CN112150675A - Control method and device of coded lock and computer readable storage medium - Google Patents

Control method and device of coded lock and computer readable storage medium Download PDF

Info

Publication number
CN112150675A
CN112150675A CN202011043350.8A CN202011043350A CN112150675A CN 112150675 A CN112150675 A CN 112150675A CN 202011043350 A CN202011043350 A CN 202011043350A CN 112150675 A CN112150675 A CN 112150675A
Authority
CN
China
Prior art keywords
lock
coded lock
preset
key
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202011043350.8A
Other languages
Chinese (zh)
Other versions
CN112150675B (en
Inventor
林万区
李建华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ningbo Bull Intelligent Technology Co ltd
Original Assignee
Bull Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Bull Group Co Ltd filed Critical Bull Group Co Ltd
Priority to CN202011043350.8A priority Critical patent/CN112150675B/en
Publication of CN112150675A publication Critical patent/CN112150675A/en
Application granted granted Critical
Publication of CN112150675B publication Critical patent/CN112150675B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks

Abstract

The application provides a control method and device of a coded lock and a computer readable storage medium, and relates to the technical field of control. The control method of the coded lock can weaken the attraction of the coded lock to children, and prevent the children from using the coded lock as a toy, so that the battery endurance of the coded lock can be improved. The method comprises the following steps: a control device of the coded lock acquires a user behavior parameter within a first preset time period; and then, the control device of the coded lock determines that the current input user is an abnormal user according to the user behavior parameters, and then controls the coded lock to open the child lock mode. Wherein, the child lock mode includes: and closing the input prompt tone of the key of the coded lock, and controlling the coded lock to be opened when the triggering operation of the key of the coded lock meets the preset triggering condition.

Description

Control method and device of coded lock and computer readable storage medium
Technical Field
The present disclosure relates to the field of control technologies, and in particular, to a method and an apparatus for controlling a combination lock, and a computer-readable storage medium.
Background
At present, traditional lock has been replaced gradually to intelligence trick lock, and compares traditional lock factor of safety higher. A child lock setting button is arranged on a door frame corresponding to a common intelligent coded lock, and when the child lock setting button is pressed down, a door handle is locked, so that a child can be prevented from breaking the code to open the door, namely, a child lock mode is started.
However, the display panel of the intelligent coded lock in the current child lock mode is still in a state that the password can be input, when the password is input by a child, a voice prompt can be sent out, the child is easily stimulated to use the intelligent coded lock as a toy, the password is repeatedly input, and the battery endurance of the intelligent coded lock is influenced.
Disclosure of Invention
The application provides a control method and device of a coded lock and a computer readable storage medium, which can prevent children from using the coded lock as a toy and improve battery endurance of the coded lock.
In order to achieve the purpose, the technical scheme is as follows:
in a first aspect, the present application provides a method for controlling a combination lock, including: a control device of the coded lock acquires a user behavior parameter within a first preset time period; and then, the control device of the coded lock determines that the current input user is an abnormal user according to the user behavior parameters, and then controls the coded lock to open the child lock mode. Wherein, the child lock mode includes: and closing the input prompt tone of the key of the coded lock, and controlling the coded lock to be opened when the triggering operation of the key of the coded lock meets the preset triggering condition.
Since the user behavior parameter may characterize whether the current input user is an abnormal user (e.g., a child), the control device of the combination lock may control the combination lock to unlock the child lock mode when the current input user is determined to be an abnormal user. In addition, when the triggering operation of the key of the coded lock meets the preset triggering condition, the control device of the coded lock can still control the coded lock to be opened, so that the use of a normal user is not influenced in the child lock mode in the application. Under the child lock mode, the control device of trick lock has closed the input prompt tone of the button of trick lock, can weaken the appeal of trick lock to children like this, avoids children as the toy with the trick lock to can improve the battery continuation of the journey of trick lock.
Optionally, in a possible design, after the "controlling the combination lock to unlock the child lock mode", the method for controlling the combination lock further includes: if the triggering operation of the key of the coded lock is received within the second preset time period, after the triggering operation of the key of the coded lock is received for the first preset time period, the control device of the coded lock controls the coded lock to open the screen locking mode.
Wherein, lock the screen mode and include: and closing the input display of the key of the coded lock, and controlling the coded lock to be opened when the triggering operation of the key of the coded lock meets the preset triggering condition.
Optionally, in another possible design, the "controlling the combination lock to unlock the screen locking mode" may include: and sending out a first early warning, and controlling the coded lock to unlock a screen locking mode.
The first early warning is used for prompting that the current input user coded lock opens the screen locking mode.
Optionally, in another possible design, the method for controlling a combination lock provided by the present application further includes: and controlling the coded lock to send out a second early warning before a second preset time length of the screen locking mode is opened.
The second early warning is used for prompting the current input user to open the screen locking mode after the password lock is in a second preset time; the second preset time is shorter than the first preset time.
Optionally, in another possible design, the "user behavior parameter" includes: at least one of a target trigger number, a target trigger area, or a target interval duration.
Specifically, the target trigger times may be key trigger times of any password verification within a first preset time period; the target trigger area can be a key trigger area within a first preset time period; the target interval duration may be an interval duration between the first time and the second time.
The first moment is the moment when a key of the coded lock is triggered for the last time in the ith password verification, and the second moment is the moment when the key of the coded lock is triggered for the first time in the (i + 1) th password verification; the ith password authentication and the (i + 1) th password authentication are two times of continuous password authentication in a first preset time period, and a key trigger area of the ith password authentication or the (i + 1) th password authentication is positioned in a first preset area; i is a positive integer.
Optionally, in another possible design, the "determining that the current input user is an abnormal user according to the user behavior parameter" includes: when the target triggering times are smaller than a first preset value, determining that the current input user is an abnormal user; or when the target trigger area is within the range of the second preset area, determining that the current input user is an abnormal user; or when the target interval duration is longer than a third preset duration, determining that the current input user is an abnormal user.
In a second aspect, the present application provides a control apparatus for a combination lock, including an obtaining module, a determining module, and a control module.
The acquisition module is used for acquiring the user behavior parameters of a first preset time period.
And the determining module is used for determining the current input user as an abnormal user according to the user behavior parameters acquired by the acquiring module.
And the control module is used for controlling the coded lock to unlock the child lock mode. Specifically, the child lock mode includes: and closing the input prompt tone of the key of the coded lock, and controlling the coded lock to be opened when the triggering operation of the key of the coded lock meets the preset triggering condition.
In a third aspect, the present application provides a control apparatus for a combination lock, including a processor, where the processor is configured to couple with a memory, read and execute instructions in the memory, so as to implement the control method for a combination lock provided in the first aspect or any one of the possible design manners of the first aspect.
Optionally, the control device of the combination lock may further comprise a memory for storing program instructions and data of the control device of the combination lock. Further optionally, the control device of the combination lock may further include a transceiver, and the transceiver is configured to perform the step of transceiving data, signaling or information under the control of the processor of the control device of the combination lock, for example, acquiring the user behavior parameter of the first preset time period.
Alternatively, the control device of the combination lock may be a part of the device in the combination lock, for example, may be a system-on-chip in the combination lock. The chip system is configured to support the control device of the combination lock to implement the functions related to the first aspect or any one of the possible design manners of the first aspect, for example, to receive, transmit or process data and/or information related to the control method of the combination lock. The chip system includes a chip and may also include other discrete devices or circuit structures.
In a fourth aspect, the present application provides a computer-readable storage medium, in which instructions are stored, and when the instructions are executed by a computer, the method for controlling a combination lock is implemented as provided in the first aspect or any one of the possible design manners of the first aspect.
In a fifth aspect, the present application provides a computer program product comprising computer instructions which, when run on a computer, cause the computer to perform a method of controlling a combination lock as provided in the first aspect or any one of the possible designs of the first aspect.
It should be noted that all or part of the computer instructions may be stored on the computer readable storage medium. The computer-readable storage medium may be packaged with a processor of a control device of the combination lock, or may be packaged separately from the processor of the control device of the combination lock, which is not limited in this application.
For the descriptions of the second, third, fourth and fifth aspects in this application, reference may be made to the detailed description of the first aspect; in addition, for the beneficial effects described in the second aspect, the third aspect, the fourth aspect and the fifth aspect, reference may be made to the beneficial effect analysis of the first aspect, and details are not repeated here.
In the present application, the names of the control means of the above-mentioned combination lock do not constitute a limitation on the devices or functional modules themselves, which may appear under other names in an actual implementation. Insofar as the functions of the respective devices or functional blocks are similar to those of the present invention, they are within the scope of the claims of the present application and their equivalents.
These and other aspects of the present application will be more readily apparent from the following description.
Drawings
Fig. 1 is a schematic system architecture diagram of a control system of a combination lock according to an embodiment of the present disclosure;
fig. 2 is a schematic flowchart of a control method of a combination lock according to an embodiment of the present disclosure;
FIG. 3 is a schematic diagram of a control interface provided in an embodiment of the present application;
FIG. 4 is a schematic view of another control interface provided by embodiments of the present application;
fig. 5 is a schematic flowchart of another control method for a combination lock according to an embodiment of the present disclosure;
fig. 6 is a schematic flowchart of another control method for a combination lock according to an embodiment of the present disclosure;
fig. 7 is a schematic flowchart of another control method for a combination lock according to an embodiment of the present disclosure;
fig. 8 is a schematic flowchart of another control method for a combination lock according to an embodiment of the present disclosure;
fig. 9 is a schematic flowchart of another control method for a combination lock according to an embodiment of the present disclosure;
fig. 10 is a schematic flowchart of a control method for a combination lock according to an embodiment of the present application;
fig. 11 is a schematic structural diagram of a control device of a combination lock according to an embodiment of the present disclosure;
fig. 12 is a schematic structural diagram of another control device of a combination lock according to an embodiment of the present application.
Detailed Description
The following describes a control method and device of a combination lock provided in an embodiment of the present application in detail with reference to the accompanying drawings.
The term "and/or" herein is merely an association describing an associated object, meaning that three relationships may exist, e.g., a and/or B, may mean: a exists alone, A and B exist simultaneously, and B exists alone.
The terms "first" and "second" and the like in the description and drawings of the present application are used for distinguishing different objects or for distinguishing different processes for the same object, and are not used for describing a specific order of the objects.
Furthermore, the terms "including" and "having," and any variations thereof, as referred to in the description of the present application, are intended to cover non-exclusive inclusions. For example, a process, method, system, article, or apparatus that comprises a list of steps or elements is not limited to only those steps or elements but may alternatively include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
It should be noted that in the embodiments of the present application, words such as "exemplary" or "for example" are used to mean serving as examples, illustrations or descriptions. Any embodiment or design described herein as "exemplary" or "e.g.," is not necessarily to be construed as preferred or advantageous over other embodiments or designs. Rather, use of the word "exemplary" or "such as" is intended to present concepts related in a concrete fashion.
In the description of the present application, the meaning of "a plurality" means two or more unless otherwise specified.
At present, traditional lock has been replaced gradually to intelligence trick lock, and compares traditional lock factor of safety higher. A child lock setting button is arranged on a door frame corresponding to a common intelligent coded lock, and when the child lock setting button is pressed down, a door handle is locked, so that a child can be prevented from breaking the code to open the door, namely, a child lock mode is started.
However, the display panel of the intelligent coded lock in the current child lock mode is still in a state that the password can be input, when the password is input by a child, a voice prompt can be sent out, the child is easily stimulated to use the intelligent coded lock as a toy, the password is repeatedly input, and the battery endurance of the intelligent coded lock is influenced.
In view of the above problems in the prior art, embodiments of the present application provide a control method for a combination lock, which may be applied to a control device for a combination lock.
In one possible implementation, the control device of the combination lock may be provided on the combination lock, for example, the control device of the combination lock may be a chip system in the combination lock. The chip system is used for supporting the control device of the coded lock to realize the functions related to the control method of the coded lock provided by the embodiment of the application.
In another possible implementation manner, the control method of the combination lock provided by the embodiment of the present application may also be applied to a control system of the combination lock. As shown in fig. 1, a control system for a combination lock may comprise a control device 01 for a combination lock and a plurality of combination locks 02.
In a possible implementation manner, the control device 01 of the trick lock may be a physical machine (such as a server), or may also be a Virtual Machine (VM) deployed on the physical machine, and is configured to monitor each trick lock 02 to implement control over each trick lock 02. For example: and determining that the current input user is an abnormal user according to the user behavior parameters, and controlling the coded lock 02 to open the child lock mode. In the embodiment of the present application, the control device 01 of the combination lock may be an independent physical machine or a virtual machine. In the embodiment of the present application, the control device 01 of the combination lock has the same processing procedure for each combination lock 02.
In another possible implementation, the control device 01 of the combination lock may be a terminal. The terminal may be a mobile phone, a tablet computer, a desktop computer, a laptop computer, a notebook computer, an ultra-mobile personal computer (UMPC), a handheld computer, a netbook, a Personal Digital Assistant (PDA), a wearable electronic device, a virtual reality device, and other different types of terminals connected to the combination lock.
Referring to fig. 2, an embodiment of the present application provides a method for controlling a combination lock, where the method includes S101-S103:
s101, a control device of the coded lock acquires user behavior parameters in a first preset time period.
The first preset time period may be a time interval determined in advance by human. For example, the first preset time period may be 5 minutes.
Since the number of password authentications of an abnormal user (e.g., a child) is generally greater than that of a normal user, alternatively, the control device of the password lock may periodically acquire the number of password authentications of the input user. When it is determined that the number of times of password authentication of the input user within a preset period reaches a preset number of times, the control device of the combination lock may determine that the input user is a suspected abnormal user. Because the normal user forgets to unlock the password or loses the wrong password, when the control device of the password lock determines that the password verification times reach the preset times, the current input user can be determined to be the suspected abnormal user. Further, the user behavior may be analyzed by acquiring a user behavior parameter for a first preset time period to determine whether the current input user is an abnormal user.
The preset period and the preset times may be parameters determined in advance by people. For example, the control device of the combination lock may determine the number of password authentications of the user input in the last 3 minutes every 3 minutes, and when it is determined that the number of password authentications of the user input in the last 3 minutes reaches 5 times, the control device of the combination lock may acquire the user behavior parameter for the first preset time period.
In a possible implementation manner, the touch screen of the combination lock may display an interface as shown in fig. 3, the "#" key may be pressed to confirm the verification password every time the user inputs the unlocking password, and the control device of the combination lock may obtain the number of times the "#" key is pressed by the user to determine the number of times of password verification within the first preset time period. It can be understood that, in practical applications, the verification modes of different combination locks are different, and the control device of the combination lock may determine the number of times of password verification within the first preset time period according to the mode of password verification of the combination lock, which is not limited in the embodiment of the present application.
S102, the control device of the coded lock determines that the current input user is an abnormal user according to the user behavior parameters.
In a possible implementation manner, the user behavior parameter may be a number of key triggers of any password verification within a first preset time period, that is, a target number of trigger in the embodiment of the present application. It can be understood that when the child views the combination lock as a toy, the number of the inputted passwords is less than the number of the correct passwords at each authentication because the passwords are not actually authenticated. Therefore, optionally, the control device of the combination lock may acquire a target trigger number, and when the target trigger number is determined to be smaller than the first preset value, determine that the current input user is an abnormal user.
The first preset value may be a number of times of triggering the key, which is determined in advance by a human. Illustratively, the first preset value may be 5 times.
In another possible implementation manner, the user behavior parameter may be a key triggering area within a first preset time period, that is, a target triggering area in the embodiment of the present application. It will be appreciated that due to the child's height limitations, the key activation area is generally lower than normal users when the child views the combination lock as a toy. Therefore, optionally, the control device of the combination lock may acquire the target trigger area, and when it is determined that the target trigger area is within the range of the second preset area, it is determined that the current input user is a child, that is, it is determined that the current input user is an abnormal user.
The key triggering area can be a key area when a user inputs a password on a touch screen of the password lock. The second preset area may be a lower area of a touch screen of the combination lock preset by a user. Exemplarily, as shown in fig. 4, the region 1 may be set as a second preset region.
In another possible implementation manner, the user behavior parameter may be an interval duration between the first time and the second time, that is, a target interval duration in the embodiment of the present application. It can be understood that the child may use a jump or the like to touch the high-order area on the touch screen during the playing, and at this time, the time interval between two successive password verifications of the child is longer than that of a normal user. Therefore, alternatively, the control device of the combination lock may acquire the target interval duration, and when it is determined that the target interval duration is greater than the third preset duration, it is determined that the current input user is an abnormal user.
The first moment is the moment when a key of the coded lock is triggered for the last time in the ith password verification, and the second moment is the moment when the key of the coded lock is triggered for the first time in the (i + 1) th password verification; the ith password authentication and the (i + 1) th password authentication are two times of continuous password authentication in a first preset time period, and a key trigger area of the ith password authentication or the (i + 1) th password authentication is positioned in a first preset area; i is a positive integer.
The third preset time period may be a time period determined in advance by an operator. The first preset area may be a high-order area of a touch screen of the combination lock preset by a user. Exemplarily, as shown in fig. 4, the region 2 may be set as a first preset region.
In order to improve the accuracy of distinguishing the normal user from the abnormal user, optionally, the user behavior parameter may be an interval duration between the first time and the second time, and an interval duration between the third time and the fourth time. The control device of the coded lock determines that the interval duration of the first time and the second time is greater than a third preset duration, and the interval duration of the third time and the fourth time is also greater than the third preset duration, so that the current input user can be determined to be an abnormal user.
The third moment is the moment when the key is triggered for the last time in the (i + 1) th password verification, and the fourth moment is the moment when the key is triggered for the first time in the (i + 2) th password verification. The (i + 1) th password authentication and the (i + 2) th password authentication are two times of continuous password authentication in a first preset time period, and the key triggering area of the (i + 1) th password authentication is located in a first preset area.
It can be understood that, in practical applications, the current input user may also be determined to be an abnormal user by combining the target trigger times, the target trigger area, and the target interval duration.
For example, the control device of the combination lock may first obtain a target trigger number, and when the target trigger number is smaller than a first preset value, determine that the current input user is an abnormal user. If the target triggering frequency is not less than the first preset value, the control device of the coded lock can further acquire a target triggering area, and when the target triggering area is within the range of the second preset area, the current input user is determined to be an abnormal user. If the target trigger area is not within the range of the second preset area, the control device of the coded lock may further obtain a target interval duration, and when the target interval duration is greater than a third preset duration, it is determined that the current input user is an abnormal user. If the target interval duration is less than or equal to the third preset duration, the control device of the coded lock can acquire the target triggering times again, and accordingly the user behavior parameters are acquired in a repeated and circular mode.
Of course, in practical application, the currently input user may also be determined to be an abnormal user by using other manners in combination with the target trigger times, the target trigger area, and the target interval duration, which is not limited in this application embodiment.
S103, controlling the coded lock to open the child lock mode by the control device of the coded lock.
Specifically, the child lock mode includes: and closing the input prompt tone of the key of the coded lock, and controlling the coded lock to be opened when the triggering operation of the key of the coded lock meets the preset triggering condition.
The preset trigger condition can be that the password input by the user is an unlocking password preset by the user. Illustratively, if the unlocking password preset by the user is 1234, the control device of the coded lock can control the coded lock to be opened when the control device of the coded lock determines that the keys "1", "2", "3" and "4" of the coded lock are continuously triggered.
Optionally, as shown in fig. 5, the method for controlling a combination lock according to the embodiment of the present application further includes S104:
and S104, if the control device of the coded lock receives the triggering operation of the key of the coded lock within a second preset time period, controlling the coded lock to unlock the screen locking mode after receiving the triggering operation of the key of the coded lock for a first preset time period.
Specifically, the screen locking mode includes: and closing the input display of the key of the coded lock, and controlling the coded lock to be opened when the triggering operation of the key of the coded lock meets the preset triggering condition.
The second preset time period may be a time period preset by a user after the control device of the combination lock controls the combination lock to unlock the child lock mode. Illustratively, the second preset time period may be 30 seconds.
The first preset duration can be determined according to the concentration duration of the abnormal user. Illustratively, the concentration time period of the child is generally 2 to 3 minutes, and the first preset time period may be set to 180 seconds.
It can be seen that, in the child lock mode, the control device of the coded lock not only closes the input prompt tone of the key of the coded lock, but also closes the input display, so that the attraction of the coded lock to children can be further weakened, the children are prevented from using the coded lock as a toy, and the battery endurance of the coded lock is improved. In addition, the battery endurance of the coded lock can be further improved by closing the input display.
Optionally, the controlling device of the combination lock controlling the combination lock to unlock the screen locking mode may further include: and sending out a first early warning, and controlling the coded lock to unlock a screen locking mode. The first early warning is used for prompting that the current input user coded lock opens the screen locking mode.
Optionally, before the controlling device of the combination lock controls the combination lock to unlock the lock screen mode, the method may further include: and sending a second early warning before controlling the coded lock to open the screen locking mode for a second preset time. The second early warning is used for prompting the current input user to open the screen locking mode after the password lock is in a second preset time; the second preset time is shorter than the first preset time.
Illustratively, the first warning may be a long beep and the second warning may be a short beep. Certainly, in practical application, the first warning and the second warning may also be in other types of warning manners, which is not limited in this application embodiment.
The first preset time length and the second preset time length may be artificially and previously determined time lengths. It should be noted that the second preset time period is shorter than the first preset time period.
The second preset time duration may be determined according to the time duration for the password authentication input by the normal user. Illustratively, the average time duration of each password authentication of the normal user is p seconds, the average time duration of the password authentication of the normal user is k seconds, and if the first preset time duration is represented by t1 and the second preset time duration is represented by t2, the t1-t2 may be 3 × p + k seconds. Where k < w <2k, w may be set between 3 seconds and 6 seconds.
In practical applications, in order to facilitate the user to open or close the child lock mode, the control of the combination lock may also be combined with other manners to control the combination lock to open or close the child lock mode.
In a possible implementation manner, the control device of the combination lock may control the combination lock to unlock the child lock mode when receiving the touch instruction or the remote instruction.
The touch instruction or the remote instruction is used for indicating the control device of the coded lock to control the coded lock to open the child lock mode.
In a possible implementation manner, a "child lock open/close mode" button may be disposed on the combination lock or the door frame, and the touch instruction may be an instruction triggered by a user through the "child lock open/close mode" button. For example, the user may trigger the touch instruction by pressing the "open/close child lock mode" button once, and the control device of the combination lock controls the combination lock to open the child lock mode when receiving the touch instruction. Then, the user can press the 'open/close child lock mode' button once again to trigger the touch instruction for the second time, and the control device of the coded lock controls the coded lock to close the child lock mode when receiving the touch instruction for the second time, so that the operation is repeated. Certainly, in practical applications, the user may also trigger the touch instruction in other manners, which is not limited in this application. For example, the user may trigger the touch command by pressing the "open/close child lock mode" button for a long time.
In another possible implementation manner, the touch instruction may also be an instruction triggered by a sliding operation of a user on a touch screen of the combination lock. For example, a user may slide a first control gesture on the touch screen to trigger a touch instruction, and the control device of the combination lock controls the combination lock to unlock the child lock mode when receiving the touch instruction. And then, the user can slide a second control gesture on the touch screen to trigger the touch instruction, and the control device of the coded lock controls the coded lock to close the child lock mode when receiving the touch instruction for the second time, so that the operation is repeated.
The first control gesture and the second control gesture may be control gestures preset by a user. In practical applications, the first control gesture and the second control gesture may be the same or different.
In a possible implementation manner, the touch instruction may also be an instruction triggered by a click operation of a user on a touch screen of the combination lock. For example, a user may click a first control password on the touch screen to trigger a touch instruction, and the control device of the combination lock controls the combination lock to unlock the child lock mode when receiving the touch instruction. And then, the user can click a second control password on the touch screen to trigger the touch instruction, and the control device of the coded lock controls the coded lock to close the child lock mode when receiving the touch instruction for the second time, so that the operation is repeated.
The first control password and the second control password may be control passwords preset by a user. In practical applications, the first control password and the second control password may be the same or different.
It will be appreciated that in practical applications, the user may also control the combination lock to unlock the child lock mode by triggering the control device of the combination lock in other ways. In a possible implementation manner, the control device of the combination lock can control the combination lock to unlock the child lock mode when receiving the remote instruction.
For example, the control device of the combination lock may be connected to a terminal (the control device of the combination lock itself may be a terminal, and the control device of the combination lock may implement control over a plurality of combination locks corresponding to the control system of the combination lock shown in fig. 1), and an Application program (APP) for controlling the combination lock is loaded in the terminal. When the APP control interface displays the control interface shown in fig. 3, a user may trigger the terminal to send a remote instruction to the control device of the combination lock by sliding a first control gesture or clicking a first control password on the control interface. When the control device of the coded lock receives the remote instruction, the coded lock is controlled to open the child lock mode. And then, the user can trigger the terminal to send a remote instruction to the control device of the coded lock for the second time by sliding a second control gesture or clicking a second control password on the control interface, and the control device of the coded lock controls the coded lock to close the child lock mode when receiving the remote instruction for the second time, so that the operation is repeated.
It will be appreciated that in practical applications, the control means of the combination lock may control the combination lock to open/close the child lock mode in combination with the above described implementation. For example, when the control device of the combination lock receives a first touch instruction, the combination lock is controlled to open the child lock mode, and when the control device of the combination lock determines that a remote instruction user is triggered by a second control gesture (in this implementation, the second control gesture is different from the first control gesture), the combination lock is controlled to close the child lock mode.
According to the control method of the coded lock provided by the embodiment of the application, the user behavior parameter can represent whether the current input user is an abnormal user (such as a child), so that when the current input user is determined to be the abnormal user, the control device of the coded lock can control the coded lock to open the child lock mode. In addition, when the triggering operation of the key of the coded lock meets the preset triggering condition, the control device of the coded lock can still control the coded lock to be opened, so that the use of a normal user is not influenced in the child lock mode in the embodiment of the application. Under the child lock mode, the control device of trick lock has closed the input prompt tone of the button of trick lock, can weaken the appeal of trick lock to children like this, avoids children as the toy with the trick lock to can improve the battery continuation of the journey of trick lock.
In summary, as shown in FIG. 6, step S104 in FIG. 5 can be replaced by steps S1041-S1042:
s1041, if the control device of the coded lock receives the triggering operation of the key of the coded lock in a second preset time period, a second early warning is sent out before the coded lock is controlled to open the screen locking mode for a second preset time period.
S1042, after receiving a first preset time length of a triggering operation of a key of the coded lock, a control device of the coded lock sends out a first early warning and controls the coded lock to unlock a screen locking mode.
Alternatively, as shown in fig. 7, step S101 in fig. 5 may be replaced with S201, and step S102 may be replaced with S202:
s201, the control device of the coded lock acquires the target triggering times.
S202, when the target triggering times are smaller than a first preset value, the control device of the coded lock determines that the current input user is an abnormal user.
Alternatively, as shown in fig. 8, step S101 in fig. 5 may be replaced with S301, and step S102 may be replaced with S302:
s301, the control device of the coded lock acquires a target trigger area.
S302, when the target trigger area is within the range of the second preset area, the control device of the coded lock determines that the current input user is an abnormal user.
Alternatively, as shown in fig. 9, step S101 in fig. 5 may be replaced with S401, and step S102 may be replaced with S402:
s401, the control device of the coded lock acquires a target interval duration.
S402, when the target interval duration is longer than a third preset duration, the control device of the coded lock determines that the current input user is an abnormal user.
Optionally, as shown in fig. 10, an embodiment of the present application further provides a method for controlling a combination lock, including S501-S507:
s501, the control device of the coded lock acquires the target triggering times.
S502, the control device of the coded lock judges whether the target triggering times are smaller than a first preset value.
When the control device of the coded lock determines that the target triggering times are smaller than a first preset value, executing step S507; when the control device of the combination lock determines that the target number of triggers is greater than or equal to the first preset value, step S503 is performed.
S503, the control device of the coded lock acquires a target trigger area.
S504, the control device of the coded lock judges whether the target trigger area is within the range of a second preset area.
When the control device of the coded lock determines that the target trigger area is within the range of the second preset area, executing step S507; when the control device of the combination lock determines that the target trigger area is not within the range of the second preset area, step S505 is executed.
And S505, the control device of the coded lock acquires the target interval duration.
S506, the control device of the coded lock judges whether the target interval duration is longer than a third preset duration.
When the control device of the coded lock determines that the target interval duration is longer than a third preset duration, executing step S507; when the control device of the combination lock determines that the target interval duration is less than or equal to the third preset duration, the execution returns to step S501.
And S507, the control device of the coded lock determines that the current input user is an abnormal user, and controls the coded lock to open the child lock mode.
As shown in fig. 11, an embodiment of the present application further provides a control device of a combination lock, where the control device of the combination lock may be the control device 01 of the combination lock in the control system of the combination lock shown in fig. 1, and the control device of the combination lock includes: an acquisition module 11, a determination module 12 and a control module 13.
The obtaining module 11 executes S101 in the above method embodiment, the determining module 12 executes S102 in the above method embodiment, and the control module 13 executes S103 in the above method embodiment.
Specifically, the obtaining module 11 is configured to obtain a user behavior parameter of a first preset time period; the determining module 12 is configured to determine, according to the user behavior parameter acquired by the acquiring module 11, that the currently input user is an abnormal user; the control module 13 is used for controlling the coded lock to unlock a child lock mode; the child lock mode includes: and closing the input prompt tone of the key of the coded lock, and controlling the coded lock to be opened when the triggering operation of the key of the coded lock meets the preset triggering condition.
Optionally, the control device of the combination lock provided in the embodiment of the present application further includes a receiving module, and the control module 13 is further configured to, if the receiving module receives the trigger operation of the key of the combination lock within a second preset time period, control the combination lock to open the lock screen mode after the receiving module receives the trigger operation of the key of the combination lock for a first preset time period; the screen locking mode comprises the following steps: and closing the input display of the key of the coded lock, and controlling the coded lock to be opened when the triggering operation of the key of the coded lock meets the preset triggering condition.
Optionally, the control module 13 is specifically configured to: sending a first early warning, and controlling a coded lock to unlock a screen locking mode; the first early warning is used for prompting that the current input user coded lock opens the screen locking mode.
Optionally, the control module 13 is further specifically configured to: controlling the coded lock to send out a second early warning before a second preset time length of the screen locking mode is opened; the second early warning is used for prompting the current input user to open the screen locking mode after the password lock is in a second preset time; the second preset time is shorter than the first preset time.
Optionally, the user behavior parameters include: at least one of a target trigger number, a target trigger area, or a target interval duration.
Specifically, the target triggering times are key triggering times of any password verification within a first preset time period; the target trigger area is a key trigger area within a first preset time period; the target interval duration is the interval duration between the first time and the second time.
The first moment is the moment when a key of the coded lock is triggered for the last time in the ith password verification, and the second moment is the moment when the key of the coded lock is triggered for the first time in the (i + 1) th password verification; the ith password authentication and the (i + 1) th password authentication are two times of continuous password authentication in a first preset time period, and a key trigger area of the ith password authentication or the (i + 1) th password authentication is positioned in a first preset area; i is a positive integer.
Optionally, the determining module 12 is specifically configured to: when the target triggering times are smaller than a first preset value, determining that the current input user is an abnormal user;
or when the target trigger area is within the range of the second preset area, determining that the current input user is an abnormal user;
or when the target interval duration is longer than a third preset duration, determining that the current input user is an abnormal user.
Optionally, the control device of the combination lock further comprises a storage module. The storage module is used for storing program codes and the like of the control device of the coded lock.
As shown in fig. 12, an embodiment of the present application further provides a control device of a combination lock, which includes a memory 41, a processor 42, a bus 43, and a communication interface 44; the memory 41 is used for storing computer execution instructions, and the processor 42 is connected with the memory 41 through a bus 43; when the control device of the combination lock is operated, the processor 42 executes the computer execution instructions stored in the memory 41 to make the control device of the combination lock execute the control method of the combination lock provided in the above embodiment.
In particular implementations, processor 42(42-1 and 42-2) may include one or more Central Processing Units (CPUs), such as CPU0 and CPU1 shown in FIG. 12, as one example. And as an example, the control means of the combination lock may include a plurality of processors 42, such as processor 42-1 and processor 42-2 shown in fig. 12. Each of the processors 42 may be a single-Core Processor (CPU) or a multi-Core Processor (CPU). Processor 42 may refer herein to one or more devices, circuits, and/or processing cores that process data (e.g., computer program instructions).
The memory 41 may be, but is not limited to, a read-only memory 41 (ROM) or other type of static storage device that can store static information and instructions, a Random Access Memory (RAM) or other type of dynamic storage device that can store information and instructions, an electrically erasable programmable read-only memory (EEPROM), a compact disc read-only memory (CD-ROM) or other optical disc storage, optical disc storage (including compact disc, laser disc, optical disc, digital versatile disc, blu-ray disc, etc.), magnetic disk storage media or other magnetic storage devices, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer. The memory 41 may be self-contained and coupled to the processor 42 via a bus 43. The memory 41 may also be integrated with the processor 42.
In a specific implementation, the memory 41 is used for storing data in the present application and computer-executable instructions corresponding to software programs for executing the present application. The processor 42 may control the various functions of the control device of the combination lock by running or executing software programs stored in the memory 41 and by invoking data stored in the memory 41.
The communication interface 44 is any device, such as a transceiver, for communicating with other devices or communication networks, such as a control system, a Radio Access Network (RAN), a Wireless Local Area Network (WLAN), and the like. The communication interface 44 may include a receiving unit implementing a receiving function and a transmitting unit implementing a transmitting function.
The bus 43 may be an Industry Standard Architecture (ISA) bus, a Peripheral Component Interconnect (PCI) bus, an extended ISA (enhanced industry standard architecture) bus, or the like. The bus 43 may be divided into an address bus, a data bus, a control bus, etc. For ease of illustration, only one thick line is shown in FIG. 12, but this is not intended to represent only one bus or type of bus.
As an example, in connection with fig. 11, the obtaining module in the control device of the trick lock implements the same functions as the receiving unit in fig. 12, the control module in the control device of the trick lock implements the same functions as the processor in fig. 12, and the storage module in the control device of the trick lock implements the same functions as the memory in fig. 12.
For the explanation of the related contents in this embodiment, reference may be made to the above method embodiments, which are not described herein again.
Through the above description of the embodiments, it is clear to those skilled in the art that, for convenience and simplicity of description, the foregoing division of the functional modules is merely used as an example, and in practical applications, the above function distribution may be completed by different functional modules according to needs, that is, the internal structure of the device may be divided into different functional modules to complete all or part of the above described functions. For the specific working processes of the system, the apparatus and the unit described above, reference may be made to the corresponding processes in the foregoing method embodiments, and details are not described here again.
The embodiment of the present application further provides a computer-readable storage medium, where instructions are stored in the computer-readable storage medium, and when the computer executes the instructions, the computer is enabled to execute the method for controlling a combination lock provided in the foregoing embodiment.
The computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination thereof. More specific examples (a non-exhaustive list) of the computer readable storage medium would include the following: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a RAM, a ROM, an erasable programmable read-only memory (EPROM), a register, a hard disk, an optical fiber, a CD-ROM, an optical storage device, a magnetic storage device, any suitable combination of the foregoing, or any other form of computer readable storage medium known in the art. An exemplary storage medium is coupled to the processor such the processor can read information from, and write information to, the storage medium. Of course, the storage medium may also be integral to the processor. The processor and the storage medium may reside in an Application Specific Integrated Circuit (ASIC). In embodiments of the present application, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
The above description is only an embodiment of the present application, but the scope of the present application is not limited thereto, and any changes or substitutions within the technical scope of the present disclosure should be covered by the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (14)

1. A control method of a coded lock is characterized by comprising the following steps:
acquiring a user behavior parameter of a first preset time period;
determining the current input user as an abnormal user according to the user behavior parameters;
controlling the coded lock to open a child lock mode; the child lock mode includes: and closing the input prompt tone of the key of the coded lock, and controlling the coded lock to be opened when the triggering operation of the key of the coded lock meets the preset triggering condition.
2. The method of claim 1, wherein after controlling the combination lock to unlock the child lock mode, the method further comprises:
if the triggering operation of the key of the coded lock is received within a second preset time period, controlling the coded lock to open a screen locking mode after the triggering operation of the key of the coded lock is received for a first preset time period; the screen locking mode comprises the following steps: and closing the input display of the key of the coded lock, and controlling the coded lock to be opened when the triggering operation of the key of the coded lock meets the preset triggering condition.
3. The method for controlling the combination lock according to claim 2, wherein the controlling the combination lock to unlock the lock screen mode comprises:
sending a first early warning, and controlling the coded lock to unlock a screen locking mode; the first early warning is used for prompting the current input user that the screen locking mode of the coded lock is unlocked.
4. A method of controlling a combination lock according to claim 3, wherein the method further comprises:
controlling the coded lock to send out a second early warning before the screen locking mode is unlocked for a second preset time; the second early warning is used for prompting the current input user to open the screen locking mode after the coded lock is in the second preset time; the second preset duration is less than the first preset duration.
5. The method of any of claims 1-4, wherein the user behavior parameters comprise: at least one of target triggering times, target triggering areas or target interval duration;
the target triggering times are key triggering times of any password verification in the first preset time period;
the target trigger area is a key trigger area within the first preset time period;
the target interval duration is an interval duration between a first time and a second time, the first time is the time when a key of the coded lock is triggered for the last time in the ith password verification, and the second time is the time when the key of the coded lock is triggered for the first time in the (i + 1) th password verification; the ith password authentication and the (i + 1) th password authentication are two times of continuous password authentication in the first preset time period, and the key trigger area of the ith password authentication or the (i + 1) th password authentication is positioned in a first preset area; i is a positive integer.
6. The method for controlling a combination lock according to claim 5, wherein the determining that the currently input user is an abnormal user according to the user behavior parameter comprises:
when the target triggering times are smaller than a first preset value, determining that the current input user is the abnormal user;
or when the target trigger area is within the range of a second preset area, determining that the current input user is the abnormal user;
or, when the target interval duration is longer than a third preset duration, determining that the current input user is the abnormal user.
7. A control device for a combination lock, comprising:
the acquisition module is used for acquiring the user behavior parameters in a first preset time period;
the determining module is used for determining the current input user as an abnormal user according to the user behavior parameters acquired by the acquiring module;
the control module is used for controlling the coded lock to unlock the child lock mode; the child lock mode includes: and closing the input prompt tone of the key of the coded lock, and controlling the coded lock to be opened when the triggering operation of the key of the coded lock meets the preset triggering condition.
8. The apparatus for controlling a combination lock of claim 7, further comprising a receiving module,
the control module is further used for controlling the coded lock to open a screen locking mode after the receiving module receives the triggering operation of the key of the coded lock for a first preset time period if the receiving module receives the triggering operation of the key of the coded lock within a second preset time period; the screen locking mode comprises the following steps: and closing the input display of the key of the coded lock, and controlling the coded lock to be opened when the triggering operation of the key of the coded lock meets the preset triggering condition.
9. The control device of the combination lock according to claim 8, wherein the control module is specifically configured to:
sending a first early warning, and controlling the coded lock to unlock a screen locking mode; the first early warning is used for prompting the current input user that the screen locking mode of the coded lock is unlocked.
10. The control device of the combination lock according to claim 9, wherein the control module is further configured to:
controlling the coded lock to send out a second early warning before the screen locking mode is unlocked for a second preset time; the second early warning is used for prompting the current input user to open the screen locking mode after the coded lock is in the second preset time; the second preset duration is less than the first preset duration.
11. A control device for a combination lock according to any of claims 7-10, wherein the user behaviour parameters include: at least one of target triggering times, target triggering areas or target interval duration;
the target triggering times are key triggering times of any password verification in the first preset time period;
the target trigger area is a key trigger area within the first preset time period;
the target interval duration is an interval duration between a first time and a second time, the first time is the time when a key of the coded lock is triggered for the last time in the ith password verification, and the second time is the time when the key of the coded lock is triggered for the first time in the (i + 1) th password verification; the ith password authentication and the (i + 1) th password authentication are two times of continuous password authentication in the first preset time period, and the key trigger area of the ith password authentication or the (i + 1) th password authentication is positioned in a first preset area; i is a positive integer.
12. The apparatus of claim 11, wherein the determination module is specifically configured to:
when the target triggering times are smaller than a first preset value, determining that the current input user is the abnormal user;
or when the target trigger area is within the range of a second preset area, determining that the current input user is the abnormal user;
or, when the target interval duration is longer than a third preset duration, determining that the current input user is the abnormal user.
13. The control device of a kind of dial lock, characterized by, including memorizer, processor, bus and communication interface; the memory is used for storing computer execution instructions, and the processor is connected with the memory through the bus;
when the control device of the coded lock is operated, the processor executes the computer-executable instructions stored in the memory to cause the control device of the coded lock to perform the control method of the coded lock according to any one of claims 1 to 6.
14. A computer-readable storage medium having stored therein instructions which, when executed by a computer, cause the computer to perform a method of controlling a combination lock according to any one of claims 1 to 6.
CN202011043350.8A 2020-09-28 2020-09-28 Control method and device of coded lock and computer readable storage medium Active CN112150675B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011043350.8A CN112150675B (en) 2020-09-28 2020-09-28 Control method and device of coded lock and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011043350.8A CN112150675B (en) 2020-09-28 2020-09-28 Control method and device of coded lock and computer readable storage medium

Publications (2)

Publication Number Publication Date
CN112150675A true CN112150675A (en) 2020-12-29
CN112150675B CN112150675B (en) 2022-04-12

Family

ID=73895129

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011043350.8A Active CN112150675B (en) 2020-09-28 2020-09-28 Control method and device of coded lock and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN112150675B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115083042A (en) * 2022-06-08 2022-09-20 珠海格力电器股份有限公司 Control method and reminding device of child lock, remote controller and nonvolatile storage medium
CN115273276A (en) * 2021-04-30 2022-11-01 云丁网络技术(北京)有限公司 Method and apparatus for authenticating a user

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20000028184A (en) * 1998-10-30 2000-05-25 전주범 Method for locking program for adults by human body sensor and apparatus the same
CN105431811A (en) * 2013-07-31 2016-03-23 谷歌公司 Limited-access state for inadvertent inputs
CN107330308A (en) * 2017-05-25 2017-11-07 珠海格力电器股份有限公司 Terminal locking/unlocking method, device, terminal and computer-readable recording medium
CN107861403A (en) * 2017-09-19 2018-03-30 珠海格力电器股份有限公司 Press key locking control method, device, storage medium and the electrical equipment of a kind of electrical equipment
KR20200051168A (en) * 2018-11-05 2020-05-13 경동대학교 산학협력단 Access Control System for Infant Care Facilities Using Smartphones
CN111312232A (en) * 2018-12-10 2020-06-19 珠海格力电器股份有限公司 Voice control method and device, storage medium and air conditioner

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20000028184A (en) * 1998-10-30 2000-05-25 전주범 Method for locking program for adults by human body sensor and apparatus the same
CN105431811A (en) * 2013-07-31 2016-03-23 谷歌公司 Limited-access state for inadvertent inputs
CN107330308A (en) * 2017-05-25 2017-11-07 珠海格力电器股份有限公司 Terminal locking/unlocking method, device, terminal and computer-readable recording medium
CN107861403A (en) * 2017-09-19 2018-03-30 珠海格力电器股份有限公司 Press key locking control method, device, storage medium and the electrical equipment of a kind of electrical equipment
KR20200051168A (en) * 2018-11-05 2020-05-13 경동대학교 산학협력단 Access Control System for Infant Care Facilities Using Smartphones
CN111312232A (en) * 2018-12-10 2020-06-19 珠海格力电器股份有限公司 Voice control method and device, storage medium and air conditioner

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115273276A (en) * 2021-04-30 2022-11-01 云丁网络技术(北京)有限公司 Method and apparatus for authenticating a user
CN115273276B (en) * 2021-04-30 2024-02-06 云丁网络技术(北京)有限公司 Method and device for authenticating a user
CN115083042A (en) * 2022-06-08 2022-09-20 珠海格力电器股份有限公司 Control method and reminding device of child lock, remote controller and nonvolatile storage medium

Also Published As

Publication number Publication date
CN112150675B (en) 2022-04-12

Similar Documents

Publication Publication Date Title
US8191161B2 (en) Wireless authentication
CN107077552B (en) Bio-identification verifying is distributed between the device in AD-HOC network
US20190268770A1 (en) Method and apparatus for remote portable wireless device authentication
US7278024B2 (en) Session authentication using temporary passwords
US20080127311A1 (en) Authentication system in information processing terminal using mobile information processing device
CN101647026B (en) User authentication control device, user authentication device, data processing device, and user authentication control method and the like
CN112150675B (en) Control method and device of coded lock and computer readable storage medium
CN108781234B (en) Function control method and terminal
US11868169B2 (en) Enabling access to data
CN105325021B (en) Method and apparatus for remote portable wireless device authentication
KR20140093556A (en) Security System Using Two factor Authentication And Security Method of Electronic Equipment Using Thereof
KR101330113B1 (en) Authentication apparatus and method based on position value
KR20210022532A (en) Information processing device, information processing method and program
KR20140094990A (en) Authentication System of the many users using mobile device and method thereof
CN112177435B (en) Control method and device of coded lock and computer readable storage medium
KR20140139451A (en) Athentication System using mobile device and method thereof
CN111866266A (en) Intelligent terminal, unlocking method thereof, wearable device and storage device
KR100638025B1 (en) Locking release system
KR20030056757A (en) Method for forbidding the use of the mobile phone&#39;s Subscriber Identity Module card
US10853479B2 (en) Information processing apparatus that sets the number of times of password re-entry and prompts user to perform password re-entry at set number of times
WO2020125667A1 (en) Device control method, apparatus and system
JP2006225889A (en) Entry and withdrawal control system, entry and withdrawal control method, controlling device and computer program
KR20120082555A (en) Method and apparatus for inputting password in electronic device
CN116541809A (en) Equipment unlocking method and device, electronic equipment and computer readable storage medium
CN111866260A (en) Unlocking method of intelligent terminal and related device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20220906

Address after: 315300 No.88 rixian North Road, Binhai Economic Development Zone, Cixi City, Ningbo City, Zhejiang Province

Patentee after: Ningbo bull Intelligent Technology Co.,Ltd.

Address before: 315000 East District of Industrial Park, Cixi, Ningbo, Zhejiang

Patentee before: GONGNIU GROUP Co.,Ltd.