Embodiment
Each embodiment of the present invention has one or more technical characteristic respectively.Under the prerequisite that may implement, those skilled in the art optionally implement technical characteristic part or all of in any embodiment, or are optionally combined by technical characteristic part or all of in these embodiments.
In embodiments of the present invention, when sensing state change (such as ON/OFF) of gateway of buildings, authorized wireless device whether will be still there is (such as but be not limited in scanning buildings, authorized user's mobile phone etc.), what determine whether will to switch buildings safety system according to this saves state from damage.
Now please refer to Fig. 1, its display is according to the schematic diagram being applied to the intelligent security system of buildings of the embodiment of the present invention.As shown in Figure 1, intelligent security system 100 at least comprises: at least one gateway inductor 110, wireless base station 120 and control center 130.Except these three devices, intelligent security system 100 also can comprise the device that other is not illustrated in Fig. 1, such as window inductor and warning horn.
Gateway inductor 110 is arranged at the gateway of buildings 140, in order to respond to the state change of at least one gateway of buildings 140 to send an induced signal.Such as, when the gateway of buildings 140 be opened close again time, gateway inductor 110 can send an induced signal.In embodiments of the present invention, gateway inductor 110 such as but be not limited to, can be implemented by gate inductor (doorsensor), door status switch, passive infrared gateway inductor etc., whether its gateway can responding to buildings 140 is ON/OFF.If gateway inductor 110 senses that the gateway of buildings 140 is opened when closing again, gateway inductor 110 will send induced signal to control center 130.
Gateway inductor 110 wired or wirelessly can be coupled to control center 130, such as, through wireless network protocols such as purple honeybees (zigbee) by the wireless control center 130 that is coupled to of inductor, induction result/induced signal can be returned to control center 130 to allow gateway inductor 110.Gateway inductor 110 also can additionally be coupled to wireless base station 120.
Wireless base station 120 can be millimicro miniature honeycomb base station (Femtocell) or Wireless Fidelity (WiFi) base station.Can be wireless coupling between wireless base station 120 and control center 130, such as, through WLAN (e.g.WiFi) etc., also can be wired coupling.Wireless device 150 (such as mobile phone) and wireless base station 120 such as can pass through GSM (global system for mobile communications, GlobalSystemforMobileCommunications), W-CDMA (wide band code division multiplex (MUX), WidebandCodeDivisionMultipleAccess), (high speed package accesses HSPA, HighSpeedPacketAccess), (GSM strengthens data rate evolution to EDGE, EnhancedDataratesforGSMEvolution), (global intercommunication microwave accesses WiMAX, WorldwideInteroperabilityforMicrowaveAccess), LTE (Long Term Evolution, LongTermEvolution), home control network communication protocols such as LTE-Advanced (Long Term Evolution upgrade version) and wirelessly each other to couple.
Control center 130 is coupled to gateway inductor 110 and wireless base station 120.What control center 130 can control/switch intelligent security system 100 saves state (such as, saving state from damage is set up defences or withdraw a garrison) from damage.In general, in setting, if still have people to exist in buildings 140 (such as family), then save state from damage and should be set as " non-protection state "; If buildings 140 inside all nobody (such as, household has gone out), is then saved state from damage and should be set " protection shape ".
Fig. 2 A and Fig. 2 B shows the operational flowchart of the intelligent security system 100 according to the embodiment of the present invention.Please also refer to Fig. 1 and Fig. 2 A.
In embodiments of the present invention, such as, suppose that someone will leave buildings 140.When this person leaves buildings 140 from gateway, gateway inductor 110 can sense that gateway is opened and close, and gateway inductor 110 can send induced signal to control center 130.Range of signal/the sweep limit leaving wireless base station 120 due to people may need a period of time, therefore after wait given time (such as but be not limited to 10 ~ 60 seconds), control center 130 requires whether wireless base station 120 still exists authorized wireless device 120 (whether still having authorized personage to exist in this representative scanning buildings 140) to scan in buildings 140.
In response to the request of control center 130, wireless base station 120 scans (such as paging (paging)), to judge whether there is authorized wireless device 150 in buildings 140.
If wireless base station 120 is millimicro miniature honeycomb base stations, because use user's mobile phone of this millimicro miniature honeycomb base station possibly through authorizing, and the correlative code of authorized user's mobile phone may be recorded in the white list of the memory internal body of millimicro miniature honeycomb base station.So, in embodiments of the present invention, when scanning, wireless base station 120 confirms whether still to exist in buildings 140 wireless device 120 (namely confirming whether still to have in buildings 140 existence of authorized personage) of listing in white list.
Then, scanning result is returned to control center 130 by wireless base station 120.According to the one scan result of wireless base station 120, control center 130 determines that whether will switch one of intelligent security system 100 saves state from damage.For example, if after scanning, wireless base station 120 is in buildings 140 interscan less than authorized wireless device (this represents all authorized personages may leave this buildings 140 all), then the state of saving from damage of intelligent security system 100 can be switched to protection state according to the scanning result of wireless base station 120 by control center 130.
On the contrary, if after scanning, wireless base station 120 still can scan authorized wireless device (personage that this representative may be authorized in addition stays in this buildings 140) in buildings 140, then the state of saving from damage of intelligent security system 100 can not switched to protection state (namely, allowing intelligent security system 100 be in non-protection state) according to the scanning result of wireless base station 120 by control center 130.Certainly, whenever gateway inductor 110 send induced signal to control center 130 after, wireless base station 120 can carry out one or scanning repeatedly off and on.
In the embodiment of the present invention, the sweep limit of wireless base station 120 can contain the position of the gateway of buildings.
In addition, after receiving in control center 130 scanning result transmitted by wireless base station 120, control center 130 can return a confirmation notification signal to wireless base station 120.
Now please refer to Fig. 1 and Fig. 2 B.Now by explanation under intelligent security system 100 is in protection state (that is, personage all not authorized in current buildings 140), the example having authorized people will get back to buildings 140 from the outside illustrates.In the case, think wireless device that the licensee getting back to buildings 140 from the outside carries with can link in advance wireless base station 120 (that is, when this personage not yet opens gateway, wireless base station 120 just can be wired to the wireless device 150 wanting the authorized people getting back to buildings 140 to carry with).Then, wireless base station 120 can notify control center 130, will save state from damage and switch to non-protection state, so to avoid the alarm of authorized personage's false touch intelligent security system 100 from protection state.
That is, before authorized wireless device 150 will enter buildings 140, authorized wireless device 150 can be linked to wireless base station 120 in advance, if state of saving from damage is now protection state, then changeable this of control center 130 saves state from damage to non-protection state, to avoid user's false touch intelligent security system 100 of getting back to buildings 140 from outward.
In upper example, wireless device 150 is explain for Smartphone, but when knowing that the present invention is not limited to this.Such as, be enough to allow user carry with, also can be the possible embodiment of wireless device 150 as other wisdom objects of user's identity identification.
In the embodiment of the present invention, when gateway inductor senses that someone will leave from buildings, wireless base station can scan interior of building to confirm whether interior of building still has authorized wireless device to exist.If still have authorized wireless device to exist, then control center can not switch to protection state by saving from damage state.On the contrary, if the wireless device that interior of building is not authorized, then control center will save state from damage and switch to protection state.When saving state from damage and being in protection state, be near gateway if wireless base station has scanned authorized wireless device, then wireless base station notifies control center automatically, state will be saved from damage and switch to non-protection state, false touch intelligent security system when opening buildings gateway to avoid authorized personage.That is in embodiments of the present invention, when each gateway inductor is triggered, after control center waits for given time, notice wireless base station scans.
In addition, when wireless base station is when scanning, if when scanning the mobile phone correlative code do not belonged in the middle of white list, then wireless base station can be ignored.
In addition, in the embodiment of the present invention, even if under intelligent security system is in protection state, control center also regularly or randomly can notify wireless base station to scan.Such as wireless base station, when prior scans, may not to scan in buildings but to be in the authorized wireless device of off-mode, so control center also regularly or randomly can notify wireless base station to scan, can intelligent security system be avoided by false touch.
Fig. 3 display is according to the process flow diagram of the wisdom security method of the embodiment of the present invention.As shown in Figure 3, wisdom security method comprises: whether at least one gateway responding to a buildings has state change (step 310); When sensing that this gateway of this buildings has state to change, after waiting for a given time, scanning in this buildings and whether still there is authorized at least one wireless device (step 320); And according to one scan result, determine whether will switch to save state (step 330) from damage.The details of step 310 ~ 330 can be described above, will not repeat in this.
From the description of above-described embodiment, the embodiment of the present invention can in conjunction with gateway induction and the scanning of wireless base station, when autoscan to interior of building without any authorized personage time, intelligent security system automatically setting saves state from damage for protecting state.In addition, if wireless base station has scanned authorized personage when will get back to buildings, then intelligent security system can automatically terminate and save state from damage.Thus, user without the need to manually setting/removing intelligent security system, can increase the convenience of user.
In sum, although the present invention with embodiment openly as above, it is also not used to limit the present invention.Those skilled in the art, without departing from the spirit and scope of the present invention, when doing various changes and amendment.Therefore, protection scope of the present invention is when being as the criterion depending on accompanying claims protection domain person of defining.