CN111354109A - Security anti-theft monitoring system and method based on big data - Google Patents

Security anti-theft monitoring system and method based on big data Download PDF

Info

Publication number
CN111354109A
CN111354109A CN202010180050.8A CN202010180050A CN111354109A CN 111354109 A CN111354109 A CN 111354109A CN 202010180050 A CN202010180050 A CN 202010180050A CN 111354109 A CN111354109 A CN 111354109A
Authority
CN
China
Prior art keywords
user
door lock
module
information
confidence
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010180050.8A
Other languages
Chinese (zh)
Other versions
CN111354109B (en
Inventor
谢杏容
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Quanzhou Huiren Intelligent Technology Co ltd
Original Assignee
Guangzhou Hongsen Capital Management Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Hongsen Capital Management Co ltd filed Critical Guangzhou Hongsen Capital Management Co ltd
Priority to CN202010180050.8A priority Critical patent/CN111354109B/en
Publication of CN111354109A publication Critical patent/CN111354109A/en
Application granted granted Critical
Publication of CN111354109B publication Critical patent/CN111354109B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05BLOCKS; ACCESSORIES THEREFOR; HANDCUFFS
    • E05B45/00Alarm locks
    • E05B45/06Electric alarm locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/30Security of mobile devices; Security of mobile applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/63Location-dependent; Proximity-dependent

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Lock And Its Accessories (AREA)
  • Alarm Systems (AREA)

Abstract

The invention discloses a security and anti-theft monitoring system and method based on big data, the monitoring system comprises a door lock terminal, the door lock terminal comprises a user registration login module, a user database, an identification code verification module, a position verification module and a door lock unlocking module, the user registration login module is used for a user to register user information through the mobile equipment, the user database is used for storing the user information and the MEID number of the mobile equipment corresponding to the user information, the identification code verifying module is used for verifying whether the MEID number of the mobile equipment which sends the request door lock unlocking information is consistent with the MEID number of the mobile equipment searched in the user database, the position verification module is used for verifying whether the mobile equipment which sends the information requesting the unlocking of the door lock is positioned in a first range of the door lock, the unlocking module is used for refusing to unlock the door lock when the identification code verification module verifies inconsistency or the position verification module fails to verify.

Description

Security anti-theft monitoring system and method based on big data
Technical Field
The invention relates to the field of big data, in particular to a security anti-theft monitoring system and a security anti-theft monitoring method based on big data.
Background
The intelligent door lock is an improved lock which is different from the traditional mechanical lock and is more intelligent, simple and convenient in the aspects of user safety, identification and manageability. The intelligent door lock is an execution component for locking a door in an access control system. Because intelligent lock has higher security and convenience, more and more people select intelligent lock. The mobile phone control door lock is popular among many mobile phone users, but the safety performance of the existing mobile phone control door lock is not high enough.
Disclosure of Invention
The invention aims to provide a security and anti-theft monitoring system and method based on big data, so as to solve the problems in the prior art.
In order to achieve the purpose, the invention provides the following technical scheme:
a security and anti-theft monitoring system based on big data comprises a door lock terminal, wherein the door lock terminal comprises a user registration login module, a user database, an identification code verification module, a position verification module and a door lock unlocking module, the user registration login module is used for a user to register user information through the mobile equipment, the user database is used for storing the user information and the MEID number of the mobile equipment corresponding to the user information, the identification code verifying module is used for verifying whether the MEID number of the mobile equipment which sends the request door lock unlocking information is consistent with the MEID number of the mobile equipment searched in the user database, the position verification module is used for verifying whether the mobile equipment which sends the information requesting the unlocking of the door lock is positioned in a first range of the door lock, the unlocking module is used for refusing to unlock the door lock when the identification code verification module verifies inconsistency or the position verification module fails to verify.
Preferably, the user registration login module comprises a main user registration login module, an invitation code generation module, an authority setting module and an auxiliary user registration login module, the main user registration login module is used for a first user who registers and logs in at the door lock terminal to perform registration login, the invitation code generation module is used for generating a registration invitation code which is used for the main user to send to the auxiliary user, the authority setting module is used for the main user to set authority priority of each auxiliary user, and the auxiliary user registration login module performs registration login according to the user who receives the registration invitation code.
Preferably, the door lock terminal further comprises an alarm receiving module, an alarm authentication module and a confidence check module, wherein the alarm receiving module is used for receiving alarm information for applying the lock master user authority to the door lock terminal by a secondary user, the alarm authentication module is used for verifying the alarm information to the secondary user, the confidence check module is used for verifying the alarm information to the mobile equipment of the master user after the alarm information passes the authentication, the alarm authentication module comprises a wireless check module, an authority priority judging module and a secondary user confidence code checking module, the wireless check module comprises a wireless connection judging module, a secondary user wireless signal acquiring module, a door lock wireless signal acquiring module and a signal comparing module, the wireless connection judging module is used for judging whether the mobile equipment of the secondary user sending the alarm information is connected with the first wireless access point or not, the system comprises a sub-user wireless signal acquisition module, a door lock wireless signal acquisition module, a signal comparison module, a permission priority judgment module and a sub-user confidence code verification module, wherein the sub-user wireless signal acquisition module is used for acquiring a first signal intensity value of a connected first wireless access point under the condition that a mobile device of a sub-user sending alarm information is connected with the first wireless access point, the door lock wireless signal acquisition module is used for acquiring a second signal intensity value of the first wireless access point connected with a door lock terminal, the signal comparison module is used for comparing the relation between the absolute value of the difference between the first signal intensity value and the second signal intensity value and an intensity difference threshold value, the permission priority judgment module is used for judging whether the priority of the sub-user sending the alarm information is the highest level after the detection of the wireless detection module, the sub-user confidence code verification module is used for verifying whether a confidence code sent by, the confidence checking module comprises a confidence information sending module and a main user confidence code checking module, the confidence information sending module is used for sending confidence information to the mobile equipment corresponding to the main user information after the auxiliary user confidence code checking module passes the checking, and the main user confidence code checking module is used for checking whether the main user mobile equipment passes the confidence information.
A security and anti-theft monitoring method based on big data comprises the following steps:
registering user information in a door lock terminal in advance, wherein the user information comprises a user account and a user password, then acquiring an MEID number of a registered user information mobile device, and storing the user information and the corresponding MEID number into a user database;
the method comprises the steps that a door lock terminal receives unlocking request information sent by mobile equipment, and user information is obtained from the unlocking request information;
and searching the MEID number of the mobile equipment corresponding to the user information in a user database of the door lock terminal, wherein if the MEID number of the mobile equipment sending the request door lock unlocking information is inconsistent with the MEID number of the mobile equipment searched in the user database, or the mobile equipment sending the request unlocking information is positioned outside a first range of the door lock, the door lock terminal does not unlock.
Preferably, the monitoring method further comprises: when registering user information, defaulting that a first user registering the user information at a door lock terminal is a master user, generating a registration invitation code for the master user by the door lock terminal, sending the registration invitation code to secondary users by the master user, and setting the authority priority of each secondary user by the door lock terminal; the auxiliary user registers the user information at the door lock terminal according to the received invitation code
Preferably, the monitoring method further comprises: when the mobile equipment of the master user is abnormal or lost, the secondary user sends alarm information to the door lock terminal, wherein the alarm information is used for the secondary user to apply for the right of locking the master user to the door lock terminal;
and the door lock terminal authenticates the alarm information, after the authentication is passed, the door lock terminal sends confidence information to the mobile equipment corresponding to the master user information, judges whether the mobile equipment corresponding to the master user information passes the confidence information or not, locks the authority of the master user if the mobile equipment corresponding to the master user information does not pass the confidence information, upgrades the slave user with the highest authority priority level to the master user, and refuses to lock the authority of the master user if the mobile equipment corresponding to the master user information passes the confidence information.
Preferably, the authentication of the alarm information by the door lock terminal comprises the following steps:
when the door lock terminal receives the alarm information of the secondary user, whether the mobile equipment of the secondary user is connected with a first wireless access point is judged, wherein the first wireless access point is a fixed wireless access point which is connected with the door lock terminal in advance,
if the mobile equipment of the secondary user is connected with the first wireless access point, acquiring a first signal intensity value of the first wireless access point connected with the mobile equipment of the secondary user and a second signal intensity value of the first wireless access point connected with the door lock terminal,
if the absolute value of the difference between the first signal intensity value and the second signal intensity value is smaller than the intensity difference threshold value, further judging whether the secondary user is the secondary user with the highest authority priority, if the secondary user is the secondary user with the highest authority priority, obtaining a confidence code from the secondary user by the door lock terminal, and if the confidence code sent from the secondary user to the door lock terminal is consistent with the confidence code pre-stored in the door lock terminal by the master user, passing the authentication; if the user is not the secondary user with the highest authority priority, the door lock terminal sends request information to the secondary user with the highest authority priority, if the secondary user with the highest authority priority agrees to lock the authority of the primary user, a confidence code is sent to the door lock terminal, and if the confidence code is consistent with a confidence code pre-stored in the door lock terminal by the primary user, authentication is passed;
if the secondary user's mobile device is connected to the first wireless access point, the secondary user is prompted to connect the mobile device to the first wireless access point.
Preferably, the determining whether the mobile device corresponding to the primary user information passes the confidence information includes: when the door lock terminal sends confidence information to the mobile equipment corresponding to the master user information, wherein the confidence information is that the user is required to input a confidence code within a preset time,
if the master user inputs the confidence code within the preset time and the confidence code is consistent with the confidence code pre-stored in the door lock terminal by the master user, the mobile equipment corresponding to the master user information passes through the confidence information;
and if the main user does not input the confidence code within the preset time or the confidence code is inconsistent with the confidence code pre-stored in the door lock terminal by the main user, the mobile equipment corresponding to the main user information does not pass the confidence information.
Compared with the prior art, the invention has the beneficial effects that: according to the invention, when the mobile equipment of the main user is lost, the unlocking authority of the main user can be locked by the aid of other auxiliary users, so that the situation that other people maliciously use the mobile equipment of the main user to unlock the mobile equipment is prevented, and greater loss is generated.
Drawings
FIG. 1 is a block diagram of a big data-based security and anti-theft monitoring system according to the present invention;
fig. 2 is a cross-sectional view of a big data-based security and anti-theft monitoring method of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1-2, in an embodiment of the present invention, a security and anti-theft monitoring system based on big data, the monitoring system comprises a door lock terminal, the door lock terminal comprises a user registration login module, a user database, an identification code verification module, a position verification module and a door lock unlocking module, the user registration login module is used for a user to register user information through the mobile equipment, the user database is used for storing the user information and the MEID number of the mobile equipment corresponding to the user information, the identification code verifying module is used for verifying whether the MEID number of the mobile equipment which sends the request door lock unlocking information is consistent with the MEID number of the mobile equipment searched in the user database, the position verification module is used for verifying whether the mobile equipment which sends the information requesting the unlocking of the door lock is positioned in a first range of the door lock, the unlocking module is used for refusing to unlock the door lock when the identification code verification module verifies inconsistency or the position verification module fails to verify.
The user registration login module comprises a main user registration login module, an invitation code generation module, an authority setting module and an auxiliary user registration login module, the main user registration login module is used for a first user who registers and logs in at a door lock terminal to perform registration and login, the invitation code generation module is used for generating a registration invitation code which is sent by the main user to an auxiliary user, the authority setting module is used for the main user to set authority priority of each auxiliary user, and the auxiliary user registration login module performs registration and login according to the user who receives the registration invitation code.
The door lock terminal further comprises an alarm receiving module, an alarm authentication module and a confidence check module, wherein the alarm receiving module is used for receiving alarm information of a secondary user applying for locking the authority of a primary user to the door lock terminal, the alarm authentication module is used for verifying the alarm information to the secondary user, the confidence check module is used for verifying the alarm information to mobile equipment of the primary user after the alarm information passes the authentication, the alarm authentication module comprises a wireless check module, an authority priority judging module and a secondary user confidence code check module, the wireless check module comprises a wireless connection judging module, a secondary user wireless signal acquisition module, a door lock wireless signal acquisition module and a signal comparison module, the wireless connection judging module is used for judging whether the mobile equipment of the secondary user sending the alarm information is connected with a first wireless access point, and the secondary user wireless signal acquisition module is used for connecting the first wireless access point to the mobile equipment of the secondary user sending the alarm information The system comprises a door lock wireless signal acquisition module, a signal comparison module, an authority priority judgment module, a secondary user confidence code inspection module and a confidence information verification module, wherein the door lock wireless signal acquisition module is used for acquiring a second signal intensity value of a first wireless access point connected with a door lock terminal, the signal comparison module is used for comparing the relation between the absolute value of the difference between the first signal intensity value and the second signal intensity value and an intensity difference threshold value, the authority priority judgment module is used for judging whether the priority of a secondary user sending alarm information is the highest after the wireless verification module passes the verification, the secondary user confidence code inspection module is used for inspecting whether a confidence code sent by a secondary user with the highest authority priority is consistent with a confidence code pre-stored in the door lock terminal by a primary user, the confidence information sending module comprises a confidence information sending module and a primary user confidence code inspection module, and the confidence information sending module is used for sending a confidence code corresponding to primary user information to the primary user after the secondary user confidence code The master user confidence code checking module is used for checking whether the master user mobile equipment passes the confidence information.
A security and anti-theft monitoring method based on big data comprises the following steps:
registering user information in a door lock terminal in advance, wherein the user information comprises a user account and a user password, then acquiring an MEID number of a registered user information mobile device, and storing the user information and the corresponding MEID number into a user database;
the method comprises the steps that a door lock terminal receives unlocking request information sent by mobile equipment, and user information is obtained from the unlocking request information;
and searching the MEID number of the mobile equipment corresponding to the user information in a user database of the door lock terminal, wherein if the MEID number of the mobile equipment sending the request door lock unlocking information is inconsistent with the MEID number of the mobile equipment searched in the user database, or the mobile equipment sending the request unlocking information is positioned outside a first range of the door lock, the door lock terminal does not unlock.
The monitoring method further comprises the following steps: when registering user information, defaulting that a first user registering the user information at a door lock terminal is a master user, generating a registration invitation code for the master user by the door lock terminal, sending the registration invitation code to secondary users by the master user, and setting the authority priority of each secondary user by the door lock terminal; and the auxiliary user registers the user information at the door lock terminal according to the received invitation code. After the first user registers, the user who registers later can register and log in only by the invitation code sent by the master user, and the door lock is controlled to be unlocked; and when the door lock terminal detects that the plurality of mobile devices are in the first range, only the mobile device with the highest authority priority can unlock the door lock, and other mobile devices cannot unlock the door lock.
The monitoring method further comprises the following steps: when the mobile equipment of the master user is abnormal or lost, the secondary user sends alarm information to the door lock terminal, wherein the alarm information is used for the secondary user to apply for the right of locking the master user to the door lock terminal;
and the door lock terminal authenticates the alarm information, after the authentication is passed, the door lock terminal sends confidence information to the mobile equipment corresponding to the master user information, judges whether the mobile equipment corresponding to the master user information passes the confidence information or not, locks the authority of the master user if the mobile equipment corresponding to the master user information does not pass the confidence information, upgrades the slave user with the highest authority priority level to the master user, and refuses to lock the authority of the master user if the mobile equipment corresponding to the master user information passes the confidence information.
The authentication of the alarm information by the door lock terminal comprises the following steps:
when the door lock terminal receives the alarm information of the secondary user, whether the mobile equipment of the secondary user is connected with a first wireless access point is judged, wherein the first wireless access point is a fixed wireless access point which is connected with the door lock terminal in advance,
if the mobile equipment of the secondary user is connected with the first wireless access point, acquiring a first signal intensity value of the first wireless access point connected with the mobile equipment of the secondary user and a second signal intensity value of the first wireless access point connected with the door lock terminal,
if the absolute value of the difference between the first signal intensity value and the second signal intensity value is smaller than the intensity difference threshold value, further judging whether the secondary user is the secondary user with the highest authority priority, if the secondary user is the secondary user with the highest authority priority, obtaining a confidence code from the secondary user by the door lock terminal, and if the confidence code sent from the secondary user to the door lock terminal is consistent with the confidence code pre-stored in the door lock terminal by the master user, passing the authentication; if the user is not the secondary user with the highest authority priority, the door lock terminal sends request information to the secondary user with the highest authority priority, if the secondary user with the highest authority priority agrees to lock the authority of the primary user, a confidence code is sent to the door lock terminal, and if the confidence code is consistent with a confidence code pre-stored in the door lock terminal by the primary user, authentication is passed;
if the secondary user's mobile device is connected to the first wireless access point, the secondary user is prompted to connect the mobile device to the first wireless access point.
When the mobile equipment of the master user is lost, the unlocking authority of the master user can be locked by the aid of other slave users, and the situation that other people maliciously use the mobile equipment of the master user to unlock the mobile equipment is avoided, so that greater loss is generated; meanwhile, in order to prevent other secondary users from locking the authority of the primary user unintentionally or maliciously, when the secondary users apply for locking the authority of the primary user, certain requirements are set on the position of the mobile equipment of the secondary users and the priority of the authority, and the probability that the authority of the primary user is maliciously locked is reduced.
The judging whether the mobile equipment corresponding to the main user information passes the confidence information comprises the following steps: when the door lock terminal sends confidence information to the mobile equipment corresponding to the master user information, wherein the confidence information is that the user is required to input a confidence code within a preset time,
if the master user inputs the confidence code within the preset time and the confidence code is consistent with the confidence code pre-stored in the door lock terminal by the master user, the mobile equipment corresponding to the master user information passes through the confidence information;
and if the main user does not input the confidence code within the preset time or the confidence code is inconsistent with the confidence code pre-stored in the door lock terminal by the main user, the mobile equipment corresponding to the main user information does not pass the confidence information. Under the condition that the mobile equipment of the master user is in a normal state or is not lost, the mobile equipment of the master user can pass the verification of the confidence information, and the authority of the master user cannot be locked, so that other secondary users can be prevented from locking the authority of the master user unintentionally or maliciously.
It will be evident to those skilled in the art that the invention is not limited to the details of the foregoing illustrative embodiments, and that the present invention may be embodied in other specific forms without departing from the spirit or essential attributes thereof. The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the invention being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference sign in a claim should not be construed as limiting the claim concerned.

Claims (8)

1. A security and anti-theft monitoring system based on big data is characterized in that: the monitoring system comprises a door lock terminal, the door lock terminal comprises a user registration login module, a user database, an identification code verification module, a position verification module and a door lock unlocking module, the user registration login module is used for a user to register user information through mobile equipment, the user database is used for storing the user information and the MEID number of the mobile equipment corresponding to the user information, the identification code verification module is used for verifying whether the MEID number of the mobile equipment sending request door lock unlocking information is consistent with the MEID number of the mobile equipment searched in the user database, the position verification module is used for verifying whether the mobile equipment sending request door lock unlocking information is located in a first range of a door lock, and the unlocking module is used for refusing to unlock the door lock when the identification code verification module verifies inconsistency or the position verification module fails.
2. A big data based security and anti-theft monitoring system according to claim 1, characterized in that: the user registration login module comprises a main user registration login module, an invitation code generation module, an authority setting module and an auxiliary user registration login module, the main user registration login module is used for a first user who registers and logs in at a door lock terminal to perform registration and login, the invitation code generation module is used for generating a registration invitation code which is sent by the main user to an auxiliary user, the authority setting module is used for the main user to set authority priority of each auxiliary user, and the auxiliary user registration login module performs registration and login according to the user who receives the registration invitation code.
3. A big data based security and anti-theft monitoring system according to claim 2, characterized in that: the door lock terminal further comprises an alarm receiving module, an alarm authentication module and a confidence check module, wherein the alarm receiving module is used for receiving alarm information of a secondary user applying for locking the authority of a primary user to the door lock terminal, the alarm authentication module is used for verifying the alarm information to the secondary user, the confidence check module is used for verifying the alarm information to mobile equipment of the primary user after the alarm information passes the authentication, the alarm authentication module comprises a wireless check module, an authority priority judging module and a secondary user confidence code check module, the wireless check module comprises a wireless connection judging module, a secondary user wireless signal acquisition module, a door lock wireless signal acquisition module and a signal comparison module, the wireless connection judging module is used for judging whether the mobile equipment of the secondary user sending the alarm information is connected with a first wireless access point, and the secondary user wireless signal acquisition module is used for connecting the first wireless access point to the mobile equipment of the secondary user sending the alarm information The system comprises a door lock wireless signal acquisition module, a signal comparison module, an authority priority judgment module, a secondary user confidence code inspection module and a confidence information verification module, wherein the door lock wireless signal acquisition module is used for acquiring a second signal intensity value of a first wireless access point connected with a door lock terminal, the signal comparison module is used for comparing the relation between the absolute value of the difference between the first signal intensity value and the second signal intensity value and an intensity difference threshold value, the authority priority judgment module is used for judging whether the priority of a secondary user sending alarm information is the highest after the wireless verification module passes the verification, the secondary user confidence code inspection module is used for inspecting whether a confidence code sent by a secondary user with the highest authority priority is consistent with a confidence code pre-stored in the door lock terminal by a primary user, the confidence information sending module comprises a confidence information sending module and a primary user confidence code inspection module, and the confidence information sending module is used for sending a confidence code corresponding to primary user information to the primary user after the secondary user confidence code The master user confidence code checking module is used for checking whether the master user mobile equipment passes the confidence information.
4. A security and anti-theft monitoring method based on big data is characterized in that: the monitoring method comprises the following steps:
registering user information in a door lock terminal in advance, wherein the user information comprises a user account and a user password, then acquiring an MEID number of a registered user information mobile device, and storing the user information and the corresponding MEID number into a user database;
the method comprises the steps that a door lock terminal receives unlocking request information sent by mobile equipment, and user information is obtained from the unlocking request information;
and searching the MEID number of the mobile equipment corresponding to the user information in a user database of the door lock terminal, wherein if the MEID number of the mobile equipment sending the request door lock unlocking information is inconsistent with the MEID number of the mobile equipment searched in the user database, or the mobile equipment sending the request unlocking information is positioned outside a first range of the door lock, the door lock terminal does not unlock.
5. The big data-based security and anti-theft monitoring method according to claim 4, characterized in that: the monitoring method further comprises the following steps: when registering user information, defaulting that a first user registering the user information at a door lock terminal is a master user, generating a registration invitation code for the master user by the door lock terminal, sending the registration invitation code to secondary users by the master user, and setting the authority priority of each secondary user by the door lock terminal; and the auxiliary user registers the user information at the door lock terminal according to the received invitation code.
6. A big data-based security and anti-theft monitoring method according to claim 5, characterized in that: the monitoring method further comprises the following steps:
when the mobile equipment of the master user is abnormal or lost, the secondary user sends alarm information to the door lock terminal, wherein the alarm information is used for the secondary user to apply for the right of locking the master user to the door lock terminal;
and the door lock terminal authenticates the alarm information, after the authentication is passed, the door lock terminal sends confidence information to the mobile equipment corresponding to the master user information, judges whether the mobile equipment corresponding to the master user information passes the confidence information or not, locks the authority of the master user if the mobile equipment corresponding to the master user information does not pass the confidence information, upgrades the slave user with the highest authority priority level to the master user, and refuses to lock the authority of the master user if the mobile equipment corresponding to the master user information passes the confidence information.
7. The big data-based security and anti-theft monitoring method according to claim 6, characterized in that: the authentication of the alarm information by the door lock terminal comprises the following steps:
when the door lock terminal receives the alarm information of the secondary user, whether the mobile equipment of the secondary user is connected with a first wireless access point is judged, wherein the first wireless access point is a fixed wireless access point which is connected with the door lock terminal in advance,
if the mobile equipment of the secondary user is connected with the first wireless access point, acquiring a first signal intensity value of the first wireless access point connected with the mobile equipment of the secondary user and a second signal intensity value of the first wireless access point connected with the door lock terminal,
if the absolute value of the difference between the first signal intensity value and the second signal intensity value is smaller than the intensity difference threshold value, further judging whether the secondary user is the secondary user with the highest authority priority, if the secondary user is the secondary user with the highest authority priority, obtaining a confidence code from the secondary user by the door lock terminal, and if the confidence code sent from the secondary user to the door lock terminal is consistent with the confidence code pre-stored in the door lock terminal by the master user, passing the authentication; if the user is not the secondary user with the highest authority priority, the door lock terminal sends request information to the secondary user with the highest authority priority, if the secondary user with the highest authority priority agrees to lock the authority of the primary user, a confidence code is sent to the door lock terminal, and if the confidence code is consistent with a confidence code pre-stored in the door lock terminal by the primary user, authentication is passed;
if the secondary user's mobile device is connected to the first wireless access point, the secondary user is prompted to connect the mobile device to the first wireless access point.
8. The big data-based security and anti-theft monitoring method according to claim 6, characterized in that: the judging whether the mobile equipment corresponding to the main user information passes the confidence information comprises the following steps: when the door lock terminal sends confidence information to the mobile equipment corresponding to the master user information, wherein the confidence information is that the user is required to input a confidence code within a preset time,
if the master user inputs the confidence code within the preset time and the confidence code is consistent with the confidence code pre-stored in the door lock terminal by the master user, the mobile equipment corresponding to the master user information passes through the confidence information;
and if the main user does not input the confidence code within the preset time or the confidence code is inconsistent with the confidence code pre-stored in the door lock terminal by the main user, the mobile equipment corresponding to the main user information does not pass the confidence information.
CN202010180050.8A 2020-03-16 2020-03-16 Security anti-theft monitoring system and method based on big data Active CN111354109B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010180050.8A CN111354109B (en) 2020-03-16 2020-03-16 Security anti-theft monitoring system and method based on big data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010180050.8A CN111354109B (en) 2020-03-16 2020-03-16 Security anti-theft monitoring system and method based on big data

Publications (2)

Publication Number Publication Date
CN111354109A true CN111354109A (en) 2020-06-30
CN111354109B CN111354109B (en) 2021-11-26

Family

ID=71196153

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010180050.8A Active CN111354109B (en) 2020-03-16 2020-03-16 Security anti-theft monitoring system and method based on big data

Country Status (1)

Country Link
CN (1) CN111354109B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115240300A (en) * 2022-03-14 2022-10-25 云丁网络技术(北京)有限公司 Control method, system and device of intelligent security system and storage medium

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100795587B1 (en) * 2006-10-26 2008-01-21 주식회사 케이티프리텔 Electronic key providing system and method thereof, terminal for electronic key providing system and recoding medium thereof
CN102413456A (en) * 2011-09-02 2012-04-11 中国电信股份有限公司 User terminal anti-theft method, user terminal anti-theft device and user terminal anti-theft system based on operation network
CN103581441A (en) * 2013-10-31 2014-02-12 中国电子科技集团公司第十五研究所 Mobile terminal tracking anti-theft system and method
CN104573788A (en) * 2014-11-25 2015-04-29 刘锐 Bracelet and system for management and evaluation of education and teaching of elementary and secondary schools
US20150294517A1 (en) * 2014-04-11 2015-10-15 9Solutions Oy Wireless locking system
CN106599641A (en) * 2016-12-13 2017-04-26 广东欧珀移动通信有限公司 Method and device for limiting terminal locking, and terminal
CN106600776A (en) * 2016-12-08 2017-04-26 宇龙计算机通信科技(深圳)有限公司 Method and system of access control
CN106981107A (en) * 2016-01-19 2017-07-25 福建省光速达物联网科技股份有限公司 The unlocked by mobile telephone method and system of control of bluetooth access
CN106981108A (en) * 2016-01-19 2017-07-25 福建省光速达物联网科技股份有限公司 A kind of bluetooth nurse method for unlocking and system
CN108428267A (en) * 2018-03-15 2018-08-21 上海易川网络科技有限公司 A kind of access control method and access control system in self-service guest room
CN108830987A (en) * 2018-06-04 2018-11-16 联想(北京)有限公司 A kind of authority control method, intelligent door system and controller

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100795587B1 (en) * 2006-10-26 2008-01-21 주식회사 케이티프리텔 Electronic key providing system and method thereof, terminal for electronic key providing system and recoding medium thereof
CN102413456A (en) * 2011-09-02 2012-04-11 中国电信股份有限公司 User terminal anti-theft method, user terminal anti-theft device and user terminal anti-theft system based on operation network
CN103581441A (en) * 2013-10-31 2014-02-12 中国电子科技集团公司第十五研究所 Mobile terminal tracking anti-theft system and method
US20150294517A1 (en) * 2014-04-11 2015-10-15 9Solutions Oy Wireless locking system
CN104573788A (en) * 2014-11-25 2015-04-29 刘锐 Bracelet and system for management and evaluation of education and teaching of elementary and secondary schools
CN106981107A (en) * 2016-01-19 2017-07-25 福建省光速达物联网科技股份有限公司 The unlocked by mobile telephone method and system of control of bluetooth access
CN106981108A (en) * 2016-01-19 2017-07-25 福建省光速达物联网科技股份有限公司 A kind of bluetooth nurse method for unlocking and system
CN106600776A (en) * 2016-12-08 2017-04-26 宇龙计算机通信科技(深圳)有限公司 Method and system of access control
CN106599641A (en) * 2016-12-13 2017-04-26 广东欧珀移动通信有限公司 Method and device for limiting terminal locking, and terminal
CN108428267A (en) * 2018-03-15 2018-08-21 上海易川网络科技有限公司 A kind of access control method and access control system in self-service guest room
CN108830987A (en) * 2018-06-04 2018-11-16 联想(北京)有限公司 A kind of authority control method, intelligent door system and controller

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115240300A (en) * 2022-03-14 2022-10-25 云丁网络技术(北京)有限公司 Control method, system and device of intelligent security system and storage medium

Also Published As

Publication number Publication date
CN111354109B (en) 2021-11-26

Similar Documents

Publication Publication Date Title
US8281373B2 (en) System, apparatus, and program for biometric authentication
US10171444B1 (en) Securitization of temporal digital communications via authentication and validation for wireless user and access devices
US10089804B2 (en) Method and apparatus for increasing reliability in monitoring systems
CN103035054B (en) NFC intelligent automobile key system with permission and authorization functions
US9305412B2 (en) Apparatus, system and method for vehicle authentication management and reporting
US8933777B2 (en) Gate control system and method of remote unlocking by validated users
JP2006331048A (en) Personal identification method and system by position information
US20070050634A1 (en) Service authentication system, server, network equipment, and method for service authentication
CN105243314B (en) A kind of security system and its application method based on USB key
CN110011811A (en) Vehicle unlock authentication method and device based on terminal device
CN109067881B (en) Remote authorization method, device, equipment and storage medium thereof
US20070288998A1 (en) System and method for biometric authentication
CN103378876A (en) Bluetooth-based terminal unlocking method
WO2018014322A1 (en) Residential intelligent door lock system and control method thereof
CN105857246A (en) Control method, device and system for automobile starting lock
CN113487779A (en) Access control method, access terminal and storage medium
CN111354109B (en) Security anti-theft monitoring system and method based on big data
CN107978033A (en) A kind of smart lock exchange method
CN113536260A (en) Method and device for improving identity authentication security level based on biological characteristics
CN105741382A (en) Access control method
US10645070B2 (en) Securitization of temporal digital communications via authentication and validation for wireless user and access devices
CN111739208A (en) Method and system for managing entrance and exit of rented house personnel based on intelligent lock
WO2020034162A1 (en) Trunking communication method, server, terminal device and storage medium
EP4148694A1 (en) Accessing an asset with user device
CN114339489B (en) Method, equipment and medium for terminal to finish server authentication in PON system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20220907

Address after: Room 1307, 13th Floor, Yuantai Building, No. 151 Wenling South Road, Yingjin Community, Fengze Street, Fengze District, Quanzhou City, Fujian Province 362000

Patentee after: Quanzhou Shuangli Network Technology Co.,Ltd.

Address before: 510630 room 1101, No. 8, Jinsui Road, Tianhe District, Guangzhou City, Guangdong Province, self compiled C78

Patentee before: Guangzhou Hongsen Capital Management Co.,Ltd.

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20220915

Address after: 362000 No. C103, building C, Chuangke street, Sanchuang garden, Luoshan street, Jinjiang City, Quanzhou City, Fujian Province

Patentee after: Quanzhou Huiren Intelligent Technology Co.,Ltd.

Address before: Room 1307, 13th Floor, Yuantai Building, No. 151 Wenling South Road, Yingjin Community, Fengze Street, Fengze District, Quanzhou City, Fujian Province 362000

Patentee before: Quanzhou Shuangli Network Technology Co.,Ltd.

TR01 Transfer of patent right