Control method of building intercom system

A technology of a building intercom system and a control method, which is applied to closed-circuit television systems, televisions, instruments, etc., can solve problems that affect the safety of users' lives and property, misjudgments, and affect user safety, so as to reduce processor costs and reduce the chance of leaking secrets , The effect of ensuring the safety of residents

Inactive Publication Date: 2020-04-10
周芝南
View PDF10 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Due to the complexity of password replacement in the ordinary electronic lock system, the password is easily leaked after a long time, causing irrelevant personnel to easily enter the community, affecting the safety of users' lives and property. For this reason, more residential communities currently use voice intercom systems, that is, through voice or Remote video call identification method, collects video and voice signals at the access control station and sends them to relevant users, and allows access (opens the access control) or denies access (closes the access control) according to the user's browsing of remote voice and video data
[0004] For general intercom systems, the entire process is complicated because too many users are involved in

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Control method of building intercom system
  • Control method of building intercom system
  • Control method of building intercom system

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0031] The recognition module 11023 compares the information sets of the relationship between the visitor’s facial image and sound wave spectrum and the head of the household in the data storage server and compares the distinguishing ability and independence of the person at home to determine which person is at home. Permission, also includes the following implementation methods:

Example Embodiment

[0032] Such as figure 2 Implementation method 1

[0033] S1: Obtain the visitor's facial makeup image and sound wave spectrum through the outdoor video intercom system 102 and send it to the indoor processor 1102;

[0034] S2: The recognition module 11023 conducts each information set of the relationship between the sent facial image and the sound wave spectrum and the head of the household in the data storage server 11022 respectively with M1 relatives, M2 relatives, M3 friends, M4 strangers...Mn Compare and match the information set; if the visitor is the information set of M1 relatives,

[0035] S3: The highest first authority is directly given, and the command unlocking module 101 is sent to open the door and let people enter.

Example Embodiment

[0036] Such as image 3 Implementation method 2

[0037] S1: Obtain the visitor's facial makeup image and sound wave spectrum through the outdoor video intercom system 102 and send it to the indoor processor 1102;

[0038] S4: The recognition module 11023 conducts each information set of the relationship between the sent facial image and sound wave spectrum and the head of the household in the data storage server 11022 respectively with M1 relatives, M2 relatives, M3 friends, M4 strangers...Mn Compare and match the information set; if the visitor is the M2 relative information set;

[0039] S5: If the highest authority of the person at home is the first authority or the second authority, send the instruction unlocking module 101 to directly open and let people enter.

[0040] S6: If the highest authority of the person at home is the third authority or the fourth authority, it is directly refused to prohibit people from entering.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a control method of a building intercom system, which comprises a building host and an indoor intelligent terminal, and is characterized in that the building host comprises anunlocking module and an outdoor visual intercom system, the indoor intelligent terminal comprises an indoor visual intercom system, an indoor processor and an indoor unlocking module, and the indoor processor comprises a data acquisition module, a data storage server, an identification module and an authority module; the data acquisition module is used for acquiring relative facial makeup images and sound wave frequency spectrums and collecting a visitor facial makeup image and sound wave frequency spectrum information, sending the acquired and collected data to the data storage server for storage, and respectively setting the facial makeup images and sound wave frequency spectrums stored in the data storage server as information sets of M1 close relatives, M2 relatives, M3 friends, M4 strangers, and so on, and Mn according to the relationship with the householder.

Description

technical field [0001] The invention relates to the technical field of building security management, in particular to a control method of a building intercom system. Background technique [0002] Residential districts are characterized by concentrated users, large capacity, and unified security management. Most of the general building security management systems use electronic combination locks, that is, to distinguish visiting users through electronic combination locks. Only visitors who know the password of the combination lock or carry a key only allowed to enter. [0003] Due to the complexity of password replacement in the ordinary electronic lock system, the password is easily leaked after a long time, causing irrelevant personnel to easily enter the community, affecting the safety of users' lives and property. For this reason, more residential communities currently use voice intercom systems, that is, through voice or The remote video call identification method colle...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G07C9/00H04N7/18
CPCG07C9/00174G07C9/00563H04N7/186
Inventor 周芝南
Owner 周芝南
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products