例如,图2中的计算设备200)上实现。在一些实施例中,服务器110可以在移动设备上实现。
在一些实施例中,服务器110可以包括处理设备112。如所描述的,处理设备112可以处理服务器110的至少一些功能。例如,处理设备112可以获取用户的指令(例如,管理指令、控制设备的控制指令等)、设备的信息(例如,设备对应的账户信息、设备的状态、设备或其部件的动作、设备的声音信号等)。又例如,处理设备112可以根据用户的指令和设备的信息,确定是否控制设备执行相关操作(例如,移动、添加、布防、解防、报警、开启/关闭反锁模式等)。
在一些实施例中,处理设备112可以包括一个或多个处理引擎(例如,单核处理引擎或多核处理器)。仅作为示例,处理设备112可以包括中央处理单元(CPU)、专用集成电路(ASIC)、专用指令集处理器(ASIP)、图形处理单元(GPU)、物理处理单元(PPU)、数字信号处理器(DSP)、现场可编程门阵列(FPGA)、可编程逻辑设备(PLD)、控制器、微控制器单元、精简指令集计算机(RISC)、微处理器等或其任何组合。
网络120可以用于信息和/或数据的交换。系统中的一个或多个部件(服务器110、智能设备130、用户终端140)之间可以通过网络120向其他部件发送信息/数据。例如,智能设备130可以通过网络120向服务器110上传智能设备的工作状态、部件信息等数据信息。又例如,服务器110可以通过网络120向用户终端140发放密码、激活码等数据信息。在一些实施例中,网络120可以是有线网络或无线网络中的任意一种或其组合。例如,网络120可以包括电缆网络、有线网络、光纤网络、远程通信网络、内联网、互联网、局域网(LAN)、广域网(WAN)、无线局域网(WLAN)、城域网(MAN)、公共交换电话网络(PSTN)、通用封包无线网络(GPRS)、移动电话网络、蓝牙网络、ZigBee网络、近场通讯(NFC)网络、窄带物联网NB-IoT/LoRa等或上述举例的任意组合。在一些实施例中,网络120可以包括一个或多个网络接入点。例如,网络120可能包括有线或无线网络接入点,如基站和/或互联网交换点120-1、120-2等等。通过接入点,系统100的一个或多个部件可能连接到网络120以交换数据和/或信息。
智能设备130可以包括设置在房屋内的一些智能家居设备。在一些实施例中,智能设备130可以包括但不限于智能家居设备、车载设备等。智能家居设备可以包括智能锁130-1、智能电气设备(例如,空调、冰箱、电视、煤气灶、音响等)及其控制设备130-2、保险箱、便携式保管柜、枪柜、lockbox、智能快递柜、智能照明设备、智能监控(例如,智能摄像机、摄像头、猫眼等)设备、对讲机、智能传感器(例如,陀螺仪、加速度计、运动传感器、定位系统(如全球定位系统GPS、北斗卫星导航系统)、压力传感器、光传感器、温度传感器、一氧化碳探测器、烟雾探测器、声音传感器、指纹传感器、图像传感器、虹膜传感器、或类似的,或它们的任何组合)、智能车载设备等或其任意组合。智能设备130可以接收服务器110和/或用户终端140的指令,并执行指令。例如,智能锁可以接收服务器110的指令,基于指令关闭或开启。又例如,智能锁可以接收服务器110的指令,基于指令进入布防状态。再例如,智能锁可以基于保险柜、保管柜等进入布防状态而进入安全模式(或撤防后取消安全模式)。在一些实施例中,智能设备130还可以将本身的工作状态信息传输给服务器110。例如,智能锁130-1可以将勿扰模式的状态信息传输给服务器110。在一些实施例中,智能设备130可以与用户终端140上的一个或多个程序绑定。例如,智能设备130的配置信息(例如,标识、位置、功能等)可以存储在用户终端140中。用户可以通过用户终端140控制智能设备130的操作。
在一些实施例中,智能设备130可以包括控制器。控制器可以用于获取用户用于控制设备130的控制指令;验证控制指令是否满足预设条件以得到验证结果;以及确定是否控制设备130执行与控制指令对应的操作。在一些实施例中,服务器110可以作为智能设备的控制器。
在一些实施例中,智能设备130也可以包括存储设备,用于将数据进行本地存储。具体的,当智能设备的数据上传服务器失败时,智能设备可以将待上传至服务器的数据进行本地存储,待智能设备与服务器之间的数据传输通信良好时,再把本地存储的数据重新上传至服务器。
用户终端140可以包括安装智能设备130的房屋的所有相关用户的用户终端。具体的,相关用户可以包括房屋的管理者,例如,出租房的商户;相关用户也可以包括房屋的使用者,例如,出租房的租户;相关用户也可以包括房屋的所有者;相关用户还可以包括房屋 的保洁人员、物业人员等。用户终端包括但不限于上述任意角色人员的用户终端。例如,用户终端140可以是酒店管理者的用户终端,或是酒店入住者的用户终端,或是出租房屋的房东的用户终端,或是出租房的租户的用户终端。用户终端140可以经由网络120接收服务器110、智能设备130发送的信息或数据。例如,用户终端140可以接收服务器110发送的门铃提醒消息。又例如,用户终端140可以接收智能设备130发送的出现异常情况的警报。
在一些实施例中,不同的用户终端可以接收到的信息不同。例如,服务器110可以根据预定规则将信息只发送给出租房房东的用户终端,也可以只发送给出租房租户的用户终端,也可以同时发送给所有与智能设备有关联的用户终端。又例如,服务器110可以根据预定规则将信息发送给房主、管理员、设备的用户等中的一个或多个。再例如,服务器110可以根据预定规则将信息发送给车主、车主设置的联系人、车辆实际使用人等中的一个或多个。用户终端140可以用于显示智能设备控制系统100的记录数据、智能设备130的工作状态、开锁记录、异常情况等相关信息。
用户终端140还可以用于直接或通过服务器对智能设备130进行操作,并接收系统100内的服务器110或智能设备130反馈的操作结果。例如,用户可以通过用户终端对智能门锁进行远程开启电子锁反锁指令,并在用户终端上显示反锁结果。在一些实施例中,用户终端140可以包括但不限于智能手机140-1、平板电脑140-2、笔记本电脑140-3、台式电脑、个人数码助理(Personal Digital Assistant,PDA)、掌上游戏机、智能眼镜、智能手表、可穿戴设备、虚拟显示设备、显示增强设备等或其任意组合。
在一些实施例中,服务器110、智能设备130和用户终端140中都可以分别设置存储设备。也可以在系统100内单独设置独立的存储设备用于存储数据和/或指令。在一些实施例中,存储设备可以包括大容量存储器、可移动存储器、挥发性读写存储器、只读存储器(ROM)等或上述举例的任意组合。示例性的大容量存储器可以包括磁盘、光盘、固态硬盘等。示例性的可移动存储器可以包括闪存盘、软盘、光盘、记忆卡、压缩硬盘、磁带等。示例性的挥发性只读存储器可以包括随机存储器(RAM)。示例性的随机存储器可以包括动态随机存储器(DRAM)、双数据率同步动态随机存储器(DDRSDRAM)、静态随机存储器(SRAM)、可控硅随机存储器(T-RAM)和零电容存储器(Z-RAM)等。示例性的只读存储器可以包括掩蔽型只读存储器(MROM)、可编程只读存储器(PROM)、可擦除可编程只读存储器(EPROM)、电可擦除可编程只读存储器(EEPROM)、压缩硬盘只读存储器(CD-ROM)和数字多功能硬盘只读存储器等。在一些实施例中,存储设备还可以在一个云平台上实现。仅仅举个例子,所述云平台可以包括私有云、公共云、混合云、社区云、分布云、云之间、多重云等或上述举例的任意组合。
在一些实施例中,本系统中的一个或多个部件可以分开设置。例如,对智能家居设备的管理,智能家居设备是在家中,管理可以是在用户的手机上完成的。例如,手机可以通过局域网、蓝牙
TM、ZigBee
TM、近场通信(NFC)等方式直接和智能家居设备通信,对智能家居设备进行控制,同时服务器(例如,服务器110)中同步更新智能家居设备相关的信息(例如,配置信息等)。又例如,服务器可以和智能家居设备连接获取家居设备的相关信息,并将智能家居相关的信息传送给手机。根据从服务器获取的智能家居相关的信息,手机可以向服务器发送管理指令。根据手机发送的管理指令,服务器可以对智能家居设备进行控制。在一些实施例中,本系统可以整体设置在某一终端上。例如,对文件资源的管理,需管理的文 件都在手机里,管理也是在用户的手机上完成的。在一些实施例中,本系统可以包括中央控制系统和一个或多个子系统。例如,中央控制系统可以设置在服务器110中,一个或多个子系统可以包括设置在本地(如一套房屋内、一幢办公楼内、一辆汽车内等)的处理装置。一个或多个子系统可以对一定范围内的部分设备(如一套房屋内的设备、一幢办公楼内的设备、一辆汽车内的设备等)进行控制。中央控制系统可以对一个或多个子系统进行控制。在一些实施例中,中央控制系统也可以通过一个或多个子系统直接对设备进行控制。
图2是实现本申请中公开的特定系统的示例性计算设备(例如,服务器110、服务器1620、服务器1920、服务器2520、服务器2740等)的框图。所述特定系统可以使用功能性框图来解释包含一个或以上用户界面的硬件平台。该计算机可能是具有一般或特定功能的计算机。两种类型的计算机可以被配置为根据本申请的一些实施例实施任何特定系统。计算设备200可以被配置为实施提供本说明书中公开的设备管理所需信息的任何部件。例如,服务器110可以通过计算设备200等计算机的硬件设备、软件程序、固件或其任意组合来实现。仅仅作为示例,用于实现服务器110的计算设备200可以基于接收到的用户发送到设备管理指令,管理一个或多个设备。又例如,计算设备200可以通过分析声音信号、图像判断是否出现预设场景(例如,异常情况)。为了简便起见,图2只描绘了一台计算机。在一些实施例中,执行设备控制和管理的计算机功能可以由分布式模式的一组类似平台来实现,以分散系统的处理负载。
计算设备200可以包括与可以实现数据通信的网络连接的通信终端250。计算设备200还可以包括被配置为执行指令并且包括一个或以上处理器的中央处理设备220。示例性计算机平台可以包括内部通信总线210、不同类型的程序存储单元和数据存储单元(例如,硬盘270、只读存储器(ROM)230、随机存取内存(RAM)240)、适用于计算机处理和/或通信的各种数据文件以及可能由CPU执行的一些程序指令。计算设备200还可以包括输入/输出设备260,其可以支持计算机和其他部件(例如,用户界面280)之间的数据流的输入和输出。在一些实施例中,输入/输出设备260可以使用户能够与服务器110交互。在一些实施例中,输入/输出设备260可以包括输入设备和输出设备。示例性输入设备可以包括键盘、鼠标、触摸屏、麦克风、轨迹球等或其组合。示例性输出设备可以包括显示设备、扬声器、打印机、投影仪等或其组合。示例性显示设备可以包括液晶显示器(LCD)、基于发光二极管(LED)的显示器、平板显示器、曲面屏幕、电视设备、阴极射线管(CRT)等或其组合。
在一些实施例中,输入/输出设备260可以感应用户输入的字符指令、语音指令、手势指令、和/或生物信息(如面部图像,声纹、指纹等),或类似的,或任意组合。在一些实施例中,服务器110的用户(例如,操作员)可以通过输入/输出设备260输入对设备的管理指令的内容,例如,对设备的分享、移动、删除、控制、管理等的请求。在一些实施例中,服务器110的用户(例如,操作员)可以通过输入/输出设备260可以通过输入的信息判断提供管理指令的用户是否有管理该设备的权限。输入的信息可以包括密码(例如,字符密码),生物信息(如面部图像,语音指令中包括的声纹、指纹等)等。输入/输出设备260还可以显示集合、集合中的设备、集合中的设备所关联的用户账户、设备的信息、设备检测到的情况(例如,图像采集装置拍摄的图像、设备监测到异常情况)、设备的警报信息等。
图3是根据本申请一些实施例所示的智能锁控制系统的示例性硬件和/或软件的示意图。如图3所示,系统300可以包括集合确定模块310、设备确定模块320和控制模块330。
在一些实施例中,集合确定模块310可以用于确定一个或多个集合。一个或多个集合具有对应的预设规则。预设规则指集合的工作模式。例如,预设规则可以包括安全模式、外出模式、聚会模式、睡眠模式、阅读模式、勿扰模式、夜间模式、温馨模式、布防模式、特定用户控制模式、用户自定义模式等或其组合。在一些实施例中,安全模式可以包括在某种特定的场景下,采取防盗、监控等措施,保护用户或他人的人身及财产安全的模式。外出模式可以包括在某个时间段内用户不在某种场景下,使全部或部分设备和/或部件进入待机或关机状态的模式。聚会模式可以包括在某种特定的场景下,控制全部或部分设备状态支持聚会场景的模式。睡眠模式可以包括用户在晚上(或其他时间)睡眠时,禁止他人来访,使全部或部分设备和/或部件进入特定状态(如关机、睡眠、待机、布防等)的模式。阅读模式可以包括在某种特定的场景下,控制全部或部分设备和/或部件营造适合阅读的氛围(例如,开启香薰、灯光调柔和等)的模式。勿扰模式可以包括在某个时间段内,用户不希望被他人和/或通知打扰,控制全部或部分设备和/或部件进入静音状态的模式。夜间模式可以包括在夜间时间段,控制全部或部分设备和/或部件以方便用户在夜间的需求(例如,夜间启动卫生间的灯、夜间启动车辆的近光灯或远光灯)的模式。温馨模式可以包括在某种特定的场景下,控制全部或部分设备和/或部件营造温馨的氛围(例如,启动音乐播放器播放温馨的音乐、灯光调柔和等)的模式。布防模式可以包括在某种特定的场景下,用户为了保护自身的生命及财产安全,控制全部或部分设备和/或部件监测异常情况的发生,并即时报警的模式。特定用户控制模式可以包括用户在某种特定的场景下,通过设置权限,允许他人对全部或部分的设备和或部件进行使用和/或控制的模式。用户自定义模式可以包括用户根据需求自定义控制全部或部分设备和/或部件状态的模式。
在一些实施例中,设备确定模块320可以根据第一设备的信息,将第一设备加入到一个或多个集合中的第一集合中。第一设备的信息可以包括第一设备的数量、名称、类型、位置、连接方式、编码、设备ID、绑定的账号等或其组合。在一些实施例中,第一设备可以是用户手动添加的设备、处理设备112根据第一集合的预设规则确定的设备,或者是用户从处理设备112推荐或者历史记录的设备中选择的设备。在一些实施例中,第一设备可以是从其他的终端移动和/或分享的设备。
在一些实施例中,控制模块330可以用于根据与第一集合对应的预设规则,控制第一集合中的第一设备执行相应的操作。在一些实施例中,控制模块330可以根据第一集合对应的预设规则确定第一集合中第一设备的配置信息。第一设备的配置信息可以包括第一设备的工作模式、音量、音效、亮度、频率等或其组合。控制模块330可以根据第一设备的配置信息控制第一设备执行相应的操作。
需要注意的是,以上对于智能锁控制系统300及其模块的描述,仅为描述方便,并不能把本申请限制在所举实施例范围之内。可以理解,对于本领域的技术人员来说,在了解该系统的原理后,可能在不背离这一原理的情况下,对各个模块进行任意组合,或者构成子系统与其他模块连接。例如,图3中的集合确定模块310、设备确定模块320和控制模块330可以是一个系统中的不同模块,也可以是一个模块实现上述的两个或两个以上模块的功能。例如,集合确定模块310和设备确定模块320可以是两个模块,也可以是一个模块同时具有集合确定功能和设备确定功能。又例如,各个模块可以共用一个存储模块,各个模块也可以分别具有各自的存储模块。诸如此类的变形,均在本申请的保护范围之内。
图4是根据本申请一些实施例所示的设备控制方法的示例性流程图。在一些实施例中,流程400可以通过处理逻辑来执行,该处理逻辑可以包括硬件(例如,电路、专用逻辑、可编程逻辑、微代码等)、软件(运行在处理设备上以执行硬件模拟的指令)等,或其任意组合。图4所示的用于创建集合的一个或多个操作可以通过图1所示的设备控制系统100实现。例如,流程400可以以指令的形式存储在存储设备中,并由处理设备112执行调用和/或执行。
在步骤401中,处理设备112可以确定一个或多个集合。在一些实施例中,步骤401可以由系统300中的集合确定模块310执行。
集合是指在用户终端(例如,用户终端140)上创建,包括一个或多个设备的设备集。在一些实施例中,集合可以包括多种形式,例如,用于容纳房屋中一个或多个设备的“房屋”、用于容纳车载设备的“车辆”、用于容纳一个或多个设备的“车间”等。在一些实施例中,集合还可以包括用于容纳车辆的“区域”、用于容纳小区的“社区”、用于容纳文件的“文件夹”等。仅作为示例,一个或多个集合可以包括与用户的房屋中的主卧对应的集合“主卧”、与用户的房屋中的次卧对应的集合“次卧”以及与用户的房屋中的儿童房对应的集合“儿童房”。
在一些实施例中,处理设备112可以根据用户通过用户终端输入的指令,确定一个或多个集合。关于集合确定的细节可以参见图6关于集合的创建方法及其相关描述。
在一些实施例中,一个或多个集合中的每一个集合具有对应的预设规则。预设规则指集合的工作模式。例如,预设规则可以包括安全模式、外出模式、聚会模式、睡眠模式、阅读模式、勿扰模式、夜间模式、温馨模式、布防模式、特定用户控制模式、用户自定义模式等或其组合。在一些实施例中,一个或多个集合对应的预设规则可以由用户手动确定,或者由处理设备112自动确定,或者由处理设备112半自动确定。例如,用户可以通过用户终端140输入一个或多个集合中每个集合的名称、工作时间、工作模式等或其组合。又例如,处理设备112可以向用户推荐一种或多种集合,用户可以在处理设备112推荐的集合中选择需要确定的集合。
在步骤402中,处理设备112可以根据第一设备的信息,将第一设备加入到一个或多个集合中的第一集合中。在一些实施例中,步骤402可以由系统300中的设备确定模块320执行。
第一设备的信息可以包括第一设备的数量、名称、类型、位置、连接方式、编码、设备ID、绑定的账号等或其组合。在一些实施例中,处理设备112可以直接或通过网络(例如,网络120)与第一设备通信,获取第一设备的信息。在一些实施例中,用户可以通过用户终端输入第一设备的信息,并将第一设备的信息发送给处理设备112。在一些实施例中,第一设备的信息(例如,数量、类型等)可以根据具体情况进行确定。
在一些实施例中,第一设备可以是用户手动添加的设备、处理设备112根据第一集合的预设规则确定的设备,或者是用户从处理设备112推荐或者历史记录的设备中选择的设备。在一些实施例中,第一设备可以是从其他的终端移动和/或分享的设备。关于设备移动和分享的细节可以分别参见图9和11及其相关描述。
在一些实施例中,处理设备112可以基于第一设备的信息,将第一设备加入到第一集合中。例如,第一集合可以为“主卧”。仅作为示例,处理设备112可以基于第一设备的位置信息,将位于主卧中的第一设备,例如,主卧中的电视机、主卧中的空调、主卧中的窗帘、 主卧中的灯具、主卧的门锁等或其组合,加入到第一集合中。关于设备添加的细节可以参见图7及其相关描述。
在步骤403中,处理设备112可以根据与第一集合对应的预设规则,控制第一集合中的第一设备执行相应的操作。在一些实施例中,步骤403可以由系统300中的控制模块330执行。
在一些实施例中,处理设备112和/或用户可以根据第一集合对应的预设规则确定第一集合中第一设备的配置信息。第一设备的配置信息可以包括第一设备的工作模式、音量、音效、亮度、频率等或其组合。例如,当第一集合为客厅时,第一设备可以为客厅的音响、客厅的灯具和客厅的投影仪等。第一集合对应的预设规则可以包括家庭影院模式,处理设备112可以根据客厅的家庭影院模式,控制客厅的音响选择立体音效、控制客厅的投影仪选择电影播放模式以及将客厅灯具的亮度调整为相对较低。在一些实施例中,处理设备112可以根据与第一集合对应的预设规则,控制第一集合中的第一设备执行相应的操作。例如,处理设备112可以控制客厅的音响以立体音效播放声音、控制客厅的投影仪进行电影播放以及控制客厅灯具以相对较低亮度照射。
在一些实施例中,大多数的账号与多个设备(例如,智能灯泡、智能路由器、空气净化器,摄像头等)进行绑定,通过账号授权的方式获取多个设备的控制权限,并根据需要分别控制和/或管理多个设备中的每个设备,此种设备控制方法,导致一个账号下添加的多个设备无法形成一个整体,无法做到基于各种场景来设置各个设备的模式。本申请提供的设备的控制方法和系统,可以将账号下添加的多个设备形成一个整体,并可以基于各种场景来设置每一个整体下的各个设备的模式。
需要注意的是,以上描述,仅为描述方便,并不能把本申请限制在所举实施例范围之内。可以理解,对于本领域的技术人员来说,在了解该系统的原理后,可以在不背离这一原理的情况下,对上述方法和系统进行形式和细节上的各种修正和改变。例如,流程400还可以包括接收管理指令,并根据管理指令执行相应的管理操作。管理指令用于指示对集合、集合中的设备、集合中的设备所关联的用户账户等或其组合的管理。具体的,对集合的管理,可以包括删除创建出的集合、修改创建出的集合对应的场景规则、修改创建出的集合的标识。对集合中的设备的管理,可以包括:将设备从对应的集合下删除、将设备从对应的集合下移动到其他集合;对集合下的设备所关联的用户账户的管理,可以包括:删除集合下的设备所关联的一个或者多个用户账户;集合下的设备所关联的用户账户可以理解成用户账户下绑定设备,用户账户则属于设备所关联的用户账户。
还需要说明的是,本实施例中提出接收管理指令,并根据管理指令执行相应的管理操作的过程,与接收设备添加指令,且在指定的集合下添加设备的过程,以及接收集合创建指令,根据集合创建指令创建集合,并为集合配置对应的场景规则的过程,并没有执行的先后顺序,也可以理解这三个过程是并行执行、且互相并不依托的处理流程。关于集合和/或设备管理的细节可以参见图6-12及其相关描述。
本申请的实施例可以对用户账户中的资源进行分组,基于组内预设规则的变化,调整资源,并可对资源实现诸如添加、删除、分享、移动等管理操作,实现对资源跨账户跨分组跨预设规则的管理。资源可以是智能锁、智能窗帘、智能电气设备(例如,空调、冰箱、电视、煤气灶、音响等)及其控制设备、保险箱、便携式保管柜、枪柜、lockbox、智能快递柜、 智能照明设备、智能监控(例如,智能摄像机、摄像头、猫眼等)设备、对讲机、智能传感器(例如,陀螺仪、加速度计、运动传感器、定位系统(如全球定位系统GPS、北斗卫星导航系统)、压力传感器、光传感器、温度传感器、一氧化碳探测器、烟雾探测器、声音传感器、指纹传感器、图像传感器、虹膜传感器、或类似的,或它们的任何组合)等各种不同类型的家居设备,可以是车内的智能座椅、智能行车记录仪、智能导航仪等车载设备,还可以是各种音乐、视频、文本等文件资源。分组可以根据实际情况灵活选择。例如,将家居设备以房屋进行分组,将车载设备以车辆进行分组,将文件资源以文件夹进行分组。预设规则可以是适用于派对、睡眠、超车、停车等场景的规则,还可以是对文件资源进行管理的规则,例如,音乐只能放在音乐文件夹里。
图5A为根据本申请的一些实施例所示的用于控制设备的装置示意图。在一些实施例中,装置500可以应用于第一终端(例如,用户终端140)。
如图5A所示,装置500可以包括第一接收单元501和添加单元502。第一接收单元501可以用于接收用于指示将待添加设备添加到指定集合下(例如,新的集合)的设备添加指令。在一些实施例中,待添加设备可以是第一终端对应的用户账户下绑定的一个或多个设备。在一些实施例中,指定的集合配置有对应的场景规则。添加单元502可以用于根据设备添加指令,将待添加设备添加到指定的集合下。其中,指定的集合下添加的设备被第一终端以指定的集合对应的场景规则进行控制。关于第一接收单元501和第二接收单元502的工作过程细节可以参见图7及其相关描述。
通过装置500的第一接收单元501接收用于指示将待添加设备添加到指定的集合下的设备添加指令。并利用添加单元502根据设备添加指令,将待添加设备添加到指定的集合下,可以实现了将账号下添加的一个或多个设备形成一个整体,并可以基于各种场景来设置每一个整体下的各个设备的模式的目的。
图5B为根据本申请的一些实施例所示的用于控制设备的装置示意图。
如图5B所示,装置550可以包括第二接收单元503和配置单元504。第二接收单元503可以用于接收集合创建指令。配置单元504可以用于根据集合创建指令,创建至少一个集合,并为至少一个集合配置对应的场景规则。其中,至少一个集合包括指定的集合。关于第二接收单元503和配置单元504的工作过程细节可以参见图6及其相关描述。
图5C为根据本申请的一些实施例所示的用于控制设备的装置的执行单元的示意图。
在一些实施例中,用于控制设备的装置可以包括执行单元5000。执行单元5000可以用于接收管理指令,并根据管理指令执行相应的管理操作。在一些实施例中,管理指令可以用于指示集合、集合中的设备、集合中的设备所关联的用户账户等或其组合的管理。
如图5C所示,执行单元5000可以包括第三接收单元5001、添加单元5002和修改单元5003。第三接收单元5001可以用于接收用于移动集合(例如,房屋)中设备的移动指令。在一些实施例中,移动指令携带有待移动设备(例如,第一设备中的一个或多个设备)的第一集合(也就是待移动设备移动前所在的集合,也可以称为原始集合)标识和新的集合(也就是待移动设备移动后所在的集合,也可以称为目标集合)标识。添加单元5002可以用于在第一集合标识对应的集合下删除待移动设备,并在目标集合标识对应的集合下添加待移动设备。修改单元5003可以用于修改待移动设备的配置信息、第一集的配置信息、新的集合的配置信息等或其组合,以使待移动设备的当前配置信息与新的集合的场景规则相匹配。关 于第三接收单元5001、添加单元5002和修改单元5003的工作过程细节可以参见图9及其相关描述。
图5D为根据本申请的一些实施例所示的用于控制设备的装置的执行单元的示意图。
如图5D所示,执行单元5100可以包括第四接收单元5101和确定单元5102。执行单元5100可以接收管理指令,根据管理指令执行相应的管理操作。具体的,第四接收单元5101可以接收用于指示将待删除设备从对应的集合中删除的第一设备删除指令。在一些实施例中,第一设备删除指令可以由第一目标用户账户发送。第一目标用户账户对待删除设备具有较高的控制权限,例如,最高控制权限。确定单元5102可以用于根据第一设备删除指令,确定待删除设备所属的集合,并从待删除设备所属的集合中删除待删除设备。关于第四接收单元5101和确定单元5102的工作过程细节可以参见图10及其相关描述。
在一些实施例中,用于控制设备的装置还可以包括:第一发送单元。第一发送单元可以用于向第二终端发送用于指示删除待删除设备的第二设备删除指令,以使第二终端根据第二设备删除指令,从待删除设备所属的集合中删除待删除设备。
图5E为根据本申请的一些实施例所示的用于控制设备的装置的执行单元的示意图。
如图5E所示,执行单元5200可以包括第五接收单元5201、删除单元5202和第二发送单元5203。第五接收单元5201可以用于接收用于指示删除第二目标用户账户的用户账户删除指令。在一些实施例中,第二目标用户账户与被添加到集合下的第一设备相关联。在一些实施例中,第二目标用户账户对第一设备的控制权限比第一目标用户账户的控制权限低。删除单元5202可以用于根据用户账户删除指令,从第一设备关联的用户账户中删除第二目标用户账户。第二发送单元5203可以用于向处理设备112发送控制权限删除指令。在一些实施例中,控制权限删除指令可以用于控制处理设备112删除第二目标用户账户对第一设备的控制权限。关于第五接收单元5201、删除单元5202和第二发送单元5203的工作过程细节可以参见图12及其相关描述。
图5F为根据本申请的一些实施例所示的用于控制设备的装置的示意图。
如图5F所示,装置5300可以包括第六接收单元5301、创建单元5302和设置单元5303。第六接收单元5301可以用于接收用户终端(例如,第二用户终端)发送的设备的分享请求。其中,分享请求中携带有被分享设备的标识、被分享设备对应的第一集合的标识和配置信息、被分享设备对应的原始用户账户的设置信息等或其组合。创建单元5302可以用于以被分享设备对应的第一集合的标识作为集合标识,创建一个新的集合。在一些实施例中,创建单元5302可以将被分享设备对应的第一集合的配置信息确定为新的集合的配置信息。设置单元5303可以用于在新的集合中添加被分享设备,并对被分享设备的控制权限进行设置,以使得被分享设备的控制权限符合被分享设备对应的原始用户账户的设置信息的要求。关于第六接收单元5301、创建单元5302和设置单元5303的工作过程细节可以参见图11及其相关描述。
需要注意的是,以上对于设备控制设备、模块及其单元的描述,仅为描述方便,并不能把本申请限制在所举实施例范围之内。可以理解,对于本领域的技术人员来说,在了解该系统的原理后,可能在不背离这一原理的情况下,对各个模块进行任意组合,或者构成子系统与其他模块连接。例如,图5A-图5F中的第一接收单元501、第二接收单元503、第三接收单元5001、第四接收单元5101、第五接收单元5201以及第六接收单元5301可以是一个 系统中的不同模块,也可以是一个模块实现上述的两个或两个以上模块的功能。又例如,添加单元502、添加单元5002、确定单元5102以及删除单元5202可以是一个系统中的不同模块,也可以是一个模块实现上述的两个或两个以上模块的功能。又例如,配置单元504、5302以及设置单元5303可以是一个系统中的不同模块,也可以是一个模块实现上述的两个或两个以上模块的功能。又例如,各个模块可以共用一个存储模块,各个模块也可以分别具有各自的存储模块。诸如此类的变形,均在本申请的保护范围之内。
图6为根据本申请一些实施例所示的集合创建方法的示例性流程图。在一些实施例中,流程600可以为流程400中的步骤401的示例性实施方式。
在一些实施例中,流程600可以通过处理逻辑来执行,该处理逻辑可以包括硬件(例如,电路、专用逻辑、可编程逻辑、微代码等)、软件(运行在处理设备上以执行硬件模拟的指令)等,或其任意组合。图6所示的用于创建集合的一个或多个操作可以通过图1所示的设备控制系统100实现。例如,流程600可以以指令的形式存储在存储设备中,并由处理设备112执行调用和/或执行。在一些实施例中,流程600可以是在接收用于指示将待添加设备添加到指定的集合下的设备添加指令之前被执行。例如,流程600可以是接收将智能家居设备添加到房屋下的设备添加指令(例如,图7中的流程700)之前被执行。又例如,流程600可以是接收将车载设备添加到车辆下的添加指令之前被执行。为了描述方便,以房屋的创建为例说明集合的创建方法。
在步骤601中,处理设备112可以接收房屋创建指令。在一些实施例中步骤601可以由第二接收单元503执行。
在一些实施例中,用户可以在第一终端利用用户账户登录服务器,创建至少一个房屋。在一些实施例中,用户可以根据用户的实际情况进行创建房屋,如用户家里有两个房子,那么用户就可以在服务器中创建两个房屋,此处不做限定。具体的,在用户利用第一终端进行创建房屋时,还可以选择预先存储在第一终端中的预设房型,若预先存储在第一终端中的预设房型中没有自己的房型,则可以自己添加或绘画出用户自己的房型。
在步骤602中,根据房屋创建指令,创建至少一个房屋,并为至少一个房屋配置对应的场景规则。房屋的场景规则(也可以称为预设规则)可以理解为基于房屋的名称、应用场景、类型、位置、使用时间等信息确定的房屋的工作模式。
在一些实施例中,第一终端创建房屋的过程中,需要配置房屋的场景规则,场景规则说明了该房屋的工作模式,该房屋下的每一个设备均需要按照房屋的工作模式进行工作。可以理解的是,场景规则与房屋的关系预先设定,即第一终端创建了一个房屋,该房屋的场景规则自动配置完成。当然,创建的房屋的场景规则可以由用户通过第一终端修改。在一些实施例中,不同的房屋具有相同或不同的场景规则。例如,第一房屋和第二房屋都为卧室,第一房屋的场景规则可以是阅读模式。第二房屋的场景规则可以是睡眠模式。
以图8为例进行说明,图8为根据本申请的一些实施例所示的房屋与设备的关系示意图。如图所示,终端810上创建有房屋821,822,……,82n。房屋821,822,……,82n分别具有对应的场景规则。房屋821下分别添加有设备821-1,821-2,……,821-n’。设备821-1,821-2,……,821-n’可以按照房屋821的场景规则进行工作。房屋82n下添加有设备822-1。设备822-1可以按照房屋82n的场景规则进行工作。在一些实施例中,同一个设备不可以同时的添加到多个房屋中,也就是说同一个设备只能在一个房屋之中,可以根 据实际情况进行调整或删除。在一些实施例中,同一个设备可以同时添加到多个房屋中。
需要注意的是,以上描述,仅为描述方便,并不能把本申请限制在所举实施例范围之内。可以理解,对于本领域的技术人员来说,在了解该系统的原理后,可以在不背离这一原理的情况下,对上述方法和系统进行形式和细节上的各种修正和改变。
图7为据本申请一些实施例所示的在集合中设备添加方法的示例性流程图。在一些实施例中,流程700可以为流程400中的步骤402的示例性实施方式。在一些实施例中,在集合中设备添加方法可以应用于第一终端(也可以称为第一客户端)。
在一些实施例中,流程700可以通过处理逻辑来执行,该处理逻辑可以包括硬件(例如,电路、专用逻辑、可编程逻辑、微代码等)、软件(运行在处理设备上以执行硬件模拟的指令)等,或其任意组合。图7所示的用于在集合中添加设备的一个或多个操作可以通过图1所示的设备控制系统100实现。例如,流程700可以以指令的形式存储在存储设备中,并由处理设备112执行调用和/或执行。
在步骤701中,处理设备112可以接收用于指示将待添加设备(例如,图4中的第一设备)添加到指定的集合(例如,房屋)下的设备添加指令。步骤701可以由第一接收单元501执行。
在一些实施例中,待添加设备可以是第一终端对应的用户账户下绑定的设备。在一些实施例中,指定的集合可以配置有对应的场景规则。在一些实施例中,待添加设备可以包括摄像头、智能锁、门铃、智能猫眼、智能空调、智能冰箱、智能窗帘、智能电视、智能音响、煤气灶等智能家居设备及其控制设备、保险箱、便携式保管柜、枪柜、lockbox、智能快递柜、智能照明设备、智能监控(例如,智能摄像机、摄像头、猫眼等)设备、对讲机、智能传感器(例如,陀螺仪、加速度计、运动传感器、定位系统(如全球定位系统GPS、北斗卫星导航系统)、压力传感器、光传感器、温度传感器、一氧化碳探测器、烟雾探测器、声音传感器、指纹传感器、图像传感器、虹膜传感器、或类似的,或它们的任何组合)等不同种类的设备,此处不做限定。在一些实施例中,第一终端可以接收用户通过网关进行绑定、通过基站进行绑定或通过蓝牙进行绑定的设备的标识。在一些实施例中,用户账户下绑定一个设备的标识后,处理设备112可以生成该设备的配置信息,设备的配置信息可以用于控制设备的工作。
在一些实施例中,当用户在自身账号下绑定设备时,用户可以是绑定的设备的主人,对该设备拥有最高权限。最高权限的权限范围可以体现在只有设备的主人可以将设备分享给其他用户。在一些实施例中,在设备被分享给其他用户时,被分享设备的配置信息也可以被一并被分享。
在一些实施例中,第一终端可以是安装在多种种类的设备上的一种可以对集合中的设备进行控制的应用程序(APP),或者其他可以对集合中的设备进行控制的软件。可安装第一终端的设备,可以包括但不限于智能手机、平板电脑、个人计算机、笔记本电脑、虚拟现实终端设备、增强现实终端设备等。需要说明的是,将终端命名为第一终端、还可以将终端命名为第二终端或第三终端,只是为了区别开多个终端,并无实际含义,第一终端、第二终端和第三终端的功能是一致或类似的,并且可以拥有更多的终端,如第四终端,第五终端等,此处不做限定。
在一些实施例中,第一终端可以实时接收各种操作指令,当第一终端接收到用于指示将待添加设备添加到指定的集合下的设备添加指令时,则执行步骤702。
在步骤702中,处理设备112可以根据设备添加指令,将待添加设备添加到指定的集合下。步骤702可以由第二接收单元502执行。
在一些实施例中,指定的集合下添加的设备可以被第一终端以指定的集合对应的场景规则进行控制。
需要说明的是,第一终端可以利用每一个集合下的场景规则控制集合下添加的设备。在一些实施例中,每一个集合下的场景规则可以是预先设置好的几类场景规则,例如,派对模式、温馨模式、夜间模式等,也可是用户提前自定义的场景规则。每当有新的设备添加到集合中时,处理设备112可以根据当前集合的场景规则更改新添加到集合中的设备的配置信息,使其符合当前集合中的场景规则,并对每一个集合添加的设备的标识进行管理,可以理解为将每一个集合添加的设备的标识进行存储起来,以便对设备的调用、删除等操作。例如,第一集合的场景规则可以包括勿扰模式,待添加设备在第一集合中的勿扰模式下可以按照睡眠模式进行工作。指定的集合的场景规则可以包括派对模式。添加到指定集合中的待添加设备在派对模式下可以按照派对模式工作。仅作为示例,待添加设备可以是智能灯具,在第一集合中,智能灯具的配置信息可以为柔和光线、低亮度。在指定集合中,智能灯具的配置信息可以为多色模式、闪光模式等。又例如,第一集合的场景规则可以包括普通模式,待添加设备在第一集合的普通模式下可以按照普通防控模式进行工作。指定的集合的场景规则可以包括安全模式,指定集合中的待添加设备在安全模式下可以按照安全模式工作。仅作为示例,待添加设备可以是智能锁(例如,保险箱、便携式保管柜、枪柜、lockbox、智能快递柜、房门等的智能锁)。在第一集合中,智能锁的配置信息可以为普通保护模式(例如,管理员或其他用户都可以开启智能锁的模式)。在指定集合中,智能锁的配置信息可以是安全模式(例如,只有管理员可以开启智能锁的模式、只有机械钥匙或者其他指定方式可以开启智能锁的模式等)。
在一些实施例中,可以根据设备添加指令中的指定集合的位置信息,将待添加设备添加到指定的集合下。在一些实施例中,待添加设备只能添加到一个指定集合下。
图9为根据本申请一些实施例所示的移动集合中设备的方法的示例性流程图。
在一些实施例中,流程900可以通过处理逻辑来执行,该处理逻辑可以包括硬件(例如,电路、专用逻辑、可编程逻辑、微代码等)、软件(运行在处理设备上以执行硬件模拟的指令)等,或其任意组合。图9所示的用于在集合中添加设备的一个或多个操作可以通过图1所示的设备控制系统100实现。例如,流程900可以以指令的形式存储在存储设备中,并由处理设备112执行调用和/或执行。
在步骤901中,处理设备112可以接收集合中待移动设备(例如,第一设备中的一个或多个设备)的移动指令。步骤901可以由第三接收单元5001执行。
在一些实施例中,移动指令可以携带有待移动设备的原始集合(也可以理解为移动前设备所在的集合)的标识和目标集合(也可以理解为移动后设备所在的集合,也可以称为指定集合或新的集合)的标识。移动指令可以是服务器(例如,服务器110)下发至第一终端的移动指令、也可以是用户使用第一终端所下发的移动指令、也可以是其他终端(例如,第二终端、第三终端等)所发送的移动指令。例如,移动指令可以是用户通过第一终端(或其他终端)通过输入/输出设备输入的移动指令。仅作为示例,用户可以通过长按并拖动需要移动的设备的标识输入移动指令。又例如,用户可以选择与设备对应的菜单中的移动按钮,从 而输入移动指令。再例如,用户可以通过语音输入需要移动的设备的信息、目标集合等信息,从而输入移动指令。
在一些实施例中,当移动指令是用户使用第一终端所下发的移动指令时,即用户在对自己账户下的集合进行设置,用户可以将自己账户下的每一个集合中的设备进行自由移动,并自由的修改该设备的配置信息。例如,用户可以将原始集合中的台灯移动到目标集合中。具体的,用户可以通过第一终端的前端界面输入移动要求,根据用户输入的要求而生成一个移动指令,并将移动指令发送至第一终端,即用户所属的终端,并可以修改该设备在不同的场景下的不同配置信息。例如,在集合的温馨模式下,台灯的灯光可以设置为偏暖色系的颜色,而在派对模式下,台灯的灯光可以按照预先设置的闪烁频率进行闪烁。又例如,在派对模式下,智能锁或门禁可以在一定预设时间内常开,而在安全模式下,智能锁或门禁可以只有管理员才能打开。
在一些实施例中,移动指令可以是其他终端发送的,如第二终端发过来的移动指令。处理设备112可以首先需要判断第二终端是否有权限移动第一终端中的设备,例如,第一终端对应的用户账户的所属用户(以下称之为第一终端的用户)为该设备的主人,那么当第二终端发送移动指令至第一终端,需要得到第一终端的用户同意,并该设备在默认的情况下需要遵循第一终端下的集合中的场景规则。如第二终端对应的用户账户的所属用户(以下称之为第二终端的用户)为该设备的主人,那么第一终端可以不需要验证该设备的移动指令的权限信息,但需要遵循第一终端下的集合中的场景规则,第二终端的用户可以向第一终端的用户申请对该设备进行移动或修改。
在一些实施例中,移动指令可以是服务器发送的移动指令,则第一终端的用户需要遵循服务器发送的移动指令。
在步骤902中,在原始集合标识对应的集合下删除待移动设备,并在目标集合标识对应的集合下添加待移动设备。步骤902可以由添加单元5002执行。
在一些实施例中,一个设备可以添加到不同的集合中。在一些实施例中,同一个设备只可以添加到一个集合之中。在这种情况下,在目标集合标识对应的集合下添加待移动设备的标识时,需要在原始集合标识对应的集合下删除待移动设备的标识。
在原始集合标识对应的集合下删除待移动设备的标识时,可以通过弹窗、语音或者其他方式提醒用户即将在原始集合标识对应的集合下删除待移动设备的标识。在一些实施例中,用户可以设置在目标集合标识对应的集合下添加待移动设备的标识时,默认在原始集合标识对应的集合下删除待移动设备的标识。关于在原始集合下删除待移动设备标识的细节可以参见图10及其相关描述。
在步骤903中,处理设备112可以修改待移动设备的配置信息,和/或目标集合标识对应的集合的配置信息,以使待移动设备的当前配置信息与目标集合标识对应的集合下的场景规则相匹配。步骤903可以由修改单元5003执行。
在一些实施例中,添加至每一个集合中的设备都会依循该集合下的场景规则,而不同的集合的场景规则不一定完全相同,如果待移动设备所属的原始集合的场景规则与待移动设备需要移动至的目标集合的场景规则不同,那么就需要修改待移动设备的配置信息,或者修改目标集合标识对应的集合的配置信息,或者,修改移动设备的配置信息和目标集合标识对应的集合的配置信息,以使待移动设备的当前配置信息与目标集合标识对应的集合下的当前 场景规则相匹配。例如,处理设备112可以修改移动设备的所在集合的位置、与其他设备的连接、绑定的账号、工作模式等。
在一些实施例中,集合的配置信息对应集合的场景规则,利用集合的配置信息,可以生成集合对应的场景规则。集合的配置信息可以理解为集合或集合中的设备有关的信息,例如,设备的数量、设备的类型、设备的位置、设备的功能、集合所在的终端、与集合相关的用户账户、集合的工作模式等或其组合。在目标集合标识对应的集合的配置信息被修改之后,集合对应的场景规则也相应被调整。
需要注意的是,以上描述,仅为描述方便,并不能把本申请限制在所举实施例范围之内。可以理解,对于本领域的技术人员来说,在了解该系统的原理后,可以在不背离这一原理的情况下,对上述方法和系统进行形式和细节上的各种修正和改变。例如,同一个设备可以位于不同的集合中,例如,智能窗帘既可以位于卧室对应的集合中,也可以位于对应安全模式对应的集合中。在一些实施例中,是否在原始集合下删除待移动设备的标识可以是由终端130的用户手动确定,或者由处理设备112自动确定,或者由半自动确定。例如,处理设备112可以根据用户的历史操作、用户喜好等确定是否在原始集合下删除待移动设备的标识。又例如,用户可以设定是否删除原始集合下待移动设备的标识的规则,处理设备112可以根据用户的设定半自动的确定是否在原始集合下删除待移动设备的标识。
图10为据本申请一些实施例所示的集合创建方法的示例性流程图。
在一些实施例中,流程1000可以通过处理逻辑来执行,该处理逻辑可以包括硬件(例如,电路、专用逻辑、可编程逻辑、微代码等)、软件(运行在处理设备上以执行硬件模拟的指令)等,或其任意组合。图10所示的用于在集合中添加设备的一个或多个操作可以通过图1所示的设备控制系统100实现。例如,流程1000可以以指令的形式存储在存储设备中,并由处理设备112执行调用和/或执行。
在步骤1001中,处理设备112可以接收用于指示将待删除设备从对应的集合下删除的第一设备删除指令。步骤1001可以由第四接收单元5101执行。
其中,第一设备删除指令来源于第一目标用户账户。在一些实施例中,第一目标用户账户可以是绑定设备的主人。在一些实施例中,第一目标用户账户可以是设备控制的管理员。在一些实施例中,第一目标用户账户对设备具有相对较高的控制权。例如,第一目标用户账户对待删除设备的控制权限最高。
为了描述方便,以用户在自身账户下绑定设备,则用户是绑定的设备的主人,对该设备拥有最高权限为例,对待删除设备从对应的集合下删除为例进行说明。本步骤中,第一设备的删除指令,可以由用户在第一终端的人机交互界面输入,在这种情况下,第一终端对应的用户账户则是第一目标用户账户。当然,第一设备的删除指令,还可以是其他终端,对应的,该终端对应的用户账户则是第一目标用户账户。
在步骤1002,处理设备112可以根据第一设备删除指令,确定待删除设备所属的集合,并从待删除设备所属的集合下删除待删除设备。步骤1002可以由确定单元5102执行。
在一些实施例中,第一设备删除指令可以携带有待删除设备的配置信息(例如,待删除设备的标识、位置、名称、绑定的账号、与其他设备的连接等),因此,在第一终端接收到第一设备删除指令后,解析该指令得到待删除设备的配置信息,再从在创建的集合中搜索待删除设备,确定待删除设备的所属集合;最后从待删除设备的所属集合下删除待删除设备。 例如,当第二终端的用户分享了一个第二终端上的集合中的设备给第一终端的用户使用,那么第一终端的用户,会创建一个与被分享过来设备所属的集合一样的集合后,将被分享设备的标识添加至与被分享过来设备所属的集合一样的集合中。若第二终端的用户不再想让第一终端的用户继续使用该设备,或者第二终端的用户删除自身账号下的设备,那么第二终端的用户可以向第一终端的用户发送一个删除指令,删除指令携带有待删除设备的配置信息。第一终端接收到该删除指令后,在第一终端所创建的所有集合之中,搜索待删除设备的标识,确定出待删除设备所属的集合后,将待删除设备的所属的集合中删除待删除设备。
在一些实施例中,如果设备所属的集合下只有一个设备,那么在设备被从所属集合中删除之后,用户或者处理设备112可以删除该集合。在一些实施例中,用户或者处理设备112可以根据集合中添加的设备的数量,来判断当前集合下是否有用户所添加的设备,若判断出当前集合下的设备的数量为零,即判断出集合中添加的设备均被删除,可以删除集合。换句话说,用户或者处理设备112可以判断用户账户下的任意一个集合是否有存在必要,则需要判断该集合下是否有用户添加的设备,如果一个集合中的用户添加的设备均被删除,则删除该集合。可选择的,用户或者处理设备112与也可以根据实际需要确定是否需要删除一个集合,例如,包含设备的集合或者不包含设备的集合。
在一些实施例中,若第一目标用户账户为第一终端对应的用户账户,且与第一终端通信的第二终端创建的集合中添加有待删除设备,则在用于控制设备的方法的另一种实施方式,流程1000在步骤1002之后,还包括以下步骤。
第一终端(也可以称为第一客户端)可以向第二终端(也可以称为第二客户端)发送用于指示删除待删除设备的第二设备删除指令,以使第二终端根据第二设备删除指令,从待删除设备所属的集合下删除待删除设备。例如,当第一终端的用户分享了一个自己集合中的设备给第二终端的用户使用,那么第二终端的用户,会创建一个与被分享过来设备所属的集合后,将被分享设备添加至创建的集合中。若第一终端的用户不希望让第二终端的用户继续使用该设备,或者第一终端的用户删除自身账号下的设备,那么第一终端的用户可以向第二终端的用户发送一个删除指令,删除指令携带有待删除设备的标识。第二终端接收到第二设备删除指令后,在第二终端所创建的所有集合(例如,房屋)之中,搜索待删除设备,确定出待删除设备所属的集合后,将待删除设备的所属的集合中删除待删除设备。
图11为据本申请一些实施例所示的不同账号间设备分享的方法的示例性流程图。
在一些实施例中,流程1100可以通过处理逻辑来执行,该处理逻辑可以包括硬件(例如,电路、专用逻辑、可编程逻辑、微代码等)、软件(运行在处理设备上以执行硬件模拟的指令)等,或其任意组合。图11所示的用于在集合中添加设备的一个或多个操作可以通过图1所示的设备控制系统100实现。例如,流程1100可以以指令的形式存储在存储设备中,并由处理设备112执行调用和/或执行。
在步骤1101中,处理设备112可以接收第一设备的分享请求。步骤1101可以由第六接收单元5301执行。
在一些实施例中,分享请求中可以携带有第一设备的标识、第一设备对应的第一集合的标识和配置信息、第一设备对应的原始用户账户的设置信息等或其组合。在一些实施例中,第一设备的分享请求可以是服务器(例如,处理设备112)发送的。
在一些实施例中,分享设备的用户(也就是第一终端的用户)可能会拥有多个集合信 息,所以,第一终端的用户需要明确被分享的设备,在被分享设备的标识的用户下的哪一个集合(例如,房屋)中。
在一些实施例中,分享设备的用户可以设定被分享设备在不同用户下的控制权限,例如:如果被分享用户是访客,则被分享用户对被分享设备没有更改任何配置信息的权限;如果被分享用户是家庭成员,则被分享用户对被分享设备具有更改配置信息的权限。因为分享设备的用户的用户账号的设置信息用于说明被分享设备在不同用户下的控制权限,则设备的分享请求中还需要携带被分享设备对应的原始用户账户的设置信息。
在步骤1102中,以第一设备对应的第一集合的标识作为集合标识,处理设备112或用户(例如,第二终端)可以创建一个新的集合。步骤1102可以由创建单元5302执行。
在一些实施例中,处理设备112或第二终端的用户可以以第一设备对应的第一集合的标识作为集合标识在第二终端创建一个新的集合。
在一些实施例中,处理设备112可以设置新的集合的配置信息为第一集合(也就是原始集合)的配置信息。具体的,第二终端作为被分享的终端,在接收到设备的分享请求后,以被分享设备对应的原始集合的标识作为集合标识,创建一个新的集合。第二终端创建的集合的配置信息,还需要被设置为被分享设备对应的第一集合的配置信息。
在步骤1103,用户(例如,第二终端的用户)或处理设备112可以在新的集合下添加被分享的第一设备,并对被分享设备的第一设备的配置信息(例如,控制权限、位置、名称、标识等)进行设置,以使得控制权限符合被分享的第一设备对应的原始用户账户的设置信息的要求。步骤113可以由设置单元5303执行。
第二终端创建集合后,将被分享的第一设备的标识添加到创建的新的集合下。在一些实施例中,第一设备对应的原始用户账户的设置信息说明了第二终端的用户对被分享设备的控制权限,第二终端可以利用被分享设备对应的原始用户账户的设置信息的要求,对被分享设备的控制权限进行设置,判断第二终端自身是否有修改被分享设备的配置信息的权限。若第二终端具有修改被分享设备的配置信息的权限,可以通过与第一终端的用户进行交互,实现对被分享设备的配置信息的修改。
现对本实施例进行举例说明,如第一终端向第二终端分享了一个设备,如台灯(如智能台灯),第二终端发送向第一终端分享台灯的请求至服务器,服务器在接收到分享请求后,将分享请求发送至第一终端,第一终端在接收到分享请求后,根据分享请求中的台灯在第一终端中所属的集合(例如,房屋)标识,在第二终端中创建一个和台灯在第一终端中所属的集合一样的集合,且这个新创建的集合的配置信息与第一终端的配置信息一致。第二终端在这个新创建的房屋下,添加台灯的标识,并对台灯的控制权限进行设置,使得台灯的控制权限符合台灯在第一终端对应账号中的设置信息。又例如,第一终端向第二终端分享了一个设备,例如,智能锁,第二终端发送向第一终端分享智能锁的请求至服务器,服务器在接收到分享请求后,将分享请求发送至第一终端,第一终端在接收到分享请求后,根据分享请求中的智能锁在第一终端中所属的集合(例如,车辆、保险柜、保险箱、便携式保管柜、枪柜、lockbox、智能快递柜等)标识,在第二终端中创建一个和智能锁在第一终端中所属的集合一样的集合,且这个新创建的集合的配置信息与第一终端的配置信息一致。第二终端在这个新创建的集合下,添加智能锁的标识,并对智能锁的控制权限进行设置,使得智能锁的控制权限符合智能锁在第一终端对应账号中的设置信息。
图12为据本申请一些实施例所示的删除设备对应账号的方法的示例性流程图。
在一些实施例中,流程1200可以通过处理逻辑来执行,该处理逻辑可以包括硬件(例如,电路、专用逻辑、可编程逻辑、微代码等)、软件(运行在处理设备上以执行硬件模拟的指令)等,或其任意组合。图12所示的用于在集合中添加设备的一个或多个操作可以通过图1所示的设备控制系统100实现。例如,流程1200可以以指令的形式存储在存储设备中,并由处理设备112执行调用和/或执行。
在步骤1201中,处理设备112可以接收用于指示删除第二目标用户账户的用户账户删除指令。
在一些实施例中,第二目标用户账户与被添加到集合(例如,房屋)中的第一设备相关联,且第二目标用户账户对第一设备的控制权限不是最高控制权限,例如,第二目标账户对第一设备的控制权限低于第一目标账户(也就是第一中终端对应的用户账户)对第一设备的控制权限。
在一些实施例中,用户账户下绑定一个设备,那该设备则会与该用户账户建立关联。一个设备可以与一个或多个用户账户建立关联,即被多个用户账户绑定。在一些实施例中,绑定设备的用户账户可以形成一个用户账号列表,该列表可以记录设备建立的多个用户账户。在一些实施例中,该账号列表可以存储在第一终端、第二终端和/或设备的存储设备中。例如,设备绑定的账号列表可以存储在设备的配置信息中。
在一些实施例中,该列表中的用户账户也可以被删除,就是解除设备和用户账户的绑定关系。在一些实施例中,当设备和用户账户的绑定关系被解除之后,该用户账户对应的终端,则不能对设备执行任何控制操作。
在一些实施例中,用户账户删除指令,可以由用户在第一终端的人际交互界面输入,该删除指令中可以包括需要删除的第二目标用户账户。在这种情况下,第一终端对应账户,则对第一设备有较高的控制权限,例如,最高的控制权限。
在步骤1202中,根据用户账户删除指令,处理设备112可以从第一设备关联的用户账户中删除第二目标用户账户。步骤1202可以由删除单元5202执行。
在步骤1203中,第一目标用户账户向服务器(例如,处理设备112)发送控制权限删除指令。在一些实施例中,控制权限删除指令用于控制服务器删除第二目标用户账户对第一设备的控制权限。
现对本实施例进行举例说明,如第二终端的用户来到第一终端的用户的家中,第二终端的用户想使用第一终端的用户当前房屋中的智能设备,如智能空调。第一终端的用户分享了控制权限给第二终端的用户,让其可以使用这个智能空调。当第二终端的用户离开第一终端的用户的当前房屋时,第一终端的用户可以在智能空调的添加列表中,找到拥有智能空调的控制权限的目标账户,即第二终端的用户的目标用户账户,在智能空调的添加列表之中,删除第二终端的用户的目标用户账户,并向处理设备112发送删除指令,利用处理器112删除第二终端对智能空调的控制权限。
在一些实施例中,本申请提供的设备控制的系统和方法可以通过指令,实现对设备的安全管理。指令可以是开启某种模式、关闭某种模式等控制指令,可以是解析人的语音得到的语义结果等。设备可以是智能锁、智能车锁、智能柜锁等锁具,可以是智能车床、智能机器人等需要进行保护的设备。安全管理可以是禁用电子方式对设备进行控制、在用户申请控 制设备时核对用户身份及权限、对用户的请求信息进行合法性验证等。
在一些实施例中,本系统和方法可以应用于锁具,以实现对锁具的安全管理。例如,本系统可以应用于家中的智能门锁,用户发出的指令为开启安全模式,系统通过核对用户的身份及权限,核对通过后开启安全模式,否则不开启安全模式。
在一些实施例中,本系统和方法可以应用于需要进行保护的设备,以实现对设备的安全管理。例如,本系统可以应用于工业车间的智能车床,管理员通过设置,定时使智能车床在每天的下班时间进入安全模式,避免人员误触,避免对人员及机器造成伤害。为方便描述,下文以应用于锁具,以实现对锁具的安全管理为例描述本系统的应用。这并不旨在限定,本系统可以应用于其它方面。
图13为根据本申请的一些实施例所示的设备控制装置的示意图。
如图13所示,设备控制装置1300可以包括指令验证模块1311、状态获取模块1312以及指令判断模块1313。
在一些实施例中,指令验证模块1311可以获取用户用于控制第一设备的控制指令,并验证控制指令是否满足预设条件。在一些实施例中,第一设备控制指令可以包括本地控制指令或通过通信方式(例如,有线通信方式、无线通信方式等或其组合)接收到的控制指令。
在一些实施例中,第一控制指令可以是用于开启预设模式的控制指令。预设模式可以包括安全模式、勿扰模式、特定用户控制模式或用户自设定模式。仅作为示例,当第一设备为智能锁时,预设模式可以是智能锁的电子反锁模式。又例如,当第一设备为智能锁、摄像机等时,预设模式可以是布防模式。又例如,当第一设备为烟雾报警器、温度传感器、电源、煤气灶等时,预设模式可以是火灾监测模式。再例如,当第一设备为保险柜时,预设模式可以是安全模式(例如,只有管理员可以打开、只有机械钥匙或特定方式可以打开等)。在一些实施例中,第一控制指令还可以用于对智能设备的管理的指令。例如,第一控制指令可以用于对智能设备的开启、关闭、锁定或其他用户自定义功能,本申请对此不加限制。
在一些实施例中,指令验证模块1311可以具体用于获取用于开启预设模式的控制指令,并确定开启预设模式指令是否是预设终端发送,得到验证结果。控制指令包括预设模式的开启和/或关闭规则。
在一些实施例中,指令验证模块1311可以获取响应于用户操作第一设备上的操作部件生成的用于开启和/或关闭预设模式的控制指令,并确定控制指令是否是将预设模式对应的操作部件调整至表征开启和/或关闭预设模式的位置时生成的,得到验证结果。
在一些实施例中,状态获取模块1312可以用于获取第一设备的状态。
在一些实施例中,指令判断模块1313可以用于根据验证结果、第一设备的状态以及控制指令,确定是否响应第一设备控制指令。
在一些实施例中,指令判断模块1313可以用于判断第一设备的当前状态是否是锁定状态、以及判断验证结果是否是第一预设结果(例如,开启预设模式的控制指令由具有权限的第一终端发出、控制指令是基于用户对第一设备上的操作部件的操作生成等)。若状态是锁定状态、以及验证结果是第一预设结果,则确定响应智能锁控制指令。若状态不是锁定状态、或验证结果不是第一预设结果,过滤智能锁控制指令。
在一些实施例中,设备控制装置1300可以包括第一工作状态控制模块和图像采集模块。第一工作状态控制模块可以用于控制第一设备处于预设模式的工作状态。图像采集模块 可以用于通过预设图像采集装置采集的图像判断是否出现预设场景,若出现,则控制预设图像采集装置按照预设图像采集规则进行图像采集操作。
在一些实施例中,第一设备控制指令可以是用于关闭预设模式的控制指令。指令验证模块1311具体可以用于获取用于关闭预设模式的控制指令,并确定控制指令是否是预设终端发送,得到验证结果。控制指令可以包括预设模式的关闭规则。在一些实施例中,指令验证模块1311可以获取设置在第一设备上的预设部件被触发后生成的用于关闭预设模式的控制指令,并判断控制指令的控制信息是否满足预设规则,得到验证结果。在一些实施例中,指令验证模块1311可以获取第一设备的状态变化指令,并确定第一设备的状态变化指令中的状态变化趋势是否是由锁定状态更改为解锁状态,得到验证结果。在一些实施例中,指令验证模块1311可以获取用户通过输入/输出设备(例如,智能锁面板)输入的用于关闭预设模式的控制指令,并判断控制指令中的内容是否是预设内容,得到验证结果。
在一些实施例中,指令判断模块1313具体可以用于判断第一设备的状态是否是正常工作状态、以及判断验证结果是否是第二预设结果。响应于第一设备的状态是正常工作状态、以及验证结果是第二预设结果,指令判断模块1313可以确定响应智能锁控制指令。响应于验证结果不是第二预设结果,指令判断模块1313可以过滤第一设备的控制指令。第二预设结果可以是关闭预设模式的控制指令由具有权限的第一终端发出、控制指令是基于用户对第一设备上的操作部件的操作生成、智能锁状态变化指令中的状态变化趋势是由锁定状态更改为解锁状态、用户输入的控制指令中的内容包含预设内容等。
在一些实施例中,设备控制装置1300可以包括第二工作状态控制模块和第三工作状态控制模块。
在一些实施例中,第二工作状态控制模块可以用于控制第一设备处于非预设模式的工作状态。在一些实施例中,第一设备控制指令可以用于关闭预设模式的控制指令。为了描述方便,以关闭智能锁的电子反锁功能为例进行说明。指令验证模块1311可以用于获取用户输入的本地解锁指令。在一些实施例中,本地解锁指令可以包括解锁信息。指令验证模块1311可以验证解锁信息是否是具有开锁权限的解锁信息。若是,指令验证模块1311可以验证解锁信息是否是对应预设用户标识的解锁信息,得到验证结果。
在一些实施例中,第三工作状态控制模块可以用于响应本地解锁指令,执行开锁操作,并在成功执行开锁操作后,关闭预设模式。例如,第三工作状态控制模块确定成功执行开锁操作时,可以确定智能锁的预设锁舌是否收回。若智能锁的预设锁舌被成功收回,则确定成功执行开锁操作。
本实施例中获取的第一设备控制指令可以是本地控制指令或通过通信方式接收的控制指令,然后基于第一设备控制指令的验证结果以及第一设备的状态,确定是否响应第一设备控制指令。本发明中,第一设备控制指令既可以是本地控制指令,也可以是通过通信方式接收的控制指令,方式多样且灵活,进而能够根据用户需求,选择适用于用户的方式,用户体验较好。
在一些实施例中,第一设备设备控制装置1300可以包括芯片、组件、模块等或其组合。在一些实施例中,第一设备控制装置1300还可以包括处理器和存储器。指令验证模块1311,状态获取模块1312,指令判断模块1313,第一、第二或第三状态控制模块等可以均作为程序单元存储在存储器中,由处理器执行存储在存储器中的上述程序单元来实现相应的 功能。
处理器中可以包含内核,由内核去存储器中调取相应的程序单元。内核可以设置一个或多个,通过调整内核参数使得第一设备控制指令既可以是本地控制指令,也可以是通过通信方式接收的控制指令,方式多样且灵活,进而能够根据用户需求,选择适用于用户的方式,用户体验较好。
存储器可能包括计算机可读介质中的非永久性存储器,随机存取存储器(RAM)和/或非易失性内存等形式,如只读存储器(ROM)或闪存(flash RAM),存储器包括至少一个存储芯片。
在一些实施例中,第一设备可以设置有控制密码。例如,在一些情况下,第一设备的用户可以为临时用户设置临时控制密码。在临时密码泄露之后,第一设备可能会被非法控制,安全性较低。为了描述方便,以第一设备为智能锁为例进行说明。智能锁的用户(例如,智能锁的主人)可以对智能锁进行开锁密码设置。在一些实施例中,智能锁的主人可以为临时用户,如访客或者保洁人员设置临时密码。在临时密码泄露之后,智能锁可能会被非法打开,安全性较低。另外,虽然对临时人员设置了临时密码,但是在不想被打扰的时候,临时人员通过临时密码打开智能锁并进入家门,使得用户的使用感受不佳。在一些实施例中,临时密码是指管理员为成员提供的可以短期内开门的密码或蓝牙钥匙,有效期内有效。在一些实施例中,智能锁包括但不限于智能门锁、保险箱上的智能锁、室内智能锁、窗锁、车库锁、车门锁等。临时密码或密码包括但不限于文本密码(例如,数字密码、字母密码等)、生物特征密码(例如,面部识别密码、虹膜识别密码、声纹识别密码、指纹识别密码等)、手势动作密码、语音密码等。
为了解决临时密码泄密以及使用临时密码的人很可能在用户不想被打扰的时候进入家中的技术问题,用户可以开启智能锁的安全模式。安全模式可以是电子反锁,或度假模式(禁用预设的密码)等,就能够在不想被打扰、或者想提高开门安全性的时候,可以将安全模式功能,例如电子反锁打开,这样非管理员之外的用户则无法打开智能锁。其中,电子反锁是指将智能锁的电子开锁方式进行锁定,只有机械钥匙或特定方式可以开门。管理员是指智能锁拥有者,即智能锁绑定在哪个用户下。
在一些情况下,用户可以通过智能锁上的固定按键实现电子反锁的开启和关闭,但是这种方式灵活性较差,使得用户体验较差。为了提高智能锁电子反锁的灵活性和用户体验,本申请提供一种可以通过本地控制指令或通过通信方式接收到的控制指令进行电子锁控制的方法和系统。本申请提供的智能锁的控制方法,可以应用于第一设备的控制器,第一设备的控制器可以通过预先设置的预设控制指令响应规则,进行预设模式的开启或关闭。以安全模式为电子反锁为例进行说明,在对智能锁进行电子反锁控制时,可以有两种实现方式,一种是开启电子反锁功能,一种是关闭电子反锁功能,开启电子反锁功能后,可以将电子反锁功能的标识位置1,表示已经开启了电子反锁功能。关闭电子反锁功能后,可以将电子反锁功能的标识位置0,表示已关闭了电子反锁功能。在一些实施例中,本申请提供的智能锁的控制方法可以应用于保险箱、便携式保管柜、枪柜、lockbox、智能快递柜、房门、窗户、车库、车门等具有智能锁的装置而实现同样的控制功能。
图14为据本申请一些实施例所示的设备控制方法的示例性流程图。
在一些实施例中,流程1400可以通过处理逻辑来执行,该处理逻辑可以包括硬件(例 如,电路、专用逻辑、可编程逻辑、微代码等)、软件(运行在处理设备上以执行硬件模拟的指令)等,或其任意组合。图14所示的智能锁控制方法的一个或多个操作可以通过图1所示的设备控制系统100实现。例如,流程1400可以以指令的形式存储在存储设备中,并由处理设备112执行调用和/或执行。在一些实施例中,流程1400可以用于智能锁的控制,例如,流程1400可以应用于智能锁中的控制器。
在步骤1401中,处理设备112可以获取用户用于控制第一设备的控制指令。步骤1401可以由指令验证模块1311执行。
在一些实施例中,第一设备的控制指令可以包括控制第一设备预设模式开启和/或关闭的指令。第一设备的预设模式可以包括安全模式、勿扰模式、特定用户控制模式、用户自设定模式等。仅作为示例,第一设备可以包括智能锁。预设模式可以是智能锁的某种模式,如电子反锁功能模式、仅支持管理员开门的安全模式,或用户自设定的安全模式等等。每种模式下,均包括了该模式对应的实际应用功能,如对于电子反锁功能模式,其对应的功能有两种,分别为开启和关闭电子反锁功能。
智能锁控制指令包括本地控制指令或通过通信方式接收到的控制指令。通信方式可以包括有线通信方式、无线通信方式等或其组合。有线通信方式可以包括金属电缆、光缆、混合电缆等,或其任意组合。无线通信方式可以包括局域网(LAN)、广域网(WAN)、蓝牙
TM、ZigBee
TM、近场通信(NFC)等或其任何组合。本地控制指令可以基于用户对第一设备上的操作部件的操作生成。以预设模式是开启电子反锁功能模式为例,用户操作用于控制电子反锁功能的按键,或者是用户在智能锁的面板上输入控制电子反锁功能的本地功能码,用户在与智能锁绑定的终端输入控制电子反锁功能等等操作。
在一些实施例中,智能锁还可以通过有线通信或者无线通信的方式与外接终端连接。外接终端包括但不限于手机、笔记本、智能手表、音响等智能设备。本实施例中,外接终端可以与第一设备进行通信,并下发控制指令,该控制指令可以是控制第一设备的预设模式开启或关闭的指令,并且还会在指令中携带有开启或者关闭的时间段,如每周日开启等等。此外,该控制指令还可以携带开启方式,如立即开启、从具体哪一天开始开启、是按照固定周期开启,还是每天都开启等等,关闭类同。
在步骤1402中,处理设备112可以验证控制指令是否满足预设条件以得到验证结果。步骤1402可以由指令验证模块1311执行。
在一些实施例中,当控制指令由用户通过第一终端发送时,验证控制指令是否满足预设条件可以包括验证第一终端是否具有执行与控制指令对应操作的权限。当第一设备的控制指令是用于开启预设模式的控制指令的情况下,控制指令的是否满足预设条件的验证可以包括以下步骤。
处理设备112可以获取用于开启预设模式的控制指令,并确定控制指令是否是预设终端发送,得到验证结果。
在一些实施例中,在开启第一设备的预设功能时,可以通过与第一终端(例如,外接终端等)通过通信方式,接收到第一接终端发送的控制指令。在这种情况下,第一终端即为本实施例中的预设终端。在一些实施例中,第一设备可以通过第一终端上的第一设备控制软件程序,如APP控制,也就是说,只有安装有第一设备控制APP、且该APP中注册有第一设备的信息的第一终端才有权限控制第一设备。
在一些实施例中,处理设备112接收到用于开启预设模式的控制指令,会判断是否是安装有第一设备控制APP、且该APP中注册有第一设备信息的第一终端发送的。若是,则认为控制指令满足预设条件。仅作为示例,用于开启预设模式的控制指令中一般携带有发送端的身份标识,以发送端是手机为例,则会携带有手机的ID号等信息。处理设备112可以验证该ID号是否是安装有第一设备控制APP、且该APP中注册有第一设备的信息的第一终端的ID号,若是,处理设备112可以确定控制指令满足预设条件,验证结果为第一预设结果,验证通过;若否,处理设备112可以确定控制指令不满足预设条件,验证未通过。
在确定出开启预设模式指令是预设终端发送的之后,处理设备112可以对控制指令的内容进行解析,在一些实施例中,控制指令可以包括预设模式的开启规则,可以实时开启或者是预设时间段开启。
在一些实施例中,当控制指令是基于用户对第一设备上的操作部件的操作生成,验证控制指令是否满足预设条件包括验证操作部件是否位于预设位置。当控制指令是用于开启预设模式的控制指令的情况下,控制指令的是否满足预设条件的验证可以包括以下步骤。
在一些实施例中,第一设备上用于开启预设模式的操作部件可以包括按钮、旋钮、拨片开关等或其组合。以预设模式是电子反锁功能为例,本实施例中的操作部件还可以是旋钮式部件,操作部件具有两个不同的标志位,一个标志位表示开启电子反锁功能,另一个标志位表示关闭电子反锁功能,当用户把操作部件调整到开启电子反锁功能的标志位时,则开启电子反锁功能,当用户把操作部件调整到关闭电子反锁功能的标志位时,则关闭电子反锁功能。例如,在操作部件为旋钮式部件时,可以通过左右旋转来开启或关闭电子反锁功能。又例如,操作部件还可以是一个物理按钮或拨片,当往上拨时,表示开启电子反锁功能,当往下拨时,表示关闭电子反锁功能。再例如,操作部件还可以是一个拨片,将拨片上的红色箭头拨至与把手同向,表示开启电子反锁功能,将拨片上的红色箭头拨至与把手反向,表示关闭电子反锁功能。关于本实施例中对具体实现方式不做限定,只要是能够动作、且该动作能够控制预设模式开启的方式均为本发明的保护范围。
为了描述方便,以操作部件为按钮为例进行说明,假设按钮一般处于未按下状态,在按钮被用户按下时,说明按钮调整到表征开启预设模式的位置,此时,处理设备112可以获取响应于用户操作智能锁上的操作部件生成的用于开启预设模式的控制指令,且该控制指令是用于开启预设模式的控制指令。
在处理设备112接收到控制指令之后,会确定该控制指令的发送端身份信息。在一些实施例中,控制指令可以携带有发送端的标识信息,例如,ID信息、用户使用的密码信息等。处理设备112可以根据标识信息判断控制指令是否是操作部件(也可以称为预设部件)调整至表征开启预设模式的位置时生成的,若是,处理设备112可以确定控制指令满足预设条件,第一预设结果表征合法,验证通过;若否,处理设备112可以确定控制指令不满足预设条件,验证未通过。
需要说明的是,上述给出了两种方式,第一种实现方式属于自动开启预设模式,如电子反锁功能,第二种实现方式属于手动开启预设模式,如电子反锁功能。此外,预设模式的开启还可支持远程控制,例如,通过软件即服务(Software-as-a-Service,SaaS)响应用户的配置请求,可以支持远程开启,保证了在用户远离第一设备时控制预设模式的可靠性和及时性。另外,也可以通过例如具有管理员权限的用户发出的关闭预设模式,如电子反锁功能的 方式的本地指令的方式进行预设模式的控制。
当第一设备的控制指令是用于关闭预设模式的控制指令的情况下,控制指令的是否满足预设条件的验证可以包括以下步骤。
处理设备112可以获取用于关闭预设模式的控制指令,并验证控制指令是否是预设终端发送,得到验证结果;控制指令包括预设模式的关闭规则。
获取用于关闭预设模式的控制指令,与上述的用于开启预设模式的控制指令类似,区别在于,一个用于开启预设模式,如电子反锁功能,一个是关闭预设模式,如电子反锁功能。具体内容参照上述内容,在此不再赘述。
在一些实施例中,移动终端软件程序可以通过有线或者无线的方式与第一设备连接,对第一设备进行控制,将第一设备的预设功能打开或关闭,实现第一设备预设功能的打开和关闭状态的切换。在移动终端软件程序中,可以在设置第一设备预设功能的开启或关闭的显示界面输入开启周期和开启时间段,并点击确定按钮,就可以将该设置数据发送至处理设备112。处理设备112可以在设置的周期和开启时间段进行关闭第一设备的预设功能。
为了描述方便,以智能锁的反锁模式关闭为例进行说明。在一些实施例中,处理设备112检测到门内开时,可以关闭预设模式,如关闭电子反锁功能。具体的,用户在室内进行一次开门操作,处理设备112可以解除电子反锁状态,即关闭电子反锁模式,并同步到APP。在实际应用中,检测智能锁从室内打开的方式具体可以通过传感器等设备实现,具体可以如下:
在设置在门内的操作件(例如,执手座、旋钮、把手等)上加一个磁铁,在操作件周围放置一个干簧管,当设置在门内的操作件转动时,干簧管或按键或红外就可以检测出来门内开。或者,在门内或门外的门框和门上分别安装红外的发射装置和接收装置,在发射装置和接收装置检测到距离变化时,认为门内开。又例如,可以使用干簧管和永磁体进行检测门内开。再例如,可以在门内或门外设置按键使用户通过按键确认是门内开。
在一些实施例中,上述的磁铁和干簧管、红外传感器、发射装置和接收装置,可以作为本实施例中的设置在智能锁上的操作部件。在操作部件被触发后,智能锁可以生成用于关闭预设模式的控制指令,处理设备112在接收到控制指令时,会验证该控制指令是否是由于用户对操作部件的操作生成,并判断控制指令的控制信息是否满足预设条件,得到验证结果。若控制指令满足预设条件,验证结果为第二预设结果,第二预设结果表征合法,验证通过。若控制指令不满足预设条件,验证未通过。
验证是否满足预设条件,可以通过判断触发上述的操作部件生成的控制指令中的内容,即控制信息,是否是预设变化规律,举例来说,操作部件以发射装置和接收装置为例,在门内开的过程中,发射装置和接收装置不断远离,此时接收装置接收到的信号的强度不断变小,所以,发射装置和接收装置的变化规律是接收的信号的强度不断变小,若是满足该规律,则认为满足预设条件。需要说明的是,其他操作部件同样也可以具有相应的变化规律,处理设备112可以通过判断是否满足变化规律的方式来确定是否满足预设规则。可选择地,在有指纹或密码在门外鉴权开锁时,认为是门外开,在没有指纹或密码鉴权直接门被打开时,认为是门内开,此时也关闭智能锁反锁模式。
上述实施例中,仅通过操作预设部件即可生成用于关闭预设模式的控制指令。在一些实施例中,为了操作安全性,可以在智能锁上设置有电子按键,只有在同时出发电子按键和 操作部件的情况下,才可以生成用于关闭预设模式的控制指令。
在一些实施例中,处理设备112可以确定第一设备(例如,第一设备的操作部件)的状态变化。响应于第一设备的状态变化满足预设条件,处理设备112可以确定验证通过。
为了描述方便,以智能锁关闭电子反锁模式为例。只要是满足门内开的条件,就关闭预设模式,如关闭或解除电子反锁功能。在一些实施例中,处理设备112可以获取智能锁状态变化指令,并确定智能锁状态变化指令中的状态变化趋势是否是由锁定状态更改为解锁状态,得到验证结果。
在一些实施例中,智能锁的锁舌上设置有传感器,将传感器放在门内锁舌上,门内开门时,锁舌收回时传感器检测其变化,此时认为门内开。具体的,此时,传感器输出至处理设备的数据为智能锁状态变化指令,智能锁状态变化指令中携带有锁舌的状态变化趋势,若该状态变化趋势是由锁定状态更改为解锁状态,即认为门内开,验证结果为通过验证。若不是由锁定状态更改为解锁状态,则认为验证未通过。
在一些实施例中,用户可以(例如,通过智能锁的面板、按键等)输入用于关闭预设模式的控制指令。响应于用户输入的内容满足预设条件,处理设备112可以确定验证通过。
作为示例,在线开锁密码编号为1001~1050、激活码密码编号为3001-3048。在实际应用中,用户可以在APP中设定一个激活码密码,该激活码密码是上述的3001-3048中的一个数字,该激活码密码用于开启或关闭预设模式,如关闭电子反锁功能。在一些实施例中,激活码密码还可以用于控制第一设备中的一个或多个设备(例如,图1中的智能设备130)的模式(例如,当前模式(例如,第一设备当前执行的模式)、用户自定义模式、安全模式、勿扰模式等)。例如,激活码密码可以用于开启和/或关闭第一设备。又例如,激活码密码可以用于开启/或关闭第一设备的模式。
用户可以在智能锁的智能锁面板上输入一串数字,此时处理设备112接收到用于关闭预设模式的控制指令,该指令中携带有用户输入的数字,处理设备112判断该数据是否是预先设定的预设内容,如上述用户设定的激活码密码,若是,则验证通过。若不是由锁定状态更改为解锁状态,则认为验证未通过。
要说明的是,本实施例中,在开启预设模式,如电子反锁功能后,动态密码和蓝牙不能开门。但指纹是可以正常开门。开启电子反锁后,在线普通密码、激活码员工密码、激活码租客密码,临时密码和一次性密码不能开门。在关闭电子反锁功能后,所以密码均可实现开门操作。
在一些实施例中,处理设备112可以获取用户输入的本地解锁指令。本地解锁指令可以包括解锁信息。处理设备112可以验证解锁信息是否是具有开锁权限的解锁信息。若是,即响应于解锁信息是具有开锁权限的解锁信息,处理设备112可以验证解锁信息是否是对应预设用户标识的解锁信息,得到验证结果。
在实际应用中,用户可以在智能锁对应的控制区域(例如,安装智能锁的房门上的智能锁控制区域、保险柜上的智能锁的显示屏、快递柜上的显示屏、与智能锁具有信号连接的额外控制区域等)上输入指纹、密码等信息,这些信息称为解锁信息,此外,本实施例还可以扩展成蓝牙开锁或者射频卡开锁的场景,在用户输入解锁信息之后,控制器会接收到包括解锁信息的本地解锁指令。当解锁信息是对应预设用户标识的解锁信息,则验证通过。关于开锁权限的确定可以参见图15及其相关说明。
在步骤1403中,处理设备112可以根据验证结果、第一设备(例如,智能锁)的状态和控制指令,确定是否控制第一设备执行与控制指令对应的操作。
在一些实施例中,第一设备的状态可以包括第一设备的工作模式(例如,智能锁的锁定模式、摄像机的拍摄模式、智能锁的反锁模式等)。
在一些实施例中,处理设备112可以获取设置在第一设备上的操作部件的状态是否满足预设条件。
在一些实施例中,处理设备112可以实时采集的第一设备的状态、间隔预设的时间(例如,每隔3秒、5秒、10秒等)采集第一时间的状态等。例如,处理设备112可以获取智能锁的锁舌传感器采集的锁舌的状态,确定智能锁处于锁定状态还是解锁状态。仅作为示例,处理设备112可以获取传感器采集的历史保存的最新的锁舌状态,并确定为智能锁的状态。
在实际应用中,智能锁控制指令是用于开启或关闭预设模式的控制指令,所以,本实施例中,需要结合验证结果、智能锁的状态以及预设控制指令响应规则,来确定是否需要执行智能锁控制指令,具体是否需要开启或关闭预设模式的控制指令。
在一些实施例中,当控制指令为开启智能锁的反锁指令,确定是否需要执行智能锁控制指令包括以下步骤。
在一些实施例中,处理设备112可以判断智能锁的状态是否是锁定状态、以及判断验证结果是否是验证通过。响应于智能锁的状态是锁定状态、以及验证结果是验证通过,处理设备112可以确定响应智能锁控制指令。响应于智能锁的状态不是锁定状态或验证结果是验证未通过,处理设备112可以过滤智能锁控制指令。
在一些实施例中,若是开启预设模式,以开启电子反锁功能为例,在开启电子反锁功能时,要求智能锁必须是锁定状态,即只有在锁定状态下,才允许开启电子反锁功能。
响应于验证结果是第一预设结果,即只有满足当前状态是锁定状态、以及验证结果是第一预设结果,才会响应智能锁控制指令,开启预设模式,控制智能锁处于预设模式的工作状态,具体如开启电子反锁功能。
以开启电子反锁为例,预设终端发送的控制指令包括预设模式,如电子反锁功能的开启规则。具体的,在一些实施例中,开启规则可以包括第一种开启规则。在一些实施例中,第一开启规则可以是实时开启规则。也就是说,在接收到控制指令、且确定控制指令是预设终端发送的之后,若是确定出智能锁的状态是锁定状态、以及验证结果是第一预设结果,此时对该控制指令的内容进行解析,若是实时开启规则,则立即开启预设模式,如电子反锁功能。
在一些实施例中,开启规则可以包括第二种开启规则。第二种开启规则可以是预设时间段开启规则,也即电子反锁功能预设时间段内有效。预设时间段内有效是指,处理设备11接收到预设终端发送的控制指令,验证控制指令是否满足预设条件,且智能锁处于锁定状态,则记录生效时间和失效时间(即对应的生效时间范围,生效时间范围是开启预设模式的时间范围),则根据预设规则启动预设模式(如开启电子反锁功能)和结束预设模式(如结束电子反锁功能)。例如,用户可以设定每晚0点~6点开启电子反锁或安全模式。又例如,用户可以设定一个时间段和周期,比如每天晚上20:00到早上8:00自动开启,如果智能锁本地时间在这个范围内,则会开启电子反锁,当超出了这个时间则会结束电子反锁。值得注意的是, 上述关于第一设备的控制可以应用于其他设备的控制。例如,第一设备可以是扫地机器人,处理设备112可以根据验证结果和扫地机器人的状态(例如,休眠状态、待机状态、充电模式等),控制扫地机器人执行与控制指令对应的操作(例如,充电、扫地、拖地等)。
在一些实施例中,开启预设模式(例如电子反锁)期间,智能锁的控制器仍然识别指纹密码等开锁指令携带的信息,但非管理员不响应。
在一些实施例中,控制指令携带的内容是,控制智能锁始终处于电子反锁状态,但是设置了电子反锁的执行有效时间段,和执行无效时间段,在执行有效时间段内,若是智能锁的状态是锁定状态、以及验证结果是第一预设结果,仅管理员身份的密码和钥匙可以开锁,在执行无效时间段内,可以响应开锁指令。
在一些实施例中,在开启预设模式之后,如开启电子反锁功能之后,此时非管理员身份或者钥匙开锁是不能开门的,但是在实际应用中,为了监测在开启电子反锁功能之后,是否有其他人员进行过开锁动作,或者是是否有小偷等不法人员进行过非法开锁动作,此时可以控制图像采集装置,如摄像头,进行监控。在一些实施例中,图像采集装置可以和智能锁一体设置也可以分体设置。在一些实施例中,当智能锁处于电子反锁状态时,可以提高摄像头的监控等级(例如,提高分辨率、扩大拍摄角度等),以加强监控。
在一些实施例中,图像采集装置可以采集图像。处理设备112可以接收图像采集装置所采集的图像,并通过图像采集装置所采集的图像判断是否出现预设场景。预设场景可以包括异常情况的场景、用户自定义的场景等或其组合。异常情况可以包括陌生人开门锁,室内和/或室外出现陌生人,无权限的用户控制设备,出现火灾、煤气泄漏、水灾、烟雾,对象(例如,监控的老人、儿童、宠物等)出现意外等或其组合。例如,处理设备112可以基于图像采集装置采集的图像判断图像中是否有人,即判断门外是否有人,若是有人,即认为出现了预设场景。此时,会控制预设图像采集装置按照预设图像采集规则进行图像采集操作。如开启预设图像采集装置的录像功能,录像时间可以大于平常的录像时间,此时,控制器还会推送强提醒给用户APP,以使用户即时了解开锁情况,提高安全性。
在一些实施例中,若智能锁的状态不是锁定状态或验证结果未通过验证时,处理设备112可以不开启预设模式,处理设备112可以过滤智能锁控制指令,或者将智能锁控制指令的有效性设置为无效,以避免误响控制指令。
在一些实施例中,智能锁的控制指令是用于关闭预设模式的控制指令,确定是否智能锁执行与控制指令对应的操作可以包括以下步骤。
在一些实施例中,处理设备112可以判断智能锁的状态是否是正常工作状态、以及判断验证结果是否是第二预设结果。响应于智能锁的状态是正常工作状态、以及验证结果是第二预设结果,处理设备112可以确定响应智能锁控制指令。响应于智能锁的验证结果不是第二预设结果,处理识别112可以过滤智能锁控制指令。在一些实施例中,关闭预设模式时,对智能锁的状态并不做限定,只要是智能锁未发生故障即可,即处于正常工作状态即可,具体是处于锁定状态,还是解锁状态,本实施例中并不做限定。响应于智能锁的状态是正常工作状态以及验证结果是第二预设结果,即验证通过,处理设备112可以确定响应控制指令。具体的,处理设备112可以控制智能锁处于非预设模式的工作状态。响应于验证结果为未通过验证,处理设备112可以过滤控制指令。
在一些实施例中,以预设模式为电子反锁功能为例,在获取用户输入的本地解锁指令 的情况下,管理员具有最高开锁权限,只要是管理员开锁以及智能锁处于正常工作状态,则不考虑预设模式,如电子反锁的状态,直接开锁。在不是管理员开锁时,会考虑电子反锁的状态以及智能锁是否处于正常工作状态,在电子反锁的状态为开启时,禁止开锁,在电子反锁的状态为关闭时,若智能锁处于正常工作状态,则允许开锁。
更具体的,若解锁信息不具有开锁权限,证明输入的解锁密码不对,则不执行开锁操作。若解锁信息具有开锁权限、且对应预设用户标识,此时证明是管理员开锁,若智能锁处于正常工作状态,则响应本地解锁指令,并执行开锁操作,具体为驱动电机转动,以进行开门操作。在一些实施例中,在成功执行开锁操作后,还是可以开启预设模式,不允许临时用户开门。在一些实施例中,在成功执行开锁操作后,关闭预设模式,如电子反锁功能,以允许临时用户开门。其中,在确定是否成功执行开锁操作时,可以通过锁舌的状态判断,具体的,确定预设锁舌是否收回;若是,则确定成功执行开锁操作。
若解锁信息具有开锁权限、但不对应预设用户标识,说明此时开锁的可能是临时用户,为了避免临时用户,如保洁人员,打扰用户,在电子反锁状态为开启时,说明用户不喜欢打扰,为了避免打扰用户,此时处理设备112可以不响应本地解锁指令,具体可以为丢弃本地解锁指令,进而不会执行开锁操作,在电子反锁状态为关闭时,说明用户允许临时用户进门,若智能锁处于正常工作状态,此时处理设备112可以执行开锁操作。
在实际应用中,用户在智能锁输入面板每次输入开锁信息后,智能锁控制器对信息正确性进行判断,如果输入正确则获取一次电子反锁状态,对状态进行判断,如电子反锁打开,则控制器进一步判断是否是管理员开锁和智能锁是否处于正常工作状态,若是,则开锁,并关闭电子反锁功能。若不是,则控制器不会控制电机转动,另外,若电子反锁关闭,智能锁控制器控制电机转动开门。
在一些实施例中,本发明实施例通过上述的开启电子反锁功能,可以禁用所有智能锁的智能开锁方式,包括蓝牙,指纹,密码,RFID等。针对一些黑客通过非法手段破解智能锁密码,或者破解智能锁蓝牙开门钥匙,本设计可以完全禁止所有电子开锁方式,即使知道了智能锁密码也没法进行开锁操作。
此外,本发明在使用方面,智能锁支持下发临时密码,周期密码等短期的密码方式,当用户给保姆或者保洁人员下发的临时密码后,或者想在某个时间内不想让被下发密码的人进入自己家时,可以使用电子反锁功能,将智能锁锁定,禁用一切电子开锁方式。
需要说明的是,上述实施例是通过指纹、数字密码等电子方式进行开锁,此外,还可以是使用钥匙进行开锁,只要是钥匙能够插入钥匙孔,并能开锁,且此时智能锁处于正常工作状态,则认为开锁成功,此时也开启预设模式,如开启电子反锁功能。
本实施例中获取的智能锁控制指令可以是本地控制指令或通过通信方式接收的控制指令,然后基于智能锁控制指令的验证结果以及智能锁的状态,确定是否响应智能锁控制指令。本发明中,智能锁控制指令既可以是本地控制指令,也可以是通过通信方式接收的控制指令,方式多样且灵活,进而能够根据用户需求,选择适用于用户的方式,以实现模式的开启或关闭,用户体验较好。
图15为根据本申请的一些实施例所示的用户开锁权限验证方法的示例性流程图。
在步骤1501中,处理设备112可以获取预先存储的具有开锁权限的合法解锁信息。
在一些实施例中,智能锁(例如,智能锁的控制器)内可以预先存储有具有开锁权限 的合法解锁信息。具有开锁权限的合法解锁信息可以是用户通过手机APP输入的方式或者是在本地的输入界面输入的。例如,用户可以设置具有开锁权限的合法解锁信息、与相应的设置合法解锁信息对应的用户标识(例如,管理员、家庭成员、普通用户、临时用户等),又或者是不是临时密码等。
在步骤1502中,处理设备112可以判断合法解锁信息是否包括解锁信息。
在一些实施例中,解锁信息可以是对应预设用户标志的解锁信息。例如,在智能锁开启反锁模式下,对应预设用户可以为智能锁管理员。又例如,在智能锁关闭反锁模式下,对应预设用户可以为智能锁管理员、普通用户、临时用户等。若合法解锁信息包括解锁信息,则执行步骤1503。若合法解锁信息不包括解锁信息,则执行步骤1504。
在步骤1503中,处理设备112可以确定解锁信息是具有开锁权限的解锁信息。
在步骤1504中,处理设备112可以确定解锁信息不是具有开锁权限的解锁信息。
在一些实施例中,处理设备112可以判断合法解锁信息是否包括解锁信息,若包括,则解锁信息是具有开锁权限的解锁信息;若不包括,则解锁信息不是具有开锁权限的解锁信息。
在处理设备112确定出解锁信息是具有开锁权限的解锁信息,会验证解锁信息是否是对应预设用户标识的解锁信息,得到验证结果。
在一些实施例中,验证解锁信息是否是对应预设用户标识的解锁信息的过程与解锁信息是否是具有开锁权限的解锁信息的过程类似,具体为:
处理设备112可以获取预设用户标识对应的目标解锁信息,判断目标解锁信息是否包括解锁信息,若包括,则解锁信息是对应预设用户标识的解锁信息;若不包括,则解锁信息不是对应预设用户标识的解锁信息,得到验证结果。
本申请提供的设备管理的系统和方法还可以用于设备的布防和撤防,以及传感器采集信息,以保障设备和/或使用设备的场景的安全。设备可以是智能门锁、智能车锁、智能设备锁等锁具,可以是智能摄像头、智能防盗器等安防设备,还可以是智能保险柜、智能枪柜等对特定物品进行保护的箱体。传感器可以是温度传感器、电池电量传感器、红外传感器、声音传感器等不同类型的传感器。场景可以是对家庭、汽车等进行防盗及保护,可以是对保险柜、枪柜等智能设备进行保护。
在一些实施例中,本系统可以在本地执行布防和撤防操作。在一些实施例中,本系统可以通过执行服务器的布防和撤防的指令,完成布防和撤防操作。在一些实施例中,本系统可以本地和服务器结合完成布防和撤防操作。
在一些实施例中,本系统可以手动布防和撤防。在一些实施例中,本系统可以自动布防和撤防。在一些实施例中,本系统可以手动和自动结合完成布防和撤防操作。
在一些实施例中,本系统可以应用于锁具,以实现对家庭、汽车等进行防盗及保护。例如,本系统可以应用于家庭中的智能门锁,对智能门锁进行布防,并通过声音传感器检测屋内是否有人声,可以实现对门内存在人声、门外撬锁等异常情况的监控及警报,通过温度传感器可检测屋内温度是否过高,一氧化碳浓度是否超标,烟雾浓度是否超标,及时发出火灾警报。
在一些实施例中,本系统可以应用于安防设备,以实现对家庭、汽车等进行防盗及保护。例如,本系统可应用于车内的安防设备,根据服务器的指令,车内的智能摄像头、智能 防盗器等进入布防状态,实时监测是否有陌生人接近、车体剧烈晃动等异常情况的发生。
在一些实施例中,本系统可以应用于对特定物品进行保护的箱体,以实现对箱体的保护。例如,本系统可以应用于保险柜,对保险柜的箱体进行布防,实时监测是否有剧烈敲击、远距离运输等异常情况的发生。
为方便描述,下文以应用于锁具,以实现对家庭、汽车等进行防盗及保护为例描述本系统的应用。这并不旨在限定,本系统可以应用于其它方面。
图16所示为根据本申请的一些实施例所示的智能锁的控制系统的应用场景示意图。
如图16所示,控制系统1600可以包括智能锁1610、服务器1620、网络1630、通信网关1640和智能设备1650。在一些实施例中,控制系统1600中的一个或多个部件可以通过有线或者无线的方式通信。
在一些实施例中,智能锁1610可以包括智能门锁、智能车锁、智能设备锁(例如,图1的智能设备130的锁)等锁具。在一些实施例中,智能锁1610可以包括锁件模块1611和通信模块1612。锁件模块1611可以包括锁体控制芯片1611-1以及锁体1611-2。
为了描述方便,以智能锁为智能门锁为例进行说明。智能锁1610还可以包括与锁体相连的门内操作件(例如,门内把手)1611-3和门外操作件(例如,门外把手)1611-4。门内操作件指的是当门关闭时,处于室内,用户用来操作以控制智能锁的部件。门外操作件指的是当门关闭时,处于室外的智能锁的操作部件。在一些实施例中,门内操作件1611-3可以包括门内把手、显示屏、按钮、旋钮、按键、感应装置等或其组合。门外操作件1611-4可以包括显示屏、门外把手、按钮、按键、旋钮等或其组合。在智能锁1610为智能门锁时,锁件模块1611也可以称为门锁模块,锁体控制芯片1611-1也可以称为门锁控制芯片。
在一些实施例中,锁体1611-2可以包括主体、锁舌和锁芯(图中未示出)。锁体控制芯片1611-2可以控制锁体中锁舌的收缩与弹出,以实现门锁的开锁与上锁,其中,上锁是指利用智能锁1610控制门处于锁门状态。门内操作件1611-3是指在门上安装智能锁1610,且门处于关门状态下,位于室内的智能锁1610的一个或多个部件。相应的,门外操作件1611-4是指在门体上安装智能锁1610且在处于关门状态下,位于室外的智能锁1610的一个或多个部件。在一些实施例中,用户通过旋转门内操作件1611-3,可以利用该门内操作件实现门开。在一些实施例中,用户可以通过电子验证(例如,密码、生物信息、蓝牙、NFC、局域网等)方式,控制智能锁1610开锁或关锁。在一些实施例中,用户通过门外操作件1611-4(如上提门外把手)实现智能锁1610的上锁。可以理解的是,由于智能锁1610可能未设置门外操作件,在该种情况下,可以通过操作智能锁1610处于门外的触控板等实现上锁。在一些实施例中,用户可以通过电子验证方式(如生物识别、密码验证、刷卡、手机蓝牙等)上锁。在一些实施例中,智能锁1610可以自动上锁。
在一些实施例中,智能锁1610上还可以设置有不同种传感器,以感应智能锁的锁舌状态,或者,感应用户对智能锁的操作行为,或者是,感应智能锁门所处场所的室内温度等。
在一些实施例中,智能锁1610还可以包括用于为智能锁1610提供动力的马达,以及用于显示提示信息和密码键盘等信息的显示屏。
在一些实施例中,智能锁1610还可以包括监控装置。监控装置可以为摄像头,以通过摄像头采集门内以及门外的图像。该监控装置还可以是其他人体感应装置(例如,红外摄像机、超声波装置、无线电定位装置、雷达定位装置、激光探测装置、传感器(例如,声音传 感器、气味传感器、运动传感器等)等或其组合)等等,对此不加限制。
在一些实施例中,智能设备1650可以设置于智能锁1610所在门体对应的室内。关于智能设备1650的细节可以参见图1中智能设备130及其相关描述。
在一些实施例中,智能设备1650和服务器1620可以通过网络1630实现通信连接。例如,服务器1620可以获得智能锁1610的锁体状态,例如,锁体的锁定状态、锁体的解锁状态等。服务器1620可以根据智能锁的锁体状态控制智能设备1650所处的工作状态。
在一些实施例中,服务器1600可以与图1中的服务器110相同或类似。在一些实施例中,服务器1600可以是服务器110的具体实施例。在一些实施例中,服务器1620可以是硬件,也可以是软件。当服务器1620为硬件时,可以实现成多个服务器组成的分布式服务器集群,也可以实现成单个服务器。当服务器1620为软件时,可以实现成多个软件或软件模块(例如用来提供分布式服务),也可以实现成单个软件或软件模块。在此不做具体限定。在一些实施例中,用户也可以不在室内部署智能设备,在该种情况下,控制系统1600也可以不包括服务器1620。
在一些实施例中,智能锁1610的通信模块1612可以通过网络1630与服务器1620建立通信连接。在一些实施例中,智能锁1610的通信模块1612可以为近距离无线通信模块。在该种情况下,通信网关1640可以包括近距离无线通信网关。智能锁1610的近距离无线通信模块可以通过近距离无线网络与近距离无线通信网关通信,而近距离无线通信网关可以通过网络1630与服务器1620建立通信连接。相应的,智能锁1620可以通过近距离无线通信网关与服务器1620建立通信连接。例如,智能锁1610的近距离无线通信模块可以为蓝牙模块,相应的,近距离无线通信网关可以为蓝牙网关。在该种情况下,智能锁的蓝牙模块可以与蓝牙网关通信,蓝牙网关可以通过网络1630与服务器1620建立通信连接。又例如,智能锁的近距离无线通信模块还可以为ZigBee模块,近距离无线通信网关可以为ZigBee网关。其中,ZigBee模块采用ZigBee技术,其中ZigBee技术是一种近距离、低复杂度、低功耗、低速率、低成本的双向无线通讯技术。
应该理解,图16中的智能锁1610、网络1630和服务器1620仅仅是示意性的,在实际应用中,智能锁的组成结构还可以有其他部件,类似的,网络1630和服务器1620的数量还可以根据需要设定。
随着智能科技的发展,智能设备,例如,智能锁已经被普遍应用于银行、酒店以及居民住宅等各种场所中。智能锁能够为用户提供智能化的门禁管理控制。由于智能锁的安全性较高,在具有智能锁的防盗门可以有效减少非法人员从防盗门进入室内的情况。然而,在用户外出后,即使防盗门的智能锁处于锁定状态,小偷等非法人员仍可以通过其他途径进入室内并在室内打开智能门锁,从而影响到室内财物的安全性。本申请的一些实施例提供了智能锁的控制系统,能够在用户需要外出的情况下,便捷的利用智能锁降低非法人员室内开锁的情况,提高用户人身和财产。
图17为根据本申请的一些实施例所示的智能锁控制装置的示意图。在一些实施例中,智能锁可以包括门锁、车锁、柜锁等锁具。为了描述方便,智能锁为门锁为例进行说明。
如图17所示,智能锁控制装置1700可以包括出门检测单元1701、动作监测单元1702和布防控制单元1703。其中,出门检测单元1701,被配置成用于检测到用户的出门动作行为。动作监测单元1702,被配置成用于响应于用户的出门动作行为,监测智能锁的触发 部件(例如,防盗触发部件、布防操作件等)的动作。布防控制单元1703,被配置成用于如检测到触发部件的动作满足设定条件,控制智能锁处于布防状态,其中,在智能锁处于布防状态下,如智能锁检测到门内开锁动作,则执行警报操作。
在本实施例中,出门检测单元1701、动作监测单元1702和布防控制单元1703的具体工作过程及其带来的技术效果可分别参考图18对应实施例中步骤1801、步骤1802和步骤1803的实施例的相关说明,在此不再赘述。
在一些实施例中,出门检测单元1701可以包括第一出门检测单元和/或第二出门检测单元。第一出门检测单元,被配置为用于检测到智能锁的门内操作件的开门动作。第二出门检测单元,被配置为用于检测到智能锁的门内操作件的开门动作和/或通过指定传感器感应到用户出门。
在一些实施例中,动作监测单元1702可以包括第一动作监测单元。布防控制单元1703可以包括第一布防控制单元。第一动作监测单元,被配置为用于响应于用户的出门动作行为,监测智能锁的触发部件的动作(例如,按键动作)。第一布防控制单元,被配置为用于如检测到触发部件被触按,控制智能锁处于布防状态。
在一些实施例中,动作监测单元1702可以包括第二动作监测单元。布防控制单元1703可以包括第二布防控制单元。第二动作监测单元,被配置为响应于用户的出门动作行为,用于监测智能锁的门外操作件的动作。相应的,第二布防控制单元,被配置为用于如检测到门外操作件的锁门动作,控制智能锁处于布防状态。
在一些实施例中,动作监测单元1702,被配置为用于响应于出门动作行为,启动定时器,并在定时器对应的设定时长内监测智能锁的触发部件的动作。相应的,布防控制单元1703,被配置为用于在设定时长内检测到触发部件(例如,安全触发部件、布防触发部件等)的动作满足设定条件,控制智能锁处于布防状态。
在一些实施例中,智能锁控制装置1700还可以包括布防请求单元。布防请求单元被配置为用于如检测到触发部件(例如,安全触发部件、布防触发部件等)的动作满足设定条件,向服务器发送布防请求,以使得服务器基于布防请求控制至少一个智能设备处于布防状态。在智能设备处于布防状态下,如智能设备感应到设定的异常情况(例如,异常防盗行为),可以执行警报操作。
在一些实施例中,智能锁控制装置1700还可以包括门铃提醒单元。门铃提醒单元被配置为用于在检测到智能锁关联的门铃按键被触按的情况下,向服务器发送门铃提醒消息,以使得服务器向智能锁绑定的用户终端发送门铃提醒消息,门铃提醒消息用于提示有人触按门铃。
在一些实施例中,智能锁控制装置1700还可以包括门铃输出单元。门铃输出单元被配置为用于如检测到当前时刻不属于设定的门铃勿扰时间段,通过智能锁的扬声器输出门铃铃声。
需要说明的是,智能锁控制装置1700可以是芯片、组件、模块等或其组合。智能锁控制装置1700可以包括处理器和存储器,出门检测单元1701、动作监测单元1702、布防控制单元1703、布防请求单元、门铃提醒单元、门铃输出单元等可以作为程序单元存储在存储器中,由处理器执行存储在存储器中的上述程序单元来实现相应的功能。
处理器中可以包含内核,由内核去存储器中调取相应的程序单元。内核可以设置一个 或多个,通过调整内核参数来及时针对非法人员的室内开锁行为输出警报,有利于减少非法人员的室内开锁的情况。
存储器可能包括计算机可读介质中的非永久性存储器,随机存取存储器(RAM)和/或非易失性内存等形式,如只读存储器(ROM)或闪存(flash RAM),存储器包括至少一个存储芯片。
本申请的上述实施例提供的智能锁控制装置1700,在通过出门检测单元1701检测到用户的出门动作行为后,如动作监测单元1702监测到触发部件(例如,安全触发部件)的动作满足设定条件,会通过布防控制单元1703控制智能锁处于布防状态,实现了用户在出门后只需要对触发部件进行相应的操作,便可以使得智能锁在检测到室内开锁动作后执行警报操作,从而可以及时针对非法人员的室内开锁行为输出警报,有利于减少非法人员的室内开锁的情况。
需要注意的是,以上对于智能锁控制装置1700及其模块/单元的描述,仅为描述方便,并不能把本申请限制在所举实施例范围之内。可以理解,对于本领域的技术人员来说,在了解该系统的原理后,可能在不背离这一原理的情况下,对各个模块/单元进行任意组合,或者构成子系统与其他模块连接。例如,出门检测单元1701还可以用于检测用户的开门动作或关门动作行为。诸如此类的变形,均在本申请的保护范围之内。
图18为根据本申请一些实施例所示的智能锁控制方法的示例性流程图。在一些实施例中,智能锁控制方法1800可以由智能锁控制装置1700执行。
在步骤1801中,处理设备112可以检测用户的出门动作(或开门动作)行为或者关门动作行为。在一些实施例中,处理设备112可以检测用户的出门动作。例如,当智能锁为门锁、车锁(例如,用户从车内开锁时)时,处理设备112可以检测用户的出门动作行为。又例如,当智能锁为柜锁(例如,保险箱、便携式保管柜、枪柜、lockbox、智能快递柜等的锁)、车锁(例如,用户从车外开锁时)等时,处理设备112可以检测用户的关门动作行为。为了描述方便,以门锁的控制方法为例进行说明,并不旨在限制本申请的保护范围,智能锁的控制方法可以应用与车锁、柜锁等其他锁具中。
步骤1801可以由智能锁控制装置1700中的出门检测单元1701执行。
在一些实施例中,处理设备112可以通过检测门锁的门内操作件的开门动作、通过传感器感应到用户出门等或其组合检测用户的出门动作。
在一些实施例中,用于智能锁控制方法的执行主体(例如,处理设备112、图17中的智能锁控制装置1700、服务器1620等)可以感应门内操作件的动作,从而可以感应到用户通过门内操作件开门的开门动作。例如,门内操作件上传感器感应门内操作件的旋转动作,在检测到门内操作件的旋转动作后,传感器可以把感应到的信息传送给处理设备112,处理设备112可以以此确定检测到开门动作。又例如,在检测到旋转动作的旋转幅度超过设定幅度,处理设备112可以确定检测到门内操作件的开门动作。又例如,用户用手向下压该门内操作件,会使得智能锁的斜锁舌缩回,从而使得门打开,因此,门内操作件的旋转动作可以表征用户需要开门,也说明用户存在出门需求或意图。
在一些实施例中,门锁控制方法的执行主体可以通过智能锁的至少一种传感器感应用户的动作行为,并获得到用户的出门动作行为。至少一个传感器可以包括红外传感器、陀螺仪、加速度计、运动传感器、定位系统(如全球定位系统GPS、北斗卫星导航系统等)、声 音传感器、压力传感器、光传感器、温度传感器、图像传感器、指纹传感器、虹膜传感器等或其组合。
用户的出门动作行为可以包括智能锁确定用户出门的至少一种动作。如,用户的出门所涉及到的动作可以包括用户操作门内操作件(例如,用户按压门内把手、按压开锁按钮、旋转开锁旋钮等)、用户通过电子验证(例如,密码、生物信息、蓝牙、NFC、局域网等)方式开锁、用户打开门体以及用户穿过门框等多种动作,因此,用户的出门动作行为可以包括这几种动作行为中的一种或者多种。例如,红外传感器可以获取用户的红外图像,根据获取的红外图像,处理设备112可以确定用户的动作行为。又例如,智能锁检测到用户出门可以是在智能锁的锁槽内设置红外传感器等传感器,如果传感器检测到人体,则确定用户出门。又例如,智能锁的锁舌上可以设置有位置传感器,在位置传感器可以检测到锁舌的弹出到位和收回,通过位置传感器感应到锁舌收回,则确定智能锁的门已经打开,可以认为检测到用户出门。又例如,智能锁检测到用户出门可以是智能锁内设置有陀螺仪,陀螺仪可以检测到门的角度,当门的角度满足预设条件时,则确定智能锁的门已经打开,可以认为检测到用户出门。再例如,智能锁检测到用户出门可以是智能锁内设置有加速度计,加速度计可以检测到门的加速度,当门的加速度满足预设条件时,则确定智能锁的门已经打开,可以认为检测到用户出门。
在步骤1802,响应于用户的出门动作行为,处理设备112可以监测智能锁的触发部件的动作。步骤1802可以由动作监测单元1702执行。
在本实施例中,处理设备112在检测到出门动作行为后,会启动对触发部件(例如,安全触发部件、布防触发部件、防控触发部件等)的动作的监测,以便后续判断智能锁是否需要进入用于防范室内开锁等预设动作的布防状态。
在一些实施例中,触发部件可以为智能锁中设置的用于触发进入布防状态的布防操作件。其中,通过用户对布防操作件的操作动作可以表征出用户是否希望进入布防状态。例如,触发部件还可以为智能锁的门外操作件或者是锁体。可以理解的是,在用户出门之后,通过门外操作件锁门或者其他方式控制锁体执行上锁动作,使得主锁体弹出,则说明目前用户外出且室内无人,在该种情况下,需要防范小偷等非法人员入室后在室内开锁。
在一些实施例中,监测触发部件的动作还可以是监测门锁的用户终端发送的用于控制该安全防护部件的动作的控制指令。如,用户终端通过用户终端上门锁相关的应用向门锁发送触发安全防控部件的动作指令。
在步骤1803中,响应于触发部件的动作满足预定条件,处理设备211可以控制第一设备处于布防状态。
在本实施例中,触发部件的动作所需满足的预定条件是表征当前符合进入布防状态的条件,在实际应用中,根据触发部件的不同,预定条件也会有所不同。例如,触发部件可以包括门外操作件或者锁体,预定条件可以包括门外操作件或者锁体的上锁动作。又例如,触发部件可以包括布防按钮,预定条件可以包括布防按钮处于对应于布防的位置。关于触发部件的细节可以参见图21及其相关描述。
在一些实施例中,在第一设备处于布防状态下,处理设备112可以检测是否有异常情况。响应于检测到异常情况,根据与异常情况对应的预设规则,控制一个或多个智能设备(例如,图4中第一集合中的第一设备)执行相应的操作。例如,门锁检测到预设动作,则执行 警报动作。其中,预设动作可以为表征存在室内非法操作,如非法人员入室后室内开门或者非法人员在室内针对室内物品或者设备进行了风险操作。如,预设动作可以为门内开锁动作。又例如,预设动作还可以是通过摄像装置等监控装置检测到非法人员入室或者在室内等。在一些实施例中,在门锁启动布防状态后,该门锁可以定时或者实时对门锁的锁体及相关部件进行监测,如监测到类似门内开锁动作等预设动作,则执行警报操作。以预定条件为门内开锁动作为例,在一些实施例中,门锁检测门内开锁的方式可以包括通过门内操作件上的传感器感应到门内操作件的转动、通过门内锁旋钮上的传感器感应到门内锁件的开锁动作、检测到门外开锁之外的其他开锁操作。门锁确定存在门内开锁的方式还可以有其他可能情况,本申请对此不加限制。
在本实施例中,门锁在布防状态下所执行的警报操作也可以有多种可能。如,门锁执行的警报操作可以包括输出警报铃声(或警报语音),向门锁绑定的一个或多个用户终端,保安部门(比如大楼的保安人员或办公室,警察局等)和/或服务器(如处理设备112)等发送室内开锁警报,控制延迟开锁,控制(例如,联动控制)一个或多个其他智能设备执行相应的操作等或其组合。在一些实施例中,根据智能设备的声音信号和/或其他信息(例如,警报器发出的声音),处理设备112可以确定具体的异常情况。关于异常情况的检测可以参见图28和图29及其相关描述。
在一些实施例中,门锁可以集成有摄像装置等监控装置,本申请还可以在检测到该触发部件的动作满足设定条件的情况下,控制门锁中集成的摄像装置处于布防状态。其中,在摄像装置处于布防状态下,摄像装置可以执行图像采集,并基于采集到的图像确定出存在异常人员的情况下,执行警报操作。例如,摄像装置可以采集门锁朝向室内的一侧的图像,因此,通过该摄像装置实时或者定时监测室内状态,如果在未解除布防状态的情况下,检测到室内存在人员或者存在不属于设定用户的人员,则确定存在非法入室等异常人员。又例如,该摄像装置还可以采集智能朝向室外的一侧的图像,通过该摄像装置采集到的图像可以检测室外是否存在撬锁或者设定用户之外的非法人员开锁等异常行为。
由本实施例可知,门锁在检测到用户的出门动作行为后,如监测到触发部件的动作满足设定条件,会控制门锁处于布防状态,因此,用户在出门后只需要对触发部件进行相应的操作,便可以使得门锁在检测到室内开锁动作等预设动作后执行警报操作,从而通过简单的操作便可以使得门锁能够及时针对非法人员的室内开锁行为等非法行为输出警报,有利于减少非法人员的室内开锁的情况。另外,本申请在检测到用户的出门动作行为后,才可能控制门锁处于布防状态,从而可以减少由于室外他人无意或者恶意操作防盗触摸部件来触发门锁进入布防状态,减少了误操作的情况。
需要注意的是,以上描述,仅为描述方便,并不能把本申请限制在所举实施例范围之内。可以理解,对于本领域的技术人员来说,在了解该系统的原理后,可以在不背离这一原理的情况下,对上述方法和系统进行形式和细节上的各种修正和改变。在一些实施例中,在步骤1802中,响应于检测到用户的开门动作行为(或者关门动作行为),处理设备112可以按照预设规则自动触发第一设备的布防操作。例如,处理设备112在检测到用户的开门动作行为后,在一定预设时间之后,可以控制第一设备进入布防状态。又例如,处理设备112可以检测到用户的开门动作和出门动作后,控制第一设备进入布防状态。又例如,处理设备112可以检测到用户的开门动作和关门动作后,控制第一设备进入布防状态。
图19所示为根据本申请的一些实施例所示的智能锁的控制系统的应用场景示意图。
与图16所示的智能锁的控制系统1600类似,控制系统1900可以包括智能锁1910、服务器1920、网络1930、通信网关1940和智能设备1950。与控制系统1600不同的是,智能锁1910除了包括锁体控制芯片1911-1、锁体1911-2以及与锁体相连的门内操作件1911-3和门外操作件1911-4中的部分或者全部之外,还可以包括布防操作件1911-5和布防提示灯1911-6。
布防操作件1911-5可以包括布防按键、布防触摸区、布防旋钮等。在一些实施例中,布防操作件1911-5可以与智能锁设置于智能锁处于门外的一侧。布防操作件1911-5可以与锁体控制芯片1911-1相连。例如,在智能锁1910具有门外操作件1911-4的情况下,布防操作件1911-5可以与门外操作件1911-4设置于门体的同一侧。即,在智能锁1910设置在门体上的情况下,布防操作件1911-5设置于门体朝向室外的一面。例如,布防操作件1911-5可以与智能锁1910的锁体控制芯片1911-1相连,并设置于门体上处于室外的一面,或者是,布防操作件1911-5可以设置于智能锁1910的锁体1911-2上,并与门外操作件1911-4处于锁体1911-2的同一面。
在一些实施例中,智能锁1910可以在检测到用户的出门动作行为后,控制布防提示灯1911-6闪烁,用于提示用户当前可设置智能锁1910进入布防状态。
图20为据本申请一些实施例所示的智能锁控制方法的示例性流程图。智能锁控制方法2000可以应用于门锁。在一些实施例中,智能锁控制方法2000可以由智能锁控制装置1700执行。
在步骤2001中,处理设备112可以检测智能锁的门内操作件的开门动作。步骤2001可以由智能锁控制装置1700中的出门检测单元1701执行。
关于智能锁的门内操作件的开门动作的检测可以参考步骤1801及其相关描述。
在步骤2002,处理设备112响应于门内操作件的开门动作,控制布防提示灯闪烁,并监测智能锁的触发部件(例如,布防操作件)的操作动作。
在门内操作件存在开门动作后,处理设备112可以控制布防提示灯闪烁可以引起已出门的用户的注意,从而起到提示用户设置智能锁的布防状态的目的。在一些实施例中,考虑到用户出门后,一般会在短时间内离开家门,因此,如果较长时间未检测到该智能锁的布防操作件的操作动作,则说明用户可能仅仅是短时间出门并不需要设置智能锁的布防状态。在该种情况下,为了避免长时间闪烁布防提示灯导致耗电,也为了避免用户已经离开家门,而由于其他误触导致误操作,本实施例的智能锁控制方法的执行主体还可以在检测到门内操作件的开门动作后,启动定时器,并在定时器对应的设定时长内控制布防提示灯闪烁,并监测布防操作件的操作动作。
需要说明的是,在该步骤中,控制布防提示灯闪烁仅仅是起到提示用户的作用,在实际应用中,也可以根据需要不执行该操作。
在步骤2003中,响应于检测到布防操作件被触发,控制智能锁处于布防状态。步骤2003可以被布防控制单元1703执行。
布防操作件被触发是指操作布防操作件上存在用于触发启动布防状态的操作行为。如,布防操作件为布防按键,则检测到该布防按键被触按,则说明布防操作件被触发。在一些实施例中,处理设备112可以在定时器对应的设定时长内监测该布防操作件的操作动作,则本 实施例的执行主体在该定时器对应的设定时长内检测到该布防操作件被触发,则会控制智能锁处于布防状态。
从图20中可以看出,与图18对应的实施例相比,本实施例中智能锁控制方法突出了智能锁基于触发部件(例如,布防操作件)的触发动作实现布防控制。由于触发部件设置于门外一侧,在检测到门内操作件的开门动作后,如果检测到触发部件被触按,则说明用户已经出门且希望启动智能锁的布防模式。由此,本实施例的方案可以使得用户通过门内操作件的开门之后,通过手动触按触发部件来控制智能锁进入布防状态,实现了较为便捷的控制智能锁的布防状态。
同时与单独触按触发部件相比,本实施例只有在检测到门内操作件的开门动作后,才会响应触发部件的触发动作,从而可以有效保证用户出门主动设置智能锁的布防状态,避免他人误操作或者恶意操作而导致智能锁进入布防状态。
图21为据本申请一些实施例所示的智能锁控制方法的示例性流程图。智能锁控制方法2100可以应用于门锁。在一些实施例中,智能锁控制方法2100可以由智能锁控制装置1700执行。
在步骤2101,处理设备112可以检测智能锁的门内操作件的开门动作。步骤2001可以由智能锁控制装置1700中的出门检测单元1701执行。
关于智能锁的门内操作件的开门动作的检测可以参考步骤1801及其相关描述。具体的,执行主体可以检测到智能锁的门内操作件的开门动作且通过指定传感器感应到用户出门,具体可以参照图20的实施例。
在步骤2102中,响应于门内操作件的开门动作,处理设备211可以监测智能锁的门外操作件的动作。步骤2102可以由动作监测单元1702执行。
本实施例的执行主体在检测到门内操作件的开门动作之后,监测门外操作件的动作可以确定用户是否需要锁门外出。
在步骤2103,处理设备112可以在检测到门外操作件的上锁动作时,控制智能锁处于布防状态。
例如,门外操作件的上锁动作实际上是触发锁门的锁门动作。门外操作件的上锁动作可以包括门外操作件向上提,在该种情况下,可以通过门外操作件上的传感器感应外门把手的旋转,确定感应到门外操作件的上提。当然,针对不同类型的智能锁,门外操作件的锁门动作也会所有差别,本申请对此不加限制。
在一些实施例中,响应于检测到用户的出门动作,处理设备112可以在设定时长内,检测门锁的触发部件的动作。本实施例的执行主体可以响应于该开门动作,启动定时器,并在定时器对应的设定时长内监测该门外操作件的动作。相应的,如执行主体在该定时器的设定时长内检测到该外门操作件的锁门动作,则会控制智能锁处于布防状态。
从图21中可以看出,与图18对应的实施例相比,本实施例中门锁控制方法突出了智能锁可以在检测到门内操作件的开门动作后,在检测到门外操作件的锁门动作时,自动进入布防状态。通过本申请的方案,用户可以在通过门内操作件开门后,通过门外操作件执行锁门操作,便可以使得智能锁自动进入布防状态,提高了智能锁的布防状态设置的便捷性和灵活性。同时,只有用户出门再通过门外操作件锁门后才可以触发智能锁进入布防状态,也可以降低由于误操作而设置智能锁进入布防状态。
在一些实施例中,在响应于门内操作件的开门动作,处理设备112可以监测智能锁的锁体的动作,在检测到锁体的上锁动作后,控制智能锁进入布防状态。例如,智能锁的触发部件还可以包括智能锁的主锁舌,其中,主锁舌是指智能锁中需要通过门内操作件、门外操作件或者操作智能锁处于门外的上锁部件(如门外的上锁验证部件或者触摸操作区等)执行锁门操作才可以弹出的锁舌。在一些实施例中,主锁舌可以为门内操作件以及门外操作件控制的三连动锁舌。
在该种情况中,处理设备112可以检测到智能锁的门内操作件的开门动作后,监测智能锁的主锁舌的动作。如检测到主锁舌弹出,处理设备112可以控制智能锁处于布防状态。
可以理解的是,由于主锁舌需要门内操作件或者门外操作件控制,而用户门内锁门的情况下,并不需要先通过门内操作件开门,再利用门内操作件执行锁门操作,以使得主锁舌弹出,因此,在检测到智能锁的门内操作件的开门动作后,如检测到主锁舌弹出,可以确认是在门外输入的上锁动作,在该种情况下,则说明用户已出门,可以控制智能锁进入布防状态。
在一些实施例中,为了进一步减少误操作,本申请还可以在检测到智能锁的门内操作件的开门动作且检测到用户出门之后,监测该主锁舌的动作,以在检测到主锁舌弹出后,控制智能锁进入布防状态。
可以理解的是,在本申请以上任意一个实施例中,在检测到用户的出门动作行为后,均可以启动定时器,并在定时器对应的设定时长内监测智能锁的触发部件的动作。如在该设定时长内检测到触发部件的动作满足设定条件,则智能锁控制进入布防状态。
图22为根据本申请的一些实施例所示的智能锁控制装置的示意图。
如图22所示,智能锁控制装置2200可以包括请求获得单元2201和布防指示单元2202。请求获得单元2201被配置为用于获得智能锁发送的布防请求。布防请求为智能锁在检测到的用户的出门动作行为后和/或在检测到智能锁的触发部件的动作满足设定条件的情况下生成的。布防指示单元2202被配置为用于响应于布防请求,指示智能锁进入布防状态。在一些实施例中,在智能锁处于布防状态下,若智能锁检测到门内开锁动作,可以执行警报操作。
请求获得单元2201和布防指示单元2202的具体处理及其带来的技术效果可分别参考图23对应实施例中步骤2301和步骤2302实施例的相关说明,在此不再赘述。
在一些实施例中,智能锁控制装置2200还可以包括布防部署模块。布防部署模块被配置为用于响应于布防请求,指示至少一个智能设备(例如,图4中第一集合的第一设备中的至少一个设备)处于布防状态。在智能设备处于布防状态下,如智能设备感应到设定的异常情况,根据与异常情况对应的预设规则,智能设备可以执行相应的操作(例如,警报操作)。
在一些实施例中,智能锁控制装置2200还可以包括消息获得单元、门铃提醒单元等。消息获得单元可以用于获得智能锁发送的门铃提醒消息,门铃提醒消息用于提示有人触按门铃。门铃提醒消息可以为智能锁在检测到智能锁关联的门铃按键被触按的情况下生成的。门铃提醒单元可以用于向智能锁绑定的用户终端和/或其他智能设备(例如,智能音响等)发送门铃提醒消息,以使得用户终端和/或其他智能设备输出门铃提醒消息。
在一些实施例中,门铃提醒单元可以包括时刻检测子单元、门铃提醒子单元等。时刻检测子单元可以用于检测当前时刻是否属于智能锁对应的门铃勿扰时间段。智能锁对应的门 铃勿扰时间段可以由用户终端配置并存储到智能锁的服务器、处理设备112或者存储设备中。门铃提醒子单元可以用于,如当前时刻不属于智能锁对应的门铃勿扰时间段,向智能锁绑定的用户终端和/或其他智能设备发送门铃提醒消息以及向其他智能设备发送门铃提醒消息的操作。
在一些实施例中,智能锁控制装置2200还可以包括电量获得单元、信息、保存单元、查询接收单元、电量反馈单元等。电量获得单元可以用于获得智能锁发送的锁件模块、门铃模块或其他模块的剩余电量。信息保存单元可以用于保存锁件模块、门铃模块和/或其他模块的剩余电量。查询接收单可以用于接收其他智能设备或用户终端发送的电量查询请求。电量反馈单元可以用于响应于电量查询请求,向其他智能设备或用户终端返回锁件模块的剩余电量、门铃模块和/或其他模块的剩余电量的信息,以使得其他智能设备播放锁件模块、门铃模块或其他模块的剩余电量的信息。
图23为根据本申请一些实施例所示的智能锁布防控制方法的示例性流程图。智能锁布防控制方法2300可以应用于门锁。在一些实施例中,智能锁布防控制方法2300可以由智能锁控制装置2200执行。
在一些实施例中,智能锁进入布防状态的方式可以包括智能锁直接切换到布防模式;也可以是智能锁向服务器(例如,服务器110、服务器1620、服务器1920等)发送布防请求,并由服务器指示智能锁进入布防状态后,智能锁进入布防状态。为了描述方便,以通过服务器控制智能锁进入布防状态为例进行说明。
在步骤2301中,服务器可以获得智能锁发送的布防请求。步骤2301可以由请求获得单元2201执行。
布防请求可以用于请求指示智能锁进入布防状态。在一些实施例中,布防请求可以是智能锁在检测到的用户的出门动作行为后,且在检测到智能锁的触发部件的动作满足设定条件的情况下生成的。如图18中的实施例,在智能锁响应于用户的出门动作行为,检测到触发部件的动作满足设定条件,则智能锁可以生成布防请求。
在一些实施例中,服务器可以直接获得智能锁发送的布防请求。在一些实施例中,服务器可以通过与智能锁具有通信连接的近距离无线通信网关获得智能锁发出的布防请求。
在步骤2302中,响应于该布防请求,服务器指示智能锁进入布防状态。在智能锁处于布防状态下,如智能锁检测到预设动作,则执行警报操作。
关于智能锁进入布防状态的描述可以参见图21及其相关描述,在此不再赘述。
本实施例主要突出通过服务器来控制智能锁进入布防状态,使得服务器可以及时获得智能锁所处的状态,并有利于服务器基于智能锁的布防状态合理控制其他智能设备。
图24为根据本申请一些实施例所示的智能锁控制方法的示例性流程图。
在步骤2401中,智能锁检测到智能锁的门内操作件的开门动作。在步骤2402中,智能锁响应于门内操作件的开门动作,启动定时器,并在定时器对应的设定时长内监测布防操作件的操作动作。可以理解的是,如果不启动定时器,而直接监测布防操作件的动作也同样适用于本实施例。需要说明的是,为了便于理解,本申请实施例以检测到用户的出门动作行为是检测到门内操作件的开门动作为例说明,并以触发部件为布防操作件为例说明。但是在实际应用中,对于前面实施例(例如,图18中步骤1801、图20中2001等)提到的检测到用户的出门动作行为的其他方式也同样适用于本实施例,相应的,触发部件的动作满足设 定条件为门外操作件、主锁舌或者锁体的上锁动作的情况也同样适用于本实施例。
在步骤2403中,智能锁在该设定时长内检测到布防操作件的触按动作,控制智能锁进入布防状态,并向服务器发送布防请求。在本实施例中,以智能锁控制自身进入布防状态为例说明,但是对于通过向服务器发送布防请求,以使得服务器指示智能锁进入布防状态也同样适用于本实施例。在本实施例中,该布防请求用于请求将智能设备设置为布防状态。
在步骤2404中,服务器指示至少一个智能设备处于布防状态。在本实施例中,智能设备可以设置于智能锁对应的室内的智能设备。智能设备可以包括智能音响、摄像装置、警报器、投影设备等或其组合。
在一些实施例中,在智能设备处于布防状态下,如智能设备感应到设定的异常情况,会执行警报操作。在一些实施例中,异常情况可以把包括防盗异常行为。智能设备感应到设定的防盗异常行为则说明存在非法入室行为等预设行为。例如,以智能设备为智能摄像头为例,在该智能摄像头处于布防状态下,该智能摄像头可以持续采集室内图像,并对室内图像进行分析;如果基于室内图像分析存在用户或者可疑人员等,则确定存在防盗异常行为,则会执行警报操作。关于异常情况的细节可以参见图14及其相关描述。
其中,智能设备执行警报操作的方式与智能锁执行警报操作的方式相似,如,智能设备可以向绑定的用户终端发送警报消息等,关于检测到异常情况的处理细节可以参见图18及其相关描述
在图24所示的一些实施例中,在智能设备进入布防状态后,会向服务器发送布防请求,以使得服务器基于该布防请求控制至少一个智能设备处于布防状态,从而使得智能设备感应到设定的防盗异常行为,会执行警报操作,实现了更为全面和可靠的防盗布防,有利于减少室内盗窃等异常情况。
图25所示为根据本申请的一些实施例所示的智能锁的控制系统的应用场景示意图。
如图25中,智能锁控制系统2500可以包括智能锁2510、服务器2520、网络2530、蓝牙网关2540、智能设备2550和用户终端2560。在一些实施例中,控制系统2500中的一个或多个部件可以通过有线或者无线的方式连接。
在一些实施例中,智能锁2510可以包括锁件模块2511、蓝牙模块2512以及门铃模块2513。
在一些实施例中,锁件模块2511可以包括锁体控制芯片2511-1、锁体2511-2以及与锁体相连的门内操作件2511-3、门外操作件2511-4、布防操作件2511-5和布防提示灯2511-6。关于锁件模块2511的细节可以参见图19中锁件模块1911及其相关描述。
在一些实施例中,门铃模块2513可以包括门铃控制芯片2513-1、扬声器2513-2和门铃按键2513-3。门铃控制芯片2513-1至少被配置为响应于门铃按键2513-3的按键动作,控制扬声器2513-2播放铃声。
智能锁2510的通信模块为蓝牙模块2512。相应的,智能锁控制系统2500的近距离无线通信网关为蓝牙网关2540。在一些实施例中,蓝牙网关2540可以与服务器2520建立远距离的通信连接。在一些实施例中,蓝牙模块2512与锁件模块2511的锁体控制芯片2511-2以及门铃模块2513的门铃控制芯片2513-1相连。在一些实施例中,蓝牙网关2540可以接收指定范围内智能锁通过蓝牙广播的信息。
在一些实施例中,服务器2520可以通过网络2530与智能锁2510的通信模块(即, 蓝牙模块2512)建立通信连接。蓝牙网关2540可以将智能锁广播的信息转发给服务器2520。智能锁2510通过蓝牙网关2540可以实现与服务器2520的远距离通信。
用户终端2560可以与服务器2520通过网络2530建立通信连接。例如,用户终端2560中可以安装并运行有用于与服务器2520建立通信连接的应用,通过该应用实现用户终端2520与服务器2520的通信连接。在一些实施例中,用户终端2560与智能锁2510以及蓝牙网关2540建立绑定,即建立绑定关系。其中,建立绑定关系是指配置两台设备之间关联关系。关于用户终端的细节可以参见图1中用户终端140及其相关描述。
在图25所示的智能锁的控制系统2500中,智能锁2510被配置为在检测到智能锁2510关联的门铃按键2513-3被触按的情况下,向服务器2520发送门铃提醒消息。相应的,服务器2520响应于门铃提醒消息,向该智能锁绑定的用户终端2560发送该铃提醒消息,该门铃提醒消息用于提示有人触按门铃。
在一些实施例中,智能设备2550可以至少包括智能音响。在一些实施例中,用户终端2560可以向服务器2520配置门铃提醒规则,如,门铃提醒声音烈性、门铃提醒时长、门铃提醒的门铃勿扰时间段等。服务器2520可以根据配置的门铃提醒规则,向智能音响和用户终端2560发送门铃提醒消息。
图26为根据本申请的一些实施例所示的智能锁的门铃提醒方法的示例性流程图。
在步骤2601中,智能锁在检测到该智能锁关联的门铃按键被触按的情况下,向服务器发送门铃提醒消息。
在一些实施例中,门铃提醒消息用于提示有人触按门铃。如,门铃提醒消息可以为包含门铃铃声的消息,也可以是包括用于提示门铃被触按的提示语的消息等。例如,智能锁可以通过门铃模块中的门铃控制芯片检测到门铃按键被触按后,生成门铃提醒消息。然后,门铃控制芯片将门铃提醒消息通过智能锁中的通信模块传输给服务器。
在一些实施例中,用户终端也可以在智能锁中配置门铃勿扰时间段,其中,门铃勿扰时间段是指用户通过用户终端设定的不希望被门铃打扰的时间段,例如,假设用户不希望在每天22点到凌晨5点之间被门铃打扰,则可以设置门铃勿扰时间段为22点到5点之间的时间段。相应的,在智能锁检测到该门铃按键被触按后,如检测到当前时刻不属于设定的门铃勿扰时间段,可以通过智能锁的扬声器输出门铃铃声。如果当前时刻属于设定的门铃勿扰时间段,则不会控制扬声器输出门铃铃声。
在步骤2602中,服务器检测当前时刻是否属于该智能锁对应的门铃勿扰时间段。在一些实施例中,智能锁对应的门铃勿扰时间段可以是由用户手动确定,或者由处理设备112或智能锁控制系统的服务器自动确定,或者由处理设备112或智能锁控制系统的服务器确定。例如,门铃勿扰时间段可以由智能锁绑定的用户终端配置并存储到该服务器中。
在一些实施例中,用户终端可以配置该用户终端绑定的智能锁的门铃提醒规则,该门铃提醒规则可以包括用户不希望被打扰的该门铃勿扰时间段。当然,用户终端还可以设置需要输出门铃提醒消息的智能音响等智能设备的信息。在一些实施例中,服务器中可以存储不同智能门铃对应的门铃提醒规则,在此基础上,在服务器接收到智能锁的门铃提醒消息之后,可以查询该智能锁的门铃提醒规则,并获得该门铃提醒规则中的门铃勿扰时间。
在步骤2603中,如服务器确定当前时刻不属于该智能锁对应的门铃勿扰时间段,向该智能锁绑定的用户终端和智能音响发送该门铃提醒消息。在一些实施例中,智能锁绑定的 智能音响可以是预先绑定的,处于该智能锁所对应的室内的智能音响。
在步骤2604中,智能音响播放该门铃提醒消息。在一些实施例,智能音响可以通过语音等方式播放该门铃提醒消息,以使得用户及时获知门铃被触按。在一些实施例中,在语音播报该门铃提醒消息的同时,如果智能音响存在显示屏,还可以在显示屏输出该门铃提醒消息对应的提示内容。
在步骤2605中,用户终端输出该门铃提醒消息。在本实施例中,用户终端可以在显示屏输出该门铃提醒消息,还可以是采用语音输出该门铃提醒消息,或者同时采用这两种方式输出该门铃提醒消息,或者通过其他方式输出门铃提醒消息。
在图26的实施例中,智能锁可以在检测到门铃按键被触按后,通过向服务器发送门铃提醒消息,可以实现通过服务器向用户的用户终端以及智能音响发送该门铃提醒消息,从而可以通过用户终端和智能音响及时向用户播报该门铃提醒信息,使得用户可以较为及时获知门铃被触按的信息,减少由于门铃的扬声器输出的铃声过小而导致用户无法及时甚至无法听到门铃声的情况。
在一些实施例中,智能锁可以通过近距离无线通信网关向服务器发送门铃提醒消息。具体的,智能锁的近距离无线通信模块广播门铃提醒消息,近距离无线网关接收到智能锁广播的门铃提醒消息后,将该门铃提醒消息传输给该服务器。
图27为根据本申请的一些实施例所示的智能锁的门铃提醒系统的示意图。如图27所示,智能锁2710可以包括门铃模块2713和锁件模块2711。关于门铃模块2713和锁件模块2710的描述可以分别参见图25中的门铃模块2513和锁件模块2511及其相关描述。
在一些实施例中,智能锁2710可以通过近距离无线通信网关与服务器2740通信。近距离无线通信网关可以为蓝牙网关2720,相应的,智能锁2710的通信模块可以为蓝牙模块。蓝牙网关2720可以配置有服务器2740的地址等信息。
在一些实施例中,用户终端2730可与智能锁2710建立绑定关系。用户终端2730可以向服务器2740中配置门铃提醒规则。例如,用户终端2730可以向服务器发2740送配置请求,配置请求携带有该智能锁2710对应的门铃勿扰时间段,且配置智能音响为门铃提醒设备等信息。服务器2740可以响应该配置请求,将配置请求中的配置信息保存为智能锁2710的门铃提醒规则。
在一些实施例中,用户终端2730可以在智能锁2710的门铃中配置该门铃勿扰时间段。用户终端2730可以控制智能锁2710的门铃模块2713开启或者关闭勿扰模式,以及设置智能锁中的门铃模块2713对应的门铃铃声等。例如,用户终端2730还可以设定智能锁2710的门铃模块2713在门铃勿扰时间段内静音。又例如,用户终端2730可以设定门铃模块2713在任意时间均保持静音。
在一些实施例中,智能锁2710的门铃检测到门铃按键被触按后,可以通过蓝牙模块广播设定格式的广播包。在一些实施例中,广播包中可以包括智能锁的门铃的标识以及用于提示门铃被触按的门铃提醒消息。蓝牙网关2720接收到该广播包后,可以将该广播包传递给服务器2740。
服务器2740接收到广播包之后,获得广播包中的门铃提醒消息和智能锁2710的门铃的标识。服务器2740可以根据广播包中智能门铃的标识,查询智能锁2710的门铃对应的门铃提醒规则。如果当前时刻不属于门铃提醒规则中设定的门铃勿扰时间段,服务器2740可 以将门铃提醒消息发送给智能锁的门铃绑定的用户终端以及门铃提醒规则中设定的其他智能设备(例如,智能音响2750等),以使得其他智能设备执行相应的操作。例如,使得智能音响2750播放门铃提醒消息;如果当前时刻属于设定的门铃勿扰时间段,则不会继续向其他智能设备以及用户终端发送门铃提醒消息。
在一些实施例中,智能锁2710在检测到门铃按键被触按后,可以向服务器2740发送门铃提醒消息,以使得服务器2740向智能锁绑定的用户终端发送门铃提醒消息以用于提醒用户有人触按门铃,减少用户无法及时获知门铃被触按的情况。另外,由于通过用户终端2730可以在智能锁2710和服务器2740中设置智能锁2710对应的门铃勿扰时间段,使得服务器2740和智能锁2710仅仅不属于门铃勿扰时间段才执行门铃提醒的相关操作,可以避免门铃对用户造成干扰。
在一些实施例中,智能锁2710的锁件模块2711和门铃模块2713都需要供电。在一些实施例中,锁件模块2711和门铃模块2713可以分别有不同的供电电源。在该种情况下,智能锁2710还可以获得锁件模块2711的剩余电量和/或门铃模块2713的剩余电量,并发送给该服务器2740。例如,智能锁2710可以通过蓝牙网关2720将锁件模块2711和门铃模块2713各自的剩余电量的信息发送给服务器2740。服务器2740可以保存智能锁2710发送的锁件模块2711的剩余电量和/或门铃模块2713的剩余电量。
在一些实施例中,用户可以向其他智能设备(例如,智能音响2750)发送锁件模块2711和/或门铃模块2713电量查询指令。响应于用户的电量查询指令,其他智能设备可以向服务器2740发送电量查询请求,电量查询请求用于请求智能锁对应的电量情况。服务器2740响应于电量查询请求,可以查询出智能锁2710中锁件模块2711的剩余电量和/或门铃模块2713的剩余电量,将锁件模块2711的剩余电量和门铃模块2713的剩余电量的信息发送给其他智能设备。相应的,其他智能设备可以播放或显示出锁件模块2711的剩余电量和/或门铃模块2713的剩余电量的信息。
在一些实施例中,智能锁2710可以检测是否存在异常情况。响应于检测到异常情况,根据与异常情况对应的预设规则,处理设备112或服务器2740控制智能锁2710和/或其他智能设备执行相应的操作。
在一些实施例中,智能锁2710内还可以设置有温度传感器。在一些实施例中,温度传感器可以为独立于锁体控制芯片(例如,锁体控制芯片2511-1)的器件,也可以集成在锁体控制芯片中。
在一些实施例中,温度传感器可以用于感应室内温度。例如,智能锁2710可以有两个面板,包括装在室外的外面板和装在室内的内面板。在该种情况下为了更准确监测室内温度,可以将温度传感器设置于内面板上,并尽量靠近内面板的表面,从而使得温度传感器检测到的温度更接近内面板环境温度,具体位置不限制。
为了能够及时发现室内异常(例如,起火或者由于温度过高),本申请中描述的处理设备112还可以在室内被检测到有异常(例如,温度超过温度阈值)的情况下,启动一个或多个操作(例如,控制智能锁2710执行解锁操作,启动室内外警报,向一个或多个与该智能锁2710绑定的用户终端2730,服务器(如处理设备112),和/或保安机构发出警报),以便开门,并提醒和/或协助用户及时离开。
为了能够在用户外出的情况下(例如,在智能锁处于布防状态时),也可以及时获得 室内温度过高等可能引发的风险,在智能锁2710确定室内温度超过温度阈值的情况下,可以向该智能锁2710绑定的用户终端2730发送风险警报。风险警报可以用于提醒用户室内温度存在安全隐患。
在一些实施例中,智能锁2710还可以在确定出室内温度超过温度阈值的情况下,通过扬声器输出风险警报铃声,或者通过智能锁2710控制与智能锁连接的灯光提示等。可以理解的是,在智能锁2710处于布防状态后,智能锁绑定的用户终端2730还可以根据需要解除智能锁2710的布防状态。例如,用户可以通过生物特征验证解除布防状态,或者是用户通过用户终端向智能锁发送解锁布防指令,以解除智能锁的布防状态等。
在智能锁处于布防状态后,如果存在智能锁2710绑定的用户(例如,管理员、主人等)之外的非法人员从室内或者室外开锁等异常开锁行为,都可能会给室内财务带来风险。为了使得用户能够及时发现并处理异常开锁行为,在智能锁2710处于布防状态的情况下,如检测到撬锁,以及非法人员通过门内操作件、门外操作件或者其他转动锁体的异常开锁动作,智能锁2710还会通过智能锁内的摄像装置采集视频图像,将采集到的视频图像标记为异常情况图像。在一些实施例中,智能锁2710还可以向与智能锁2710绑定的用户终端2730发送报警消息。报警消息可以用于提示存在开锁动作。
在一些实施例中,在智能锁2710处于布防状态且检测到开锁动作后,智能锁采集图像并标记为异常情况图像,有利于后续及时获取并分析包含非法人员开锁的图像。在一些实施例中,在智能锁2710向智能锁绑定的用户终端2730发送报警消息之后,如果检测到用户终端2730发送的视频查看指令后,智能锁2710还可以建立智能锁2710与用户终端2730之间的视频直播通道。例如,智能锁2710可以通过服务器2740与用户终端2730上的应用建立视频直播通道等。相应的,智能锁2710可以通过视频直播通道将智能锁2710采集到的视频图像传输给用户终端2730。在一些实施例中,智能锁2710与用户终端2730建立视频直播通道的时长可以根据需要设定,如视频直播通道的维持时长可以为4秒、10秒、30秒、1分钟、5分钟等。
在一些实施例中,智能锁的门铃提醒系统也可以用于对保险柜、枪柜等进行布防。在一些实施例中,本系统可以在用户开启柜门后又在限定时间内关闭柜门的情况下,通过用户手动触发安全触发部件进行布防。在一些实施例中,本系统可以在用户开启柜门后又在限定时间内关闭柜门并上锁的情况下,自动进行布防。
在一些实施例中,本系统用于对保险柜、枪柜等进行布防的具体工作流程可以包括(下文以保险柜为例进行说明):
(1)检测用户开启智能保险柜的动作行为。
在一些实施例中,系统可以通过智能保险柜的至少一种传感器感应用户的动作行为,并获得到用户开启智能保险柜的动作行为。其中,用户开启智能保险柜的动作行为可以包括用户打开智能保险柜的柜门、锁件的开锁动作、用户的身体部分穿过柜框等动作中的一种或多种。
(2)响应于用户开启智能保险柜的动作行为,监测智能保险柜的安全触发部件的动作。
在一些实施例中,上述执行主体在检测到用户开启智能保险柜的动作行为后,会启动对安全触发部件的动作的监测,以便后续判断智能保险柜是否需要进入用于防范移动箱体、 敲打箱体、连续几次输错密码等预设动作的布防状态。
在一些情况中,安全触发部件可以为智能保险柜中设置的用于触发进入布防状态的布防操作件。其中,通过用户对布防操作件的操作动作可以表征出用户是否希望进入布防状态。
在一些情况下,安全触发部件还可以为智能保险柜的箱体外的把手或者是主锁体。可以理解的是,在用户关闭智能保险箱之后,通过箱体外的把手关闭保险柜或者其他方式控制锁体执行上锁动作,使得主锁体弹出,则说明目前用户已完成使用智能保险柜,在该种情况下,需要防范小偷等非法人员暴力开锁、偷窃智能保险柜。
在一些实施例中,安全触发部件可以为智能保险柜的识别装置。通过识别装置验证当前操作者的身份和/或权限,进行布防。例如,用户通过预定次数和/或频率敲打智能保险柜的外表面的某个区域,可以触发安全触发部件。又例如,用户通过设置在智能保险柜的外表面的指纹验证装置、人脸验证装置、声音识别装置等生物识别装置进行身份和/或权限验证,可以触发安全触发部件。
在一些情况中,检测安全触发部件的动作还可以是监测智能保险柜的用户终端发送的用于控制该安全触发部件的动作的控制指令。如,用户终端通过用户终端上智能保险柜相关的应用向智能保险柜发送触发安全触发部件的动作指令。
在一些实施例中,监测智能保险柜的安全触发部件的动作可以在用户关闭保险柜之前、用户关闭保险柜时和/或用户关闭保险柜之后执行。
(3)如检测到该安全触发部件的动作满足设定条件,控制智能保险柜处于布防状态。在一些实施例中,控制智能保险柜处于布防状态可以在用户关闭保险柜之后执行。
在一些实施例中,安全触发部件的动作所需满足的该设定条件是表征当前符合进入布防状态的条件,在实际应用中,根据安全触发部件的不同,该设定条件也会有所不同。
其中,在智能保险柜启动布防状态后,该智能保险柜可以定时或者实时对智能保险柜的锁体及相关部件进行监测,如监测到类似移动箱体等预设动作,则执行警报操作。
以预设动作为移动箱体为例,在本实施例中,智能保险柜检测移动箱体的方式可以包括如下几种情况中的一种或者多种:通过智能保险柜的传感器感应到箱体的晃动;通过智能保险柜柜脚的传感器感应到位置坐标发生变化;检测到移动箱体之外的其他移动操作。当然,智能保险柜确定存在移动箱体的方式还可以有其他可能情况,本申请对此不加限制。
在一些实施例中,布防提示方式可以为需要布防提示喇叭、布防提示显示屏等本地设备进行的方式。在一些实施例中,布防提示方式可以为短信提醒、APP内消息推送提醒等需要网络进行的方式。
在一些实施例中,智能保险柜在遇到暴力开锁、异物进入锁体等破坏锁的情况下会报警(如将警报发送给用户)。在一些实施例中,智能保险柜在连续输错几次密码、人脸识别未通过等密码输入不正确的情况下会报警(如将警报发送给用户)。在一些实施例中,智能保险柜在遇到敲打箱体、异物吸附箱体、箱体温度过高等破坏箱体的情况下会报警(如将警报发送给用户)。在一些实施例中,智能保险柜在遇到箱体发生位移、晃动箱体等移动箱体的情况下会报警(如将警报发送给用户)。在一些实施例中,智能保险柜的安防设备检测异常时会报警(如将警报发送给用户)。例如,摄像头检测到有人员在靠近会报警、红外检测到智能保险柜附近有人会报警(如将警报发送给用户)。在一些实施例中,智能保险柜还可以将警报发送给用户预设的联系人。在一些实施例中,智能保险柜还可以将警报发送给警务 人员。
本系统可以很好的保护智能保险柜。通过对智能保险柜的锁进行设置,防止通过破坏锁打开智能保险柜,增加了锁的可靠性和安全性。通过对智能保险柜的箱体进行设置,防止偷窃和/或破坏箱体,增加了箱体的智能性和安全性。此外,本系统还可以连接网络,若锁进入布防状态,还可调动箱体进入布防状态。整体增加了智能保险柜的可靠性、智能性和安全性,保护用户财产安全。用户在开启柜门后又在限定时间内关闭柜门,用户通过不上锁,可通过安全触发控件,手动进行布防。若用户上锁,则智能保险柜自动布防。此外,本系统还允许用户通过网络下发布防和撤防命令,这增加了用户使用的便利性,可以适用于多种应用场景。
本系统在布防之后,还可以随时手动或自动撤防。在一些实施例中,智能保险柜在打开柜门之后,即可自动撤防。在一些实施例中,智能保险柜在输入指定的密码后,即可手动撤防。例如,在密码输入区输入撤防的专用密码,即可在不打开柜门的情况下进行撤防。在一些实施例中,智能保险柜还可以通过接收用户终端发出的撤防指令,进行撤防。
图28是根据本申请的一些实施例所示的信息处理装置的示例性系统架构的示意图。
在一些实施例中,系统2800可以获取各种实体的声音和/或其它信息,并对获取的信息进行处理,例如,基于数据库和/或机器学习模型对信息进行处理,得到与实体对应的处理结果,并将处理结果推送至用户终端(例如,第一终端、第二终端、第三终端等)。
在一些实施例中,系统2800可以整体设置在某一设备上。例如,系统2800可以设置在一个用户终端(例如,手机)上,在用户终端上完成对声音和/或其它信息的获取、处理,并将处理结果推送到该用户终端或其他用户终端上。在一些实施例中,系统2800可以分开设置。例如,将在A城市获取的声音和/或其它信息通过网络传输到位于B城市的处理设备进行处理,再将处理结果通过网络传输到位于C城市的终端。
在一些实施例中,系统2800可以应用于根据设备和/或传感器的声音和/或其它信息识别哪个设备和/或传感器发出了警报。例如,系统2800可以应用于消防监控、车载设备监控、突发事件警报、行为监督等。在一些实施例中,系统2800可以应用于根据声音和/或其它信息识别声音的来源。例如,识别讲话的人是谁、识别演唱会中的乐器、识别歌曲的词曲等。为方便描述,下文以根据设备和/或传感器的声音和/或其它信息识别哪个设备和/或传感器发出了警报为例描述系统2800的应用。这并不旨在限定,系统2800可以应用于其它方面。
如图28所示,系统2800可以包括声音采集模块2801、声音处理模块2802和数据传输模块2803。在一些实施例中,声音采集模块2801、声音处理模块2802和数据传输模块2803可以依次连接。
在一些实施例中,系统2800还可以包括信息采集模块2804和信息处理模块2805。信息处理模块2805和信息采集模块2804之间以及与其他模块(如声音采集模块2801、声音处理模块2802或数据传输模块2803)之间可以具有信号连接(如电连接)。
在一些实施例中,声音采集模块2801可以包括麦克风、本地报警拾音器等设备,用于采集智能设备(例如,烟雾报警器、水灾报警器、可燃气体报警器以及智能门锁等)发出的声音。在一些实施例中,信息采集模块2804可以包括系统监视器,用于采集传感器(例如,温度传感器、可燃性气体浓度传感器、空气湿度传感器等)的状态信息。在一些实施例 中,信息采集模块2804可以用于采集智能设备(例如,烟雾报警器、火灾报警器、可燃气体报警器以及智能门锁等)的传感器的状态信息。在一些实施例中,信息采集模块2804可以是数据采集装置,用于采集物联网的网关中的数据信息。在一些实施例中,可以同时运行声音采集模块2502和信息采集模块2804,也可以只运行其中一个,可根据实际情况灵活选择,本申请在此不做限制。数据传输模块2803可以包括控制器等设备,数据传输模块2803可以是有线传输模块或无线传输模块,其中,无线传输模块可以是NFC(近场通信,Near Field Communication)、蓝牙
TM、ZigBee
TM、局域网、卫星等。
在一些实施例中,声音采集模块2801可以采集智能设备(例如,烟雾报警器、水灾报警器、可燃气体报警器等)的声音信号,如采集发出的警报声音。在一些实施例中,智能设备,例如,烟雾探测报警、入侵报警器等等,每种报警器都有各自规定的固定报警声音和频次,各种报警器发出的报警声音的分贝、频率等参数会存在差别,即每个报警器发出的声音都不一样,进而可根据报警声音等确认是哪个设备发出的什么报警。
在一些实施例中,信息采集模块2804可以通过数据传输模块2803与传感器和/或设备进行连接。在一些实施例中,信息采集模块2804可以通过数据传输模块2803采集传感器和/或设备的传感器的状态信息,例如,信息采集模块2804可以通过蓝牙与温度传感器进行连接,用于采集温度传感器的信息。
传感器能够探测、采集外界的信号、物理条件(如光、热、湿度)或化学组成(如烟雾),并能将探测、采集到的信息,按一定的规律变换为电信号或其他所需形式的状态信息,即每个传感器的状态信息不同,进而可根据传感器的状态信息确认是哪种类型的报警或哪个设备发出的什么报警。
在一些实施例中,信息采集模块2804可以采集物联网的网关数据信息,具有远程通信功能的设备和/或传感器通过物联网的网关与外界进行数据传输,而每个设备和/或传感器在网络上进行数据传输时都有一个唯一的标识符,所以对数据进行分析可得到哪个设备和/或传感器发出的什么报警。
在一些实施例中,信息采集模块2804可以实时采集信息。在一些实施例中,信息采集模块可以定时采集信息,例如,信息采集模块每隔10秒采集一次信息。在一些实施例中,信息采集模块可以基于大数据,在不同的时间不同的场景采取不同的采集信息频率,例如,在温度相对较低的冬天,人们都靠烧煤取暖,容易发生火灾和产生一氧化碳、二氧化硫等对人体有害的气体,则信息采集模块可以实时采集温度传感器的信息和有害气体传感器的信息,可以间隔采集甚至不采集湿度传感器的信息。
在一些实施例中,信息采集模块2804可以主动采集信息。在一些实施例中,信息采集模块可以被动接收来自设备和/或传感器的信息,例如,信息采集模块只设置有接收模块,可接收来自设备和/或传感器的信息。
声音处理模块2802可以得到与声音信号对应的声音分析结果;声音分析结果为智能设备的声音分析结果,并通过数据传输模块2803输出声音分析结果至一个或多个用户终端(例如,第一终端)。
声音是由振动产生的,不同的声音信号,其特征指标表现出来的值不同。通过对声音信号的分析,可以识别该声音的含义,从而使用户更容易明白声音代表的意义。在实际应用中,声音处理模块2802可以本地分析得到声音分析结果。具体的,解析声音信号,得到声音 信号的特征信息。声音信号的特征信息可以包括音色、音调、振动频率、时长等或其组合。在确定出声音信号的特征信息之后,通过声音处理模块2802内置的数据库中存储的不同的智能设备的音色、音调、振动频率和时长等信息,从该数据库中获取与分析得到的特征信息相应的智能设备,从而可以得到具体智能设备的声音分析结果,例如,声音分析结果可以是烟雾报警器报警了等等。
在一些实施例中,信息处理装置还包括第二终端。第二终端与数据传输模块2803连接。声音处理模块2802将声音信号发送至第二终端。第二终端得到声音信号对应的声音分析结果,并发送/反馈声音分析结果至声音处理模块2802。
在一些实施例中,信息处理模块2805可以对信息进行处理并将处理结果传送至一个或多个用户终端。在一些实施例中,信息处理模块2805可以通过匹配本地和/或云端的数据库以确定是哪个设备和/或传感器报的什么警报,并通过数据传输模块2803将处理结果输出至用户终端。例如,信息处理模块2805将信息采集模块2804获得的信息与本地和/或云端的数据库进行匹配,得到处理结果为可燃性气体浓度传感器发出了警报,并将处理结果传送至第一终端。在一些实施例中,信息处理模块2805可以通过机器学习模型以确定是哪个设备和/或传感器报的什么警报,并通过数据传输模块2803将结果输出至用户终端。例如,机器学习模型的输出结果为各种设备和/或传感器的各种警报的相似度,信息处理模块2805从中选出相似度值最高的作为结果,并将结果传送至用户终端。在一些实施例中,信息处理模块2805可以对来自声音处理模块2802的声音分析结果进行处理汇总,并将处理结果传送至用户终端。
在一些实施例中,信息处理模块2805可以将获得的信息,传送给用户终端。在一些实施例中,信息处理模块2805可以将来自信息收集模块的信息汇总至一起,推送给第一终端。在一些实施例中,信息处理模块可以对信息采集模块2804的信息进行汇总并处理,将处理结果传送给第一终端。例如,信息处理模块汇总的信息为烟雾传感器检测到烟雾浓度过高,温度传感器检测到温度为正常室温,则信息处理模块的处理结果可以为火势很小。在一些实施例中,信息处理模块2805可以将信息处理模块的处理结果和来自声音处理模块2802的声音分析结果汇总至一起,传送给用户终端。
此外,声音分析结果除了可以包括分析得到的智能设备的种类(本实施例中可以将其称为声音处理结果)之外,还可以包括该声音处理结果的推送方式以及推送对象(本实施例中是指第一终端)。推送方式是指采用何种方式进行推送,如无线、有线、移动信号(短信)、APP推送消息等等。推送对象是指确定该声音处理结果发送至哪一终端。本实施例中,可以基于预先获取的声音处理结果分别与推送方式、推送对象的对应关系,确定得到的该声音处理结果对应的推送方式以及推送对象。在一些实施例中,信息处理模块2805可以使用来自声音处理模块2802的声音分析结果中包括的推送方式和推送对象。在一些实施例中,信息处理模块2805可以仅保留来自声音处理模块2802的声音分析结果中的声音处理结果,信息处理模块2805可以确定新的推送方式和推送对象进行推送。
在一些实施例中,信息处理模块2805可以基于用户终端连接网络的状态,确定推送方式以及推送对象。在一些实施例中,信息处理模块2805可以基于数据传输模块2803获得第一终端连接网络的状态,确定推送方式以及推送对象。例如,信息处理模块2805通过数据传输模块2803检测到第一终端没有连接互联网,可以将第一终端确定为推送对象,确定的 推送方式可以是短信、蓝牙等无需通过互联网进行数据传输的方式;还可以将本地的社区保安室或者当地警局,即第三终端确定为推送对象,确定的推送方式可以是无线、有线、移动信号(短信)、APP推送消息等等。
在一些实施例中,信息处理模块2805可以基于信息处理结果的种类,确定推送方式以及推送对象。例如,信息处理模块2805可以将声音处理模块2802的声音处理结果进行分类,并基于分类结果确定推送方式以及推送对象。仅作为示例,信息处理模块2805可以获取声音处理模块2802的声音处理结果,并将声音处理结果分类为提示、警报。对于提示,可以将第一终端确定为推送对象,将短信、APP推送消息等不会对用户造成太大干扰的方式确定为推送方式;对于警报,可以将第一终端和第三终端确定为推送对象,为将损失降低,还可以将距离信息采集模块2804和/或第一终端在一定距离内的终端设备确定为推送对象,将无线、有线、移动信号(短信)、APP推送消息等确定为推送方式。本实施例中的声音分析结果可以包括上述的声音处理结果、推送方式以及推送对象,但是在对声音处理结果进行推送时,可以仅推送声音处理结果的内容,此外,还可以将推送方式以及推送对象的内容也进行推送。
上述实施例应用在能够从数据库中获取得到特征信息对应的智能设备的场景,在实际应用中,若在数据库保存的数据不全面,无法从数据库中获取得到特征信息对应的智能设备时,此时可以将接收到的声音和该声音对应的特征信息推送给用户终端(如上述的第一终端),以便用户通过用户终端了解设备的当前状态。在一些实施例中,可以人工远程控制与该设备相关的联动设备动作,如可以启动声音来源所在位置的摄像头拍摄画面或者是在设备是烟雾报警器时,控制窗户打开等等。
得到声音分析结果之后,处理器112可以通过数据传输模块2803输出至第一终端,第一终端就是用户的终端设备,如手机、平板、笔记本等设备。数据传输模块2803输出声音分析结果时,按照上述确定的推送方式进行推送即可。
在一些实施例中,系统2800还会与第三终端对接起来,如果住户没有及时处理这个报警消息,如在预设时间段内未通过数据传输模块2803接收到第一终端反馈的信息,处理设备112可以将该声音分析结果转发至第三终端,即用户不能及时处理报警消息时,也能有相关机构处理该紧急报警消息,以提升安全和保护用户财产免破坏。
在实际应用中,不管第一终端能否及时处理声音分析结果,声音处理模块2802可以控制与智能设备相关联的目标联动设备执行与智能设备相对应的目标动作,具体可以控制与智能设备相对应的报警消除设备动作,来防止危害进一步扩大。例如当家里的水灾报警器响起了,则自动切断家里的电源,以免引发另外的灾害。当烟雾报警器响起后,则控制将窗户打开等。此外,还可以是控制摄像装置采用智能设备的图像信息。例如,当窗户的防撬动报警响起的时候,用户的照相机camera全部处于警备状态,开始拍摄画面,并将图像视频发送给用户,有助于用户追查和了解具体状况。
本实施例通过一个带有收音功能的设备以始终在线always on的方式,始终保持接收其他传感器的预警或者报警声音,这个设备也是可以联网的设备,通过网络或者在本地解析该声音信号的含义,进而将其报警的含义传达给用户。用户即使是不在家的状态,也能通过互联网知道家里的报警状况,进而可以尽快处理紧急报警。在一些实施例中,设备还可以将声音信号发送至第二终端,如云端,以使第二终端解析该声音信号,得到特征信息,并确定 特征信息对应的声音分析结果。即可以实现“声音处理模块2802将声音信号发送至第二终端;第二终端得到声音信号对应的声音分析结果,并发送至声音处理模块2802”。
若第二终端处理声音信号,则控制与智能设备相关联的目标联动设备执行与智能设备相对应的目标动作也可以通过第二终端实现,具体过程参照声音处理模块2802的处理过程,在此不再赘述。
为了本领域技术人员能够更加清楚的了解本发明,现提供一个场景实施例进行举例说明。具体的,以智能设备为烟雾报警器为例,假设家中发生了火灾,烟雾浓度较大,超过了烟雾报警器的报警阈值,烟雾报警器发出了警示声音,此时本发明实施例中的信息处理装置中的声音采集模块2801可以采集到该警示声音,然后送至声音处理模块2802进行分析,分析得到声音处理结果是烟雾报警器,推送方式是短信,推送终端是用户的手机,此时会通过短信,将“家里的烟雾报警器报警了”的消息以短信发送至用户的手机,告诉用户家里可能发生火灾了,若是用户长时间不回复该短信,则说明用户可能没有看到该短信,此时可以将该短信发送至小区的治安人员,治安人员看到后,可以及时处理火灾。
需要注意的是,以上对于信息处理设备、模块及其单元的描述,仅为描述方便,并不能把本申请限制在所举实施例范围之内。可以理解,对于本领域的技术人员来说,在了解该系统的原理后,可能在不背离这一原理的情况下,对各个模块进行任意组合,或者构成子系统与其他模块连接。例如,声音采集模块2801和信息采集模块2804可以是一个信息处理设备的不同模块,也可以是同一个模块实现声音采集模块和信息采集模块的功能。声音处理模块2802和信息处理模块2805可以是信息处理设备的不同模块,也可以是一个模块实现上述的两个模块的功能。诸如此类的变形,均在本申请的保护范围之内。
在一些实施例中,在发送短信至用户的手机的同时,还可以查找出与烟雾报警器对应的目标联动设备,如摄像头和喷水装置,控制喷水装置喷水,以及控制摄像头拍摄室内的图像,此外,为了提高信息处理装置的智能化,可以是控制摄像头以不同的角度拍摄室内,然后从拍摄的图像中分析出着火位置,控制喷水装置向该着火位置喷水,以尽快的消除火灾。其中,摄像头采集的图像或者视频,可以实时发送至用户的手机,以使用户实时查看家里中的情况。
本实施例中,通过声音采集模块2801采集智能设备的声音信号,声音处理模块2802得到与声音信号对应的声音分析结果;数据传输模块2803输出声音分析结果至第一终端,声音分析结果就是智能设备发出声音的分析结果,也即哪一设备发出了报警,实现了用户了解报警声音的内容。另外,若用户未在智能设备所在的位置,则可以通过数据传输模块2803输出至用户的第一终端,使得用户及时了解声音分析结果,智能化程度较高,用户体验较好。
本发明实施例通过信息处理装置可以及时进行报警信号解析和声音分析结果输出。需要说明的是,本发明中的信息处理装置可以是独立的设备。也可以集成到现有的智能终端上,如集成到门锁,猫眼,智能音响设备上。另外,本发明实施例中的装置可以在用户原有的设备报警的基础上进行拾音,改造成本相对较低,不需要破坏原有的家居智能设备,可以做到完全的兼容和适配,用户不需要重新购买整套的智能设备来支撑本方案,用户的成本投入较少,可以做到资源复用。
现有的智能设备,如烟雾报警器、水灾报警器、可燃气体报警器以及智能门锁等等,仅安装本地智能设备,即当达到预警或报警条件的时候,就进行报警。如烟雾报警器检测烟 雾浓度,当浓度达到一定浓度时,进行报警。又或者,门锁在检测到异常人员时发出的警示声音,门锁低电量提示声音等,这种报警提示更多的是本地发出报警提示的声音,对于用户来说可能并不能确切知道发出的报警提示声音对应的具体内容,如仅听到了报警提示声音,但是该提示声音属于哪一智能设备不清楚。或者对于不在本地的用户来说,根本就无法接收到报警提示的声音。另外,要将本地智能设备改装成可以支持远程报警或提示的设备,会造成整体成本代价较高。
本申请提供的设备控制方法和系统,智能设备在达到预警或报警的情况下,通过设备内置的sensor感应器,能感知当前环境的状态,并根据环境状态的动态变化,产生预警或者报警。比如,智能设备,烟雾报警器,就可以通过内置的sensor检测到室内的烟雾浓度,根据烟雾浓度的变化,产生预警或者报警的声音提示。同时每种类型的报警提示(如烟雾报警、火警、淹水报警、防撬报警、门锁提示声等)声音也不相同。在此基础上,本发明实施例可以识别正在报警的智能设备的声音信号,对其声音信号进行分析,提取报警声音信号中所包含的报警内容含义。进而,通过APP或者其他方式与用户交互,如短信提示用户,同时也告知报警的内容。或者通过其他方式连接到当地最近的警局出警,在第一时间处理预警或者报警事件,以免酿成不可挽回的损失。
图29是根据本申请一些实施例所示的异常情况分析方法的示例性流程图。在一些实施例中,流程2900可以通过处理逻辑来执行,该处理逻辑可以包括硬件(例如,电路、专用逻辑、可编程逻辑、微代码等)、软件(运行在处理设备上以执行硬件模拟的指令)等,或其任意组合。图29所示的用于创建集合的一个或多个操作可以通过图1所示的设备控制系统100、图28所示的系统2800实现。例如,流程2900可以以指令的形式存储在存储设备中,并由处理设备112执行调用和/或执行。为了描述方便,流程2900以根据声音信号确定异常情况为例,说明根据设备和/或传感器的声音和/或其他信息确定异常情况的方法。
在步骤2910中,处理设备112可以采集信息。信息可以包括声音信号、光信号、电信号以及其他信息。在一些实施例中,步骤2910可以由系统2800中的声音采集模块2801执行。
在一些实施例中,声音信号可以包括任何实体的声音,例如,各种设备(例如,警报器)发出的声音、人说话的声音、乐器发出的声音等。在一些实施例中,声音信号可以是智能设备(例如,图1中的智能设备130)中的一个或多个部件发出的。例如,声音信号可以是智能门锁、烟雾报警器、噪声报警器、烟雾报警器、火灾报警器、可燃气体报警器等发出的警报声音。在一些实施例中,声音信号还可以包括设备的状态信息、网关信息、网络上的相关信息等。
在一些实施例中,声音信号可以由一个或多个声音信号拾取部件(例如,麦克风、本地报警拾音器等)拾取。处理设备112可以通过有线或者无线的方式从一个或多个声音拾取设备和/或存储设备(例如,智能设备130的存储设备)获取声音信号。一个或多个声音拾取部件可以是,例如,智能设备上的声音拾取部件,也可以是外部声音拾取部件。
在一些实施例中,处理设备112可以实时获取声音信号。在一些实施例中,处理设备112可以每间隔一定的时间(例如,10秒、20秒、30秒、1分钟等)获取一次声音信号。在一些实施例中,信号获取的时间间隔可以由用户设定,或由处理设备112根据实际情况设置或调整。例如,当处理设备112判断有异常发生,可以缩短信号获取的时间间隔。在一些实 施例中,信号获取的时间间隔可以由用户设定,或由处理设备112根据实际情况设置或调整。在一些实施例中,当处理设备112判断有异常发生,可以缩短或取消信号获取的时间间隔。例如,处理设备112可以基于大数据,在不同的时间不同的场景采取不同的采集信息频率。仅作为示例,在温度较低的冬天,人们都靠烧煤取暖,容易发生火灾和产生一氧化碳、二氧化硫等对人体有害的气体,则处理设备112可以实时采集温度传感器的声音信号和/或有害气体传感器的声音信号,可以间隔采集湿度传感器的声音信号。
在步骤2920中,处理设备112可以解析信息得到信息的特征。例如,处理设备112可以解析获取的声音信号,得到声音信号的特征信息。在一些实施例中,步骤2910可以由系统2800中的声音采集模块2801执行。
在一些实施例中,声音的信号的特征信息可以包括音色、音调、振动幅度、振动频率、时长、振幅等或其组合。在一些实施例中,处理设备112可以基于各种声音信号的特征提取技术从声音信号中提取声音信号的特征信息。示例性声音信号的特征信息提取技术可以包括梅尔级频率倒谱系数(Mel-Frequency Cepstral Coefficient,MFCC)、感知线性预测(Packet Level Protocol,PLP)、滤波器组等或其组合。
在步骤2930,处理设备112可以获取与特征信息相匹配的分析结果。例如,处理设备112可以获取与声音信号的特征信息相匹配的特征信息。步骤2930可以由系统2800中的声音处理模块2802执行。
在一些实施例中,处理设备112可以与,例如,声音处理模块2802内置的数据库中存储的不同的智能设备的声音信号的特征信息,从该数据库中获取与分析得到的特征信息相应的智能设备。
具体的,处理设备112可以是首先筛选出符合特征信息中的第一个信息的所有声音分析结果,然后从筛选得到的声音分析结果中获取得到符合第二个信息的所有声音分析结果……直至得到获取到同时满足该特征信息中的每一信息的声音分析结果。此外,处理设备还可以是对数据库进行遍历,找到与上述的特征信息完全匹配的声音分析结果。又或者,处理设备预先训练一个神经网络模型,该模型基于大量的特征信息样本(例如,正常情况样本、异常情况样本等)以及特征信息样本对应的声音分析结果训练得到,将上述的特征信息输入到该神经网络模型中,即可输出相应的声音分析结果。当然,本发明实施例也可以采用除上述方法之外的其他方法来实现“获取与特征信息相匹配的声音分析结果”,只要是能够实现获取与特征信息相匹配的声音分析结果的方法,均在本发明实施例的保护范围之内。
在一些实施例中,处理设备112可以得到具体智能设备的声音分析结果,例如,声音分析结果可以是烟雾报警器报警了等等。在一些实施例中,处理设备112可以通过匹配本地和/或云端的数据库以确定是哪个设备和/或传感器报的什么警报。例如,信息处理模块2805将信息采集模块2804获得的信息与本地和/或云端的数据库进行匹配,得到处理结果为可燃性气体浓度传感器发出了警报。在一些实施例中,处理设备112可以通过机器学习模型以确定是哪个设备和/或传感器报的什么警报。例如,机器学习模型的输出结果为各种设备和/或传感器的各种警报的相似度,处理设备112从中选出相似度值最高的作为结果。
在步骤2940中,处理设备112和/或用户可以根据分析结果,确定是否有异常情况。例如,处理设备112和/或用户可以根据声音分析结果,确定是否有异常情况。步骤2940可以由系统2800中的信息处理模块2805执行。
在一些实施例中,异常情况可以包括陌生人开门锁,室内和/或室外出现陌生人,无权限的用户控制设备,出现火灾、水灾、烟雾,对象(例如,监控的老人、儿童、宠物等出现意外)等或其组合。
在一些实施例中,处理设备112和/或用户可以根据分析结果,确定是否有异常情况。例如,当分析结果为火灾报警器发出的火灾警报,处理设备112和/或用户可以确定有异常情况。又例如,当分析结果为有陌生人在室内,处理设备112和/或用户可以确定有异常情况。
在一些实施例中,处理设备112和/或用户可以根据声音信号的特征信息,确定是否有异常情况存在。例如,处理设备112可以确定声音信号的频率是否大于频率阈值。当处理设备112和/或用户确定声音信号的频率大于频率阈值时,处理设备112和/或用户可以确定有异常情况。又例如,处理设备112和/或用户可以确定声音信号的振幅是否大于振幅阈值。当处理设备112和/或用户确定声音信号的振幅大于振幅阈值时,处理设备112和/或用户可以确定有异常情况。在一些实施例中,声音特征信息对应的阈值(例如,频率阈值、振幅阈值、时长阈值等)可以是预先确定的数值或者处理设备112和/或用户根据事情情况确定的数值。
需要注意的是,以上描述,仅为描述方便,并不能把本申请限制在所举实施例范围之内。可以理解,对于本领域的技术人员来说,在了解该系统的原理后,可以在不背离这一原理的情况下,对上述方法和系统进行形式和细节上的各种修正和改变。在一些实施例中,步骤2940可以从流程2900中省略。
在一些实施例中,流程2900可以包括一个或多个附加步骤。例如,在流程2900每个步骤之后,处理设备112可以将声音信号、声音信号放到的特征信息、声音分析结果和/或异常情况传送给一个或多个个用户终端。例如,在数据库保存的数据不全面,无法从数据库中获取得到特征信息对应的智能设备时,此时可以将接收到的声音和该声音对应的特征信息推送给用户终端(如上述的第一终端),以便用户通过用户终端了解设备的当前状态。
在一些实施例中,处理设备112可以分别将声音信号的特征信息、声音分析结果、异常情况等或其组合传送给一个或多个用户终端。
在一些实施例中,处理设备112可以获取一个或多个设备的声音信号,并将一个或多个设备的与特征信息相匹配的声音分析结果和/或根据分析结果确定的异常情况传送给一个或多个用户终端。声音分析结果可以包括声音处理结果、声音处理结果的推送方式以及声音处理结果的推送对象。例如,处理设备112可以分别将一个或多个设备的声音信号、特征信息、声音分析结果和/或确定的异常情况发送给一个或多个用户终端。又例如,处理设备112可以对一个或多个设备的声音分析结果进行处理汇总,并将处理结果传送给一个或多个终端。例如,处理设备112可以根据烟雾传感器检测到烟雾浓度过高,温度传感器检测到温度为正常室温,确定火势很小。
推送方式是指采用何种方式进行推送,如无线、有线、移动信号(短信)、APP推送消息等等。推送对象是指确定该声音处理结果发送至哪一终端,本实施例中,可以基于预先获取的声音处理结果分别与推送方式、推送对象的对应关系,确定得到的该声音处理结果对应的推送方式以及推送对象。
在一些实施例中,处理设备112可以基于第一终端连接网络的状态,确定推送方式以及推送对象。在一些实施例中,处理设备112可以根据用户终端的网络连接状态,确定推送 方式以及推送对象。例如,处理设备112确定第一终端没有连接互联网,可以将第一终端确定为推送对象,确定的推送方式可以是短信、蓝牙
TM、NFC等无需通过互联网进行数据传输的方式。在一些实施例中,处理设备112可以将第三终端(例如,本地的社区保安室、当地警局、物业管家等)确定为推送对象,推送方式可以包括无线、有线、移动信号(短信)、APP推送消息等等。
在一些实施例中,处理设备112可以基于声音分析结果的种类,确定推送方式以及推送对象。在一些实施例中,处理设备112可以将声音分析结果进行分类,并基于分类结果确定推送方式以及推送对象。例如,处理设备112可以将声音处理结果分类为提示、警报。对于提示,处理设备112可以将第一终端确定为推送对象,通过短信、APP等等不会对用户造成太大干扰的方式确定为推送方式。对于警报,处理设备112可以将第一终端和第三终端确定为推送对象,为将损失降低,还可以将距离信息采集模块2804和/或第一终端在一定距离内的终端设备确定为推送对象,将无线、有线、移动信号(短信)、APP推送消息等确定为推送方式。本实施例中的声音分析结果可以包括上述的声音处理结果、推送方式以及推送对象,但是在对声音处理结果进行推送时,可以仅推送声音处理结果的内容,此外,还可以将推送方式以及推送对象的内容也进行推送。
在一些实施例中,处理设备112还会与第三终端对接起来,如果住户没有及时处理这个报警消息,如在预设时间段内,处理设备112未接收到第一终端反馈的信息,此时会将该声音分析结果转发至第三终端,即用户不能及时处理报警消息时,也能有相关机构处理该紧急报警消息,以提升安全和保护用户财产免破坏。
在一些实施例中,信息采集模块2804可以采集系统2800与第一终端之间的距离。在一些实施例中,信息处理模块2805可以基于采集的距离信息,判断用户是否在附近。在一些实施例中,信息处理模块2805可以将采集的距离信息与预设的距离范围作比较,若采集的距离超过了预设的距离范围,则判断用户不在附近。
在一些实施例中,信息处理模块2805通过数据传输模块2803输出声音分析结果至第一终端,同时判断用户是否在附近,若用户在附近,则不将声音分析结果转发至第三终端,若用户不在附近,则将声音分析结果转发至第三终端。如此设置,当用户在附近时,用户可根据警报及时查看是否误报,并采取措施,为消防人员、警务人员等减小了工作量;当用户不在附近时,无论是否误报都及时通知消防人员、警务人员等,避免危险发生。
在一些实施例中,处理设备112或者用户可以一个或多个设备执行相应的操作。例如,处理设备112可以联动控制集合(例如,第一集合)中的设备(例如,第一设备)执行相应的操作。例如,当处理设备112确定有火灾出现时,处理设备112可以启动声音来源所在位置的摄像头拍摄画面、控制电源和/或煤气灶关闭。又例如,当处理设备112确定屋内的温度过高时,可以控制门锁打开、窗户打开等。
在一些实施例中,不管用户能否及时处理声音分析结果,处理设备112可以控制与智能设备相关联的目标联动设备执行与智能设备相对应的目标动作,具体可以控制与智能设备相对应的报警消除设备动作,来防止危害进一步扩大。例如当家里的水灾报警器响起了,则自动切断家里的电源,以免引发另外的灾害。当烟雾报警器响起后,则控制将窗户打开等。此外,还可以是控制摄像装置采用智能设备的图像信息。例如,当窗户的防撬动报警响起的时候,用户的摄像装置全部处于警备状态,开始拍摄画面,并将图像视频发送给用户, 有助于用户追查和了解具体状况。
为了本领域技术人员能够更加清楚的了解本发明,现提供一个场景实施例进行举例说明。具体的,以智能设备为烟雾报警器为例,假设家中发生了火灾,烟雾浓度较大,超过了烟雾报警器的报警阈值,烟雾报警器发出了警示声音,此时本发明实施例中的信息处理装置中的声音采集模块可以采集到该警示声音,然后送至声音处理模块进行分析,分析得到声音处理结果是烟雾报警器,推送方式是短信,推送终端是用户的手机,此时会通过短信,将“家里的烟雾报警器报警了”的消息以短信发送至用户的手机,告诉用户家里可能发生火灾了,若是用户一段时间(如3分钟、5分钟等)不回复该短信,则说明用户可能没有看到该短信,此时可以将该短信发送至小区的治安人员,治安人员看到后,可以及时处理火灾。
另外,在发送短信至用户的手机的同时,还可以查找出与烟雾报警器对应的目标联动设备,如摄像头和喷水装置,控制喷水装置喷水,以及控制摄像头拍摄室内的图像,此外,为了提高信息处理装置的智能化,可以是控制摄像头以不同的角度拍摄室内,然后从拍摄的图像中分析出着火位置,控制喷水装置向该着火位置喷水,以尽快的消除火灾。其中,摄像头采集的图像或者视频,可以实时发送至用户的手机,以使用户实时查看家里中的情况。
本实施例中,通过声音采集模块采集智能设备的声音信号,声音处理模块得到与声音信号对应的声音分析结果;数据传输模块输出声音分析结果至第一终端,声音分析结果就是智能设备发出的声音的分析结果,也即哪一设备发出了报警,实现了用户了解报警声音的内容。另外,若用户未在智能设备所在的位置,则可以通过数据传输模块输出至用户的第一终端,使得用户及时了解声音分析结果,智能化程度较高,用户体验较好。
本发明实施例可以及时进行报警信号解析和声音分析结果输出。另外,本发明实施例中的装置可以在用户原有的设备报警的基础上进行拾音,改造成本相对较低,不需要破坏原有的家居智能设备,可以做到完全的兼容和适配,用户不需要重新购买整套的智能设备来支撑本方案,用户的成本投入较少,可以做到资源复用。
图29中以声音信号为例描述了异常情况分析方法的过程。应当注意的是,上述描述仅仅是为了示例和说明,而不限定本申请的适用范围。对于本领域技术人员来说,在本申请的指导下可以对异常情况分析方法进行各种修正和改变。然而,这些修正和改变仍在本申请的范围之内。在一些实施例中,异常情况分析方法也可以基于其他种类的信号或信息执行。例如,异常情况分析方法也可以适用于光信号、电磁波信号、雷达信号等。
上文已对基本概念做了描述,显然,对于本领域技术人员来说,上述发明披露仅仅作为示例,而并不构成对本申请的限定。虽然此处并没有明确说明,本领域技术人员可能会对本申请进行各种修改、改进和修正。该类修改、改进和修正在本申请中被建议,所以该类修改、改进、修正仍属于本申请示范实施例的精神和范围。
同时,本申请使用了特定词语来描述本申请的实施例。如“一个实施例”、“一实施例”和/或“一些实施例”意指与本申请至少一个实施例相关的某一特征、结构或特点。因此,应强调并注意的是,本说明书中在不同位置两次或多次提及的“一实施例”或“一个实施例”或“一替代性实施例”并不一定是指同一实施例。此外,本申请的一个或多个实施例中的某些特征、结构或特点可以进行适当的组合。
此外,本领域技术人员可以理解,本申请的各方面可以通过若干具有可专利性的种类 或情况进行说明和描述,包括任何新的和有用的工序、机器、产品或物质的组合或对他们的任何新的和有用的改进。相应地,本申请的各个方面可以完全由硬件执行、可以完全由软件(包括固件、常驻软件、微码等)执行、也可以由硬件和软件组合执行。以上硬件或软件均可被称为“数据块”、“模块”、“引擎”、“单元”、“组件”或“系统”。此外,本申请的各方面可能表现为位于一个或多个计算机可读介质中的计算机产品,该产品包括计算机可读程序编码。
本申请中,关于设备控制方法和系统的描述旨在是说明性的,而不是限制本申请的范围。许多替代、修改和变化对本领域普通技术人员将是显而易见的。本文描述的示例性实施方式的特征、结构、方法和其它特征可以以各种方式组合以获取另外的和/或替代的示例性实施例。
此外,除非权利要求中明确说明,本申请处理元素和序列的顺序、数字字母的使用或其他名称的使用,并非用于限定本申请流程和方法的顺序。尽管上述披露中通过各种示例讨论了一些目前认为有用的发明实施例,但应当理解的是,该类细节仅起到说明的目的,附加的权利要求并不仅限于披露的实施例,相反,权利要求旨在覆盖所有符合本申请实施例实质和范围的修正和等价组合。例如,虽然以上所描述的系统组件可以通过硬件设备实现,但是也可以只通过软件的解决方案得以实现,如在现有的服务器或移动设备上安装所描述的系统。
同理,应当注意的是,为了简化本申请披露的表述,从而帮助对一个或多个发明实施例的理解,前文对本申请实施例的描述中,有时会将多种特征归并至一个实施例、附图或对其的描述中。但是,这种披露方法并不意味着本申请对象所需要的特征比权利要求中提及的特征多。实际上,实施例的特征要少于上述披露的单个实施例的全部特征。
一些实施例中使用了描述成分、属性数量的数字,应当理解的是,此类用于实施例描述的数字,在一些示例中使用了修饰词“大约”、“近似”或“大体上”等来修饰。除非另外说明,“大约”、“近似”或“大体上”表明数字允许有±20%的变化。相应地,在一些实施例中,说明书和权利要求中使用的数值数据均为近似值,该近似值根据个别实施例所需特点可以发生改变。在一些实施例中,数值数据应考虑规定的有效数位并采用一般位数保留的方法。尽管本申请一些实施例中用于确认其范围广度的数值域和数据为近似值,在具体实施例中,此类数值的设定在可行范围内尽可能精确。
Claims (20)
- 一种设备控制方法,其特征在于,包括:确定一个或多个集合,所述一个或多个集合具有对应的预设规则;根据第一设备的信息,将所述第一设备加入到所述一个或多个集合中的第一集合中;以及根据与所述第一集合对应的预设规则,控制所述第一集合中的所述第一设备执行相应的操作。
- 根据权利要求1所述的设备控制方法,其特征在于,进一步包括:接收管理指令;根据所述管理指令执行相应的管理操作,其中,所述管理指令用于指示对以下至少一项进行管理:集合、集合中的设备、集合中的设备所关联的用户账户。
- 根据权利要求1所述的设备控制方法,其特征在于,进一步包括:接收所述第一设备的分享请求,其中,所述分享请求中携带有所述第一设备的标识、所述第一设备对应的第一集合的标识和配置信息、所述第一设备对应的原始用户账户的设置信息;以所述第一设备对应的第一集合的标识作为集合标识,创建一个新的集合;其中,所述新的集合的配置信息被设置为所述第一集合的配置信息;在所述新的集合下添加所述第一设备,并对所述第一设备的控制权限进行设置,以使得所述控制权限符合所述第一设备对应的原始用户账户的设置信息的要求。
- 根据权利要求1所述的设备控制方法,其特征在于,进一步包括:获取用户用于控制所述第一设备的控制指令;验证所述控制指令是否满足预设条件以得到验证结果;以及根据所述验证结果、所述第一设备的状态和所述控制指令,确定是否控制所述第一设备执行与所述控制指令对应的操作。
- 根据权利要求4所述的设备控制方法,其特征在于,所述控制指令由所述用户通过第一终端发送;所述验证所述控制指令是否满足预设条件包括:验证所述第一终端是否具有执行与所述控制指令对应操作的权限。
- 根据权利要求4所述的设备控制方法,其特征在于,所述控制指令基于所述用户对所述第一设备上的操作部件的操作生成;所述验证所述控制指令是否满足预设条件包括:验证所述操作部件是否位于预设位置。
- 根据权利要求4所述的设备控制方法,其特征在于,所述控制指令用于控制所述第一设备的预设模式的开启和/或关闭。
- 根据权利要求7所述的设备控制方法,其特征在于,所述预设模式包括以下模式中的一种或几种:安全模式、勿扰模式、特定用户控制模式或用户自设定模式。
- 根据权利要求4所述的设备控制方法,其特征在于,进一步包括:在控制所述第一设备执行与所述控制指令对应的操作之后,通过图像采集装置所采集的图像判断是否出现预设场景;以及响应于出现所述预设场景,控制所述图像采集装置按照预设图像采集规则进行图像采集操作。
- 根据权利要求1所述的设备控制方法,其特征在于,所述第一设备包括智能锁,所述设备控制方法进一步包括:检测用户的开门动作行为或关门动作行为;响应于检测到所述开门动作行为或关门动作行为,监测所述门锁的触发部件的动作;以及响应于所述触发部件的动作满足预定条件,控制所述第一设备处于布防状态。
- 根据权利要求10所述的设备控制方法,其特征在于,所述检测用户的开门动作行为或关门动作行为包括:检测所述智能锁的门内操作件或门外操作件的动作,或者,通过传感器检测用户的开门动作行为或关门动作行为。
- 根据权利要求10所述的设备控制方法,其特征在于,所述监测所述门锁的触发部件的动作包括:监测所述门锁的门外操作件或者锁体的动作;所述响应于所述触发部件的动作满足预定条件,包括:检测到所述门锁的门外操作件或者锁体的上锁动作。
- 根据权利要求10所述的设备控制方法,其特征在于,所述响应于检测到所述开门动作行为或关门动作行为,监测所述门锁的触发部件的动作包括:响应于检测到所述用户的所述开门动作行为或关门动作行为,在设定时长内,监测所述门锁的所述触发部件的动作;所述响应于所述触发部件的动作满足预定条件,包括:在所述设定时长内检测到所述触发部件的动作满足设定条件。
- 根据权利要求10所述的设备控制方法,其特征在于,进一步包括:检测室内温度;判断所述室内温度是否超过温度阈值;以及响应于所述室内温度超过所述温度阈值,控制所述智能锁解锁。
- 根据权利要求1所述的设备控制方法,其特征在于,根据与所述第一集合对应的预设规则,控制所述第一集合中的所述第一设备执行相应的操作进一步包括:检测是否有异常情况;以及响应于检测到异常情况,根据与所述异常情况对应的预设规则,控制所述第一集合中的第一设备执行相应的操作。
- 根据权利要求15所述的设备控制方法,其特征在于,所述检测是否有异常情况包括:获取信息;解析所述信息,得到所述信息的特征;获取与所述特征相匹配的分析结果;根据所述分析结果确定是否有异常情况。
- 根据权利要求16所述的设备控制方法,其特征在于,还包括:响应于检测到异常情况,将所述异常情况发送给一个或多个终端。
- 根据权利要求16所述的设备控制方法,其特征在于,所述信息包括声音信号, 所述信息的特征包括所述声音信号的特征信息,所述特征信息包括以下中的一种或多种:音色、音调、振动幅度、振动频率和时长。
- 一种设备控制系统,其特征在于,包括:集合确定模块、设备确定模块和控制模块;所述集合确定模块用于确定一个或多个集合,所述一个或多个集合具有对应的预设规则;所述设备确定模块用于根据第一设备的信息,将所述第一设备加入到所述一个或多个集合中的第一集合中;和所述控制模块用于根据与所述第一集合对应的预设规则,控制所述第一集合中的所述第一设备执行相应的操作。
- 一种计算机可读存储介质,所述存储介质存储计算机指令,当计算机读取存储介质中的计算机指令后,计算机执行如权利要求1~18任一项所述的设备控制方法。
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP21812467.5A EP4141583A4 (en) | 2020-05-26 | 2021-05-26 | METHOD AND SYSTEM FOR APPARATUS CONTROL |
US18/058,861 US20230091394A1 (en) | 2020-05-26 | 2022-11-26 | Device control methods and systems |
Applications Claiming Priority (10)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010454856.1 | 2020-05-26 | ||
CN202010454856.1A CN113726617A (zh) | 2020-05-26 | 2020-05-26 | 用于控制设备的方法及相关装置、计算机可读介质 |
CN202021553185.6 | 2020-07-30 | ||
CN202010750449.5 | 2020-07-30 | ||
CN202010750449.5A CN114067843A (zh) | 2020-07-30 | 2020-07-30 | 信息处理装置和方法 |
CN202021553185.6U CN213042656U (zh) | 2020-07-30 | 2020-07-30 | 信息处理装置 |
CN202011624116.4A CN114764955A (zh) | 2020-12-31 | 2020-12-31 | 智能锁控制方法、装置、设备及存储介质 |
CN202011624116.4 | 2020-12-31 | ||
CN202011621279.7A CN114764954A (zh) | 2020-12-31 | 2020-12-31 | 智能锁控制方法及装置 |
CN202011621279.7 | 2020-12-31 |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US18/058,861 Continuation US20230091394A1 (en) | 2020-05-26 | 2022-11-26 | Device control methods and systems |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2021239015A1 true WO2021239015A1 (zh) | 2021-12-02 |
Family
ID=78745599
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2021/096186 WO2021239015A1 (zh) | 2020-05-26 | 2021-05-26 | 一种设备控制方法和系统 |
Country Status (3)
Country | Link |
---|---|
US (1) | US20230091394A1 (zh) |
EP (1) | EP4141583A4 (zh) |
WO (1) | WO2021239015A1 (zh) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114866269A (zh) * | 2022-03-09 | 2022-08-05 | 上海纽盾科技股份有限公司 | 网络安全监测方法、系统及应用 |
CN115499265A (zh) * | 2022-11-18 | 2022-12-20 | 杭州涂鸦信息技术有限公司 | 一种物联网的设备控制方法、装置、设备和存储介质 |
WO2024125284A1 (zh) * | 2022-12-12 | 2024-06-20 | 中兴通讯股份有限公司 | 一种规则引擎的级联触发方法、装置、电子设备及介质 |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP7516515B2 (ja) * | 2020-06-10 | 2024-07-16 | マクセル株式会社 | 見守り監視装置および見守り監視方法 |
CN118230453B (zh) * | 2024-05-22 | 2024-08-16 | 深圳市久通物联科技股份有限公司 | 一种集装箱门锁远程控制方法及装置 |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140229752A1 (en) * | 2013-02-08 | 2014-08-14 | Samsung Electronics Co., Ltd. | User device and operation method thereof |
US20170039844A1 (en) * | 2014-12-30 | 2017-02-09 | Google Inc. | Automatic security system mode selection |
CN109150672A (zh) * | 2017-06-13 | 2019-01-04 | 美的智慧家居科技有限公司 | 智能家居的配置方法、装置、系统及机器可读存储介质 |
CN109471371A (zh) * | 2018-12-27 | 2019-03-15 | 武汉职业技术学院 | 一种基于Zigbee的智能家居控制系统 |
CN109828544A (zh) * | 2019-02-15 | 2019-05-31 | 广州视声智能科技有限公司 | 一种基于蓝牙mesh的智能家居控制系统及其配置方法 |
CN110519738A (zh) * | 2019-08-30 | 2019-11-29 | 青岛海信智慧家居系统股份有限公司 | 一种ZigBee终端设备的多功能确定的方法及装置 |
CN213042656U (zh) * | 2020-07-30 | 2021-04-23 | 云丁网络技术(北京)有限公司 | 信息处理装置 |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9064394B1 (en) * | 2011-06-22 | 2015-06-23 | Alarm.Com Incorporated | Virtual sensors |
US9640055B2 (en) * | 2012-09-21 | 2017-05-02 | Google Inc. | Interacting with a detected visitor at an entryway to a smart-home |
-
2021
- 2021-05-26 EP EP21812467.5A patent/EP4141583A4/en not_active Withdrawn
- 2021-05-26 WO PCT/CN2021/096186 patent/WO2021239015A1/zh unknown
-
2022
- 2022-11-26 US US18/058,861 patent/US20230091394A1/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140229752A1 (en) * | 2013-02-08 | 2014-08-14 | Samsung Electronics Co., Ltd. | User device and operation method thereof |
US20170039844A1 (en) * | 2014-12-30 | 2017-02-09 | Google Inc. | Automatic security system mode selection |
CN109150672A (zh) * | 2017-06-13 | 2019-01-04 | 美的智慧家居科技有限公司 | 智能家居的配置方法、装置、系统及机器可读存储介质 |
CN109471371A (zh) * | 2018-12-27 | 2019-03-15 | 武汉职业技术学院 | 一种基于Zigbee的智能家居控制系统 |
CN109828544A (zh) * | 2019-02-15 | 2019-05-31 | 广州视声智能科技有限公司 | 一种基于蓝牙mesh的智能家居控制系统及其配置方法 |
CN110519738A (zh) * | 2019-08-30 | 2019-11-29 | 青岛海信智慧家居系统股份有限公司 | 一种ZigBee终端设备的多功能确定的方法及装置 |
CN213042656U (zh) * | 2020-07-30 | 2021-04-23 | 云丁网络技术(北京)有限公司 | 信息处理装置 |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114866269A (zh) * | 2022-03-09 | 2022-08-05 | 上海纽盾科技股份有限公司 | 网络安全监测方法、系统及应用 |
CN114866269B (zh) * | 2022-03-09 | 2023-05-02 | 上海纽盾科技股份有限公司 | 网络安全监测方法、系统及应用 |
CN115499265A (zh) * | 2022-11-18 | 2022-12-20 | 杭州涂鸦信息技术有限公司 | 一种物联网的设备控制方法、装置、设备和存储介质 |
CN115499265B (zh) * | 2022-11-18 | 2023-03-10 | 杭州涂鸦信息技术有限公司 | 一种物联网的设备控制方法、装置、设备和存储介质 |
WO2024125284A1 (zh) * | 2022-12-12 | 2024-06-20 | 中兴通讯股份有限公司 | 一种规则引擎的级联触发方法、装置、电子设备及介质 |
Also Published As
Publication number | Publication date |
---|---|
EP4141583A4 (en) | 2023-11-01 |
EP4141583A1 (en) | 2023-03-01 |
US20230091394A1 (en) | 2023-03-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2021239015A1 (zh) | 一种设备控制方法和系统 | |
US20240071204A1 (en) | Security System | |
US10917618B2 (en) | Providing status information for secondary devices with video footage from audio/video recording and communication devices | |
US10147308B2 (en) | Method and system for consolidating events across sensors | |
CA2902332C (en) | Methods for using an image capture device integrated at a building entry with an automation control panel, and systems and devices related thereto | |
US20220301401A1 (en) | Control access utilizing video analytics | |
AU2018312581B2 (en) | Supervising property access with portable camera | |
US8559914B2 (en) | Interactive personal surveillance and security (IPSS) system | |
US20070182543A1 (en) | Intelligent Home Security System | |
US20170132888A1 (en) | Intruder detection devices, methods and systems | |
US20060007005A1 (en) | Communication device | |
CN109789848A (zh) | 车辆安全系统 | |
US20120092163A1 (en) | Intruder detection and interdiction system and methods for using the same | |
CN201749536U (zh) | 电子智能防盗系统 | |
WO2020096969A1 (en) | System and apparatus for a home security system | |
CN108600202A (zh) | 一种信息处理方法及装置、计算机可读存储介质 | |
CN111784889A (zh) | 一种门禁管理系统 | |
WO2023280273A1 (zh) | 一种控制方法和系统 | |
CN111119597A (zh) | 一种安全锁舌的控制方法以及装置 | |
CN104670154A (zh) | 汽车监控装置、系统和方法 | |
CN105335629A (zh) | 一种基于传感器技术并结合智能穿戴设备的移动设备实时防护方法 | |
US20180244240A1 (en) | Vehicle security system | |
CN112863117A (zh) | 一种基于云计算大数据的校园安全防护系统 | |
WO2024068032A1 (en) | Security installations and methods | |
CN117730524A (zh) | 一种控制方法和系统 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 21812467 Country of ref document: EP Kind code of ref document: A1 |
|
ENP | Entry into the national phase |
Ref document number: 2021812467 Country of ref document: EP Effective date: 20221125 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |