WO2021114700A1 - Procédé et système de sécurité, dispositif électronique, support de stockage, et dispositif de commande intelligent - Google Patents

Procédé et système de sécurité, dispositif électronique, support de stockage, et dispositif de commande intelligent Download PDF

Info

Publication number
WO2021114700A1
WO2021114700A1 PCT/CN2020/108537 CN2020108537W WO2021114700A1 WO 2021114700 A1 WO2021114700 A1 WO 2021114700A1 CN 2020108537 W CN2020108537 W CN 2020108537W WO 2021114700 A1 WO2021114700 A1 WO 2021114700A1
Authority
WO
WIPO (PCT)
Prior art keywords
wireless communication
preset
communication device
signal
device information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/CN2020/108537
Other languages
English (en)
Chinese (zh)
Inventor
叶盛世
谭泽汉
陈彦宇
李茹
朱鹏飞
马鑫磊
曾安福
黎小坚
黄忠岐
蔡琪
刘郑宇
杜洋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Gree Electric Appliances Inc of Zhuhai
Zhuhai Lianyun Technology Co Ltd
Original Assignee
Gree Electric Appliances Inc of Zhuhai
Zhuhai Lianyun Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Gree Electric Appliances Inc of Zhuhai, Zhuhai Lianyun Technology Co Ltd filed Critical Gree Electric Appliances Inc of Zhuhai
Publication of WO2021114700A1 publication Critical patent/WO2021114700A1/fr
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING SYSTEMS, e.g. PERSONAL CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/22Electrical actuation
    • G08B13/24Electrical actuation by interference with electromagnetic field distribution
    • G08B13/2491Intrusion detection systems, i.e. where the body of an intruder causes the interference with the electromagnetic field
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • H04L67/025Protocols based on web technology, e.g. hypertext transfer protocol [HTTP] for remote control or remote monitoring of applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/005Discovery of network devices, e.g. terminals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/22Processing or transfer of terminal data, e.g. status or physical capabilities
    • H04W8/24Transfer of terminal data

Definitions

  • the present disclosure relates to the field of communications, and in particular to a security method, system, electronic equipment, storage medium and intelligent controller.
  • the main purpose of the present disclosure is to propose a security method, system, electronic equipment, storage medium, and intelligent controller, which effectively avoids the problem of being unable to actively know whether someone is coming at home in the prior art.
  • the present disclosure has monitoring means. Secret and not easy to be discovered by others.
  • a security method includes: monitoring a signal access condition within a preset range, where the signal is a wireless communication signal; In time, according to the preset trusted device information list, it is determined whether the wireless communication device sending the signal is an untrusted device; when it is determined that the wireless communication device is the untrusted device, a preset alarm operation is performed.
  • determining whether the wireless communication device sending out the signal is the untrusted device according to a preset trusted device information list includes: acquiring device information of the wireless communication device sending out the signal; determining Whether the preset trusted device information list includes the device information of the wireless communication device; if it is determined that the preset trusted device information list does not include the device information of the wireless communication device, determine the The wireless communication device is the untrusted device.
  • the method further includes: counting the access duration of the signal; in a case where it is determined that the wireless communication device is the untrusted device, determining the value of the signal sent by the wireless communication device Whether the access duration exceeds a preset threshold; in the case where it is determined that the access duration exceeds the preset threshold, it is determined to perform a preset alarm operation.
  • the method further includes: uploading the device information of the wireless communication device to a cloud server; instructing the cloud server to count the access time of the device information of the wireless communication device, and determining When the wireless communication device is the untrusted device, instruct the cloud server to determine whether the access duration of the signal sent by the wireless communication device exceeds a preset threshold; when it is determined that the access duration exceeds the preset threshold, When the threshold is set, the cloud server is instructed to determine to perform a preset alarm operation.
  • the method before monitoring the signal access condition within the preset range, the method further includes: acquiring a monitoring start triggering instruction sent by the control terminal, where the monitoring start triggering instruction is Send by the control terminal periodically and at a preset time period, or send by the control terminal periodically, or send by the control terminal at a preset time period; according to the start monitoring trigger instruction , Determining to monitor the signal access condition within the preset range.
  • the method before monitoring the signal access condition within the preset range, further includes: obtaining a high-risk time period according to historical use time data of the associated smart device, and It is determined to monitor the signal access condition within the preset range during the high-risk time period.
  • the method before monitoring the signal access condition within the preset range, the method further includes: confirming the start time of the automatic detection function according to the historical record of the start instruction of triggering the monitoring function ; Determine whether the current time is the start time; if the current time is the start time, determine to monitor the signal access condition within the preset range at the current time; if the current time is not If it is the start time, it is determined to monitor the signal access condition within the preset range at the start time.
  • performing a preset alarm operation includes: obtaining a detection result uploaded by an associated smart device, where the detection result is characterized as the danger level of the wireless communication device; according to a preset danger level table, Perform a preset warning operation corresponding to the detection result, wherein the preset danger level table includes: at least one danger level, and a preset warning operation corresponding to each danger level in the at least one danger level.
  • the device information includes: a Bluetooth MAC address.
  • a security system configured to monitor signal access conditions within a preset range, and the signal is a wireless communication signal; The module is set to determine whether the wireless communication device sending the signal is an untrusted device based on the preset trusted device information list when the signal access is monitored; the security module is set to determine whether the wireless communication device is In the case of an untrusted device, perform a preset alarm operation.
  • an electronic device including a processor and a memory; the memory is configured to store computer instructions, and the processor is configured to run the computer instructions stored in the memory to implement One of the above-mentioned security methods.
  • a computer-readable storage medium stores one or more programs, and the one or more programs can be processed by one or more The device executes to realize the above-mentioned security method.
  • an intelligent controller including: an intelligent security device configured to execute the above-mentioned security method; or, the above-mentioned security system.
  • At least some of the embodiments of the present disclosure have the following beneficial effects: when a wireless communication device appears near a product at home, the device information of the wireless communication device can be directly obtained to determine whether the wireless communication device is safe. If it is not safe, the user can Knowing the situation at the first time and taking countermeasures can greatly improve the safety factor of the family, thus realizing the hidden and credible active monitoring of the home.
  • Fig. 1 is a flowchart of a security method according to one of the embodiments of the present disclosure.
  • Fig. 2 is a schematic diagram of an implementation process of a security method according to one of the embodiments of the present disclosure.
  • Fig. 3 is a flowchart of a security method according to an optional embodiment of the present disclosure.
  • Fig. 4 is a structural block diagram of a security system according to one of the embodiments of the present disclosure.
  • module means, “part” or “unit” used to indicate elements is only for facilitating the description of the present disclosure, and has no specific meaning in itself. Therefore, “module”, “part” or “unit” can be used in a mixed manner.
  • a security method includes: monitoring a signal access condition within a preset range, where the signal is a wireless communication signal; When entering, determine whether the wireless communication device sending the signal is an untrusted device according to the preset trusted device information list; in the case of determining that the wireless communication device is the untrusted device, perform a preset alarm operation.
  • the device information of the wireless communication device can be directly obtained to determine whether the wireless communication device is safe. If it is not safe, the user can know the situation at the first time and respond to it. Measures, which can greatly improve the safety factor of the family, so as to realize the concealed and credible active monitoring of the home.
  • Fig. 1 is a flowchart of a security method according to one of the embodiments of the present disclosure. As shown in Fig. 1, the security method is applied to smart products, including but not limited to: Rubik’s cube controller, air conditioner, smart door lock, smart refrigerator And smart camera. Specifically, the method includes:
  • the signal is a wireless communication signal.
  • the user needs to power on the smart product and open the matching product APP on the preset user terminal. Then, the smart product can monitor all wireless communication signals within the preset range. For example, the smart product monitors the wireless communication signal appearing near it, so as to detect the wireless communication device that sends the signal.
  • the preset range is not limited, and it can be automatically set by the system or by the user.
  • the preset range is a range with the smart product as the center and a diameter of 20m.
  • the specific methods for monitoring wireless communication signals involved in this article are not limited, which include, but are not limited to: BLE Bluetooth scanning technology and WiFi scanning technology.
  • step S1 One way to implement this step S1 is: the smart product periodically scans the Bluetooth signals sent by all surrounding wireless communication devices with Bluetooth and turned on Bluetooth, and communicates with the wireless communication devices that send these Bluetooth signals through Bluetooth. .
  • the execution timing of S1 is not limited, and the execution timing includes but is not limited to one or more of the following items: (1) Obtain the start monitoring trigger instruction sent by the control terminal, The start monitoring trigger instruction is sent by the control terminal periodically and in a preset time period, or sent by the control terminal periodically, or sent by the control terminal in a preset time period; The start monitoring trigger instruction determines to monitor the signal access condition within the preset range.
  • control terminal includes but is not limited to one or more of the following: PC, notebook PC, tablet PC, smart phone, wearable wireless communication device, embedded wireless communication device, smart home appliance or any combination thereof.
  • start monitoring trigger command sent by the smart phone every morning at 8 o'clock in the morning For example, get the start monitoring trigger command sent by the smart phone every 12 hours.
  • the high-risk time period refers to the time period when there is no one at home or there are only children at home.
  • the associated smart device is not limited, and it may be a TV or an air conditioner.
  • the high-risk time period in the home is inferred based on the analysis of the use frequency of the TV. During this time period, it is necessary to start monitoring the wireless communication signal within the preset range.
  • the monitoring mode will be automatically turned on at 8 o'clock.
  • step S2 When the signal access is monitored, determine whether the wireless communication device sending the signal is an untrusted device according to the preset trusted device information list; if so, perform the following step S4, otherwise, perform the following step S3;
  • the device information of the wireless communication device that sent the signal can be obtained, and then according to the preset trusted device information list, it is determined whether the connected wireless communication device is an untrusted device.
  • the alarm terminal (such as user terminal), automatically notify the property to alarm, activate the door lock to lock the door, or call the home camera for video recording.
  • the preset user terminal includes, but is not limited to: a mobile phone.
  • the smart product when it is determined that the wireless communication device is an untrusted device, the smart product performs a preset alarm operation.
  • the number of smart products is not limited, for example, at least one same or similar smart product is performing the above operations.
  • the device information of the wireless communication device can be directly obtained to determine whether the wireless communication device is safe. If it is not safe, the user can know the situation at the first time and respond to it. Measures, which can greatly improve the safety factor of the family, so as to realize the concealed and credible active monitoring of the home.
  • an implementation manner of the foregoing step S2 includes:
  • the method of acquiring the device information is not limited, as long as it meets the requirements of this embodiment.
  • the signal includes the device information of the wireless communication device that sends the signal. After analysis, the device information of the wireless communication device that sends out these connected signals can be obtained from it. Among them, the device information includes but is not limited to: Bluetooth MAC address.
  • step S22 Determine whether the device information of the wireless communication device is included in the preset trusted device information list; if so, perform the following step S4, otherwise, perform the above step S23;
  • the device information of the trusted device is pre-stored in the preset trusted device information list, that is, the smart product needs to pre-store the device information of the trusted wireless communication device, such as the Bluetooth MAC address of the trusted wireless communication device. If the device information of the connected wireless communication device is included in the preset trusted device information list, the wireless communication device is determined to be a trusted wireless communication device; otherwise, the wireless communication device is determined to be an untrusted device.
  • the Bluetooth MAC address of the trusted device is pre-stored in the preset trusted device information list; in this case, if the access is not stored in the preset trusted device information list
  • the Bluetooth MAC address of the wireless communication device can determine that the connected wireless communication device is an untrusted device; of course, if the Bluetooth MAC address of the connected wireless communication device is stored in the preset trusted device information list, you can Determine that the connected wireless communication device is a trusted device,
  • the method further includes:
  • the timing of actual recording is not limited in this embodiment, as long as it meets the requirements of this embodiment, for example, when it is determined that a signal is connected, the recording starts, or it can be based on a predetermined time. It is assumed that the recording is started when the trusted device information list determines that the wireless communication device is a trusted device, and the recording may also be started when the wireless communication device is determined to be an untrusted device according to the preset trusted device information list.
  • Step S232 In the case of determining that the wireless communication device is an untrusted device, determine whether the access duration of the signal sent by the wireless communication device exceeds a preset threshold; if so, perform the following step S3, otherwise, perform the above Step S4;
  • the smart product will also identify the type of the wireless communication device. Of course, it will also count the access time of the device information of the wireless communication device, that is, the connection time between the wireless communication device and the smart product, so as to count
  • the access duration of the signal sent by the wireless communication device within the preset range can be determined based on the access duration to determine whether the connection duration of the wireless communication device to which the device information belongs is too long within the preset range.
  • the connection time of the wireless communication device is too long, on the basis that the wireless communication device is an untrusted device, it can be determined to execute the above step S3 to perform the preset alarm operation. If the connection duration of the wireless communication device is within the preset time range, it will be determined that the wireless communication device is only temporarily connected, so that the above step S4 can be performed to avoid false alarms.
  • the method further includes:
  • step S2312 Instruct the cloud server to count the access time length of the device information of the wireless communication device, and in the case of determining that the wireless communication device is an untrusted device, instruct the cloud server to determine that the wireless communication device sends Whether the signal access time exceeds the preset threshold; if yes, execute the following step S2313, otherwise, execute the above step S4.
  • the actual recording start time is not limited, as long as it meets the requirements of this embodiment, such as: start recording when it is determined that a signal is connected, or it can be based on
  • the preset trusted device information list determines that the wireless communication device is a trusted device to start recording, or the preset trusted device information list determines that the wireless communication device is an untrusted device.
  • the smart product will also upload the device information of the wireless communication device to the cloud server, and the cloud server will match and identify the type of the wireless communication device through the Internet. Of course, it will also count the wireless communication device's information.
  • the access time of the device information that is, the connection time between the wireless communication device and the smart product is counted, so as to count the access time of the signal sent by the wireless communication device within the preset range, and the access time can be judged according to the access time. Whether the connection duration of the wireless communication device to which the device information belongs is too long.
  • connection time of the wireless communication device is too long, based on determining that the wireless communication device is an untrusted device, it can be determined to execute the above step S3 to perform a preset alarm operation. If the connection duration of the wireless communication device is within the preset time range, it will be determined that the wireless communication device is only temporarily connected, so that the above step S4 can be performed to avoid false alarms.
  • step S231, step 2312, step 2313, and step S4 can be replaced by step S231, step 232, step S3, and step S4, and vice versa.
  • performing the preset alarm operation includes:
  • the detection result is characterized as the danger level of the wireless communication device.
  • S32 Perform a preset alarm operation corresponding to the detection result according to a preset danger level table, where the preset danger level table includes: at least one danger level, each of the at least one danger level corresponds to The preset alarm operation.
  • the associated smart device is associated with the smart product involved in executing steps S1 to S4, step S21 to step S23, step S231 to step S232, and step S2311 to step S2313.
  • the associated smart devices include other smart security products in the house.
  • the smart product will obtain the detection result of the associated smart device detecting the danger level of the wireless communication device, and then the smart product will execute the preset corresponding to the detection result according to the preset danger level table
  • the alarm operation wherein the preset danger level table includes: at least one danger level, and the preset alarm operation corresponding to each danger level in the at least one danger level, so as to realize the linkage with other intelligent security products in the house. Further verify the abnormal situation.
  • the associated smart device is any type of machine that executes processing procedures and/or computing operations, including but not limited to one or more of the following: PC, notebook PC, tablet PC, smart phone, wearable wireless communication device , Embedded wireless communication equipment, smart home appliances or any combination thereof.
  • the smart product can also report the device information of the wireless communication device determined as an untrusted device to the user terminal.
  • the smart product will report the device information cloud server of the wireless communication device that is determined to be an untrusted device, and forward the device information to the preset user terminal through the cloud server.
  • the smart product or the cloud server also obtains the detection result of the wireless communication device by the smart device associated therewith.
  • the detection result is characterized as the danger level of the wireless communication device; then, according to the preset danger level table, Perform a preset alarm operation corresponding to the detection result.
  • the communication methods involved in this article are not limited, which include but are not limited to: WiFi communication, wired Ethernet communication, BLE Bluetooth communication, Bluetooth Mesh communication, ZigBee communication, LoRa communication, and 2G/3G /4G/5G communication.
  • FIG. 2 is a schematic diagram of the implementation process of a security method according to one of the embodiments of the present disclosure
  • Figure 3 is a flowchart of a security method according to one of the optional embodiments of the present disclosure, as shown in Figures 2 and 3
  • the security method requires the smart product to meet the following three conditions.
  • the smart product integrates BLE Bluetooth function, which can be turned on or off by the smart product
  • the smart product needs to have networking functions, such as the smart product It integrates WiFi communication function or can use BLE Bluetooth communication technology to transfer data through the gateway; thirdly, it needs a back-end server and corresponding smart product APP to support the entire smart home security system.
  • the specific project design framework is shown in Figure 2 above. Here are the detailed steps:
  • the user needs to power on the smart product and open the matching smart product APP operation, then add the Bluetooth MAC address of the trusted wireless communication device on the smart product APP interface, and then click to turn on the arming function on the APP.
  • the smart product will periodically scan all surrounding Bluetooth wireless communication devices with Bluetooth enabled, so that the MAC addresses of surrounding Bluetooth wireless communication devices can be obtained. Then by judging whether the acquired MAC address of the Bluetooth wireless communication device is the Bluetooth MAC address of the trusted wireless communication device, if the Bluetooth MAC address of the trusted wireless communication device is trusted, the smart product restarts the regular scan; otherwise, it uploads the Bluetooth wireless communication device.
  • the MAC address of the communication device is sent to the cloud server, and the cloud server uses the Internet to match and identify the wireless communication device that the MAC address belongs to, and starts timing the access time of the MAC address, and then judges whether the access time of the MAC address is too long long? If it is not, the smart product restarts regular scanning; if it is, the server will report the relevant unfamiliar Bluetooth device information to the user's mobile phone, and link with other smart security smart products in the house to further verify the abnormal situation.
  • the WiFi communication in the figure can be other communication technologies, such as wired Ethernet communication, BLE Bluetooth communication, Bluetooth Mesh communication, ZigBee communication, LoRa communication, 2G/3G/4G/5G communication, and so on.
  • the determining module 120 includes: an acquiring unit configured to acquire device information of the wireless communication device that sends out the signal; and a list determining unit configured to determine whether the preset trusted device information list includes The device information of the wireless communication device; a determining unit configured to determine that the wireless communication device is an untrusted device in the case where it is determined that the device information of the wireless communication device is not included in the preset trusted device information list , And when it is determined that the preset trusted device information list includes the device information of the wireless communication device, determining that the wireless communication device is a trusted device.
  • the apparatus further includes: a first statistics module configured to count the access duration of the signal; a first judgment module configured to determine that the wireless communication device is an untrusted device Next, determine whether the access duration of the signal sent by the wireless communication device exceeds a preset threshold; in the case where it is determined that the access duration exceeds the preset threshold, determine to perform a preset alarm operation.
  • the apparatus further includes: an upload module configured to upload device information of the wireless communication device to a cloud server; and a second judgment module configured to instruct the cloud server to count the wireless communication The access duration of the device information of the device, and in the case of determining that the wireless communication device is an untrusted device, instruct the cloud server to determine whether the access duration of the signal sent by the wireless communication device exceeds a preset threshold; If it is determined that the access duration exceeds a preset threshold, instruct the cloud server to determine to perform a preset alarm operation.
  • the system further includes: a first start-up monitoring module configured to obtain a start-up monitoring trigger instruction sent by the control terminal, and the start-up monitoring trigger instruction is periodically and preset by the control terminal. It is sent within a time period, or is sent periodically by the control terminal, or is sent by the control terminal in a preset time period; according to the start monitoring trigger instruction, it is determined to access the signal within the preset range The situation is monitored.
  • a first start-up monitoring module configured to obtain a start-up monitoring trigger instruction sent by the control terminal, and the start-up monitoring trigger instruction is periodically and preset by the control terminal. It is sent within a time period, or is sent periodically by the control terminal, or is sent by the control terminal in a preset time period; according to the start monitoring trigger instruction, it is determined to access the signal within the preset range The situation is monitored.
  • the system further includes: a second startup monitoring module, configured to obtain a high-risk time period according to the historical use time data of the associated smart device, and determine that the high-risk time period is The signal access situation inside is monitored.
  • a second startup monitoring module configured to obtain a high-risk time period according to the historical use time data of the associated smart device, and determine that the high-risk time period is The signal access situation inside is monitored.
  • the obtaining module is configured to obtain the detection result uploaded by the associated smart device, wherein the detection result is characterized by the danger level of the wireless communication device; and the execution of the test results is performed according to a preset danger level table.
  • the preset warning operation corresponding to the detection result wherein the preset danger level table includes: at least one danger level, and a preset warning operation corresponding to each danger level in the at least one danger level.
  • the device information includes: a Bluetooth MAC address.
  • an intelligent controller including: an intelligent security device configured to execute the above-mentioned security method; or, the above-mentioned security system.
  • the smart controller includes but is not limited to one or more of the following: smart controller, remote control, and smart cube.
  • an electronic device including a processor and a memory; the memory is configured to store computer instructions, and the processor is configured to run the computer instructions stored in the memory to implement One of the above-mentioned security methods.
  • a computer-readable storage medium stores one or more modules, and the one or more modules can be processed by one or more The device executes to realize the above-mentioned security method.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Electromagnetism (AREA)
  • General Physics & Mathematics (AREA)
  • Alarm Systems (AREA)

Abstract

L'invention porte sur un procédé et un système de sécurité, sur un dispositif électronique, sur un support de stockage et sur un dispositif de commande intelligent, le procédé consistant : à surveiller une situation d'accès au signal dans une portée prédéfinie (S1), le signal étant un signal de communication sans fil ; lors de la détection d'un accès au signal, à déterminer selon une liste d'informations de dispositif sécurisé prédéfinie si le dispositif de communication sans fil émettant le signal est un dispositif non sécurisé (S2) ; et quand il est déterminé que le dispositif de communication sans fil est un dispositif non sécurisé, à effectuer une opération d'alarme prédéfinie (S3). Par conséquent, lorsqu'un dispositif de communication sans fil apparaît à proximité d'un produit dans une maison, il est possible de déterminer directement si le dispositif de communication sans fil est sécurisé en obtenant des informations de dispositif du dispositif de communication sans fil. Si le dispositif de communication sans fil n'est pas sécurisé, un utilisateur peut immédiatement prendre connaissance de la situation et prendre des contre-mesures, ce qui peut ainsi améliorer considérablement le facteur de sécurité de la maison et assurer une surveillance active dissimulée et fiable de la maison.
PCT/CN2020/108537 2019-12-09 2020-08-11 Procédé et système de sécurité, dispositif électronique, support de stockage, et dispositif de commande intelligent Ceased WO2021114700A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201911255210.4 2019-12-09
CN201911255210.4A CN111047810A (zh) 2019-12-09 2019-12-09 一种安防方法、系统、电子设备、存储介质及智能控制器

Publications (1)

Publication Number Publication Date
WO2021114700A1 true WO2021114700A1 (fr) 2021-06-17

Family

ID=70235348

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2020/108537 Ceased WO2021114700A1 (fr) 2019-12-09 2020-08-11 Procédé et système de sécurité, dispositif électronique, support de stockage, et dispositif de commande intelligent

Country Status (2)

Country Link
CN (1) CN111047810A (fr)
WO (1) WO2021114700A1 (fr)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111047810A (zh) * 2019-12-09 2020-04-21 珠海格力电器股份有限公司 一种安防方法、系统、电子设备、存储介质及智能控制器
CN114978375B (zh) * 2021-02-25 2024-05-07 Oppo广东移动通信有限公司 安防提示的方法、装置、介质及电子设备
CN115314537B (zh) * 2022-08-05 2024-08-30 深圳市畅飞博科技有限公司 基于门磁开关的监控方法、系统、计算机设备和存储介质
CN116866898B (zh) * 2023-08-08 2024-01-30 广东小狼星物联有限公司 随身WiFi扩展信号的应用方法及系统

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105741510A (zh) * 2016-03-17 2016-07-06 云丁网络技术(北京)有限公司 一种基于无线信号的智能报警方法及其智能报警系统
CN206058435U (zh) * 2016-09-13 2017-03-29 北京信达泰科技有限公司 一种基于无线网络的防盗系统
CN107170185A (zh) * 2017-06-20 2017-09-15 上海斐讯数据通信技术有限公司 一种基于无线接入设备的安防报警方法、无线接入设备
CN107623898A (zh) * 2017-08-29 2018-01-23 广州中国科学院计算机网络信息中心 入侵监控方法、装置和设备
US20190347925A1 (en) * 2018-05-10 2019-11-14 Olarm Alarm Service, Inc. Multiple Purpose Sensor and Security System
CN111047810A (zh) * 2019-12-09 2020-04-21 珠海格力电器股份有限公司 一种安防方法、系统、电子设备、存储介质及智能控制器

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH08161654A (ja) * 1994-12-05 1996-06-21 Maspro Denkoh Corp 盗難防止用装置
US20090102654A1 (en) * 2007-10-22 2009-04-23 Optimal Innovations Inc. Systems and methods for operating a surveillance system
CN201600757U (zh) * 2009-04-16 2010-10-06 金易昌实业(深圳)有限公司 远方防侵入监控器
CN104363155B (zh) * 2014-12-04 2018-06-22 上海理工大学 网络连接方法及其设备
CN106128053A (zh) * 2016-07-18 2016-11-16 四川君逸数码科技股份有限公司 一种智慧金睛识别人员逗留徘徊报警方法和装置
CN107085903A (zh) * 2017-04-24 2017-08-22 苏州合欣美电子科技有限公司 一种停车场防盗提醒系统
CN107295522A (zh) * 2017-07-07 2017-10-24 上海斐讯数据通信技术有限公司 一种无线入侵的检测报警方法及无线报警供网设备
CN107680348A (zh) * 2017-07-31 2018-02-09 深圳市心上信息技术有限公司 电子围栏智能报警方法、装置、存储介质和计算机设备
CN107769978A (zh) * 2017-10-30 2018-03-06 上海斐讯数据通信技术有限公司 一种终端设备入网的管理方法、系统、路由器及服务器
CN108922093A (zh) * 2018-07-17 2018-11-30 珠海格力电器股份有限公司 一种wifi识别技术与移动端结合的全新安防系统

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105741510A (zh) * 2016-03-17 2016-07-06 云丁网络技术(北京)有限公司 一种基于无线信号的智能报警方法及其智能报警系统
CN206058435U (zh) * 2016-09-13 2017-03-29 北京信达泰科技有限公司 一种基于无线网络的防盗系统
CN107170185A (zh) * 2017-06-20 2017-09-15 上海斐讯数据通信技术有限公司 一种基于无线接入设备的安防报警方法、无线接入设备
CN107623898A (zh) * 2017-08-29 2018-01-23 广州中国科学院计算机网络信息中心 入侵监控方法、装置和设备
US20190347925A1 (en) * 2018-05-10 2019-11-14 Olarm Alarm Service, Inc. Multiple Purpose Sensor and Security System
CN111047810A (zh) * 2019-12-09 2020-04-21 珠海格力电器股份有限公司 一种安防方法、系统、电子设备、存储介质及智能控制器

Also Published As

Publication number Publication date
CN111047810A (zh) 2020-04-21

Similar Documents

Publication Publication Date Title
US12260726B2 (en) Digital fingerprint tracking
AU2021250874B2 (en) Providing internet access through a property monitoring system
US10446000B2 (en) Detecting an intruder's wireless device during a break in to a premises
WO2021114700A1 (fr) Procédé et système de sécurité, dispositif électronique, support de stockage, et dispositif de commande intelligent
WO2016112724A1 (fr) Procédé et dispositif de transmission d'informations
US11393306B2 (en) Intruder detection method and apparatus

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20899130

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 20899130

Country of ref document: EP

Kind code of ref document: A1