Times are undergoing similar changes. When everything is networked, cloud-based and intelligent, sensor information is sent to the cloud, which brings the rapid evolution of AI. Artificial intelligence is just around the corner. This market is huge, and it has very detailed solution marketing. Whoever provides the best service and content can occupy the market, and the service begins to return to the essence. There are many participants in this industry, which is a big ecology, so in this big ecology, everyone has the same fate, and everyone is looking for the last mile in win-win cooperation.
How to open the distance between smart products and users
With the help of Internet environment, how can product design widen the distance between users and products, and how can artificial intelligence be embodied? For example, intelligent cloud lock, how to open the distance between the door and the user, how to connect the building of the product, how to integrate with intelligent fingerprint lock, and provide a new product. From electronic doorbell to electronic cat's eye, to fingerprint lock, to replaceable lock core without changing lock body.
The enterprise removed the so-called smart lock at the door, and the panel was also removed, so that everyone could replace it themselves and leave this option to the user. This lock body can also be connected to the system, and the most critical part of the smart lock is the circuit part. Stripped into so-called pre-genes. Password module, fingerprint module, these are stripped into a small device, there is also a small device to complete the compatibility of various lock bodies. This is Millie's design concept.
After the split design, it is easy to realize the opportunity for everyone to choose the panel independently. Lock body can be planned, the most important fingerprint identification password and face recognition. After stripping this module, it can be made into a whole touch screen in the future, which is a higher-end touch screen mode. Because of this product, foreigners like it very much at this year's Beijing Expo. After each component is disassembled, take a look at what the architecture looks like. It's actually a small system. Smart door locks can appear in the form of independent packaging.
Application Scenarios of Intelligent Door Lock
1, smart home scene. The smart lock at the door is directly connected to the cloud through the wireless router at home, so this cloud lock has the functions just mentioned, and can also be stored online and monitored remotely. And all the functions of fingerprint identification. This is a standalone application. Another application is the combination with traditional intercom. The recognition machine can monitor, for example, there can be alarms, lights and controls, so these scenes can interact.
Unlock by fingerprint, password, credit card or traditional key. Face recognition has a camera, which is installed in a normal position, and face recognition has. At the same time, after getting through the cloud, you can open it with the APP. Guests can press the button at the door and answer the phone at the door through the 4G network, and then they can unlock the door.
The APP directly unlocks the intercom. For example, when a child goes home, he can enter the door through this fingerprint, which is an application. If the old man goes home, his fingerprints may not have been entered yet, and they are damaged and not easy to use. As long as the call button is pressed, the family can unlock the lock when they see the old father at the door. This is the intercom section.
When relatives and friends visit, they can also temporarily share a key. This critical time can be set. These are the usual methods. For example, if someone is wandering at the door, you can capture it through the camera. After finding the problem, you can push it directly to your mobile phone. At this time, the owner can directly monitor the autumn harvest and see the situation at the door, and directly shout. This is an application.
In the whole operation process, there is such information design as voice prompt, backlight setting and key feedback. The product opens the cloud, and there are so many ways to open it, but they are all one-to-one. This lock can bind 20 mobile phones. For example, both male and female hosts can use mobile phones to control. One device can bind 20 mobile phones. When the mobile phone is set, only his fingerprint and password can be authorized, so the mobile phone part is useless, and it can also support secondary applications. The parameter capacity of home products can be registered as 200 faces and 20 fingerprints, which is designed for the application of smart door locks in the field of smart home.
2. Office scene. When this product is installed in an office area, you don't want to automatically lock it every time you close the door. Can you open all working hours at a set time, such as 9: 00 am to 17: 00 am, so that employees can go in directly? This part can be set in software and programs.
The parameters put in the office in the future can be re-determined. All panels can be replaced, but there is one requirement. This panel needs to be lifted and locked to be compatible. Whether fingerprints and swiping cards can be upgraded to the recognition of iterative ability. In addition to the normal password and fingerprint, if there are any problems at the same time, call the front desk directly. Therefore, in the office, the mode of combined use is also suitable for managing several doors or multiple doors in the office. This is a new application place.
3. Scene application in public places. If the network is poor, can public rental houses and short rent use this lock? It's actually compatible. For the tenant, the owner can set another deadline and tell the tenant face to face. After this time, it will be invalid. So after the tenant leaves, the lock is invalid. If you put it at home, this scene can be directly adapted to this lock.
Public places in the community refer to public places in the community, such as swimming pools and libraries. When the community owner bought a year's access service. During this time, you can go to this place to authorize entry, you can shake your mobile phone, you can also open the door with one button Bluetooth, and the password can be the same. Time is up, close this permission.
4. Business scenes such as hotels. Sometimes go to the front desk of the hotel. If the card is invalid, you need to take a phone call to the front desk to communicate. This is a situation. After entering the room, can the control of home appliances and various scenes in the room be bound with APP and lock? At the door, the enterprise cancels this function as face and fingerprint, and does not want a fingerprint to collect passwords, cards and mobile phones. If you stay in a hotel, the hotel pays attention to an official WeChat account on WeChat and then binds it. After binding, we can enter the room, which can be opened by mobile phone. After entering, the control in the room can also use the APP.