CN114267105A - Doorbell control method, intelligent doorbell and related equipment - Google Patents

Doorbell control method, intelligent doorbell and related equipment Download PDF

Info

Publication number
CN114267105A
CN114267105A CN202111525092.1A CN202111525092A CN114267105A CN 114267105 A CN114267105 A CN 114267105A CN 202111525092 A CN202111525092 A CN 202111525092A CN 114267105 A CN114267105 A CN 114267105A
Authority
CN
China
Prior art keywords
module
doorbell
target object
identity authentication
intelligent doorbell
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111525092.1A
Other languages
Chinese (zh)
Inventor
余承富
李尹
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Haique Technology Co ltd
Original Assignee
Shenzhen Haique Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Haique Technology Co ltd filed Critical Shenzhen Haique Technology Co ltd
Priority to CN202111525092.1A priority Critical patent/CN114267105A/en
Publication of CN114267105A publication Critical patent/CN114267105A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Lock And Its Accessories (AREA)

Abstract

The embodiment of the application discloses doorbell control method, intelligent doorbell and related equipment, is applied to intelligent doorbell, intelligent doorbell includes response module, image acquisition module, authentication module and communication module, and the method includes: the induction module detects whether a target object exists in a preset range of the intelligent doorbell or not; the image acquisition module acquires image information of the target object when the target object exists in a preset range of the intelligent doorbell; the identity authentication module carries out identity authentication through the image information; and the communication module sends an unlocking instruction to the electronic lock when the identity authentication is successful. Adopt this application embodiment can realize the function of unblanking through the doorbell, and then promote doorbell's intellectuality.

Description

Doorbell control method, intelligent doorbell and related equipment
Technical Field
The application relates to the technical field of electronic technology and Internet of things, in particular to a doorbell control method, an intelligent doorbell and related equipment.
Background
With the rapid development of science and technology and the improvement of the living standard of people, the internet of things is closer to the life of users, and the products of the internet of things are more and more pursued by people. With regard to taking the doorbell, present doorbell plays the vocal suggestion effect more, also appears in succession on the market can carry out the intelligent doorbell that video recording and audio/video recorded, but generally, the doorbell function is comparatively single, so, how to promote the intelligent problem of doorbell to await solution.
Disclosure of Invention
The embodiment of the application provides a doorbell control method, an intelligent doorbell and related equipment, which can realize an unlocking function through the doorbell and further improve the intelligence of the doorbell.
In a first aspect, an embodiment of the present application provides a doorbell control method, which is applied to an intelligent doorbell, where the intelligent doorbell includes an induction module, an image acquisition module, an identity authentication module, and a communication module, and the method includes:
the induction module detects whether a target object exists in a preset range of the intelligent doorbell or not;
the image acquisition module acquires image information of the target object when the target object exists in a preset range of the intelligent doorbell;
the identity authentication module carries out identity authentication through the image information;
and the communication module sends an unlocking instruction to the electronic lock when the identity authentication is successful.
In a second aspect, an embodiment of the present application provides a doorbell control device, which is applied to an intelligent doorbell, and the method includes:
detecting whether a target object exists in a preset range of the intelligent doorbell or not;
when the target object exists in the preset range of the intelligent doorbell, acquiring image information of the target object;
performing identity authentication through the image information;
and when the identity authentication is successful, an unlocking instruction is sent to the electronic lock.
In a third aspect, an embodiment of the present application provides a doorbell control device, which is applied to an intelligent doorbell, the doorbell control device includes an induction module, an image acquisition module, an identity authentication module, and a communication module, and the method includes:
the induction module is used for detecting whether a target object exists in a preset range of the intelligent doorbell;
the image acquisition module is used for acquiring the image information of the target object when the target object exists in the preset range of the intelligent doorbell;
the identity authentication module is used for performing identity authentication through the image information;
and the communication module is used for sending an unlocking instruction to the electronic lock when the identity authentication is successful.
In a fourth aspect, an embodiment of the present application provides an intelligent doorbell, including a processor, a memory, a communication interface, and one or more programs, where the one or more programs are stored in the memory and configured to be executed by the processor, and the programs include instructions for executing the steps in the first aspect or the second aspect of the embodiment of the present application.
In a fifth aspect, the present application provides a computer-readable storage medium, where the computer-readable storage medium stores a computer program for electronic data exchange, where the computer program makes a computer perform some or all of the steps described in the first aspect or the second aspect of the present application.
In a sixth aspect, embodiments of the present application provide a computer program product, where the computer program product includes a non-transitory computer-readable storage medium storing a computer program, where the computer program is operable to cause a computer to perform some or all of the steps as described in the first or second aspect of embodiments of the present application. The computer program product may be a software installation package.
The embodiment of the application has the following beneficial effects:
it can be seen that the doorbell control method, the intelligent doorbell and the related device described in the embodiments of the present application are applied to an intelligent doorbell, the intelligent doorbell includes a sensing module, an image obtaining module, an identity authentication module, and a communication module, the sensing module detects whether a target object exists within a preset range of the intelligent doorbell, the image obtaining module obtains image information of the target object when the target object exists within the preset range of the intelligent doorbell, the identity authentication module performs identity authentication through the image information, the communication module sends an unlocking instruction to the electronic lock when the identity authentication is successful, so that the image information corresponding to the target object can be obtained when the intelligent doorbell detects the target object, and then the unlocking function can be realized based on the image information when the identity authentication is passed, i.e. the unlocking function can be realized through the doorbell, thereby improving the intelligence of the doorbell, the unlocking convenience is improved, and the user experience is improved.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present application, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
Fig. 1A is a schematic structural diagram of a doorbell control system for implementing a doorbell control method according to an embodiment of the present application;
fig. 1B is a scene schematic diagram of an intelligent doorbell provided in an embodiment of the present application;
fig. 1C is a schematic structural diagram of an intelligent doorbell provided in an embodiment of the present application;
fig. 1D is a schematic structural diagram of a doorbell control device according to an embodiment of the present application;
fig. 2A is a schematic flowchart of a doorbell control method according to an embodiment of the present application;
fig. 2B is a schematic structural diagram of another intelligent doorbell provided in an embodiment of the present application;
fig. 3 is a schematic flowchart of another doorbell control method provided in an embodiment of the present application;
FIG. 4 is a schematic structural diagram of another intelligent doorbell provided in the embodiments of the present application;
Detailed Description
In order to make the technical solutions of the present application better understood, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The terms "first," "second," and the like in the description and claims of the present application and in the above-described drawings are used for distinguishing between different objects and not for describing a particular order. Furthermore, the terms "include" and "have," as well as any variations thereof, are intended to cover non-exclusive inclusions. For example, a process, method, system, article, or apparatus that comprises a list of steps or elements is not limited to only those steps or elements listed, but may alternatively include other steps or elements not listed, or inherent to such process, method, article, or apparatus.
Reference herein to "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment can be included in at least one embodiment of the application. The appearances of the phrase in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. It is explicitly and implicitly understood by one skilled in the art that the embodiments described herein can be combined with other embodiments.
The electronic Devices described in the embodiments of the present application may include a smart Phone (e.g., an Android Phone, an iOS Phone, a Windows Phone, etc.), a tablet computer, a palm computer, a vehicle data recorder, a traffic guidance platform, a server, a notebook computer, a Mobile Internet device (MID, Mobile Internet Devices), a webcam (IPC), a smart home central control or wearable device (e.g., a smart watch, a bluetooth headset), and the like, which are merely examples and are not exhaustive, and include but not limited to the electronic Devices mentioned above.
The following describes embodiments of the present application in detail.
Referring to fig. 1A, fig. 1A is a schematic illustration showing a doorbell control system for implementing a doorbell control method according to an embodiment of the present application, where as shown in the figure, the doorbell control system includes: intelligent doorbell and electronic lock. Communication connection can be established between intelligent doorbell and the electronic lock, like intelligent doorbell realization electronic lock that unblanks. The communication mode between the intelligent doorbell and the electronic lock can comprise at least one of the following modes: a bluetooth communication mode, a wireless fidelity (Wi-Fi) communication mode, a Zigbee communication mode, an Ultra Wide Band (UWB), a low power consumption communication mode (such as LoRa), an infrared communication mode, a visible light communication mode, a millimeter wave communication mode, and the like, which are not limited herein.
In addition, in this application embodiment, doorbell control system can also include electronic equipment, establishes communication connection between through electronic equipment and the intelligent doorbell promptly, and then, electronic equipment can control intelligent doorbell and carry out remote control, for example, obtain the image that intelligent doorbell recorded through intelligent doorbell, for example, realize long-range function of unblanking through intelligent doorbell again.
Further, as shown in fig. 1B, the intelligent doorbell and the electronic lock can be both disposed on the same door, and of course, the intelligent doorbell can also be disposed in other places, such as on a wall, including a wall near the garage door, so as to open the garage door. Of course, the intelligent doorbell can also be installed on the door of the pet house, and then the pet can be helped to open the door.
In a specific implementation, the intelligent doorbell can comprise at least one of the following: the sensing module, the electroacoustic module, the communication module, the image acquisition module, the driving module, the identity authentication module, and the like are not limited herein, and specifically, as shown in fig. 1C, each module of the smart doorbell may be a software module (a program module) or a hardware module, and each module may be connected in a wireless manner or a wired manner. The intelligent doorbell can further comprise a memory and a processor, and of course, the intelligent doorbell can further comprise other modules, for example, a touch module or a trigger module, touch operation can be realized through the touch module, and the trigger module can trigger a doorbell sounding function, or can initiate an intercom function or a video call function. In an embodiment of the present application, the processor may include at least one of: a Central Processing Unit (CPU), a Graphics Processing Unit (GPU), a neural-Network Processing Unit (NPU), and the like, which are not limited herein.
In some possible embodiments, the smart doorbell may comprise an outdoor component, which may be understood as an outdoor mounted component, and an indoor component, which may be understood as an indoor mounted component. The number of the indoor modules and the outdoor modules may be one or more. Specifically, the outdoor component may include a sensing module, an image capturing module, an identity authentication module, and the like, which are not limited herein. The indoor module may include a communication module and an electroacoustic module, which are not limited herein. The outdoor assembly and the indoor assembly can be in communication connection through the local area network. The indoor component may also include a memory.
In particular implementations, the installation locations or orientations of the plurality of outdoor components may be partially the same, completely the same, or completely different. A plurality of outdoor subassemblies can be installed by partial or whole separation, and at least one outdoor subassembly possesses the function of response module in a plurality of outdoor subassemblies to can enlarge the response scope, promote the response ability. Of course, a plurality of outdoor assemblies can be assembled together to form an exquisite intelligent doorbell.
In one embodiment, for example, when the electronic lock is used in a bank or a scene requiring verification by multiple persons, when at least 2 or more than 2 outdoor components among the multiple outdoor components have an identity authentication function, identity authentication is performed on image information acquired by the multiple outdoor components, and when the identity authentication is successful or the number of successful authentication is greater than a preset value or a preset ratio, an unlocking instruction can be sent to the electronic lock. The preset value or the preset proportion can be preset or defaulted by the system, so that the authentication security of the intelligent doorbell is improved.
Outdoor subassembly and indoor subassembly in this application only for corresponding "electronic lock", in some embodiments, outdoor subassembly also can install in indoorly, for example the inside security protection system of bank, through triggering intelligent doorbell, realizes alarming function.
Specifically, the sensing module may include at least one of the following: temperature sensors, distance sensors, proximity sensors, physical buttons, ultrasonic sensors, cameras, etc., without limitation. In the embodiment of the present application, the sensing module can be used for detecting people, other animals, robots, and the like, for example, kittens and puppies.
Specifically, the electroacoustic module may include at least one of the following: bell, buzzer, horn, etc., without limitation, the electroacoustic module is used for sounding to prompt the user that someone presses the doorbell.
Specifically, the communication module may include at least one of: the bluetooth module, Wi-Fi module, infrared communication module, visible light communication module, satellite communication module, mobile communication module, millimeter wave communication module, UWB module, loRa module etc. do not do the injecing here, and then, can adopt the corresponding communication technology of communication module to realize the communication connection between intelligent doorbell and the electronic lock. The communication module is used for establishing communication connection with other equipment, for example, communication connection can be established with an electronic lock or electronic equipment. In the embodiment of the present application, the mobile communication module may support at least one of the following communication modes: 2G, 3G, 4G, 5G, 6G, etc., without limitation.
In this embodiment of the application, the smart doorbell may be configured with a Subscriber Identity Module (SIM), the SIM may be a physical SIM card or a virtual SIM card, and the SIM card is configured in the indoor component.
Specifically, the image capturing module may include at least one of the following: cameras, ultrasonic sensors, etc., without limitation. The camera that this application embodiment related all can be visible light camera, infrared camera, and the quantity of camera can be one or more. The camera can also be a camera with a common visual angle or a wide-angle camera. The camera may also be a rotatable camera or a non-rotatable camera. The image acquisition module can be used for realizing image acquisition or a video recording function. For example, the camera can be a structured light module, and a two-dimensional plane image can be captured through the camera, or a three-dimensional stereo image can also be captured.
Specifically, the driving module may be configured to implement a driving function, for example, the driving module may drive the image obtaining module or the identity authentication module to perform angle adjustment or position adjustment, and the driving module may be a driving motor, a spring, or another module capable of implementing the angle adjustment or position adjustment function.
Specifically, the identity authentication module can be used for realizing an identity authentication function, the identity authentication module can be a processor, and of course, the identity authentication module can also be the same module as the image acquisition module.
Based on the intelligent doorbell in the doorbell control system, the intelligent doorbell can comprise a doorbell control device, as shown in fig. 1D, the doorbell control device comprises a sensing module, an image acquisition module, an identity authentication module, and a communication module, wherein,
the induction module is used for detecting whether a target object exists in a preset range of the intelligent doorbell;
the image acquisition module is used for acquiring the image information of the target object when the target object exists in the preset range of the intelligent doorbell;
the identity authentication module is used for performing identity authentication through the image information;
and the communication module is used for sending an unlocking instruction to the electronic lock when the identity authentication is successful.
In one possible example, the communication module is configured to establish a communication connection between the smart doorbell and an electronic lock after the target object exists within a preset range of the smart doorbell.
In one possible example, the doorbell control device further comprises a memory, and the memory is used for recording unlocking information after receiving feedback information sent by the electronic lock after the electronic lock is successfully unlocked;
alternatively, the first and second electrodes may be,
and the memory is used for recording the unlocking information after the unlocking instruction is sent.
In one possible example, the doorbell control device further comprises a triggering module to receive a triggering instruction; the communication module is used for responding to the trigger instruction and sending a video call request to the electronic equipment; and after the electronic equipment receives the video call request, sending a first video to the electronic equipment, wherein the first video is used for assisting a user to decide whether to trigger an unlocking instruction.
In a possible example, the image obtaining module is configured to continuously record a video to obtain a second video when the target object appears in the preset range and when the target object leaves the preset range, and store the second video.
In one possible example, the doorbell control device further comprises an electroacoustic module, and the identity authentication module is configured to perform target detection on the image information to obtain a total number of the target objects;
and the electroacoustic module is used for carrying out voice prompt if the identity authentication fails when the total number is greater than the preset number so as to prompt a user to carry out identity verification.
In a possible example, the identity authentication module is configured to, when the total number is less than or equal to the preset number, execute a closing operation if the identity authentication fails.
In one possible example, the doorbell control device further comprises a driving module, and in the acquiring the image information of the target object, the image acquiring module is configured to:
and adjusting the angle parameter of the image acquisition module through the driving module, and acquiring the image information of the target object by using the adjusted angle parameter.
In the embodiment of the application, the intelligent doorbell further comprises other biological identification modules such as a fingerprint identification module, a voiceprint identification module and the like; the system also comprises a password input module, a card swiping module and the like, wherein the modules can be respectively independent, can be integrated together, and can be integrated with a triggering module or an image acquisition module and the like, and the system is not limited in the application.
It can be understood that, in the doorbell control device, the sensing module, the image acquisition module, the identity authentication module, the communication module, the memory, the trigger module, the electroacoustic module, and the driving module are all program modules, and functions of each program module of the doorbell control device of this embodiment may be specifically implemented according to the method in the following method embodiment, and specific implementation processes thereof may refer to the description related to the method embodiment, and are not described herein again.
Referring to fig. 2A, fig. 2A is a schematic flowchart of a doorbell control method provided in an embodiment of the present application, and is applied to the doorbell control system shown in fig. 1A, where as shown in the figure, the doorbell control method includes:
201. the induction module detects whether a target object exists in the preset range of the intelligent doorbell.
The target object may be a person, another animal, a robot, or the like, which is not limited herein, but may also be another object, such as a license plate, a designated good, designated identification information, or the like, which is not limited herein, and the designated good and the designated identification information may be preset or default to the system. When the target object is a person, the sensing module can also be called a human body sensing module. The preset range may be preset or default, for example, the preset range may be a sensing range of the sensing module. The corresponding preset ranges of different induction modules are different. For example, the sensing module may be a physical button, which requires the user to touch or press the physical button to confirm the existence of the target object. For another example, when the sensing module is a proximity sensor, whether a target object exists in a preset range can be detected without contacting the intelligent doorbell.
202. And the image acquisition module acquires the image information of the target object when the target object exists in the preset range of the intelligent doorbell.
In a specific implementation, the image information may include one or more images, or the image information may be a video. The image information can be saved in a memory of the intelligent doorbell or a cloud server. The image information may be a human body image, or the image information may be a human face image, or the image information may be a human body image and a human face image. For example, when the image information is a human body image, video data may be acquired, and then the human body image may be extracted from the video data. For example, when the target object is within the preset range, a plurality of images may be collected, and one image with the clearest face may be used as image information.
In addition, in this embodiment of the application, the image information may be a two-dimensional planar image captured by a snapshot, a (two-dimensional planar) image extracted from the video information, or a three-dimensional stereoscopic image.
In one possible example, the following steps may be further included:
and the communication module establishes communication connection between the intelligent doorbell and the electronic lock after the target object exists in the preset range of the intelligent doorbell.
In the embodiment of the present application, the image obtaining module obtains the image information of the target object, and the execution sequence between the communication connection between the intelligent doorbell and the electronic lock may be the communication connection between the intelligent doorbell and the electronic lock, and then the image obtaining module obtains the image information of the target object, or may also be the first self-running image obtaining module obtains the image information of the target object and then executes the communication connection between the intelligent doorbell and the electronic lock, or both may be executed in parallel, for example, the image obtaining module can be executed by one process to obtain the image information of the target object, another process executes the communication connection between the intelligent doorbell and the electronic lock, or may also be a thread to execute the image obtaining module to obtain the image information of the target object, and the other thread executes the communication connection between the intelligent doorbell and the electronic lock.
In this application embodiment, when the communication module has the target object in the preset range of the intelligent doorbell, then can send the invitation of pairing to the electronic lock to establish the communication connection between intelligent doorbell and the electronic lock, specifically, if the response module senses human body information, or the image acquisition module acquires human body image, then the communication module can establish safe and credible communication connection through wireless (bluetooth, WiFi, Zigbee, mobile communication technology etc.) or high in the clouds (cloud ware) and the electronic lock, so, then after the authentication succeeds, need not carry out the communication between intelligent doorbell and the electronic lock again and pair, help the follow-up quick function of unblanking of realizing.
In one possible example, the following steps may be further included:
and the image acquisition module continuously records the video when the target object appears in the preset range and when the target object leaves the preset range, so as to obtain a second video, and the second video is stored.
The image acquisition module can start continuous video recording within a preset range when the target object appears, and the second video is obtained when the target object leaves the preset range and then stored in the local or cloud end, so that the monitoring function can be realized, and the safety is favorably improved.
In the concrete implementation, can disappear from sensing human information to this human information from intelligent doorbell's induction zone, and complete video information can be gathered to the image acquisition module, and this video information can be preserved to intelligent doorbell's local memory or save to the high in the clouds.
In a possible example, the smart doorbell further comprises a driving module, and the step 202 of acquiring the image information of the target object may be implemented as follows:
and adjusting the angle parameter of the image acquisition module through the driving module, and acquiring the image information of the target object by using the adjusted angle parameter.
In the embodiment of the application, a reference angle can be preset, a first angle between a current target object and the image acquisition module is determined, a difference value between the first angle and the reference angle is determined, an angle parameter to be adjusted by the image acquisition module is determined based on the difference value, then, the angle parameter of the image acquisition module is adjusted through the driving module, and image information of the target object is acquired by using the adjusted angle parameter, so that a face image or a human body image with better quality can be obtained.
In the specific implementation, the driving module is used for driving the image acquisition module to adjust the rotation angle or the position of the image acquisition module and/or the rotation angle, so that the image acquisition range is expanded, and the response sensitivity of the doorbell is improved.
Of course, the driving module can also be used for driving the identity authentication module so as to adjust the rotation angle or the position of the identity authentication module, thereby enlarging the range of the identity authentication area and improving the response sensitivity of the doorbell.
203. And the identity authentication module carries out identity authentication through the image information.
In a specific implementation, the identity authentication technology may be a 3D structured light technology, a TOF technology, a binocular vision technology, and the like, which is not limited herein. Different cameras obtain different image information, and corresponding identity authentication technologies can be selected for identity authentication aiming at different image information.
Specifically, feature extraction may be performed on image information to obtain a first feature set, and then the first feature set is compared with a second feature set of a template image in a preset template library, where the preset template library may be stored in a local memory or a cloud of an intelligent doorbell, the preset template library may include a plurality of second feature sets, and each second feature set is a feature set of a face image or a human body image which is input in advance, in an embodiment of the present application, the feature sets may include at least one of the following: feature points, feature contours, feature vectors, and the like, without limitation. The number of feature points, feature contours, and feature vectors may be one or more.
In the embodiment of the application, the user can input image information such as a human face through the image acquisition module of the electronic equipment or the intelligent doorbell, and then the image information is used as a template image of a preset template library, so that the active input function of identity information is realized.
Of course, in the embodiment of the application, a face image meeting preset requirements (for example, definition, an image shooting angle, and the like) can be automatically extracted from image information automatically acquired by the image acquisition module, and the electronic device or the intelligent doorbell acquires the face image meeting the preset requirements, so that a template image can be added to or replaced by the preset template library, thereby realizing a passive or non-sensitive entry function, and simultaneously realizing a dynamic update function of the template library. The preset requirements may be preset or system defaults.
Specifically, if the first feature set is successfully compared with any one of the second feature sets, the identity authentication is considered to be successful, and if the first feature set is unsuccessfully compared with each of the second feature sets, the identity authentication is considered to be unsuccessful.
In specific implementation, a local memory or a cloud of the intelligent doorbell can store a set number of face images or human body images in advance, and for example, the person information which can pass the identity authentication can be managed by storing the set number of face images. For example, each authorized user enters and stores one or more (e.g., 3) facial images. The stored face image may be dynamically updated, for example, an identity-authenticated face image may be substituted for the face image in the template library. The intelligent doorbell can be in communication connection with the electronic equipment, the establishment of a template library is completed through the electronic equipment, the template library can comprise a plurality of authorized users, and each authorized user can correspond to one group of face images or human body images.
In specific implementation, for a visiting user, a face image of the visiting user can be sent to the electronic device, the electronic device can record the face image as a face template, when the visiting user appears in a preset range of the intelligent doorbell at a specified visiting time, the face image of the visiting user can be acquired and compared with the face template, if the comparison is successful, identity authentication is successful, otherwise, identity authentication is failed. The specified visit time may be agreed upon in advance.
In the embodiment of the application, the visiting user can be a housekeeping service person. Specifically, assuming that an owner of the intelligent doorbell needs housekeeping service once every week, and assuming that service time/visit time is 10:00-12:00 of the morning of every three weeks, a housekeeping company can send a face image of a housekeeping service person to electronic equipment of the owner of the intelligent doorbell in advance, after the electronic equipment receives the face image, the face image can be recorded as a face template, and the face template can correspond to effective time, such as the time of getting home in advance, namely 10:00-12: 00. Therefore, the safety can be guaranteed, and the intelligence of the intelligent doorbell is also improved.
204. And the communication module sends an unlocking instruction to the electronic lock when the identity authentication is successful.
When the identity authentication is successful, the communication module can establish communication connection with the electronic lock, and then sends an unlocking instruction to the electronic lock, and the electronic lock performs unlocking operation after receiving the unlocking instruction. Of course, the unlocking instruction may also carry an unlocking duration, that is, the electronic lock is kept in the unlocked state within the unlocking duration, and after the unlocking duration is over, the electronic lock enters the locked state. In the embodiment of the application, the number of the electronic locks can be one or more, and when a plurality of electronic locks exist, the unlocking operation of the plurality of electronic locks can also be realized. In the embodiment of the present application, the electronic lock may be a specific hardware device or may also be a software device.
According to the embodiment of the application, noninductive entry can be realized through communication with the electronic lock, financial-level identity authentication can also be realized, for example, the method can be used for realizing opening of a safe box, or can also be used for realizing software login or unlocking functions, for example, after the intelligent doorbell is connected with a mobile phone, the mobile phone can be unlocked by using the intelligent doorbell.
In this application embodiment, intelligent doorbell's installation scope is restricted less, and installation quantity does the nimble setting, can realize bigger perception scope, and the lock changes along with the door opening and shutting emergence position moreover, in this application embodiment, still can realize the incessant monitoring under the fixed visual angle of fixed position.
In one possible example, the smart doorbell further comprises a memory, and further comprises the following steps:
the memory records unlocking information after receiving feedback information sent by the electronic lock after the electronic lock is successfully unlocked;
alternatively, the first and second electrodes may be,
and after the memory sends the unlocking instruction, recording the unlocking information.
In this embodiment, the unlocking information may include at least one of the following: the unlocking time, the identity information of the target object, the human body image or the human face image of the at least one target object, the complete video of the target object within the preset range, and the like, which are not limited herein. The identity information may include at least one of: name, gender, height, body type, body temperature, etc., without limitation. In a specific implementation, in the identity authentication process, identity information of the target object may also be identified, for example, age identification, gender identification, dress, occupation identification, and the like.
In the specific implementation, if the electronic lock is successfully unlocked, the electronic lock can send feedback information of successful unlocking to the intelligent doorbell, and the intelligent doorbell receives the feedback information of successful unlocking sent by the electronic lock.
Further, after sending the instruction of unblanking, perhaps after receiving the feedback information that unblanks successfully that the electronic lock sent, then record information of unblanking, information of unblanking can be saved in intelligent doorbell's memory or high in the clouds, so, can file information of unblanking, the later stage of being convenient for is traceed back.
In one possible example, the smart doorbell further comprises a triggering module, and further comprises the following steps:
a1, the trigger module receives a trigger instruction;
a2, the communication module responds to the trigger instruction and sends a video call request to the electronic equipment;
a3, after the electronic device accepts the video call request, sending a first video to the electronic device, where the first video is used to assist a user in deciding whether to trigger an unlocking instruction.
As shown in fig. 2B, the triggering module may be a physical button, for example, a button, and after the button is pressed, the triggering module may receive a triggering instruction, the communication module responds to the triggering instruction, and then sends a video call request to the electronic device, and after the electronic device receives the video call request, the electronic device may send a first video to the electronic device, where the first video may be a video that is obtained by the image obtaining module in real time and is used to assist a user to decide whether to trigger an unlocking instruction, the electronic device may display an unlocking control and a rejection control, and when the unlocking control is selected, the unlocking instruction may be generated, and when the rejection control is selected, the unlocking is confirmed and rejected, and at the same time, the video call may also be ended.
For example, if the trigger module receives the trigger signal, the (video) call request is sent to the electronic device through the communication module. After receiving the call request, the electronic device can perform local screen capturing and video recording, and also can perform preset quick reply, sound change and unlocking instruction sending. After receiving the unlocking instruction, the intelligent doorbell can send the unlocking instruction to the electronic lock to realize remote unlocking. For example, through non-face-to-face communication interaction, intelligent express sign-in can also be achieved.
In one possible example, the smart doorbell further comprises an electroacoustic module, and further comprises the following steps:
b1, the identity authentication module performs target detection on the image information to obtain the total number of the target objects;
b2, when the total number of the electroacoustic modules is larger than the preset number, if the identity authentication fails, voice prompt is carried out to prompt a user to change the identity for identity verification.
Wherein the preset number can be preset or default by the system. In concrete the realization, the authentication module can carry out the target detection to image information, obtains the total number of target object, for example, when the target object was the man-hour, then can realize the people count, and the electroacoustic module is when the total number is greater than predetermined quantity, if authentication fails, then can carry out voice prompt to the suggestion trades the people and carries out authentication, for example, can change into one person and carry out authentication.
Further, the method can also comprise the following steps:
and when the total number of the identity authentication modules is less than or equal to the preset number, if the identity authentication fails, closing operation is executed.
In the embodiment of the present application, the identity authentication failure may be understood as the authentication frequency exceeding a preset frequency, and if the authentication result is authentication failure each time, the identity authentication is considered to be failed. The preset number of times may be preset or default to the system, for example, the preset number of times may be 1 or more, and further, the identity authentication module may perform the closing operation, and the closing duration may be preset or default to the system, for example, 30 seconds or 1 minute. Certainly, during the authentication module is closed, as long as the target object is in predetermineeing the within range, the image acquisition module still can last the video recording, so, can save intelligent doorbell's consumption.
For example, in the embodiment of the present application, the number of people may be determined according to the acquired human body image. For example, if the number of people is greater than or equal to 2, if the identity authentication fails, a voice prompt may be issued, for example, the prompt content may be "please change people for identity verification". If the number of the persons is 1, the identity authentication module can be closed after the identity authentication fails.
In one possible example, when the identity authentication is successful, the following steps may be further included:
c1, the identity authentication module acquires a target unlocking time period of the target object; acquiring current time; verifying whether the current time is within the target unlocking time period;
and C2, when the current time is in the target unlocking time period, the communication module sends an unlocking instruction to the electronic lock.
Wherein, different user identities then their corresponding unblock time interval is different, for example, own family can all weather unblock and open the door, and friend's words, then can set up daytime or holiday, also can set up specific time quantum certainly, so, can guarantee privacy and security. Each user may correspond to an identity, and the identity may include at least one of the following: name, level, grouping category, affinity, etc., without limitation.
In the concrete realization, the target identification of target object can be acquireed to the authentication module, according to the mapping relation between the identification of prestore and the unblock period, confirm the target unblock period that target identification corresponds, then, can acquire the current time, judge again whether this current time is in the target unblock period, communication module is when the current time is in the target unblock period, send the instruction of unblanking to the electronic lock, thus, because set up different unblock periods to different people, can guarantee privacy and security in the family, also guarantee the unlocking convenience, intelligent doorbell's intelligence has been promoted.
In one possible example, when the identity authentication is successful, the following steps may be further included:
d1, the identity authentication module acquires the target identity level of the target object; when the target identity level is higher than a preset level, the communication module executes the unlocking instruction sent to the electronic lock;
d2, when the target identity is lower than or equal to the preset level, the communication module detects whether the distance between the intelligent doorbell and the electronic equipment is within a set distance range;
and D3, the communication module executes the unlocking instruction sent to the electronic lock when the distance between the intelligent doorbell and the electronic device is within the set distance range, otherwise, an unlocking event is reported to the electronic device, and the unlocking event carries the target identity information of the target object.
Wherein the preset level can be preset or default by the system. The set distance range can be preset or default by the system, and the set distance range can be used for detecting whether the owner is at home or not.
In the specific implementation, taking a home scenario as an example, the target identity level of a target object may be obtained, when the target identity level is higher than a preset level, a coming person may be considered as a family person, and an unlocking instruction may be sent to the electronic lock, in addition, when the target identity level is lower than or equal to the preset level, it may be indicated that the coming person is a guest, it may be detected whether a distance between the smart doorbell and the electronic device is within a set distance range, and when the distance between the smart doorbell and the electronic device is within the set distance range, it may be indicated that the owner is at home, and an unlocking instruction may be sent to the electronic lock, otherwise, it may be indicated that no person is at home, an unlocking event may be reported to the electronic device, where the unlocking event carries target identity information of the target object, and the target identity information may include at least one of the following: name, age, sex, people's face image, human image etc. do not do the injecing here, and then, owner can confirm the visitor's identity through identity information to whether the regular door that opens, of course, owner also knows who comes the visit, thereby, has guaranteed the security, has also promoted intelligent doorbell's intellectuality.
It can be seen that the doorbell control method described in the embodiments of the present application is applied to an intelligent doorbell, the intelligent doorbell includes a sensing module, an image acquiring module, an identity authenticating module, and a communication module, the sensing module detects whether a target object exists within a preset range of the intelligent doorbell, the image acquiring module acquires image information of the target object when the target object exists within the preset range of the intelligent doorbell, the identity authenticating module performs identity authentication through the image information, and the communication module transmits an unlocking instruction to the electronic lock when the identity authentication succeeds, so that the image information corresponding to the target object can be acquired when the intelligent doorbell detects the target object, and then the unlocking function can be realized when the identity authentication is passed based on the image information, that is, the unlocking function can be realized through the doorbell, thereby improving intelligence of the doorbell and also improving unlocking convenience, the user experience is improved.
In accordance with the foregoing, please refer to fig. 3, where fig. 3 is a schematic flowchart of a doorbell control method provided in an embodiment of the present application, and is applied to an intelligent doorbell in the doorbell control system shown in fig. 1A, as shown in the figure, the doorbell control method includes:
301. and detecting whether a target object exists in a preset range of the intelligent doorbell.
302. And when the target object exists in the preset range of the intelligent doorbell, acquiring the image information of the target object.
303. And performing identity authentication through the image information.
304. And when the identity authentication is successful, an unlocking instruction is sent to the electronic lock.
In one possible example, the following steps may be further included:
and after the target object exists in the preset range of the intelligent doorbell, establishing communication connection between the intelligent doorbell and the electronic lock.
In one possible example, the following steps may also be performed
After receiving feedback information sent by the electronic lock after unlocking is successful, recording unlocking information;
alternatively, the first and second electrodes may be,
and after the unlocking instruction is sent, recording the unlocking information.
In one possible example, a method comprising the steps of:
receiving a trigger instruction;
responding to the trigger instruction, and sending a video call request to the electronic equipment;
after the electronic equipment receives the video call request, a first video is sent to the electronic equipment, and the first video is used for assisting a user to decide whether to trigger an unlocking instruction.
In one possible example, the following steps may also be performed:
and continuously recording the video when the target object appears in the preset range and the target object leaves the preset range to obtain a second video, and storing the second video.
In one possible example, the following steps may also be performed:
carrying out target detection on the image information to obtain the total number of the target objects;
and when the total number is larger than the preset number, if the identity authentication fails, carrying out voice prompt to prompt a user to carry out identity verification.
Further, in a possible example, the following steps may be further performed:
and when the total number of the identity authentication modules is less than or equal to the preset number, if the identity authentication fails, closing operation is executed.
In one possible example, the step 302 of acquiring the image information of the target object may be implemented as follows:
and adjusting the angle parameter of the image acquisition module through the driving module, and acquiring the image information of the target object by using the adjusted angle parameter.
For the detailed description of the steps described in fig. 3, reference may be made to the corresponding steps of the doorbell control method described in fig. 2A, and details are not repeated here.
It can be seen that the doorbell control method described in the embodiment of the application can acquire the image information corresponding to the target object when the intelligent doorbell detects the target object, and then realize the unlocking function based on the image information under the condition of passing the identity authentication, that is, the unlocking function can be realized through the doorbell, so that the intelligence of the doorbell is improved, the unlocking convenience is also improved, and the user experience is improved.
Referring to fig. 4, in accordance with the above-mentioned embodiment, fig. 4 is a schematic structural diagram of an intelligent doorbell provided in an embodiment of the present application, as shown in the figure, the intelligent doorbell includes a processor, a memory, a communication interface, and one or more programs, the intelligent doorbell further includes a sensing module, an image obtaining module, an identity authentication module, and a communication module, the one or more programs are stored in the memory and configured to be executed by the processor, and in an embodiment of the present application, the programs include instructions for performing the following steps:
the induction module detects whether a target object exists in a preset range of the intelligent doorbell or not;
the image acquisition module acquires image information of the target object when the target object exists in a preset range of the intelligent doorbell;
the identity authentication module carries out identity authentication through the image information;
and the communication module sends an unlocking instruction to the electronic lock when the identity authentication is successful.
In one possible example, the program further includes instructions for performing the steps of:
and the communication module establishes communication connection between the intelligent doorbell and the electronic lock after the target object exists in the preset range of the intelligent doorbell.
In one possible example, the smart doorbell further comprises a memory, the program further comprising instructions for:
the memory records unlocking information after receiving feedback information sent by the electronic lock after the electronic lock is successfully unlocked;
alternatively, the first and second electrodes may be,
and after the memory sends the unlocking instruction, recording the unlocking information.
In one possible example, the smart doorbell further comprises a triggering module, the program further comprising instructions for:
the trigger module receives a trigger instruction;
the communication module responds to the trigger instruction and sends a video call request to the electronic equipment;
after the electronic equipment receives the video call request, a first video is sent to the electronic equipment, and the first video is used for assisting a user to decide whether to trigger an unlocking instruction.
In one possible example, the program further includes instructions for performing the steps of:
and the image acquisition module continuously records the video when the target object appears in the preset range and when the target object leaves the preset range, so as to obtain a second video, and the second video is stored.
In one possible example, the smart doorbell further comprises an electro-acoustic module, the program further comprising instructions for:
the identity authentication module carries out target detection on the image information to obtain the total number of the target objects;
and when the total number of the electroacoustic modules is greater than the preset number, if the identity authentication fails, voice prompt is carried out to prompt a user to change the identity for identity verification.
In one possible example, the program further includes instructions for performing the steps of:
and when the total number of the identity authentication modules is less than or equal to the preset number, if the identity authentication fails, closing operation is executed.
In one possible example, the smart doorbell further comprises a driver module, and in the aspect of acquiring the image information of the target object, the above program comprises instructions for performing the following steps:
and adjusting the angle parameter of the image acquisition module through the driving module, and acquiring the image information of the target object by using the adjusted angle parameter.
It can be seen that the intelligent doorbell described in the embodiments of the present application comprises a sensing module, an image acquisition module, an identity authentication module, and a communication module, wherein the sensing module detects whether a target object exists within a preset range of the intelligent doorbell, the image acquisition module acquires image information of a target object when the target object exists in a preset range of the intelligent doorbell, the identity authentication module performs identity authentication through the image information, the communication module sends an unlocking instruction to the electronic lock when the identity authentication is successful, therefore, the intelligent doorbell can acquire the image information corresponding to the target object under the condition that the intelligent doorbell detects the target object, and then realize the unlocking function under the condition that the intelligent doorbell passes the identity authentication based on the image information, can realize the function of unblanking through the doorbell promptly, and then promote doorbell's intelligence, also promote the convenience of unblanking, promote user experience.
Embodiments of the present application also provide a computer storage medium, wherein the computer storage medium stores a computer program for electronic data exchange, the computer program enabling a computer to perform part or all of the steps of any one of the methods as described in the above method embodiments, and the computer includes an intelligent doorbell.
Embodiments of the present application also provide a computer program product comprising a non-transitory computer readable storage medium storing a computer program operable to cause a computer to perform some or all of the steps of any of the methods as described in the above method embodiments. The computer program product may be a software installation package, said computer comprising an intelligent doorbell.
It should be noted that, for simplicity of description, the above-mentioned method embodiments are described as a series of acts or combination of acts, but those skilled in the art will recognize that the present application is not limited by the order of acts described, as some steps may occur in other orders or concurrently depending on the application. Further, those skilled in the art should also appreciate that the embodiments described in the specification are preferred embodiments and that the acts and modules referred to are not necessarily required in this application.
In the foregoing embodiments, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus may be implemented in other manners. For example, the above-described embodiments of the apparatus are merely illustrative, and for example, the above-described division of the units is only one type of division of logical functions, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection of some interfaces, devices or units, and may be an electric or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit may be stored in a computer readable memory if it is implemented in the form of a software functional unit and sold or used as a stand-alone product. Based on such understanding, the technical solution of the present application may be substantially implemented or a part of or all or part of the technical solution contributing to the prior art may be embodied in the form of a software product stored in a memory, and including several instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the above-mentioned method of the embodiments of the present application. And the aforementioned memory comprises: a U-disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a removable hard disk, a magnetic or optical disk, and other various media capable of storing program codes.
Those skilled in the art will appreciate that all or part of the steps in the methods of the above embodiments may be implemented by associated hardware instructed by a program, which may be stored in a computer-readable memory, which may include: flash Memory disks, Read-Only memories (ROMs), Random Access Memories (RAMs), magnetic or optical disks, and the like.
The foregoing detailed description of the embodiments of the present application has been presented to illustrate the principles and implementations of the present application, and the above description of the embodiments is only provided to help understand the method and the core concept of the present application; meanwhile, for a person skilled in the art, according to the idea of the present application, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present application.

Claims (10)

1. The doorbell control method is applied to an intelligent doorbell, the intelligent doorbell comprises an induction module, an image acquisition module, an identity authentication module and a communication module, and the method comprises the following steps:
the induction module detects whether a target object exists in a preset range of the intelligent doorbell or not;
the image acquisition module acquires image information of the target object when the target object exists in a preset range of the intelligent doorbell;
the identity authentication module carries out identity authentication through the image information;
and the communication module sends an unlocking instruction to the electronic lock when the identity authentication is successful.
2. The method of claim 1, further comprising:
and the communication module establishes communication connection between the intelligent doorbell and the electronic lock after the target object exists in the preset range of the intelligent doorbell.
3. The method of claim 1 or 2, wherein the smart doorbell further comprises a memory, the method further comprising:
the memory records unlocking information after receiving feedback information sent by the electronic lock after the electronic lock is successfully unlocked;
alternatively, the first and second electrodes may be,
and after the memory sends the unlocking instruction, recording the unlocking information.
4. The method of claim 1 or 2, wherein the smart doorbell further comprises a triggering module, the method further comprising:
the trigger module receives a trigger instruction;
the communication module responds to the trigger instruction and sends a video call request to the electronic equipment;
after the electronic equipment receives the video call request, a first video is sent to the electronic equipment, and the first video is used for assisting a user to decide whether to trigger an unlocking instruction.
5. The method according to claim 1 or 2, characterized in that the method further comprises:
and the image acquisition module continuously records the video when the target object appears in the preset range and when the target object leaves the preset range, so as to obtain a second video, and the second video is stored.
6. The method of claim 1 or 2, wherein the smart doorbell further comprises an electro-acoustic module, the method further comprising:
the identity authentication module carries out target detection on the image information to obtain the total number of the target objects;
and when the total number of the electroacoustic modules is greater than the preset number, if the identity authentication fails, voice prompt is carried out to prompt a user to change the identity for identity verification.
7. The method of claim 5, further comprising:
and when the total number of the identity authentication modules is less than or equal to the preset number, if the identity authentication fails, closing operation is executed.
8. A doorbell control method is applied to an intelligent doorbell, and comprises the following steps:
detecting whether a target object exists in a preset range of the intelligent doorbell or not;
when the target object exists in the preset range of the intelligent doorbell, acquiring image information of the target object;
performing identity authentication through the image information;
and when the identity authentication is successful, an unlocking instruction is sent to the electronic lock.
9. An intelligent doorbell, comprising a processor, a memory for storing one or more programs and configured to be executed by the processor, the programs comprising instructions for performing the steps in the method of any one of claims 1-7.
10. A computer-readable storage medium, characterized in that a computer program for electronic data exchange is stored, wherein the computer program causes a computer to perform the method according to any one of claims 1-7.
CN202111525092.1A 2021-12-14 2021-12-14 Doorbell control method, intelligent doorbell and related equipment Pending CN114267105A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111525092.1A CN114267105A (en) 2021-12-14 2021-12-14 Doorbell control method, intelligent doorbell and related equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111525092.1A CN114267105A (en) 2021-12-14 2021-12-14 Doorbell control method, intelligent doorbell and related equipment

Publications (1)

Publication Number Publication Date
CN114267105A true CN114267105A (en) 2022-04-01

Family

ID=80826942

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111525092.1A Pending CN114267105A (en) 2021-12-14 2021-12-14 Doorbell control method, intelligent doorbell and related equipment

Country Status (1)

Country Link
CN (1) CN114267105A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115035644A (en) * 2022-05-24 2022-09-09 淮阴工学院 Multi-mode identification access control system based on raspberry group and RFID
CN116798153A (en) * 2023-06-13 2023-09-22 浙江德塔森特数据技术有限公司 Access control authorization opening method and device
CN117743631A (en) * 2024-02-21 2024-03-22 深圳市卓悦智能技术有限公司 Control method and device of intelligent doorbell, intelligent doorbell and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106780922A (en) * 2017-01-20 2017-05-31 浙江小尤鱼智能技术有限公司 A kind of intelligent access control system
US20190066470A1 (en) * 2017-08-31 2019-02-28 Hanwha Techwin Co., Ltd. Doorbell system and security method thereof
KR20200044223A (en) * 2018-10-12 2020-04-29 문창훈 Security service system using IOT-based smart door lock
CN111131695A (en) * 2019-12-12 2020-05-08 深圳市大拿科技有限公司 Doorbell control method and related device
CN111914640A (en) * 2020-06-30 2020-11-10 上海小蚁科技有限公司 Intelligent doorbell control method and system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106780922A (en) * 2017-01-20 2017-05-31 浙江小尤鱼智能技术有限公司 A kind of intelligent access control system
US20190066470A1 (en) * 2017-08-31 2019-02-28 Hanwha Techwin Co., Ltd. Doorbell system and security method thereof
KR20200044223A (en) * 2018-10-12 2020-04-29 문창훈 Security service system using IOT-based smart door lock
CN111131695A (en) * 2019-12-12 2020-05-08 深圳市大拿科技有限公司 Doorbell control method and related device
CN111914640A (en) * 2020-06-30 2020-11-10 上海小蚁科技有限公司 Intelligent doorbell control method and system

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115035644A (en) * 2022-05-24 2022-09-09 淮阴工学院 Multi-mode identification access control system based on raspberry group and RFID
CN116798153A (en) * 2023-06-13 2023-09-22 浙江德塔森特数据技术有限公司 Access control authorization opening method and device
CN116798153B (en) * 2023-06-13 2024-02-27 浙江德塔森特数据技术有限公司 Access control authorization opening method and device
CN117743631A (en) * 2024-02-21 2024-03-22 深圳市卓悦智能技术有限公司 Control method and device of intelligent doorbell, intelligent doorbell and storage medium

Similar Documents

Publication Publication Date Title
US11399157B2 (en) Augmenting and sharing data from audio/video recording and communication devices
US10475311B2 (en) Dynamic assessment using an audio/video recording and communication device
CN107065586B (en) Interactive intelligent home service system and method
US10402989B2 (en) Neighborhood alert mode for triggering multi-device recording, multi-camera motion tracking, and multi-camera event stitching for audio/video recording and communication devices
CN114267105A (en) Doorbell control method, intelligent doorbell and related equipment
US11196966B2 (en) Identifying and locating objects by associating video data of the objects with signals identifying wireless devices belonging to the objects
US10511810B2 (en) Accessing cameras of audio/video recording and communication devices based on location
US20180233010A1 (en) Neighborhood alert mode for triggering multi-device recording, multi-camera motion tracking, and multi-camera event stitching for audio/video recording and communication devices
CN107564144A (en) A kind of intelligent robot gate control system and control method
CN106504390A (en) Control method for door lock, apparatus and system
US10839204B2 (en) Sharing identification data with audio/video recording and communication devices and local processing of the shared data
US11024138B2 (en) Adjustable alert tones and operational modes for audio/video recording and communication devices based upon user location
US11749038B2 (en) Facial recognition frictionless access control
KR102237086B1 (en) Apparatus and method for controlling a lobby phone that enables video surveillance through a communication terminal that can use a 5G mobile communication network based on facial recognition technology
US11195408B1 (en) Sending signals for help during an emergency event
US11349707B1 (en) Implementing security system devices as network nodes
US10733857B1 (en) Automatic alteration of the storage duration of a video
CN111373453A (en) Entrance monitoring system with radio and face recognition mechanism
CN111554025A (en) Passing method, device and system
CN112352408B (en) Intruder detection method and device
WO2018187451A1 (en) Augmenting and sharing data from audio/video recording and communication devices
CN108492415A (en) A kind of internet safety-protection system
US10863146B1 (en) Setup and configuration of audio/video recording and communication devices
CN116225235B (en) Data processing method, device, equipment and medium
CN113645045B (en) Security control method, device and equipment in TEE and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination