WO2016202083A1 - Procédé et appareil permettant de commander un dispositif de surveillance - Google Patents
Procédé et appareil permettant de commander un dispositif de surveillance Download PDFInfo
- Publication number
- WO2016202083A1 WO2016202083A1 PCT/CN2016/079665 CN2016079665W WO2016202083A1 WO 2016202083 A1 WO2016202083 A1 WO 2016202083A1 CN 2016079665 W CN2016079665 W CN 2016079665W WO 2016202083 A1 WO2016202083 A1 WO 2016202083A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- terminal
- monitoring device
- information
- wlan network
- user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
Definitions
- the present invention relates to the field of communications, and in particular, to a monitoring device control method and apparatus.
- the monitoring equipment occupies a vital position.
- the video recording function of the camera is a commonly used function.
- the video recording function generally requires a person. Manually turning on and off, that is, manual intervention is required, which will bring inconvenience to the user, and if there is a master or other recording function that does not need to turn on the camera at home, if there is no manual to turn off the video recording function of the camera This function will be on in the same state. Turning on the recording function of the camera will also cause waste of recording storage resources.
- a main object of the present invention is to provide a monitoring device control method and apparatus, so as to at least solve the problem that the monitoring device that is required in the related art requires manual control by a person, and the user experience is not high.
- a monitoring device control method includes: determining information of a terminal connected to a wireless local area network (WLAN) WLAN network; and controlling the monitoring device according to information of the terminal.
- WLAN wireless local area network
- controlling the monitoring device according to the information of the terminal includes: determining whether the information of the terminal meets a closing rule of the monitoring device; if the determination result is yes, the monitoring device is shut down or the monitoring is maintained. The off state of the device; and/or, if the determination result is no, the monitoring device is turned on or the on state of the monitoring device is maintained.
- the information about the terminal includes at least one of: a password input when the terminal connects to the WLAN network, and media access control MAC information of the terminal.
- the closing rule includes at least one of the following: when the terminal connects to the WLAN network, The entered password is correct; the MAC information of the terminal matches the preset MAC information database; the password input when the terminal connects to the WLAN network is correct, and the number of terminals successfully connected to the WLAN network exceeds a first predetermined threshold; the MAC information of the terminal matches a preset MAC information database, and the number of terminals simultaneously connected to the WLAN network exceeds a second predetermined threshold.
- the monitoring device comprises at least one of the following: a camera, an infrared detector, and an acousto-optic sensor.
- a monitoring device control apparatus comprising: a determining module configured to determine information of a terminal connected to a wireless local area network WLAN network; and a control module configured to control the monitoring device according to information of the terminal.
- control module includes: a determining unit, configured to determine whether the information of the terminal meets a closing rule of the monitoring device; and the closing unit is configured to close the monitoring device if the determination result is yes Or maintaining the closed state of the monitoring device; and/or, the opening unit is configured to enable the monitoring device or maintain the open state of the monitoring device if the determination result is negative.
- the information about the terminal includes at least one of: a password input when the terminal connects to the WLAN network, and media access control MAC information of the terminal.
- the closing rule includes at least one of the following: a password input when the terminal connects to the WLAN network is correct; the MAC information of the terminal matches a preset MAC information database; and the terminal is connected.
- the password entered in the WLAN network is correct, and the number of terminals successfully connected to the WLAN network exceeds a first predetermined threshold; the MAC information of the terminal matches a preset MAC information database, and the connection is simultaneously The number of terminals of the WLAN network exceeds a second predetermined threshold.
- the monitoring device comprises at least one of the following: a camera, an infrared detector, and an acousto-optic sensor.
- Another embodiment of the present invention provides a computer storage medium storing execution instructions for performing the method in the above embodiments.
- the method of determining the information of the terminal connected to the WLAN network of the wireless local area network and controlling the monitoring device according to the information of the terminal solves the problem that the monitoring device in the related art needs manual control of the user and the user experience is not high. Thereby, the monitoring device can be turned on and off without manual intervention, thereby improving the user experience.
- FIG. 1 is a flow chart of a method for controlling a monitoring device according to an embodiment of the present invention
- FIG. 2 is a structural block diagram of a monitoring device control apparatus according to an embodiment of the present invention.
- FIG. 3 is a structural block diagram of a control module 24 in a monitoring device control apparatus according to an embodiment of the present invention
- FIG. 4 is a system block diagram of monitoring device control according to an embodiment of the present invention.
- FIG. 5 is a flowchart of the user information monitoring module 404 in operation according to an embodiment of the present invention.
- FIG. 6 is a flow diagram of the camera configuration management module 406 in accordance with an embodiment of the present invention.
- FIG. 1 is a flowchart of a method for controlling a monitoring device according to an embodiment of the present invention. As shown in FIG. 1 , the method includes:
- Step S102 determining information of a terminal connected to the WLAN network of the wireless local area network
- Step S104 Control the monitoring device according to the information of the terminal.
- the information of the terminal connected to the wireless local area network (WLAN) network is determined, and the manner of monitoring the device is controlled according to the information of the terminal, so that the wireless human intervention can be performed according to the connection.
- the information of the terminal of the WLAN network controls the monitoring device.
- the problem that the monitoring device in the related art needs manual control of the user is not high, so that the monitoring device can be turned on and off according to the information of the terminal connected to the WLAN network, without manual intervention. Additional hardware needs to be added.
- the information of the terminal associated with the WLAN network is used to enable and disable the monitoring device, thereby improving the user experience.
- the method may be: determining whether the information of the terminal meets the closing rule of the monitoring device, and closing the monitoring device if the determination result is yes.
- the monitoring device is turned off, and/or the monitoring device is turned on or the monitoring device is turned on when the determination result is negative. Whether the information according to the above terminal meets the closing rules Then, the control of the opening and/or closing of the monitoring device can be realized without manual intervention.
- the information about the terminal may include at least one of the following: a password input when the terminal connects to the WLAN network, and media access control MAC information of the terminal.
- a password input when the terminal connects to the WLAN network may be included in the information about the terminal.
- media access control MAC information of the terminal may be included in the information about the terminal.
- the user does not frequently change the terminal in a short time, because the information of the terminal can be used to uniquely identify the terminal, and the access password of the WLAN network is It is difficult for a stranger to know, so that it is possible to judge whether the user is currently at home according to the information of the terminal connected to the WLAN network, and to turn on and/or off the monitoring device according to the determined situation.
- the closing rule may include at least one of the following: the password input when the terminal connects to the WLAN network is correct; the MAC information of the terminal matches the preset MAC information database; and the terminal inputs when the WLAN network is connected.
- the number of terminals that are successfully connected to the WLAN network exceeds a first predetermined threshold; the MAC information of the terminal matches the database of the preset MAC information, and the number of terminals connected to the WLAN network exceeds a second predetermined threshold.
- the monitoring device may be turned off or the closed state of the monitoring device may be maintained.
- a WLAN network includes an encrypted network and an open network.
- the WLAN network is an encrypted network
- the terminal user is a legitimate user, and the home is In the application scenario, it means that someone is at home at this time, and thus there is no need to turn on the monitoring device.
- the terminal can directly access the WLAN network without password verification. In this case, whether the MAC information of the terminal accessing the WLAN network matches the preset MAC information database, To determine whether the end user is a legitimate user. Because the MAC information of the terminal can uniquely identify a terminal, if the MAC information of the terminal is successfully matched, the terminal user is a legitimate user. For the home application scenario, it indicates that someone is at home at this time, and thus there is no need to open the monitoring device. . Otherwise, it indicates that the terminal user is illegal, and the monitoring device will be turned on or the monitoring device will be kept open. In this way, it is possible to ensure that illegal users are monitored without monitoring legitimate users, which saves the amount of monitoring resources that need to be stored to some extent.
- the password verification for accessing the WLAN network and the matching verification for the MAC information of the terminal may also be combined to determine whether the terminal user is a legitimate user, thereby further enhancing the security of the end user environment.
- the first preset threshold and the second preset threshold may both be 1, that is, after determining that the first legal terminal (ie, the terminal of the legitimate user) is online (and successfully accesses the WLAN network)
- the monitoring device is turned off. After the second legal terminal is online, the monitoring device is in the closed state because the other legal terminal is online. In this case, only the online message of the second legal terminal can be saved. If a legitimate terminal is found offline (ie, disconnecting from the WLAN network), but when there are still other legitimate terminals online, you do not need to enable the monitoring device, you only need to save the offline message of the terminal; when all legal terminals are offline, you need to enable the monitoring device. .
- the monitoring device maintains the open state until the third is determined. After the legal terminal is online, turn off the monitoring device. If you continue to monitor the presence of a legitimate terminal in the future, only the online status of these legitimate terminals will be recorded.
- the monitoring device is kept off until the number of legitimate terminals online is less than 3, and the monitoring device is turned on, although there may still be 2 at this time. The legal terminal is online.
- the first predetermined threshold and the second predetermined threshold in the above embodiments may be the same or different.
- the monitoring device may include, but is not limited to, at least one of the following devices: a camera, an infrared detector, and an acousto-optic sensor.
- the method according to the above embodiment can be implemented by means of software plus a necessary general hardware platform, and of course, by hardware, but in many cases, the former is A better implementation.
- the technical solution of the present invention which is essential or contributes to the prior art, may be embodied in the form of a software product stored in a storage medium (such as ROM/RAM, disk,
- the optical disc includes a number of instructions for causing a terminal device (which may be a cell phone, a computer, a server, or a network device, etc.) to perform the methods described in various embodiments of the present invention.
- a monitoring device control device is also provided, which is used to implement the above-mentioned embodiments and optional embodiments, and has not been described again.
- the term “module” may implement a combination of software and/or hardware of a predetermined function.
- the apparatus described in the following embodiments is preferably implemented in software, hardware, or a combination of software and hardware, is also possible and contemplated.
- FIG. 2 is a block diagram showing the structure of a monitoring device control device according to an embodiment of the present invention. As shown in FIG. 2, the device includes a determining module 22 and a control module 24. The device will be described below.
- the determining module 22 is configured to determine information of a terminal connected to the WLAN network of the wireless local area network; the control module 24 is connected to the determining module 22, and is configured to control the monitoring device according to the information of the terminal.
- control module 24 in a monitoring device control device according to an embodiment of the present invention.
- the control module 24 includes: a determining unit 32, a closing unit 34, and an opening unit 36. Be explained.
- the determining unit 32 is configured to determine whether the information of the terminal meets the closing rule of the monitoring device;
- the unit 34 is connected to the determining unit 32, and is configured to turn off the monitoring device or maintain the closed state of the monitoring device if the determination result of the determining unit 32 is YES; and/or, the opening unit 36 is connected to the determining unit 32. It is set to turn on the monitoring device or maintain the on state of the monitoring device if the determination result of the above determining unit 32 is negative.
- each of the above modules may be implemented by software or hardware.
- the following forms may be used, but are not limited thereto: the determining module 22 and the control module 24 are located in the same processor, or the determining module is 22 and control module 24 are located in the first processor and the second processor, respectively.
- the information about the terminal may include at least one of the following: a password input when the terminal connects to the WLAN network, and media access control MAC information of the terminal.
- the information of the terminal may also be other information that can uniquely identify the terminal, and is not limited thereto.
- the closing rule may include at least one of the following: the password input when the terminal connects to the WLAN network is correct; the MAC information of the terminal matches the preset MAC information database; and the terminal inputs when the WLAN network is connected. The number of terminals that are successfully connected to the WLAN network exceeds a first predetermined threshold; the MAC information of the terminal matches the database of the preset MAC information, and the number of terminals connected to the WLAN network exceeds a second predetermined threshold.
- the WLAN network includes both an encrypted network and an open network.
- the WLAN network is an encrypted network
- the terminal user is a legitimate user for the home application scenario. In other words, it means that someone is at home at this time, so there is no need to turn on the monitoring device.
- the terminal can directly access the WLAN network without password verification. In this case, whether the MAC information of the terminal accessing the WLAN network matches the preset MAC information database, To determine whether the end user is a legitimate user. Because the MAC information of the terminal can uniquely identify a terminal, if the MAC information of the terminal is successfully matched, the terminal user is a legitimate user. For the home application scenario, it indicates that someone is at home at this time, and thus there is no need to open the monitoring device. . Otherwise, the terminal user is illegal, and the opening unit 36 will open the monitoring device or continue to maintain the monitoring device. In this way, it is possible to ensure that illegal users are monitored without monitoring legitimate users, which saves the amount of monitoring resources that need to be stored to some extent.
- the password verification for accessing the WLAN network and the matching verification for the MAC information of the terminal may also be combined to determine whether the terminal user is a legitimate user, thereby further enhancing the security of the end user environment.
- the first preset threshold and the second preset threshold may both be 1, that is, after determining that the first legal terminal (ie, the terminal of the legitimate user) is online (and successfully accesses the WLAN network)
- the closing unit 34 turns off the monitoring device; when the second legal terminal is online, since the other legal terminals are online, the monitoring device is set.
- the standby device is already in the shutdown state. In this case, only the online message of the second legal terminal can be saved. . If a legitimate terminal is offline (that is, disconnected from the WLAN network), but there are still other legitimate terminals online, you do not need to enable the monitoring device, you only need to save the offline message of the terminal; when all legal terminals are offline Then, the unit 36 needs to be turned on to turn on the monitoring device.
- the monitoring device maintains the open state until the third is determined.
- the closing unit 34 determines to close the monitoring device. If the terminal continues to monitor the connection, the terminal only records the online status of the terminal. When the terminal is offline, the number of legitimate terminals at the same time is still greater than 3. The closed state of the device until the number of simultaneously online terminals is less than 3, the opening unit 36 turns on the monitoring device, although there may still be two terminals online at this time.
- the first predetermined threshold and the second predetermined threshold in the above embodiments may be the same or different.
- the monitoring device includes, but is not limited to, at least one of the following: a camera, an infrared detector, and an acousto-optic sensor.
- the method proposed by the present invention can be applied to the security system of the smart home, and can automatically turn on and off the monitoring and storage system of the camera according to the needs of the user, without the active intervention of the person, and the operation is flexible. And can save storage resources.
- the monitoring device may be a camera
- the application scenario may be a user's residence
- the associated information of the WLAN network of the home gateway and the network device may be utilized to control the opening and closing of the camera.
- the purpose of the embodiment of the present invention is to change the shortcoming of the camera opening and closing operation in the home security system in the related art, thereby providing a method for automatically turning on and off the video recording function of the camera according to whether the user is at home. No need for the user's active intervention, no need to add additional hardware, on the basis of retaining the original switch function, the user's network device is associated with the data information of the WLAN network to automatically turn on and off the camera monitoring and recording function.
- FIG. 4 is a system block diagram of a monitoring device control according to an embodiment of the present invention. As shown in FIG. 4, the system includes the following modules:
- the WLAN network management module 402 manages data information associated with the WLAN network by the user network device.
- the user information monitoring module 404 (the same as the determining module 22 and the control module 24 described above) monitors the data information of the user connected to the home gateway through the WLAN, and controls the opening and closing of the camera according to the data information.
- the camera configuration management module 406 (same as the control module 24 described above) is provided to the configuration interface of the monitoring module to configure the camera to be turned on and off.
- the home gateway universal module in FIG. 4 belongs to the home network access system and does not belong to the monitoring device control system. Of course, the home gateway universal module can also be included in the monitoring device control system.
- the user can configure the MAC information of the home network device, including the MAC information of the computer and the mobile phone, and the home gateway saves the MAC information in the database, and the user information monitoring module 404 stores the MAC address of the associated device according to the MAC address of the associated device.
- the MAC in the database is matched to confirm the identity information of the user.
- the user's network device including the computer, the mobile phone, etc., must be connected to the WLAN network through the WLAN encryption check, so that the device access information and/or MAC matching information can be accessed through the WLAN network ( Same as the above MAC information) to confirm the identity information of the user. If it is an open WLAN network, the user can confirm the identity information of the user only through the MAC matching information of the device.
- the camera configuration management module 406 is used to disable the video recording and storage functions of the camera. If no user's device is associated with the WLAN network, turn on the video recording and storage function of the camera.
- the monitoring device control system in the embodiment of the present invention can flexibly open and close the camera according to the data information of the access WLAN network, thereby arming and disarming the security system of the entire smart home, and reducing the use of storage resources. And human intervention to improve the efficiency of equipment use.
- This approach eliminates the need for any hardware and is practically available in a home environment to achieve the flexibility and applicability of a smart home security system.
- the WLAN network management module 402 is configured to collect user identity information when the network device is accessed, and then send the information to the user information monitoring module 404 for analysis processing.
- the WLAN network management module 402 sends a device uplink message to the user information monitoring module 404 when the network device is online, and sends the MAC information of the online device to the user information monitoring module 404.
- the network device is offline, the user information is monitored.
- the module 404 sends a device down message and sends the MAC information of the offline device to the user information monitoring module 404.
- the WLAN network includes both an encrypted network and an open network.
- the encrypted network can use the encrypted password of the WLAN network and the matching information of the device MAC to verify the identity of the user; the open network user can directly connect to the WLAN network, and only through the MAC of the device. Match information to verify user identity.
- FIG. 5 is a flowchart of the user information monitoring module 404 according to an embodiment of the present invention. As shown in FIG. 5, the user information monitoring module 404 analyzes the device information sent by the WLAN network side as follows:
- Step S502 querying the online and offline messages of the user terminal.
- the network device is a device of the user owner, including:
- Step S504 querying an encryption mode of the WLAN network.
- Step S506 matching the MAC information of the database.
- Step S504 and step S506 include the following cases:
- the user configures the MAC information of the home network device through the web, and whether the WLAN network is in the encryption mode or the open mode, the MAC information is matched to determine whether the network device of the uplink and the line is the device of the user owner.
- the user does not configure the MAC information of the home network device, but the WLAN network is in the encryption mode, and may not match the MAC message, and only processes according to the online and offline messages of the network device.
- the user neither configures the MAC information of the home network device, and the WLAN network is in the open mode, and the module 404 sends a detection failure message.
- Step S508 analyzing device information.
- step S510 After determining the upper and lower lines of the user terminal and analyzing the data information of the user terminal, step S510 can be performed.
- step S510 the monitoring result is sent to the camera configuration management module 406.
- the message of whether the camera is turned on or off is sent to the camera configuration management module 406 according to the online and offline message, and includes the following situations: the first predetermined threshold value and the second predetermined threshold value are taken as an example. Description):
- the first network device goes online, and sends a camera monitoring message to the camera configuration management module 406.
- the network device other than the first one is online, and other network devices are online, and only the online message of the device is saved.
- the camera configuration management module 406 is configured to receive the monitoring message sent by the user information monitoring module 404.
- FIG. 6 is a flowchart of the camera configuration management module 406 according to an embodiment of the present invention. As shown in FIG. 6, the process includes the following steps. :
- Step S602 receiving information of the user information monitoring module 404;
- Step S604 determining whether to perform the operation of turning on the camera or turning off the camera;
- Step S606 if the operation of the camera is turned on, the interface for turning on the camera is called;
- Step S608 if the operation of the camera is turned off, the interface for closing the camera is called.
- the camera configuration management module 406 also supports the interface expansion of the monitoring device. If the home security system includes other monitoring devices, such as an infrared detector, an acousto-optic sensor, etc., if the user needs to automatically disarm and arm the device, only the device needs to be added.
- the operation interface can be.
- embodiments of the present invention also provide a storage medium.
- the foregoing storage medium may be configured to store program code for performing the following steps:
- the foregoing storage medium may include, but is not limited to, a USB flash drive, a Read-Only Memory (ROM), and a Random Access Memory (RAM).
- ROM Read-Only Memory
- RAM Random Access Memory
- the processor performs, according to the stored program code in the storage medium, whether the information of the terminal is consistent with the closing rule of the monitoring device, and if the determination result is yes, the monitoring device is shut down or maintained.
- the monitoring device is turned off, and/or, when the determination result is negative, the monitoring device is turned on or the monitoring device is turned on.
- the embodiment of the present invention achieves the following beneficial effects: in the security system of the smart home, the monitoring and storage system of the camera can be automatically turned on and off according to the needs of the user, without the active intervention of the person, the operation is relatively simple. Flexible and saves storage resources. At the same time, it supports the expansion of other security equipment including infrared detectors, sound and light detectors, etc., so that the automatic home security system can be automatically armed and disarmed.
- the monitoring device control method and apparatus provided by the embodiments of the present invention have the following beneficial effects: solving the problem that the monitoring device that needs to be manually controlled by the related art in the related art has a low user experience, and thus can be The monitoring device is turned on and off without manual intervention, which improves the user experience.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Small-Scale Networks (AREA)
- Selective Calling Equipment (AREA)
Abstract
La présente invention porte sur un procédé et sur un appareil permettant de commander un dispositif de surveillance. Le procédé consiste à : déterminer des informations concernant un terminal se connectant à un réseau local sans fil (WLAN pour Wireless Local Area Network) ; et commander un dispositif de surveillance en fonction des informations concernant le terminal. Le procédé résout le problème dans l'état de la technique associé selon lequel l'expérience de l'utilisateur n'est pas grande parce qu'un dispositif de surveillance doit être commandé manuellement de telle sorte qu'un dispositif de surveillance puisse être allumé ou éteint sans intervention manuelle, ce qui permet d'améliorer l'expérience de l'utilisateur.
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201510329266.5 | 2015-06-15 | ||
| CN201510329266.5A CN106330580A (zh) | 2015-06-15 | 2015-06-15 | 监控设备控制方法及装置 |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2016202083A1 true WO2016202083A1 (fr) | 2016-12-22 |
Family
ID=57546756
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/CN2016/079665 Ceased WO2016202083A1 (fr) | 2015-06-15 | 2016-04-19 | Procédé et appareil permettant de commander un dispositif de surveillance |
Country Status (2)
| Country | Link |
|---|---|
| CN (1) | CN106330580A (fr) |
| WO (1) | WO2016202083A1 (fr) |
Families Citing this family (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN107040656A (zh) * | 2017-03-31 | 2017-08-11 | 上海斐讯数据通信技术有限公司 | 一种监控方法 |
| US10740494B2 (en) * | 2017-09-06 | 2020-08-11 | Google Llc | Central and delegate security processors for a computing device |
| CN107505848B (zh) * | 2017-09-07 | 2021-04-23 | 上海犀科环境科技有限公司 | 具有自我学习及动态调整功能的智能家居控制方法 |
| CN107734299A (zh) * | 2017-10-12 | 2018-02-23 | 广州视源电子科技股份有限公司 | 监控控制方法、装置、监控设备及存储介质 |
Citations (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20100138007A1 (en) * | 2008-11-21 | 2010-06-03 | Qwebl, Inc. | Apparatus and method for integration and setup of home automation |
| CN102714885A (zh) * | 2010-01-12 | 2012-10-03 | 三星电子株式会社 | 在便携式终端中自动连接短距离无线网络的方法和设备 |
| CN103646328A (zh) * | 2013-12-06 | 2014-03-19 | 上海众人网络安全技术有限公司 | 一种基于摄像头的安全支付方法 |
| CN103929742A (zh) * | 2014-04-22 | 2014-07-16 | 杭州爱纬斯电子有限公司 | 移动终端借道WiFi安全共享网络摄像头的方法及智控装置 |
| CN104703232A (zh) * | 2015-03-23 | 2015-06-10 | 上海海莱威无线通信技术有限公司 | 一种自动识别移动终端是否回家的方法 |
Family Cites Families (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN103838155A (zh) * | 2012-11-27 | 2014-06-04 | 海尔集团公司 | 家庭安防控制方法、家庭服务器及安防控制系统 |
| CN104062921B (zh) * | 2014-06-27 | 2017-07-07 | 广州视源电子科技股份有限公司 | 一种智能控制家电的方法 |
| CN104093008B (zh) * | 2014-08-01 | 2017-12-15 | 北京奇虎科技有限公司 | 摄像装置、视频监控系统以及视频监控方法 |
-
2015
- 2015-06-15 CN CN201510329266.5A patent/CN106330580A/zh active Pending
-
2016
- 2016-04-19 WO PCT/CN2016/079665 patent/WO2016202083A1/fr not_active Ceased
Patent Citations (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20100138007A1 (en) * | 2008-11-21 | 2010-06-03 | Qwebl, Inc. | Apparatus and method for integration and setup of home automation |
| CN102714885A (zh) * | 2010-01-12 | 2012-10-03 | 三星电子株式会社 | 在便携式终端中自动连接短距离无线网络的方法和设备 |
| CN103646328A (zh) * | 2013-12-06 | 2014-03-19 | 上海众人网络安全技术有限公司 | 一种基于摄像头的安全支付方法 |
| CN103929742A (zh) * | 2014-04-22 | 2014-07-16 | 杭州爱纬斯电子有限公司 | 移动终端借道WiFi安全共享网络摄像头的方法及智控装置 |
| CN104703232A (zh) * | 2015-03-23 | 2015-06-10 | 上海海莱威无线通信技术有限公司 | 一种自动识别移动终端是否回家的方法 |
Also Published As
| Publication number | Publication date |
|---|---|
| CN106330580A (zh) | 2017-01-11 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| KR101673238B1 (ko) | 연결 관리 방법, 장치, 전자 기기, 프로그램 및 저장매체 | |
| CA2906195C (fr) | Profils d'acces a un systeme de securite | |
| JP6599341B2 (ja) | 動的ネットワークアクセス管理のための方法、デバイスおよびシステム | |
| WO2016184195A1 (fr) | Procédé, appareil et terminal de commande de verrouillage de porte | |
| US20160087976A1 (en) | Technologies for sensor action verification | |
| CN107770137A (zh) | 一种信息处理方法和装置 | |
| CN106559213B (zh) | 设备管理方法、设备及系统 | |
| CN103518205B (zh) | 限制操作权限的方法及自动化设备 | |
| CN104809046B (zh) | 一种应用程序联网控制方法和应用程序联网控制装置 | |
| WO2016202083A1 (fr) | Procédé et appareil permettant de commander un dispositif de surveillance | |
| CN105392137A (zh) | 家庭wifi防盗用的方法、无线路由器及终端设备 | |
| CA3058105A1 (fr) | Surveillance d`evenements | |
| US20230224355A1 (en) | Providing network access via communal device | |
| CN110719583B (zh) | 一种通信方法及装置 | |
| US11153387B2 (en) | Decentralized network protected IoT query resolution | |
| CN114244568A (zh) | 基于终端访问行为的安全接入控制方法、装置和设备 | |
| WO2018107544A1 (fr) | Dispositif intelligent et appareil électroménager | |
| CN106303371A (zh) | 拍照监控系统、方法及移动终端 | |
| CN112035807A (zh) | 对象认证方法和装置、存储介质和电子装置 | |
| CN102387494A (zh) | 一种基于Android手机平台的远程自动化信息交换和操控的解决方案 | |
| CN117319464A (zh) | 一种基于安防集成平台的数据处理方法及装置 | |
| US10964200B2 (en) | Anti-theft method and apparatus | |
| CN110430164A (zh) | 一种网络摄像头监控方法、装置、系统及存储介质 | |
| CN108965319A (zh) | 设备控制方法、系统和存储介质 | |
| CN106953873A (zh) | 一种加密设备加密信息的安全管理系统 |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 16810824 Country of ref document: EP Kind code of ref document: A1 |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| 122 | Ep: pct application non-entry in european phase |
Ref document number: 16810824 Country of ref document: EP Kind code of ref document: A1 |