WO2023207114A1 - 监控方法、监控装置、空调及电子设备 - Google Patents

监控方法、监控装置、空调及电子设备 Download PDF

Info

Publication number
WO2023207114A1
WO2023207114A1 PCT/CN2022/137529 CN2022137529W WO2023207114A1 WO 2023207114 A1 WO2023207114 A1 WO 2023207114A1 CN 2022137529 W CN2022137529 W CN 2022137529W WO 2023207114 A1 WO2023207114 A1 WO 2023207114A1
Authority
WO
WIPO (PCT)
Prior art keywords
target
monitoring
target object
file
door lock
Prior art date
Application number
PCT/CN2022/137529
Other languages
English (en)
French (fr)
Inventor
丁振华
高保华
李朋
谢琳琳
Original Assignee
青岛海尔空调器有限总公司
青岛海尔空调电子有限公司
海尔智家股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 青岛海尔空调器有限总公司, 青岛海尔空调电子有限公司, 海尔智家股份有限公司 filed Critical 青岛海尔空调器有限总公司
Publication of WO2023207114A1 publication Critical patent/WO2023207114A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V10/00Arrangements for image or video recognition or understanding
    • G06V10/70Arrangements for image or video recognition or understanding using pattern recognition or machine learning
    • G06V10/74Image or video pattern matching; Proximity measures in feature spaces
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/16Human faces, e.g. facial parts, sketches or expressions
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/16Actuation by interference with mechanical vibrations in air or other fluid
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/19Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using infrared-radiation detection systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N7/00Television systems
    • H04N7/18Closed-circuit television [CCTV] systems, i.e. systems in which the video signal is not broadcast

Definitions

  • This application relates to the field of security technology, and in particular to a monitoring method, monitoring device, air conditioner and electronic equipment.
  • the position of door locks can be monitored through devices such as smart security surveillance cameras, which can not only have a certain deterrent effect on abnormal intrusion behaviors, but also record abnormal intrusion behaviors.
  • This application provides a monitoring method, monitoring device, air conditioner and electronic equipment to solve the time-consuming and labor-intensive defect of monitoring data screening in the prior art, and achieve the effect of improving the screening efficiency of monitoring data.
  • This application provides a monitoring method, including:
  • the method after sending the first target monitoring file in the first target area to the first target object, the method further includes:
  • alarm information is sent to the networked alarm system and the first target monitoring file is stored.
  • a monitoring method after monitoring the status information of the door lock, it also includes:
  • the third target time period is obtained.
  • the second target monitoring file in the second target area where N is a positive integer;
  • the second target monitoring file is sent to the first target object, and the door lock is switched to a closed state.
  • the method further includes:
  • the method further includes:
  • determining the matching degree between the second target object in the second target area and the preset target object based on the second target monitoring file includes:
  • the similarity between the target face image and the face image of the preset target object is determined as the matching degree.
  • the method further includes:
  • the target face image is not determined, determine the target outline of the second target object based on the target image;
  • the similarity between the target outline and the outline of the preset target object is determined as the matching degree.
  • This application also provides a monitoring device, including:
  • a monitoring module used to monitor the status information of the door lock.
  • the status information includes the open state, the closed state and the unlocked state;
  • the first processing module is used to monitor the door lock switching from the closed state to the unlocked state, and then from the unlocked state to the closed state for the Mth time within the first target time period. , sending the first target monitoring file in the first target area to the first target object; where M is an integer greater than 1;
  • a second processing module configured to determine that the first target input information includes alarm information when the first target input information of the first target object is received within the second target time period;
  • the third processing module is used to send alarm information to the networked alarm system and store the first target monitoring file.
  • the application also provides an air conditioner, including an indoor unit, an outdoor unit, a processor and a memory provided in the indoor unit or outdoor unit; and a program stored on the memory and executable on the processor. or instructions. When the programs or instructions are executed by the processor, any one of the above monitoring methods is implemented.
  • This application also provides an electronic device, including a memory, a processor, and a computer program stored in the memory and executable on the processor.
  • the processor executes the program, it implements any of the above monitoring methods.
  • This application also provides a non-transitory computer-readable storage medium on which a computer program is stored.
  • a computer program is stored on which a computer program is stored.
  • the present application also provides a computer program product, which includes a computer program.
  • a computer program product which includes a computer program.
  • the computer program When executed by a processor, it implements any one of the above monitoring methods.
  • the monitoring method, monitoring device, air conditioner and electronic equipment provided by this application can automatically determine the abnormal state of the monitoring area based on the status of the door lock by monitoring the status information of the door lock in real time and send the corresponding monitoring file to the user for security purposes. Determination, it is convenient for users to make alarms and directly obtain monitoring files, which improves the efficiency of filtering monitoring files and improves user experience.
  • FIG. 1 is a schematic flow chart of the monitoring method provided by this application.
  • FIG. 2 is a schematic structural diagram of the monitoring device provided by this application.
  • Figure 3 is a schematic structural diagram of an electronic device provided by this application.
  • the execution subject of the monitoring method in the embodiment of the present application may be a controller. In some embodiments, the execution subject may also be a server. The execution subject of the monitoring method in the embodiment of the present application is not limited here. The following describes the monitoring method of the embodiment of the present application with the controller as the execution subject.
  • the monitoring method in the embodiment of the present application mainly includes step 110, step 120, step 130 and step 140.
  • Step 110 Monitor the status information of the door lock.
  • the status information of the door lock includes an open state, a closed state and an unlocked state.
  • the smart door lock and the controller can be communicatively connected.
  • Smart door locks can automatically determine status information.
  • the controller can obtain status information in real time for monitoring.
  • a sensor can be set at the door lock position to monitor the status information of the door lock, and the controller can determine the status information of the door lock by reading the data from the sensor.
  • infrared sensors and vibration sensors can be installed in the keyhole.
  • Step 120 When it is monitored for the Mth time that the door lock switches from the closed state to the unlocked state, and then from the unlocked state to the closed state within the first target time period, send the first target object in the first target area to the first target object.
  • a target monitoring file
  • the door lock switches from the closed state to the unlocked state, and then switches from the unlocked state to the closed state. In this case, it can be determined that the door lock was tried to be opened but failed, and there may be abnormal unlocking behavior.
  • M is set to an integer greater than 1.
  • the first target monitoring file in the first target area is sent to the first target object.
  • the first target object may be a user who has been granted permission in advance to identify and judge abnormal intrusion behavior.
  • the first target area is the area at the door lock position. When the door lock is opened, the unlocker is located in the target area.
  • the abnormal status information of the door lock can be monitored within the first target time period.
  • the length of the first target time period can be set to a fixed value, such as 30 minutes or 40 minutes.
  • the length of the first target time period can also be automatically determined based on the actual situation.
  • the length of the first target time period is No restrictions.
  • the first target surveillance file may be a surveillance video file or a surveillance image file.
  • the first target surveillance files can be obtained through surveillance cameras or terminals with surveillance functions.
  • the surveillance camera can be connected to the controller through communication, and the surveillance camera can be installed at a suitable location according to actual needs to monitor the first target area.
  • the monitoring files of the surveillance camera within the first target time period can be directly extracted to obtain the first target monitoring file containing the monitoring of the abnormal intrusion behavior.
  • the first target monitoring file can be sent to the first target object.
  • the first target monitoring file can be sent to the smart terminal of the first target object through email, application, etc.
  • the first target object can review the received first target monitoring file to further determine the security of the abnormal intrusion behavior in the first target monitoring file.
  • abnormal intrusion behavior may be a behavior in which the user fails to unlock normally, a behavior in which the user interrupts unlocking when unlocking, or a behavior in which the door lock fails to unlock abnormally.
  • the first target object can determine the automatically determined abnormal intrusion behavior as safe by reviewing the first target monitoring file, thereby eliminating the need to issue an alarm.
  • the abnormal intrusion behavior may be the behavior of a stranger who fails to unlock the door.
  • the first target object can determine the automatically determined abnormal intrusion behavior as unsafe by reviewing the first target monitoring file, and then call the police.
  • Step 130 When the first target input information of the first target object is received within the second target time period, determine that the first target input information includes alarm information.
  • the second target time period may be a time period of fixed length, and the length of the second target time period may be 60 minutes, 90 minutes, 120 minutes, or 180 minutes, etc.
  • the length of the second target time period is not limited here.
  • the first target object can input the first target input information through the smart terminal.
  • the input method of the first target input information includes but is not limited to touch input, voice input, physical key input, etc.
  • a control for selecting whether it is safe or not may automatically pop up on the display screen of the mobile phone.
  • the controls may include "safe controls” or "unsafe controls", and the first target object can determine the input content of the first target input information after clicking the corresponding control.
  • the first target input information includes alarm information.
  • the first target input information is used to confirm that the automatically determined abnormal intrusion behavior is unsafe.
  • Step 140 Send alarm information to the networked alarm system and store the first target monitoring file.
  • the alarm information is sent to the networked alarm system and the first target monitoring file is stored.
  • the networked alarm system is an automatic alarm reception and alarm platform.
  • the networked alarm system can be an alarm management platform built by the operator in the monitoring center.
  • the networked alarm system communicates with the networked alarms and detection equipment of merchants and home users who install the anti-theft alarm system.
  • the networked alarm system can transmit the alarm information detected by these scattered alarms to the management platform through various transmission methods through the networked alarm software.
  • the central platform will handle the alarm situation in a unified manner, and the operator's operation system will conduct real-time monitoring of the alarm situation. processing to reduce losses and facilitate traceability.
  • the networked alarm system receives alarm information, it can issue an alarm in time.
  • the first target monitoring file can be stored when the first target input information includes alarm information.
  • the first target monitoring file can be stored locally or in a cloud server.
  • the storage address of the first target monitoring file is not limited here.
  • the stored first target monitoring file can be directly retrieved. There is no need to manually search and retrieve monitoring files among a large number of complicated monitoring files, which improves the efficiency of screening and improves the user experience.
  • the abnormal status of the monitoring area can be automatically determined according to the status of the door lock and the corresponding monitoring file can be sent to the user for safety determination, which facilitates the user.
  • Alarm and directly obtain monitoring files which improves the efficiency of filtering monitoring files and improves user experience.
  • the step of sending the first target monitoring file in the first target area to the first target object further includes: not receiving the first target input of the first target object within the second target time period.
  • the alarm information is sent to the networked alarm system and the target monitoring file is stored.
  • the first target object may be busy or unable to check the smart terminal in time, and may not make a timely judgment on the automatically determined abnormal intrusion behavior.
  • alarm information can be automatically sent to the networked alarm system and the target monitoring file can be stored.
  • step 110 monitoring the status information of the door lock, it also includes: monitoring the door lock switching from the closed state to the unlocked state for the Nth time within the first target time period, and then switching from the unlocked state to the open state. In the case of status, obtain the second target monitoring file in the second target area within the third target time period.
  • N is a positive integer. In this case, it can be determined that the door lock has been opened by monitoring the status information of the door lock.
  • the door lock can be opened by a trusted user, or the door lock can be opened by an abnormal intruder.
  • the starting point of the third target time period may be the moment when the open state of the door lock is monitored.
  • the length of the third target time period may be a fixed length, such as 30 minutes or 40 minutes.
  • the length of the third target time period may also be automatically determined based on the actual situation. There is no limit to the length of the third target time period here.
  • the second target area is the indoor area after the door lock is opened or other areas isolated by doors.
  • the second target area may be the area where the living room is located.
  • the second target surveillance file may be a surveillance video file or a surveillance image file.
  • the second target surveillance file can be obtained through a surveillance camera or a terminal with surveillance functions.
  • the surveillance camera can be connected to the controller through communication, and the surveillance camera can be installed at a suitable location according to actual needs to monitor the first target area.
  • the surveillance camera may be installed on the indoor unit of the air conditioner.
  • the second target surveillance file obtained by surveillance cameras can be obtained.
  • the matching degree between the second target object and the preset target object in the second target area can be determined based on the second target monitoring file.
  • the second target object is a person identified by monitoring in the second target area within the third target time period.
  • the matching degree between the second target object and the preset target object can be determined by automatically identifying the second target object that opens the door lock and enters the second target area.
  • the preset target object may be a person who has the authority to open the door lock and is set in advance, or the preset target object may be a person who is not a threat and is set in advance.
  • determining the matching degree between the second target object and the preset target object in the second target area includes the following implementation process.
  • the target image containing the second target object can be determined based on the second target monitoring file.
  • the video frames of the second target surveillance file can be filtered to obtain image frames containing people, and the image frames containing people can be extracted to obtain target images containing the second target object.
  • face recognition is performed on the target image to determine the target face image.
  • face recognition is performed on the target image, the target image containing the face image is filtered out from the target image, and the target face image is extracted.
  • the second target surveillance file is first identified and filtered to obtain a target image containing a person, and then face recognition is performed on the target image to determine the target face image.
  • the target face image can be directly used as the face image of the second target object.
  • the similarity between the target face image and the face image of the preset target object is determined as the matching degree.
  • the face image of the preset target object can be entered in advance, so that the similarity between the target face image and the face image of the preset target object can be calculated through the face recognition algorithm.
  • features can be extracted from the target face image and the face image of the preset target object, and the Euclidean distance or cosine distance of the features can be calculated.
  • the calculated Euclidean distance or cosine distance can be directly used as the similarity, that is, the matching degree between the second target object and the preset target object.
  • the identity of the second target object can be accurately determined by recognizing the face image, which improves the security of monitoring.
  • the step further includes: in the case where the target face image is not determined, determining the second target based on the target image.
  • the target outline of the object is not determined.
  • the target outline of the second target object is modified. Identify.
  • the similarity between the target outline and the outline of the preset target object may be determined as the matching degree.
  • the target contour of the second target object can be determined based on the target recognition algorithm.
  • special calibration points in the target contour can be identified, and the distance ratio between each calibration point can be determined.
  • the ratio of the length of the arm or leg to the height can be determined, and then compared with the outline of the preset target object in a unified monitoring scene, the similarity between the target outline and the outline of the preset target object can be determined, and then the third target can be determined. 2.
  • the face image cannot be recognized, which improves the compatibility of surveillance recognition and the high fault tolerance of the application, which is beneficial to improving surveillance security.
  • the door lock is switched to the closed state.
  • the first preset value is a constant set in advance, and different first preset values can be set for different matching degree calculation methods.
  • the matching degree is less than the first preset value, it can be determined that the second target object is an abnormal intruder.
  • the second target monitoring file can be sent to the first target object and the door lock can be controlled to close.
  • the door lock in this case is a smart door lock, which can automatically lock the door when it is closed.
  • the abnormal intruder can be locked in the second target area so that relevant measures can be taken in time.
  • the monitoring method of the embodiment of the present application by calculating the matching degree between the second target object and the preset target object, and determining the identity of the second target object based on the matching degree and taking corresponding measures, such as sending monitoring files and other measures, It can effectively improve the security of monitoring.
  • the monitoring method of the embodiment of the present application further includes: When the second target input information of the first target object is received within the time period, it is determined that the second target input information includes alarm information.
  • the first target object can input the second target input information through the smart terminal.
  • the input method of the second target input information includes but is not limited to touch input, voice input, physical key input, etc.
  • a control for selecting whether it is safe or not can automatically pop up on the display screen of the mobile phone.
  • the controls may include "safe controls” or "unsafe controls", and the first target object can determine the input content of the second target input information after clicking the corresponding control.
  • the second target input information includes alarm information.
  • the second target input information is used to confirm that the automatically determined abnormal intrusion behavior is unsafe.
  • alarm information is sent to the networked alarm system and the second target monitoring file is stored.
  • the alarm information is sent to the networked alarm system and the second target monitoring file is stored.
  • the second target monitoring file can be stored when the input information of the second target includes alarm information.
  • the second target monitoring file can be stored locally or in a cloud server.
  • the storage address of the second target monitoring file is not limited here.
  • the stored second target monitoring file can be directly retrieved. There is no need to manually search and retrieve monitoring files among a large number of complicated monitoring files, which improves the efficiency of screening and improves the user experience.
  • the corresponding monitoring file can be sent to the user for security judgment, which facilitates the user to alarm and directly obtain the monitoring file, and improves the efficiency of filtering monitoring files. Efficiency and improved user experience.
  • the monitoring method of the embodiment of the present application further includes: If the second target input information of the first target object is not received within the time period, the alarm information is sent to the networked alarm system and the second target monitoring file is stored.
  • the first target object may be busy or unable to check the smart terminal in time, and may not make a timely judgment on the automatically determined abnormal intrusion behavior.
  • alarm information can be automatically sent to the networked alarm system and the target monitoring file can be stored.
  • the monitoring device provided by the present application will be described below.
  • the monitoring device described below and the monitoring method described above can be referenced correspondingly.
  • the monitoring device in the embodiment of the present application includes: a listening module 210, a first processing module 220, a second processing module 230, and a third processing module 240.
  • the monitoring module 210 is used to monitor the status information of the door lock.
  • the status information includes the open status, the closed status and the unlocked status;
  • the first processing module 220 is configured to send the first target to the first target object when the door lock is monitored for the Mth time during the first target time period and is switched from the closed state to the unlocked state, and then from the unlocked state to the closed state.
  • the first target monitoring file in the area; where M is an integer greater than 1;
  • the second processing module 230 is configured to determine that the first target input information includes alarm information when the first target input information of the first target object is received within the second target time period;
  • the third processing module 240 is used to send alarm information to the networked alarm system and store the first target monitoring file.
  • the abnormal status of the monitoring area can be automatically determined according to the status of the door lock and the corresponding monitoring file can be sent to the user for safety determination, which facilitates the user to issue an alarm. And directly obtain monitoring files, which improves the efficiency of filtering monitoring files and improves user experience.
  • the monitoring device of the embodiment of the present application further includes a fourth processing module.
  • the fourth processing module is used to process the first target input information of the first target object when the first target input information of the first target object is not received within the second target time period. Send alarm information to the networked alarm system and store the first target monitoring file.
  • the monitoring device of the embodiment of the present application also includes a fifth processing module.
  • the fifth processing module is used to detect when the door lock switches from the closed state to the unlocked state for the Nth time within the first target time period, and then from When the unlocking state is switched to the open state, obtain the second target monitoring file in the second target area within the third target time period; where N is a positive integer; based on the second target monitoring file, determine the second target monitoring file in the second target area.
  • the matching degree between the second target object and the preset target object when the matching degree is less than the first preset value, the second target monitoring file is sent to the first target object, and the door lock is switched to the closed state.
  • the fifth processing module is also configured to, when receiving the second target input information of the first target object within the second target time period, determine that the second target input information includes alarm information; and report the alarm information to the networked alarm system. Send alarm information and store the second target monitoring file.
  • the fifth processing module is also configured to send alarm information to the networked alarm system and store the second target monitoring when the second target input information of the first target object is not received within the second target time period. document.
  • the fifth processing module is also used to determine the target image containing the second target object based on the second target monitoring file; perform face recognition on the target image to determine the target face image; and convert the target face image to The similarity with the face image of the preset target object is determined as the matching degree.
  • the fifth processing module is also used to determine the target outline of the second target object based on the target face image when the target face image is not determined; and determine the similarity between the target outline and the outline of the preset target object.
  • the degree is determined as the degree of matching.
  • An embodiment of the present application also provides an air conditioner.
  • the air conditioner includes an indoor unit, an outdoor unit, a processor and a memory provided in the indoor unit or the outdoor unit; it also includes a program or instruction stored in the memory and executable on the processor. The above monitoring method is performed when the program or instruction is executed by the processor.
  • the abnormal status of the monitoring area can be automatically determined according to the status of the door lock and the corresponding monitoring file can be sent to the user for safety determination, which facilitates the user to alarm and Directly obtaining monitoring files improves the efficiency of filtering monitoring files and improves user experience.
  • Figure 3 illustrates a schematic diagram of the physical structure of an electronic device.
  • the electronic device may include: a processor (processor) 310, a communications interface (Communications Interface) 320, a memory (memory) 330 and a communication bus 340.
  • the processor 310, the communication interface 320, and the memory 330 complete communication with each other through the communication bus 340.
  • the processor 310 can call the logic instructions in the memory 330 to execute the monitoring method.
  • the method includes: monitoring the status information of the door lock, the status information includes the open status, the closed status and the unlocked status; the Mth time within the first target time period When the door lock is monitored to switch from the closed state to the unlocked state, and then from the unlocked state to the closed state, the first target monitoring file in the first target area is sent to the first target object; where M is an integer greater than 1 ; When the first target input information of the first target object is received within the second target time period, determine that the first target input information includes alarm information; send the alarm information to the networked alarm system and store the first target monitoring file.
  • the above-mentioned logical instructions in the memory 330 can be implemented in the form of software functional units and can be stored in a computer-readable storage medium when sold or used as an independent product.
  • the technical solution of the present application is essentially or the part that contributes to the existing technology or the part of the technical solution can be embodied in the form of a software product.
  • the computer software product is stored in a storage medium, including Several instructions are used to cause a computer device (which may be a personal computer, a server, or a network device, etc.) to execute all or part of the steps of the methods described in various embodiments of this application.
  • the aforementioned storage media include: U disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), magnetic disk or optical disk and other media that can store program code. .
  • the present application also provides a computer program product.
  • the computer program product includes a computer program.
  • the computer program can be stored on a non-transitory computer-readable storage medium.
  • the computer can Execute the monitoring method provided by each of the above methods.
  • the method includes: monitoring the status information of the door lock.
  • the status information includes the open state, the closed state and the unlocked state; monitoring the door lock from the closed state for the Mth time within the first target time period.
  • the first target monitoring file in the first target area is sent to the first target object; where M is an integer greater than 1; in the second target time period
  • the first target input information of the first target object is received, it is determined that the first target input information includes alarm information; the alarm information is sent to the networked alarm system and the first target monitoring file is stored.
  • the present application also provides a non-transitory computer-readable storage medium on which a computer program is stored.
  • the computer program is implemented when executed by the processor to perform the monitoring method provided by each of the above methods.
  • the method includes: monitoring.
  • the status information includes the open state, the closed state and the unlocked state; within the first target time period, it is monitored for the Mth time that the door lock switches from the closed state to the unlocked state, and then from the unlocked state to the closed state.
  • the device embodiments described above are only illustrative.
  • the units described as separate components may or may not be physically separated.
  • the components shown as units may or may not be physical units, that is, they may be located in One location, or it can be distributed across multiple network units. Some or all of the modules can be selected according to actual needs to achieve the purpose of the solution of this embodiment. Persons of ordinary skill in the art can understand and implement the method without any creative effort.
  • each embodiment can be implemented by software plus a necessary general hardware platform, and of course, it can also be implemented by hardware.
  • the computer software product can be stored in a computer-readable storage medium, such as ROM/RAM, magnetic disk, optical disk, etc., including a number of instructions to cause a computer device (which can be a personal computer, a server, or a network device, etc.) to execute the methods described in various embodiments or certain parts of the embodiments.

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Theoretical Computer Science (AREA)
  • Signal Processing (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Health & Medical Sciences (AREA)
  • Human Computer Interaction (AREA)
  • Oral & Maxillofacial Surgery (AREA)
  • Artificial Intelligence (AREA)
  • Computing Systems (AREA)
  • Databases & Information Systems (AREA)
  • Evolutionary Computation (AREA)
  • Medical Informatics (AREA)
  • Software Systems (AREA)
  • Air Conditioning Control Device (AREA)
  • Alarm Systems (AREA)

Abstract

本申请提供一种监控方法、监控装置、空调及电子设备,所述方法包括监听门锁的状态信息;在第一目标时间段内第M次监听到所述门锁由所述关闭状态切换到所述开锁状态,再由所述开锁状态切换至所述关闭状态的情况下,向第一目标对象发送第一目标区域内的第一目标监控文件;在第二目标时间段内接收到所述第一目标对象的第一目标输入信息的情况下,确定所述第一目标输入信息包括报警信息;向联网报警系统发送报警信息并存储所述第一目标监控文件。本申请提供的监控方法通过可以根据门锁的状态自动确定监控区域的异常状态并将对应的监控文件发送至用户进行安全性判定,方便用户直接获取监控文件,提高了筛选监控文件的效率,提升了用户体验。

Description

监控方法、监控装置、空调及电子设备
相关申请的交叉引用
本申请要求于2022年4月27日提交的申请号为202210456400.8,名称为“监控方法、监控装置、空调及电子设备”的中国专利申请的优先权,其通过引用方式全部并入本文。
技术领域
本申请涉及安防技术领域,尤其涉及一种监控方法、监控装置、空调及电子设备。
背景技术
随着科技的发展,防盗门的应用愈加广泛,防盗门配备的门锁的种类也愈加多样化。不管是纯机械式的门锁还是新型的密码锁、指纹锁等,都无法杜绝异常人群入侵室内的问题。
随着智能家居的不断普及,可以通过智能安防监控摄像头等设备来对门锁位置进行监控,既可以对异常入侵行为产生一定的威慑作用,还可以对异常入侵行为进行记录。
在发生异常入侵行为后,需要人工调取和筛选大量的历史监控文件来侦破异常入侵行为,费时费力,筛选效率较低。
发明内容
本申请提供一种监控方法、监控装置、空调及电子设备,用以解决现有技术中监控资料筛选费时费力的缺陷,实现提高监控资料的筛选效率的效果。
本申请提供一种监控方法,包括:
监听门锁的状态信息,所述状态信息包括开启状态、关闭状态和开锁状态;
在第一目标时间段内第M次监听到所述门锁由所述关闭状态切换到所述开锁状态,再由所述开锁状态切换至所述关闭状态的情况下,向第一目标对象发送第一目标区域内的第一目标监控文件;其中,M为大于1的 整数;
在第二目标时间段内接收到所述第一目标对象的第一目标输入信息的情况下,确定所述第一目标输入信息包括报警信息;
向联网报警系统发送报警信息并存储所述第一目标监控文件。
根据本申请提供的一种监控方法,所述向第一目标对象发送第一目标区域内的第一目标监控文件之后,还包括:
在第二目标时间段内未接收到所述第一目标对象的第一目标输入信息的情况下,向所述联网报警系统发送报警信息并存储所述第一目标监控文件。
根据本申请提供的一种监控方法,所述监听门锁的状态信息之后,还包括:
在第一目标时间段内第N次监听到所述门锁由所述关闭状态切换到所述开锁状态,再由所述开锁状态切换至所述开启状态的情况下,获取第三目标时间段内第二目标区域内的第二目标监控文件;其中,N为正整数;
基于所述第二目标监控文件,确定所述第二目标区域内第二目标对象与预设目标对象的匹配度;
在所述匹配度小于第一预设值的情况下,向所述第一目标对象发送所述第二目标监控文件,并将所述门锁切换为关闭状态。
根据本申请提供的一种监控方法,所述基于所述第二目标监控文件,确定所述第二目标区域内第二目标对象与预设目标对象的匹配度之后,还包括:
在第二目标时间段内接收到所述第一目标对象的第二目标输入信息的情况下,确定所述第二目标输入信息包括报警信息;
向所述联网报警系统发送报警信息并存储所述第二目标监控文件。
根据本申请提供的一种监控方法,所述基于所述第二目标监控文件,确定所述第二目标区域内第二目标对象与预设目标对象的匹配度之后,还包括:
在第二目标时间段内未接收到所述第一目标对象的第二目标输入信息的情况下,向所述联网报警系统发送报警信息并存储所述第二目标监控文件。
根据本申请提供的一种监控方法,所述基于所述第二目标监控文件,确定所述第二目标区域内第二目标对象与预设目标对象的匹配度,包括:
基于所述第二目标监控文件,确定包含所述第二目标对象的目标图像;
对所述目标图像进行人脸识别,确定出目标人脸图像;
将所述目标人脸图像与所述预设目标对象的人脸图像的相似度确定为所述匹配度。
根据本申请提供的一种监控方法,所述基于所述第二目标监控文件,确定包含所述第二目标对象的目标图像之后,还包括:
在未确定出所述目标人脸图像的情况下,基于所述目标图像,确定所述第二目标对象的目标轮廓;
将所述目标轮廓与所述预设目标对象的轮廓的相似度确定为所述匹配度。
本申请还提供一种监控装置,包括:
监听模块,用于监听门锁的状态信息,所述状态信息包括开启状态、关闭状态和开锁状态;
第一处理模块,用于在第一目标时间段内第M次监听到所述门锁由所述关闭状态切换到所述开锁状态,再由所述开锁状态切换至所述关闭状态的情况下,向第一目标对象发送第一目标区域内的第一目标监控文件;其中,M为大于1的整数;
第二处理模块,用于在第二目标时间段内接收到所述第一目标对象的第一目标输入信息的情况下,确定所述第一目标输入信息包括报警信息;
第三处理模块,用于向联网报警系统发送报警信息并存储所述第一目标监控文件。
本申请还提供一种空调,包括室内机、室外机和设置在所述室内机或室外机中的处理器和存储器;还包括存储在所述存储器上并可在所述处理器上运行的程序或指令,所述程序或指令被所述处理器执行时实现如上述任一种所述监控方法。
本申请还提供一种电子设备,包括存储器、处理器及存储在存储器上并可在处理器上运行的计算机程序,所述处理器执行所述程序时实现如上述任一种所述监控方法。
本申请还提供一种非暂态计算机可读存储介质,其上存储有计算机程序,该计算机程序被处理器执行时实现如上述任一种所述监控方法。
本申请还提供一种计算机程序产品,包括计算机程序,所述计算机程序被处理器执行时实现如上述任一种所述监控方法。
本申请提供的监控方法、监控装置、空调及电子设备,通过对门锁的状态信息进行实时监控,可以根据门锁的状态自动确定监控区域的异常状态并将对应的监控文件发送至用户进行安全性判定,方便用户进行报警并直接获取监控文件,提高了筛选监控文件的效率,提升了用户体验。
附图说明
为了更清楚地说明本申请或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作一简单地介绍,显而易见地,下面描述中的附图是本申请的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。
图1是本申请提供的监控方法的流程示意图;
图2是本申请提供的监控装置的结构示意图;
图3是本申请提供的电子设备的结构示意图。
具体实施方式
为使本申请的目的、技术方案和优点更加清楚,下面将结合本申请中的附图,对本申请中的技术方案进行清楚、完整地描述,显然,所描述的实施例是本申请一部分实施例,而不是全部的实施例。基于本申请中的实施例,本领域普通技术人员在没有作出创造性劳动前提下所获得的所有其他实施例,都属于本申请保护的范围。
下面结合图1-图3描述本申请的监控方法、监控装置、空调及电子设备。
本申请实施例的监控方法的执行主体可以是控制器,在一些实施例中,执行主体还可以是服务器,此处对本申请实施例的监控方法的执行主体不作限制。下面以控制器为执行主体来对本申请实施例的监控方法进行描述。
参照图1,本申请实施例的监控方法主要包括步骤110、步骤120、步骤130和步骤140。
步骤110,监听门锁的状态信息。
可以理解的是,门锁的状态信息包括开启状态、关闭状态和开锁状态。
在一些实施例中,对于智能门锁,智能门锁与控制器可以通讯连接。智能门锁可以自动确定状态信息。控制器可以实时获取状态信息来进行监听。
在另一些实施例中,对于不具有通讯功能的门锁,还可以在门锁位置设置传感器来监控门锁的状态信息,控制器可以通过读取传感器的数据来确定门锁的状态信息。
例如,可以在钥匙孔内设置红外传感器以及震动传感器等。
步骤120,在第一目标时间段内第M次监听到门锁由关闭状态切换到开锁状态,再由开锁状态切换至关闭状态的情况下,向第一目标对象发送第一目标区域内的第一目标监控文件。
门锁由关闭状态切换到开锁状态,再由开锁状态切换至关闭状态。在此种情况下,可以确定门锁被尝试打开,但打开失败,可能会存在异常开锁行为。
但是考虑到用户拿错钥匙、输错密码以及指纹识别误差较大等特殊情况,将M设置为大于1的整数。
在此种情况下,可以给用户容错的机会。因此,只有在第一目标时间段内第M次存在异常开锁行为时,才会将此种情况定义为异常入侵情况。
在确定为异常入侵的情况下,向第一目标对象发送第一目标区域内的第一目标监控文件。
可以理解的是,第一目标对象可以是提前授予识别判断异常入侵行为权限的用户。
第一目标区域为门锁位置处的区域,在进行门锁开启时,开锁人位于目标区域内。
第一目标时间段内可以监听到门锁的异常状态信息。第一目标时间段的长度可以设置为固定值,例如30分钟或者40分钟等,当然,第一目标时间段的长度还可以是根据实际情况自动确定的,此处对第一目标时间段的长度不作限制。
第一目标监控文件可以是监控视频文件或者监控图像文件。第一目标 监控文件可以通过监控摄像头或者具有监控功能的终端获取。
以监控摄像头为例,监控摄像头可以与控制器通讯连接,监控摄像头可以根据实际需要安装于合适的位置来对第一目标区域进行监控。
在确定为异常入侵的情况下,可以直接将监控摄像头在第一目标时间段内的监控文件进行提取,以获得包含对异常入侵行为进行监控的第一目标监控文件。
在获取到第一目标监控文件后,可以将第一目标监控文件发送至第一目标对象。具体地,可以通过邮件以及应用程序等方式将第一目标监控文件发送至第一目标对象的智能终端。
第一目标对象可以对接收到的第一目标监控文件进行审核,进一步确定第一目标监控文件中异常入侵行为的安全性。
例如,异常入侵行为可以是用户正常开锁失败的行为、用户开锁时中断开锁的行为、或者门锁异常开锁失败等行为。
在此种情况下,第一目标对象可以通过审核第一目标监控文件将自动确定的异常入侵行为确定为安全,进而无需进行报警。
又如,异常入侵行为可以是陌生人开锁失败的行为,在此种情况下,第一目标对象可以通过审核第一目标监控文件将自动确定的异常入侵行为确定为不安全,再进行报警。
步骤130,在第二目标时间段内接收到第一目标对象的第一目标输入信息的情况下,确定第一目标输入信息包括报警信息。
第二目标时间段可以是固定时间长度的时间段,第二目标时间段的长度可以是60分钟、90分钟、120分钟或者180分钟等,此处对第二目标时间段的长度不作限制。
可以理解的是,第一目标对象在接收并审核第一目标监控文件后,可以通过智能终端输入第一目标输入信息。
第一目标输入信息的输入方式包括但不限于触控输入、语音输入以及物理按键输入等。
例如,第一目标对象在手机的安防应用程序上查看第一目标监控文件后,手机的显示屏上可以自动弹出用于选择确定是否安全的控件。
控件可以包括“安全控件”或者“不安全控件”,第一目标对象在点 击对应的控件后可以确定第一目标输入信息的输入内容。
在接收到第一目标对象对“不安全控件”的点击操作后,可以确定出第一目标输入信息包括报警信息。
第一目标输入信息用于确认自动确定的异常入侵行为不安全。
步骤140,向联网报警系统发送报警信息并存储第一目标监控文件。
可以理解的是,在确定第一目标输入信息包括报警信息的情况下,向联网报警系统发送报警信息并存储第一目标监控文件。
联网报警系统是一种自动接警和报警平台,联网报警系统可以是运营商在监控中心搭建的报警管理平台。联网报警系统与安装防盗报警系统的商户、家庭用户等的联网报警器和探测设备通讯连接。
联网报警系统可以通过联网报警软件将这些分散的报警器探测到的警情通过各种传输方式传到管理平台,统一由中心平台来处理警情,并由运营商运作体系对警情进行即时的处理,以降低损失并便于追溯。联网报警系统在接收到报警信息的情况下,可以及时进行报警。
为了便于对不安全的异常入侵行为进行记录存档,方便进行监控与侦破,可以在第一目标输入信息包括报警信息的情况下存储第一目标监控文件。
可以理解的是,第一目标监控文件可以存储于本地,还可以存储于云端服务器,此处对第一目标监控文件的存储地址不作限制。
在第一目标对象需要进行监控回放时,可以直接调取存储的第一目标监控文件,无需在冗杂的大量监控文件中手动查找与调取监控文件,提高了筛选的效率,提升了用户体验。
根据本申请实施例提供的监控方法,通过对门锁的状态信息进行实时监控,可以根据门锁的状态自动确定监控区域的异常状态并将对应的监控文件发送至用户进行安全性判定,方便用户进行报警并直接获取监控文件,提高了筛选监控文件的效率,提升了用户体验。
在一些实施例中,在向第一目标对象发送第一目标区域内的第一目标监控文件的步骤之后,还包括:在第二目标时间段内未接收到第一目标对象的第一目标输入信息的情况下,向联网报警系统发送报警信息并存储目标监控文件。
可以理解的是,第一目标对象可能较忙或者无法及时查看智能终端,未及时对自动确定的异常入侵行为进行判定。
在此种情况下,考虑到异常入侵行为的安全性和紧急性,可以在第一目标对象在一定时间段内未进行判定的情况下自动向联网报警系统发送报警信息并存储目标监控文件。
在本实施方式中,充分考虑到了用户的实际情况,并考虑到异常入侵行为的安全性,可以自动进行报警和存储监控文件,提高了监控状态下的安全性。
在一些实施例中,在步骤110:监听门锁的状态信息之后,还包括:在第一目标时间段内第N次监听到门锁由关闭状态切换到开锁状态,再由开锁状态切换至开启状态的情况下,获取第三目标时间段内第二目标区域内的第二目标监控文件。
需要说明的是,N为正整数。在此种情况下,通过监听门锁的状态信息可以确定出门锁已经被打开。
可以理解的是,门锁可以是被受信任的用户打开,门锁也可以是被异常入侵人员打开,
在此种情况下,需要对打开门锁的人进行识别,以确定安全性。
可以理解的是,第三目标时间段的起点可以是监听到门锁处于的开启状态的时刻。第三目标时间段的长度可以是固定的长度,例如30分钟或者40分钟等,第三目标时间段的长度还可以根据实际情况自动进行确定,此处对第三目标时间段的长度不作限制。
第二目标区域为门锁打开后的室内区域或者其他被门隔离开的区域。例如,在家庭场景下,第二目标区域可以是客厅所在的区域。
第二目标监控文件可以是监控视频文件或者监控图像文件。第二目标监控文件可以通过监控摄像头或者具有监控功能的终端获取。
以监控摄像头为例,监控摄像头可以与控制器通讯连接,监控摄像头可以根据实际需要安装于合适的位置来对第一目标区域进行监控。在本实施方式中,监控摄像头可以安装于空调的室内机。
可以获取监控摄像头监控得到的第二目标监控文件。在本实施方式中,可以基于第二目标监控文件,确定第二目标区域内第二目标对象与预设目 标对象的匹配度。
第二目标对象为在第三目标时间段内于第二目标区域监控识别到的人员。
在此种情况下,可以通过对打开门锁并进入第二目标区域内的第二目标对象进行自动识别,以确定第二目标对象与预设目标对象的匹配度。
可以理解的是预设目标对象可以是提前设置的具有打开门锁权限的人员,或者,预设目标对象可以是提前设置的不具有威胁的人员等。
在一些实施例中,基于第二目标监控文件,确定第二目标区域内第二目标对象与预设目标对象的匹配度,包括以下实现过程。
可以理解的是,可以基于第二目标监控文件,确定包含第二目标对象的目标图像。
可以理解的是,可以对第二目标监控文件的视频帧进行筛选买得到包含人物的图像帧,将包含人物的图像帧进行提取得到包含第二目标对象的目标图像。
在此种情况下,再对目标图像进行人脸识别,确定出目标人脸图像。
换言之,再对目标图像进行人脸识别,从目标图像中筛选出包含人脸图像的目标图像并提取出目标人脸图像。
在本实施方式中,先对第二目标监控文件进行识别和筛选得到包含人物的目标图像,再对目标图像进行人脸识别,确定目标人脸图像。在本实施方式中,可以直接将目标人脸图像作为第二目标对象的人脸图像。
在此种情况下,再将目标人脸图像与预设目标对象的人脸图像的相似度确定为匹配度。
在此种情况下,预设目标对象的人脸图像可以提前进行录入,以便于通过人脸识别算法计算目标人脸图像与预设目标对象的人脸图像的相似度。
例如,可以对目标人脸图像与预设目标对象的人脸图像进行特征提取,并计算特征的欧氏距离或者余弦距离。在此种情况下,可以直接将计算得到的欧式距离或者余弦距离作为相似度,即第二目标对象与预设目标对象的匹配度。
在本实施方式中,可以通过识别人脸图像精准确定第二目标对象的身 份,提高了监控的安全性。
在另一些实施例中,基于第二目标监控文件,确定包含第二目标对象的目标图像的步骤之后,还包括:在未确定出目标人脸图像的情况下,基于目标图像,确定第二目标对象的目标轮廓。
在此种情况下,由于第二目标对象可能会对自己的面部特征进行遮挡,或者在第二目标监控文件中未能识别到目标人脸图像的情况下,对第二目标对象的目标轮廓进行识别。
在此种情况下,可以将目标轮廓与预设目标对象的轮廓的相似度确定为匹配度。
在此种情况下,可以基于目标识别算法,确定出第二目标对象的目标轮廓。在一些实施例中,可以对目标轮廓中特殊的标定点进行识别,并确定各个标定点之间的距离比例。
例如,可以确定出胳膊或者腿的长度与身高的比例,再通过与预设目标对象在统一监控场景下的轮廓进行对比,确定目标轮廓与预设目标对象的轮廓的相似度,进而确定出第二目标对象与预设目标对象的匹配度。
在此种情况下,可以考虑到识别不到人脸图像的情况,提高了监控识别的兼容性和应用的高容错性,有利于提高监控安全性。
在确定出匹配度的情况下,在匹配度小于第一预设值的情况下,将门锁切换为关闭状态。
可以理解的是,第一预设值为提前设置的常数,针对不同的匹配度计算方式,可以设置不同的第一预设值。
在匹配度小于第一预设值的情况下,可以确定第二目标对象为异常入侵人员,在此种情况下,可以向第一目标对象发送第二目标监控文件,并控制门锁关闭。
可以理解的是,此种情况下的门锁为智能门锁,能在门关闭状态下自动进行反锁。
在此种情况下,可以将异常入侵人员反锁于第二目标区域内,以便及时采取相关措施。
根据本申请实施例的监控方法,通过计算第二目标对象与预设目标对象的匹配度,并通过匹配度的大小确定第二目标对象的身份并采取相应的 措施,例如发送监控文件等措施,能够有效提高监控的安全性。
在一些实施例中,在基于第二目标监控文件,确定第二目标区域内第二目标对象与预设目标对象的匹配度的步骤之后,本申请实施例的监控方法还包括:在第二目标时间段内接收到第一目标对象的第二目标输入信息的情况下,确定第二目标输入信息包括报警信息。
可以理解的是,第一目标对象在接收并审核第二目标监控文件后,可以通过智能终端输入第二目标输入信息。
第二目标输入信息的输入方式包括但不限于触控输入、语音输入以及物理按键输入等。
例如,第一目标对象在手机的安防应用程序上查看第二目标监控文件后,手机的显示屏上可以自动弹出用于选择确定是否安全的控件。
控件可以包括“安全控件”或者“不安全控件”,第一目标对象在点击对应的控件后可以确定第二目标输入信息的输入内容。
在接收到第一目标对象对“不安全控件”的点击操作后,可以确定出第二目标输入信息包括报警信息。
第二目标输入信息用于确认自动确定的异常入侵行为不安全。
在此种情况下,向联网报警系统发送报警信息并存储第二目标监控文件。
可以理解的是,在确定第二目标输入信息包括报警信息的情况下,向联网报警系统发送报警信息并存储第二目标监控文件。
为了便于对不安全的异常入侵行为进行记录存档,方便进行监控与侦破,可以在第二目标输入信息包括报警信息的情况下存储第二目标监控文件。
可以理解的是,第二目标监控文件可以存储于本地,还可以存储于云端服务器,此处对第二目标监控文件的存储地址不作限制。
在第一目标对象需要进行监控回放时,可以直接调取存储的第二目标监控文件,无需在冗杂的大量监控文件中手动查找与调取监控文件,提高了筛选的效率,提升了用户体验。
在本实施方式中,可以再根据匹配度计算确定出异常入侵行为的情况下,将相应的监控文件发送至用户进行安全性判定,方便用户进行报警并 直接获取监控文件,提高了筛选监控文件的效率,提升了用户体验。
在一些实施例中,在基于第二目标监控文件,确定第二目标区域内第二目标对象与预设目标对象的匹配度的步骤之后,本申请实施例的监控方法还包括:在第二目标时间段内未接收到第一目标对象的第二目标输入信息的情况下,向联网报警系统发送报警信息并存储第二目标监控文件。
可以理解的是,第一目标对象可能较忙或者无法及时查看智能终端,未及时对自动确定的异常入侵行为进行判定。
在此种情况下,考虑到异常入侵行为的安全性和紧急性,可以在第一目标对象在一定时间段内未进行判定的情况下自动向联网报警系统发送报警信息并存储目标监控文件。
在本实施方式中,充分考虑到了用户的实际情况,并考虑到异常入侵行为的安全性,可以自动进行报警和存储监控文件,提高了监控状态下的安全性。
参照图2,下面对本申请提供的监控装置进行描述,下文描述的监控装置与上文描述的监控方法可相互对应参照。
本申请实施例的监控装置包括:监听模块210、第一处理模块220、第二处理模块230和第三处理模块240。
监听模块210用于监听门锁的状态信息,状态信息包括开启状态、关闭状态和开锁状态;
第一处理模块220用于在第一目标时间段内第M次监听到门锁由关闭状态切换到开锁状态,再由开锁状态切换至关闭状态的情况下,向第一目标对象发送第一目标区域内的第一目标监控文件;其中,M为大于1的整数;
第二处理模块230用于在第二目标时间段内接收到第一目标对象的第一目标输入信息的情况下,确定第一目标输入信息包括报警信息;
第三处理模块240用于向联网报警系统发送报警信息并存储第一目标监控文件。
根据本申请实施例的监控装置,通过对门锁的状态信息进行实时监控,可以根据门锁的状态自动确定监控区域的异常状态并将对应的监控文件发送至用户进行安全性判定,方便用户进行报警并直接获取监控文件,提 高了筛选监控文件的效率,提升了用户体验。
在一些实施例中,本申请实施例的监控装置还包括第四处理模块,第四处理模块用于在第二目标时间段内未接收到第一目标对象的第一目标输入信息的情况下,向联网报警系统发送报警信息并存储第一目标监控文件。
在一些实施例中,本申请实施例的监控装置还包括第五处理模块,第五处理模块用于在第一目标时间段内第N次监听到门锁由关闭状态切换到开锁状态,再由开锁状态切换至开启状态的情况下,获取第三目标时间段内第二目标区域内的第二目标监控文件;其中,N为正整数;基于第二目标监控文件,确定第二目标区域内第二目标对象与预设目标对象的匹配度;在匹配度小于第一预设值的情况下,向第一目标对象发送第二目标监控文件,并将门锁切换为关闭状态。
在一些实施例中,第五处理模块还用于在第二目标时间段内接收到第一目标对象的第二目标输入信息的情况下,确定第二目标输入信息包括报警信息;向联网报警系统发送报警信息并存储第二目标监控文件。
在一些实施例中,第五处理模块还用于在第二目标时间段内未接收到第一目标对象的第二目标输入信息的情况下,向联网报警系统发送报警信息并存储第二目标监控文件。
在一些实施例中,第五处理模块还用于基于第二目标监控文件,确定包含第二目标对象的目标图像;对目标图像进行人脸识别,确定出目标人脸图像;将目标人脸图像与预设目标对象的人脸图像的相似度确定为匹配度。
在一些实施例中,第五处理模块还用于在未确定出目标人脸图像的情况下,基于目标图像,确定第二目标对象的目标轮廓;将目标轮廓与预设目标对象的轮廓的相似度确定为匹配度。
本申请实施例还提供一种空调,空调包括室内机、室外机和设置在室内机或室外机中的处理器和存储器;还包括存储在存储器上并可在处理器上运行的程序或指令,程序或指令被处理器执行时执行上述的监控方法。
根据本申请实施例的空调,通过对门锁的状态信息进行实时监控,可以根据门锁的状态自动确定监控区域的异常状态并将对应的监控文件发 送至用户进行安全性判定,方便用户进行报警并直接获取监控文件,提高了筛选监控文件的效率,提升了用户体验。
图3示例了一种电子设备的实体结构示意图,如图3所示,该电子设备可以包括:处理器(processor)310、通信接口(Communications Interface)320、存储器(memory)330和通信总线340,其中,处理器310,通信接口320,存储器330通过通信总线340完成相互间的通信。处理器310可以调用存储器330中的逻辑指令,以执行监控方法,该方法包括:监听门锁的状态信息,状态信息包括开启状态、关闭状态和开锁状态;在第一目标时间段内第M次监听到门锁由关闭状态切换到开锁状态,再由开锁状态切换至关闭状态的情况下,向第一目标对象发送第一目标区域内的第一目标监控文件;其中,M为大于1的整数;在第二目标时间段内接收到第一目标对象的第一目标输入信息的情况下,确定第一目标输入信息包括报警信息;向联网报警系统发送报警信息并存储第一目标监控文件。
此外,上述的存储器330中的逻辑指令可以通过软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本申请各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(ROM,Read-Only Memory)、随机存取存储器(RAM,Random Access Memory)、磁碟或者光盘等各种可以存储程序代码的介质。
另一方面,本申请还提供一种计算机程序产品,所述计算机程序产品包括计算机程序,计算机程序可存储在非暂态计算机可读存储介质上,所述计算机程序被处理器执行时,计算机能够执行上述各方法所提供的监控方法,该方法包括:监听门锁的状态信息,状态信息包括开启状态、关闭状态和开锁状态;在第一目标时间段内第M次监听到门锁由关闭状态切换到开锁状态,再由开锁状态切换至关闭状态的情况下,向第一目标对象发送第一目标区域内的第一目标监控文件;其中,M为大于1的整数;在第二目标时间段内接收到第一目标对象的第一目标输入信息的情况下,确 定第一目标输入信息包括报警信息;向联网报警系统发送报警信息并存储第一目标监控文件。
又一方面,本申请还提供一种非暂态计算机可读存储介质,其上存储有计算机程序,该计算机程序被处理器执行时实现以执行上述各方法提供的监控方法,该方法包括:监听门锁的状态信息,状态信息包括开启状态、关闭状态和开锁状态;在第一目标时间段内第M次监听到门锁由关闭状态切换到开锁状态,再由开锁状态切换至关闭状态的情况下,向第一目标对象发送第一目标区域内的第一目标监控文件;其中,M为大于1的整数;在第二目标时间段内接收到第一目标对象的第一目标输入信息的情况下,确定第一目标输入信息包括报警信息;向联网报警系统发送报警信息并存储第一目标监控文件。
以上所描述的装置实施例仅仅是示意性的,其中所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部模块来实现本实施例方案的目的。本领域普通技术人员在不付出创造性的劳动的情况下,即可以理解并实施。
通过以上的实施方式的描述,本领域的技术人员可以清楚地了解到各实施方式可借助软件加必需的通用硬件平台的方式来实现,当然也可以通过硬件。基于这样的理解,上述技术方案本质上或者说对现有技术做出贡献的部分可以以软件产品的形式体现出来,该计算机软件产品可以存储在计算机可读存储介质中,如ROM/RAM、磁碟、光盘等,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行各个实施例或者实施例的某些部分所述的方法。
最后应说明的是:以上实施例仅用以说明本申请的技术方案,而非对其限制;尽管参照前述实施例对本申请进行了详细的说明,本领域的普通技术人员应当理解:其依然可以对前述各实施例所记载的技术方案进行修改,或者对其中部分技术特征进行等同替换;而这些修改或者替换,并不使相应技术方案的本质脱离本申请各实施例技术方案的精神和范围。

Claims (11)

  1. 一种监控方法,包括:
    监听门锁的状态信息,所述状态信息包括开启状态、关闭状态和开锁状态;
    在第一目标时间段内第M次监听到所述门锁由所述关闭状态切换到所述开锁状态,再由所述开锁状态切换至所述关闭状态的情况下,向第一目标对象发送第一目标区域内的第一目标监控文件;其中,M为大于1的整数;
    在第二目标时间段内接收到所述第一目标对象的第一目标输入信息的情况下,确定所述第一目标输入信息包括报警信息;
    向联网报警系统发送报警信息并存储所述第一目标监控文件。
  2. 根据权利要求1所述的监控方法,其中,所述向第一目标对象发送第一目标区域内的第一目标监控文件之后,还包括:
    在第二目标时间段内未接收到所述第一目标对象的第一目标输入信息的情况下,向所述联网报警系统发送报警信息并存储所述第一目标监控文件。
  3. 根据权利要求1所述的监控方法,其中,所述监听门锁的状态信息之后,还包括:
    在第一目标时间段内第N次监听到所述门锁由所述关闭状态切换到所述开锁状态,再由所述开锁状态切换至所述开启状态的情况下,获取第三目标时间段内第二目标区域内的第二目标监控文件;其中,N为正整数;
    基于所述第二目标监控文件,确定所述第二目标区域内第二目标对象与预设目标对象的匹配度;
    在所述匹配度小于第一预设值的情况下,向所述第一目标对象发送所述第二目标监控文件,并将所述门锁切换为关闭状态。
  4. 根据权利要求3所述的监控方法,其中,所述基于所述第二目标监控文件,确定所述第二目标区域内第二目标对象与预设目标对象的匹配度之后,还包括:
    在第二目标时间段内接收到所述第一目标对象的第二目标输入信息的情况下,确定所述第二目标输入信息包括报警信息;
    向所述联网报警系统发送报警信息并存储所述第二目标监控文件。
  5. 根据权利要求3所述的监控方法,其中,所述基于所述第二目标监控文件,确定所述第二目标区域内第二目标对象与预设目标对象的匹配度之后,还包括:
    在第二目标时间段内未接收到所述第一目标对象的第二目标输入信息的情况下,向所述联网报警系统发送报警信息并存储所述第二目标监控文件。
  6. 根据权利要求3所述的监控方法,其中,所述基于所述第二目标监控文件,确定所述第二目标区域内第二目标对象与预设目标对象的匹配度,包括:
    基于所述第二目标监控文件,确定包含所述第二目标对象的目标图像;
    对所述目标图像进行人脸识别,确定出目标人脸图像;
    将所述目标人脸图像与所述预设目标对象的人脸图像的相似度确定为所述匹配度。
  7. 根据权利要求6所述的监控方法,其中,所述基于所述第二目标监控文件,确定包含所述第二目标对象的目标图像之后,还包括:
    在未确定出所述目标人脸图像的情况下,基于所述目标图像,确定所述第二目标对象的目标轮廓;
    将所述目标轮廓与所述预设目标对象的轮廓的相似度确定为所述匹配度。
  8. 一种监控装置,包括:
    监听模块,用于监听门锁的状态信息,所述状态信息包括开启状态、关闭状态和开锁状态;
    第一处理模块,用于在第一目标时间段内第M次监听到所述门锁由所述关闭状态切换到所述开锁状态,再由所述开锁状态切换至所述关闭状态的情况下,向第一目标对象发送第一目标区域内的第一目标监控文件;其中,M为大于1的整数;
    第二处理模块,用于在第二目标时间段内接收到所述第一目标对象的第一目标输入信息的情况下,确定所述第一目标输入信息包括报警信息;
    第三处理模块,用于向联网报警系统发送报警信息并存储所述第一目 标监控文件。
  9. 一种空调,包括室内机、室外机和设置在所述室内机或室外机中的处理器和存储器;还包括存储在所述存储器上并可在所述处理器上运行的程序或指令,所述程序或指令被所述处理器执行时执行如权利要求1至7任一项所述监控方法。
  10. 一种电子设备,包括存储器、处理器及存储在所述存储器上并可在所述处理器上运行的计算机程序,其中,所述处理器执行所述程序时实现如权利要求1至7任一项所述监控方法。
  11. 一种非暂态计算机可读存储介质,其上存储有计算机程序,其中,所述计算机程序被处理器执行时实现如权利要求1至7任一项所述监控方法。
PCT/CN2022/137529 2022-04-27 2022-12-08 监控方法、监控装置、空调及电子设备 WO2023207114A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202210456400.8A CN117014573A (zh) 2022-04-27 2022-04-27 监控方法、监控装置、空调及电子设备
CN202210456400.8 2022-04-27

Publications (1)

Publication Number Publication Date
WO2023207114A1 true WO2023207114A1 (zh) 2023-11-02

Family

ID=88517227

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2022/137529 WO2023207114A1 (zh) 2022-04-27 2022-12-08 监控方法、监控装置、空调及电子设备

Country Status (2)

Country Link
CN (1) CN117014573A (zh)
WO (1) WO2023207114A1 (zh)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2004124686A (ja) * 2002-07-31 2004-04-22 Sony Corp ドアロックシステムおよびドアロック管理方法
CN204347945U (zh) * 2014-12-21 2015-05-20 绵阳艾佳科技有限公司 电子门锁远程监控装置
CN110460671A (zh) * 2019-08-19 2019-11-15 深圳坚朗海贝斯智能科技有限公司 智能门锁联动管理方法及实现该方法的联网智能锁系统
CN215717894U (zh) * 2021-07-26 2022-02-01 锐巢万联科技(武汉)有限公司 一种带监控功能的安全防盗锁

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2004124686A (ja) * 2002-07-31 2004-04-22 Sony Corp ドアロックシステムおよびドアロック管理方法
CN204347945U (zh) * 2014-12-21 2015-05-20 绵阳艾佳科技有限公司 电子门锁远程监控装置
CN110460671A (zh) * 2019-08-19 2019-11-15 深圳坚朗海贝斯智能科技有限公司 智能门锁联动管理方法及实现该方法的联网智能锁系统
CN215717894U (zh) * 2021-07-26 2022-02-01 锐巢万联科技(武汉)有限公司 一种带监控功能的安全防盗锁

Also Published As

Publication number Publication date
CN117014573A (zh) 2023-11-07

Similar Documents

Publication Publication Date Title
US10902707B1 (en) Video monitoring and alarm verification technology
CN104850771B (zh) 一种身份确认方法及相关设备
US9779614B2 (en) System and method of alerting CMS and registered users about a potential duress situation using a mobile application
US8675071B1 (en) Video monitoring and alarm verification technology
US10565838B2 (en) Building access control system with complex event processing
CN104504793A (zh) 基于视频服务的智能门安全控制系统及方法
US20080303903A1 (en) Networked video surveillance system
CN110211267A (zh) 室内开门控制方法、权限的配置方法、装置和存储介质
JP2020518903A (ja) 遠隔端末ユニットからscadaネットワークへのアクセスの保護
CN111917981A (zh) 隐私保护方法、装置、设备及计算机可读存储介质
WO2023207114A1 (zh) 监控方法、监控装置、空调及电子设备
CN111915765A (zh) 基于智能锁和传感器联动的人员安全监护的方法和系统
CN114175573B (zh) 基于物理隐患的动态应用程序安全姿态更改
CN113301300A (zh) 基于互联网建筑楼宇智能化监测系统及方法
JP7002422B2 (ja) 入退室管理システム
KR100335837B1 (ko) 지능형 보안체제 시스템
CN112419547A (zh) 基于物联网和人工智能的安防监控方法及云通信服务器
CN107070913B (zh) 一种基于webshell攻击的检测和防护方法及系统
WO2019148695A1 (zh) 安全监控方法、装置、安保设备及系统
CN115967542B (zh) 基于人因的入侵检测方法、装置、设备及介质
US12125355B2 (en) Video monitoring and alarm verification technology
KR101564046B1 (ko) 보드 간 통신에 의한 지능형 출입 통제 시스템, 방법 및 컴퓨터 판독 가능한 기록 매체
US20230044156A1 (en) Artificial intelligence-based system and method for facilitating management of threats for an organizaton
CN112002036B (zh) 基于传感器和智能锁联动的管理房间的方法和系统
KR102307837B1 (ko) 다세대 홈 네트워크 데이터의 중앙 집중형 수집 및 저장 방법 및 시스템

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22939928

Country of ref document: EP

Kind code of ref document: A1