CN102306351A - User information control method and device for intelligent lock - Google Patents
User information control method and device for intelligent lock Download PDFInfo
- Publication number
- CN102306351A CN102306351A CN201110251600A CN201110251600A CN102306351A CN 102306351 A CN102306351 A CN 102306351A CN 201110251600 A CN201110251600 A CN 201110251600A CN 201110251600 A CN201110251600 A CN 201110251600A CN 102306351 A CN102306351 A CN 102306351A
- Authority
- CN
- China
- Prior art keywords
- user
- user profile
- totem information
- information
- profile
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Landscapes
- Storage Device Security (AREA)
Abstract
The invention discloses a user information control method and a user information control device for an intelligent lock, which are used for solving the problem that the number of the user information control method in the prior art is inconvenient to manage and easily lost. The method comprises the following steps of: establishing user information, namely acquiring user identification information and establishing the user information containing the user identification information according to the acquired user identification information, wherein the user identification information is audio content of an identified user; extracting the user information, namely extracting the user information which contains the user identification information and is established in the step of establishing the user information according to a received instruction; and processing the user information, namely processing the extracted user information according to the user identification information. In the embodiment of the invention, the user information is managed by using user identification information, and the user identification information is the audio content recorded by the identified user; because audio has high intuition, deliberate memory or storage is not required, and the audio is easy to manage and cannot be lost.
Description
Technical field
The present invention relates to the communications field, particularly a kind of user information control method and apparatus that is used for the intelligence lock.
Background technology
Intelligence lock, especially bio-identification class intelligence lock be through the identification biological information, waits the unlatching of controlling the intelligence lock or close like fingerprint, iris, thereby exempted the burden of carrying key.Prior biological recognition category intelligence lock can be stored a plurality of user profile (generally being no more than 30).But because restrictions such as environment for use and power consumptions, this kind equipment does not generally have display screen, and this is the control of user profile, and particularly the selective control of user profile has been brought certain difficult problem.
At present, when prior biological recognition category intelligence is locked in control user profile, relate generally to two kinds of user information control modes: add user and deletion user.For example, adding under the User Status, during registered user's information, the user is numbered, and point out user's typing biological information of corresponding numbering.Under the deletion User Status, the pairing numbering of user that prompting keeper input will be deleted, thereby the deletion of the user profile that will number.
This shows, in existing user information control method, need accurate recording user's numbering, or carry out the artificial memory, or store, perhaps carry out record through the paper pen through computer by the user.But, no matter adopting any mode, all can make troubles for user information control.And Customs Assigned Number does not need to use in the process of unblanking at ordinary times, only when leading subscriber once in a while, just can use, therefore, forget or lose very risky, and in case forget or lose numbering, will make troubles to user information control.
Summary of the invention
The invention provides a kind of user information control method and apparatus that is used for the intelligence lock, in order to the problem of numbering management inconvenience in the user information control method that solves prior art and being easy to lose.
The method that a kind of user profile that is used for the intelligence lock is handled comprises:
User profile foundation step: obtain user totem information; Create the user profile that comprises said user totem information according to the user totem information that obtains, wherein, said user totem information is the audio content of identifying user;
User profile extraction step: according to the user profile of creating in the instruction fetch user profile foundation step that receives that comprises user totem information;
User profile treatment step: the user profile of extracting is handled according to the user is required.
A kind of user profile treating apparatus that is used for the intelligence lock comprises:
User profile is created the unit, is used to obtain user totem information, and creates user profile and the storage that comprises said user totem information according to said user totem information, and wherein, said user totem information is the audio content of identifying user;
The user profile extraction unit is used for extracting user profile and creates the user profile that comprises user totem information that the unit is created;
The user profile processing unit is used for when extracting the required user profile of user, the user profile of extracting being handled.
Among the present invention, come the leading subscriber record through user totem information, wherein, user totem information is the audio content of identifying user record, because audio frequency itself possesses very strong intuitive, therefore, need not painstakingly to remember, so convenient management and can not losing.
Description of drawings
The user information control method flow diagram that is used for the intelligence lock that Fig. 1 provides for the embodiment of the invention;
The method flow diagram of the establishment user profile that Fig. 2 provides for the embodiment of the invention;
The method flow diagram of the deletion user profile that Fig. 3 provides for the embodiment of the invention;
The structural drawing that is used for the intelligent user profile treating apparatus of locking that Fig. 4 provides for the embodiment of the invention.
Embodiment
The embodiment of the invention provides a kind of user profile disposal route and device that is used for the intelligence lock, can solve the problem of numbering management inconvenience and being easy to lose in the user profile disposal route of prior art.
The embodiment of the invention provides a kind of user profile disposal route that is used for the intelligence lock, as shown in Figure 1, comprising:
S101: user profile foundation step: obtain user totem information; Create the user profile that comprises said user totem information according to the user totem information that obtains, wherein, said user totem information is the audio content of identifying user.
Wherein, said user totem information can comprise: the audio content of the audio content of address name and/or user's job number.
Preferably, this step can realize through following mode:
The audio content of recording identifying user obtains user totem information; The user totem information recorded and other information of identifying user are carried out related, and storage creation is a user profile.
S102: user profile extraction step: according to the user profile of creating in the instruction fetch user profile foundation step that receives that comprises user totem information.
Preferably, this step can realize in the following manner:
Extract the user profile of creating, and play the audio content of the pairing user totem information of each user profile, confirm the user profile that needs are handled according to user totem information; Perhaps,
The user totem information that the input user needs; User totem information according to input carries out speech recognition, from the user profile of creating, extracts the user profile that the user totem information with said input is complementary according to the user totem information of identification.
S103: user profile treatment step: the user profile of extracting is controlled according to the user is required.
Concrete implementation when according to the user is required the user profile of extracting being controlled particularly, can comprise: the user profile that deletion or modification are extracted.
In the embodiment of the invention, come the leading subscriber record through user totem information, wherein, user totem information is the audio content of identifying user record, because audio frequency itself possesses very strong intuitive, therefore, need not painstakingly to remember, so convenient management and can not losing.
The deletion user profile that is usually directed in the user information control pattern with the intelligence lock is example below, describes the concrete implementation procedure of the embodiment of the invention in detail, and this process mainly comprises following two steps:
Step 1: create user profile.
Application scenarios with the indoor New Hire Onboarding of minimized office is that example describes step 1 below; Suppose that the new registration employee of certain company is named as Xiao Zhang; In order in the intelligence lock of company, to add user record about user Xiao Zhang, need to carry out following steps, as shown in Figure 2:
S201: open the intelligence lock, get into the interpolation User Status under the intelligent user information control pattern of locking through modes such as click keys;
S202: prompting user typing biological information.
Particularly, can realize, for example, " please register " by intelligence lock playing voice prompting through voice prompting mode; Perhaps, also can point out through a prompt tone of " toot ".
S203: the biological information of gathering the user.
To dissimilar intelligence locks, this step can have different implementations.For example, for recognition of face intelligence lock, need the user that face is aimed at camera, at this moment, the intelligence lock is through camera collection user's facial information; For fingerprint recognition intelligence lock, need the user to press...with one's finger and press intelligent fingerprint recognition zone of locking, at this moment, the finger print information that intelligence lock collection user imports.
And; In this step; If the user does not import for a long time or does not have correct input feature vector information; Cause intelligence to be locked in above not collecting any characteristic information behind the Preset Time; Then intelligence is locked further voice suggestion user " typing is overtime please set up new registration procedure "; The user can re-enter after hearing voice suggestion, when the correct input feature vector information of user, and execution in step S204.
S204: prompting user's characteristic information typing success.
S205: prompting user typing name.
S206: the name of recording and store user's typing.
At this moment, quote Xiao Zhang's name, the name of quoting is recorded and stored by the intelligence lock by user Xiao Zhang or keeper.Particularly, can be after quoting name, by " affirmation " key, perhaps, interval setting-up time after step S205 after 5 seconds, is stored the name of just having quoted by the intelligence lock.In the present embodiment, be that the audio content with address name is that example describes as user totem information, in the practical application; Also the audio content that can adopt user's job number is as user totem information; Perhaps, adopt other user totem information flexibly, as long as can identifying user.
S207: prompting address name typing success.
S208: user totem information and other information of identifying user of recording are carried out related, and storage creation is a user profile.
Particularly; User totem information in the present embodiment is an address name; Other information of identifying user are user's biological information, and therefore, the biological information that this step also can be understood as address name and relative users is stored in the user record together.
In the above-mentioned steps, also the order of step S202~S204 and step S205~S207 can be exchanged promptly first typing address name, typing user's characteristic information again; Perhaps, after can also finishing in user's characteristic information typing, replenish the typing address name by the keeper.
Step 2:, and the user profile of extracting deleted according to the user profile of creating in the instruction fetch step 1 that receives.
Application scenarios with the indoor labor turnover of minimized office is that example describes step 2 below; Suppose that the employee that certain company will leave office is named as Xiao Wang; For deletion in the intelligence lock of company needs to carry out following steps about user Xiao Wang's user record, as shown in Figure 3:
S301: open the intelligence lock, get into the deletion User Status under the intelligent management mode of locking through modes such as click keys;
S302: the name recording " Xiao Li " of quoting first user by the intelligence lock.
S303: whether the supvr confirms that intelligence lock just quoted is the Xiao Wang's that will delete name, if not, execution in step S304 then; If then carry out S305.
S304: press the D score key through the keeper, perhaps, trigger the name recording that the intelligence lock continues to quote next user through modes such as interval setting-up times, and return step S303.
S305: intelligent interlocking receives that the keeper presses the information of " affirmation " key, and whether voice suggestion " confirms to delete Xiao Wang ".
S306: intelligent interlocking receives that the keeper presses the information of " affirmation " key once more, and deletion is about Xiao Wang's user record.
S307: intelligence lock prompting user's " Xiao Wang deletes ".
In the present embodiment, can also utilize speech recognition technology to simplify the operation course.For example; Can directly quote the user who needs deletion by the keeper; Name like " Xiao Wang "; After the intelligence interlocking is received the name of " Xiao Wang " that the keeper quotes; Utilize speech recognition technology; The voice document all about address name of the name of " Xiao Wang " that just received with storage in advance compared, thereby get access to the user profile with the name matches of " Xiao Wang ", and it is deleted.
In the present embodiment, be to be that the audio content of address name is that example describes with the user totem information, in actual the use, user totem information also can be for the audio content of user's job number etc.And, in the present embodiment, be that example describes with deletion user profile, the concrete mode of revising user profile is similar with it, repeats no more here.
In the above-described embodiments,, therefore there is not the risk of forgetting or losing, therefore, greatly reduces managerial personnel's burden, improved the reliability of user information control simultaneously because information such as address name or job number do not need painstakingly to remember.
The embodiment of the invention also provides a kind of user information control device that is used for the intelligence lock, as shown in Figure 4, comprising:
User profile is created unit 41, is used to obtain user totem information, and creates user profile and the storage that comprises said user totem information according to said user totem information, and wherein, said user totem information is the audio content of identifying user;
User profile extraction unit 42 is used for extracting user profile and creates the user profile that comprises user totem information that the unit is created;
User profile processing unit 43 is used for when extracting the user profile of required processing, and the user profile of extracting is handled.
Preferably, said user profile is created unit 41 and is comprised: acquisition module, be used to obtain user totem information, and promptly record user totem information; Relating module, the user totem information that is used for obtaining carries out related with other information of user and is stored as user profile.
Preferably, said user profile extraction unit 42 comprises: playing module is used to play user profile; Identification module is used to discern the user totem information of input; Extraction module is used to extract the user profile of establishment.
The device that the embodiment of the invention provides comes managing user information through user totem information, wherein; User totem information is the audio content of identifying user information, because audio frequency itself possesses very strong intuitive, therefore; Need not painstakingly to remember, so convenient management and can not losing.
Though invention has been described for top combination embodiment, to those skilled in the art, be understandable that the foregoing description should not thought the protection domain that limits the present invention with this only for example purposes.Protection scope of the present invention is only limited by accompanying Claim.Though in the above-mentioned explanation, for ease of understanding, the step of method has been adopted the succession description, should be pointed out that for the order of above-mentioned steps and do not do strict the restriction.In addition, realize that all or part of step in the foregoing description method is to instruct relevant hardware to accomplish through program, this program can be stored in the computer read/write memory medium, as: ROM/RAM, magnetic disc, CD etc.Also have, the apparatus structure shown in accompanying drawing or the embodiment only is to schematically show logical organization.Wherein the module that shows as separating component maybe or possibly not be physically to separate, and the parts that show as module also possibly be possibly not be physical module perhaps.
In addition, in claims, term " comprises " does not get rid of other parts of existence or step.In addition, although in different claims, comprised each characteristic, these characteristics can advantageously be made up, and each characteristic is included in the different claims and does not mean that these combination of features are infeasible and/or disadvantageous.In addition, single implication is not got rid of a plurality of.Therefore, the implication of " " etc. is not got rid of a plurality of.
In addition, those skilled in the art can make amendment, change or replace under the prerequisite that does not break away from spirit of the present invention it, still, according to the various equivalent variations that the present invention did, still belong to the scope that the present invention is contained.
Claims (10)
1. a method that is used for the user profile processing of intelligence lock is characterized in that, comprising:
User profile foundation step: obtain user totem information; Create the user profile that comprises said user totem information according to the user totem information that obtains, wherein, said user totem information is the audio content of identifying user;
User profile extraction step: according to the user profile of creating in the instruction fetch user profile foundation step that receives that comprises user totem information;
User profile treatment step: the user profile of extracting is handled according to user totem information.
2. the method for claim 1 is characterized in that, the implementation of said user profile foundation step comprises:
The audio content of recording identifying user obtains user totem information;
The user totem information recorded and other information of identifying user are carried out related, and storage creation is a user profile.
3. the method for claim 1 is characterized in that, the concrete implementation of said user profile extraction step comprises:
Extract the user profile of creating, and play the audio content of the pairing user totem information of each user profile, confirm the user profile that needs are handled according to user totem information.
4. the method for claim 1 is characterized in that, the concrete implementation of said user profile extraction step also comprises:
Input needs the user totem information of the user profile of processing;
User totem information according to input carries out speech recognition, from the user profile of creating, extracts the user profile that the user totem information with said typing is complementary according to the user totem information of identification.
5. like each described method of claim 1-4, it is characterized in that the said concrete implementation of the user profile of extracting being handled according to user totem information comprises: the user profile that deletion or modification are extracted.
6. method as claimed in claim 5 is characterized in that, said user totem information comprises: address name and/or user's job number.
7. a user profile treating apparatus that is used for the intelligence lock is characterized in that, comprising:
User profile is created the unit, is used to obtain user totem information, and creates user profile and the storage that comprises said user totem information according to said user totem information, and wherein, said user totem information is the audio content of identifying user;
The user profile extraction unit is used for extracting user profile and creates the user profile that comprises user totem information that the unit is created;
The user profile processing unit is used for when extracting the user profile of required processing, and the user profile of extracting is handled.
8. device as claimed in claim 7 is characterized in that, said user profile is created the unit and comprised:
Acquisition module is used to obtain user totem information, promptly records user totem information;
Relating module, the user totem information that is used for obtaining carries out related with other information of user and is stored as user profile.
9. device as claimed in claim 7 is characterized in that, said user profile extraction unit comprises:
Playing module is used for playing the user totem information that user profile comprises;
Identification module is used for the user profile that is complementary at user profile identification of creating and the user totem information of importing;
Extraction module is used to extract the user profile that prestores.
10. like each described device of claim 7-9, it is characterized in that said user totem information comprises: address name and/or user's job number.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201110251600.1A CN102306351B (en) | 2011-08-29 | 2011-08-29 | User information control method and device for intelligent lock |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201110251600.1A CN102306351B (en) | 2011-08-29 | 2011-08-29 | User information control method and device for intelligent lock |
Publications (2)
Publication Number | Publication Date |
---|---|
CN102306351A true CN102306351A (en) | 2012-01-04 |
CN102306351B CN102306351B (en) | 2015-03-11 |
Family
ID=45380210
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201110251600.1A Active CN102306351B (en) | 2011-08-29 | 2011-08-29 | User information control method and device for intelligent lock |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102306351B (en) |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0813171A2 (en) * | 1996-06-13 | 1997-12-17 | Robert Bosch Gmbh | Mobile user interface |
US20010030644A1 (en) * | 1999-03-30 | 2001-10-18 | Allport David E. | Method of controlling multi-user access to the functionality of consumer devices |
CN1325059A (en) * | 2000-05-18 | 2001-12-05 | 联华电信股份有限公司 | Phonetic checking information system |
US20020104027A1 (en) * | 2001-01-31 | 2002-08-01 | Valene Skerpac | N-dimensional biometric security system |
CN1301026C (en) * | 2002-12-19 | 2007-02-14 | 北京天朗语音科技有限公司 | Mobile terminal voice telephone directory system |
CN1979468A (en) * | 2005-11-29 | 2007-06-13 | 陈修志 | Sound-controlled document inquiring system and method thereof |
CN101819690A (en) * | 2010-03-29 | 2010-09-01 | 中山大学 | Entrance control message-leaving system |
CN201622628U (en) * | 2010-03-10 | 2010-11-03 | 初昊阳 | Biological identification-compatible access control equipment |
-
2011
- 2011-08-29 CN CN201110251600.1A patent/CN102306351B/en active Active
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0813171A2 (en) * | 1996-06-13 | 1997-12-17 | Robert Bosch Gmbh | Mobile user interface |
US20010030644A1 (en) * | 1999-03-30 | 2001-10-18 | Allport David E. | Method of controlling multi-user access to the functionality of consumer devices |
CN1325059A (en) * | 2000-05-18 | 2001-12-05 | 联华电信股份有限公司 | Phonetic checking information system |
US20020104027A1 (en) * | 2001-01-31 | 2002-08-01 | Valene Skerpac | N-dimensional biometric security system |
CN1301026C (en) * | 2002-12-19 | 2007-02-14 | 北京天朗语音科技有限公司 | Mobile terminal voice telephone directory system |
CN1979468A (en) * | 2005-11-29 | 2007-06-13 | 陈修志 | Sound-controlled document inquiring system and method thereof |
CN201622628U (en) * | 2010-03-10 | 2010-11-03 | 初昊阳 | Biological identification-compatible access control equipment |
CN101819690A (en) * | 2010-03-29 | 2010-09-01 | 中山大学 | Entrance control message-leaving system |
Also Published As
Publication number | Publication date |
---|---|
CN102306351B (en) | 2015-03-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105678872B (en) | A kind of access control system and its authorization method and access control terminal equipment | |
CN101599187B (en) | Electronic lock system and management method thereof | |
CN104375836A (en) | Method and device for showing lock screen window | |
CN103077339A (en) | Data protection method and device | |
CN103559455A (en) | Android device personal information protection method based on user identification | |
CN110069559A (en) | A kind of analysis of Heterogeneous Information System data and integrated approach with height automatic control | |
CN106098069A (en) | A kind of identity identifying method and terminal unit | |
CN103400431A (en) | Intelligent double-management and double-control secret carrier storage cabinet | |
CN109697989A (en) | Audio data processing method, server and readable storage medium storing program for executing | |
CN204351376U (en) | A kind of drug in ward Intelligent management cabinet | |
JP2008243172A (en) | Access authority control system | |
CN109410371A (en) | Finger vein identification access control system based on intelligent management | |
CN102306351A (en) | User information control method and device for intelligent lock | |
CN102439615A (en) | User identification system and user data processing method thereof | |
CN103824008A (en) | Computer operation control system on basis of face recognition | |
CN202126701U (en) | Intelligent management system of key storeroom | |
JP2010174516A (en) | Drawer opening/closing management system, management device, terminal device, drawer opening/closing management program, and drawer opening/closing management method | |
CN109413283A (en) | The extracting method and mobile terminal of a kind of key message in call | |
CN205880965U (en) | Domestic access control system and burglary -resisting door based on speech recognition | |
CN102467641A (en) | File management method and system | |
CN100367295C (en) | Intelligent imaging implicit writting analytical system based on three-layer frame | |
JP2007193649A (en) | Secret information leak prevention system and server therefor | |
CN207425015U (en) | A kind of Warehouse Management System based on Internet of Things | |
CN106529254A (en) | Convenient and safe password management method and system | |
JP4005120B1 (en) | Access authority control system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant |