CN117649714B - Door lock monitoring system, method, equipment and storage medium - Google Patents

Door lock monitoring system, method, equipment and storage medium Download PDF

Info

Publication number
CN117649714B
CN117649714B CN202410122079.9A CN202410122079A CN117649714B CN 117649714 B CN117649714 B CN 117649714B CN 202410122079 A CN202410122079 A CN 202410122079A CN 117649714 B CN117649714 B CN 117649714B
Authority
CN
China
Prior art keywords
unlocking
lock
passive
information
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202410122079.9A
Other languages
Chinese (zh)
Other versions
CN117649714A (en
Inventor
任均霭
李姣棉
穆启超
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhuhai Weima Technology Co ltd
Original Assignee
Zhuhai Weima Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhuhai Weima Technology Co ltd filed Critical Zhuhai Weima Technology Co ltd
Priority to CN202410122079.9A priority Critical patent/CN117649714B/en
Publication of CN117649714A publication Critical patent/CN117649714A/en
Application granted granted Critical
Publication of CN117649714B publication Critical patent/CN117649714B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Lock And Its Accessories (AREA)

Abstract

The application discloses a door lock monitoring system, a method, equipment and a storage medium, wherein the system comprises a passive lock cylinder, an active key and a terminal management platform for monitoring the state of a door lock, and a detection unit for detecting the rotation direction and the rotation angle of the active key is arranged on the circumferential side wall of a key hole; the wall of the key hole is provided with a lock core probe, and when the active key is inserted into the key hole, the active key is electrically connected with the passive lock core; the passive lock cylinder is associated with a product identifier; acquiring the unlocking and locking information of the currently inserted passive lock cylinder, and outputting an unlocking and locking instruction based on the current unlocking and locking information; the detection unit acquires unlocking operation information of the active key, and compares the unlocking instruction with the unlocking operation information to obtain a lockset state authentication result; the terminal management platform updates the door lock state of the corresponding passive lock cylinder based on the lock state authentication result; the method has the advantages of accurately judging unlocking and locking operations of the passive lock and improving the monitoring effect on the state of the lock.

Description

Door lock monitoring system, method, equipment and storage medium
Technical Field
The present disclosure relates to the field of door locks, and in particular, to a door lock monitoring system, method, apparatus, and storage medium.
Background
The existing intelligent locks are various in development trend, a passive electronic lock which is powered by an electronic key instead of a power line or a battery is arranged on the market, the passive electronic lock is also called a passive lock, the working principle of the passive lock is that an encryption chip is built in, after the electronic key is inserted into the passive lock, password verification is carried out firstly, the lock can be opened after the electronic key passes through the passive lock, and the passive lock is the same as a traditional mechanical lock in a mechanical transmission part.
The existing passive lock can realize the function of unlocking a plurality of locks by one key, and is connected with a terminal management platform in a matched manner for monitoring the lock state of the passive lock, so that a user can realize remote monitoring and management of the passive lock through the terminal management platform. However, when the passive lock is used, the rotation angles of the passive lock are different when the passive lock is opened due to the difference of different brands of doors and lock bodies, and the unlocking directions of the different locks are also different, so that a user always has the situation that the rotation angles are insufficient and the lock is not closed in the actual use process, and normally, the lock is closed again when checking afterwards; therefore, the defect that the monitoring effect of the lock state is low exists, and based on the defect, how to accurately report the lock state of the passive lock to the terminal management platform has practical application value and significance.
Disclosure of Invention
In order to accurately judge unlocking and locking operations of a passive lock and improve the monitoring effect on the state of the lock, the application provides a door lock monitoring system, a door lock monitoring method, door lock monitoring equipment and a storage medium.
In a first aspect, the object of the present application is achieved by the following technical solutions:
a door lock monitoring system comprising: the passive lock cylinder is provided with a key hole, and an active key matched with the passive lock cylinder for use, wherein the circumferential side wall of the key hole is provided with a detection unit for detecting the rotation direction and the rotation angle of the active key; the door lock monitoring system further comprises a terminal management platform for monitoring the state of the door lock;
a lock cylinder probe is arranged on the wall of the key hole, and when the active key is inserted into the key hole of the passive lock cylinder, the active key is abutted against the lock cylinder probe and is electrically connected with the passive lock cylinder through the lock cylinder probe;
the passive lock cylinder is associated with a product identifier; acquiring the currently inserted switch lock information of the passive lock cylinder based on the acquired product identifier, and outputting a switch lock instruction based on the current switch lock information;
the detection unit acquires the twisted direction and angle of the active key and determines the unlocking and locking operation information, and the terminal management platform compares the unlocking and locking instruction with the unlocking and locking operation information to obtain a lockset state authentication result;
And the terminal management platform updates the corresponding door lock state of the passive lock cylinder based on the lock state authentication result.
By adopting the technical scheme, the terminal management platform is an APP management background which is convenient to carry, and when a user opens and closes a lock, the portable terminal management platform can carry out the operation of opening and closing the lock so as to monitor the states of the current passive lock cylinder and the active key in real time; specifically, the terminal management platform is in communication connection with the active key, when the active key is inserted into the passive lock core, the active key supplies power to the passive lock core through a lock core probe in a key hole of the passive lock core, so that the passive lock core is in communication connection with the active key, at the moment, the active key obtains a product identifier (the product identifier is a unique product information code on the passive lock core), corresponding unlocking information (the unlocking information comprises an unlocking angle and an unlocking direction) is judged based on the product identifier of the currently inserted passive lock core, after an unlocking instruction to be operated is generated according to the unlocking information, the current unlocking instruction of the passive lock is output to a user, and therefore the user can accurately know the unlocking operation of the current passive lock core, the active key is moved to realize the unlocking operation (at the moment, a detection unit on the active key detects the direction and the angle of the active key which is twisted, and the unlocking operation information is determined to be generated).
Further, through detecting the angle and the direction of the switch lock operation information and comparing with the angle and the data size of the switch lock instruction, the lock state authentication result whether the switch lock is successfully unlocked, closed and opened is obtained through the result of the data size comparison, then the active key sends the lock state authentication result to the terminal management platform, the terminal management platform updates the current lock state of the passive lock based on the lock state authentication result, the purpose of updating the lock state information of the passive lock in real time is conveniently achieved, the effect of accurately judging the unlocking and locking operation of the passive lock is facilitated, and the monitoring effect on the lock state is improved.
In a preferred example, the present application: the active key comprises a key circuit board, and the key circuit board is provided with a communication unit in communication connection with the terminal management platform; the key blank of the active key is provided with a power supply contact and a communication contact at intervals, and the power supply contact and the communication contact are electrically connected with the key circuit board; and when the key blank of the active key is inserted into the key hole, the power supply contact and the communication contact are electrically connected with the lock cylinder probe.
By adopting the technical scheme, the active key is in communication connection with the terminal management platform through the communication unit, the communication contact and the lock core probe on the key circuit board, so that the terminal management platform can acquire the power supply connection state of the passive lock core and the active key in real time; the active key is in butt joint with a lock cylinder probe in a key hole through a power supply contact and a communication contact on a key blank so as to realize the function of detecting whether the active key and the lock cylinder probe are in electric connection and communication connection, and particularly, when the power supply contact on the active key is in butt joint with the key hole of the passive lock cylinder, the power supply contact of the active key is in electric connection with the lock cylinder probe of the passive lock cylinder, and the communication contact of the active key is in communication connection with the lock cylinder probe of the passive lock cylinder; when the active key is electrically connected with the lock cylinder probe, the active key is in communication connection with the terminal management platform, and a corresponding unlocking instruction is sent to an unlocking person based on the product identifier of the current passive lock cylinder; unlocking personnel are based on the unlocking instruction so as to conveniently unlock the current passive lock, and the operation is more convenient.
In a preferred example, the present application: the communication contacts are multiple, and the lock cylinder probes are arranged at intervals; the communication contacts are arranged in one-to-one correspondence with the lock cylinder probes, and one lock cylinder probe is arranged in correspondence with the power supply contact; the detection unit comprises a triaxial sensor.
By adopting the technical scheme, when the power supply contact is correspondingly abutted with the lock cylinder probe, the passive lock cylinder is electrically connected with the active key, and when a plurality of communication contacts are correspondingly abutted with the rest lock cylinder probes one by one, the active key is in communication connection with the terminal management platform, so that the communication connection effect of the passive lock cylinder and the active key is improved by the plurality of communication contacts and the plurality of lock cylinder probes; the triaxial sensor detects the rotation direction and the rotation angle of the active key in the key hole when the active key is twisted by a human hand through the detection end so as to generate real-time switch lock operation information.
In a second aspect, the object of the present application is achieved by the following technical solutions:
the door lock monitoring method is applied to the door lock monitoring system, and comprises the following steps:
acquiring power supply connection information of the active key, and acquiring a product identifier of the currently inserted passive lock cylinder based on the power supply connection information;
acquiring corresponding unlocking and locking information based on the product identifier of the passive lock cylinder, and outputting an unlocking and locking instruction according to the unlocking and locking information;
When the active key is twisted in the key hole, corresponding unlocking and locking operation information is determined according to the direction and the angle, acquired by the detection unit, of the active key which is twisted;
comparing the unlocking instruction with corresponding unlocking operation information to obtain a corresponding lockset state authentication result; transmitting a lock state update instruction to the terminal management platform based on the lock state authentication result, wherein the lock state update instruction comprises a corresponding product identifier;
and the terminal management platform updates the door lock and lock state of the passive lock cylinder corresponding to the product identifier based on the state update instruction and the lock state authentication result.
By adopting the technical scheme, the power supply connection information is the information that the active key and the passive lock core realize power supply conduction connection, when the power supply connection information of the active key is obtained, the active key is characterized to be inserted into a key hole of the passive lock core, then the product identification of the currently inserted passive lock core is collected, so that corresponding unlocking and locking information is obtained based on the product identification of the passive lock core, the unlocking and locking information is the angle and the direction required to be twisted when the current passive lock core is unlocked or locked, and an unlocking and locking instruction is output to a terminal management platform connected with a user according to the unlocking and locking information, so that the user can conveniently obtain the correct operation of the unlocking and locking, the switching operation efficiency of the user on the current unlocking and locking is improved, and the operation time is saved; further, when the user twists the active key to realize the unlocking operation, corresponding unlocking operation information is determined (at this time, a detection unit on the active key detects the direction and the angle in which the active key is twisted so as to determine to generate the unlocking operation information); and comparing the unlocking instruction with corresponding unlocking operation information to obtain a corresponding lockset state authentication result (the lockset state authentication result comprises unlocking, locking and unlocking success or unlocking failure), then sending the lockset state authentication result to a terminal management platform by an active key, and automatically updating the lockset state of the current passive lock by the terminal management platform based on the lockset state authentication result, thereby being convenient for realizing the purpose of updating the lockset state information of the passive lock in real time, being beneficial to realizing the effect of accurately judging the unlocking and locking operation of the passive lock and improving the monitoring effect on the lockset state.
In a preferred example, the present application: the passive lock core is connected with a camera acquisition device, and the method further comprises the following steps:
acquiring unlocking operation information of a plurality of passive locks in a target monitoring area in a specified time period, and extracting corresponding unlocking failure times based on the unlocking operation information;
comparing the corresponding unlocking failure times with a preset unlocking time threshold; when the corresponding unlocking failure times exceed the preset unlocking times threshold value, acquiring a monitoring video of the camera acquisition device, and carrying out framing treatment on the monitoring video to obtain a portrait image to be judged;
inputting the portrait image to be judged into a preset user identification model, and carrying out user identification to obtain an identification result; the identity recognition result comprises identity recognition failure and identity recognition success;
when the identity recognition result of the portrait image to be judged is that the identity recognition fails, carrying out behavior analysis on the portrait image to be judged frame by frame to obtain a corresponding behavior analysis result;
and inputting the behavior analysis result into a preset behavior abnormality detection model to obtain corresponding abnormal behavior judgment data, and outputting abnormality early warning information based on the abnormal behavior judgment data.
By adopting the technical scheme, the target monitoring area is a monitoring area range in which a plurality of passive locks are set for a certain use scene area, and a plurality of user images are stored in the user identification model so as to facilitate image identity identification of the portrait images to be determined; in order to realize the lockset monitoring of a plurality of passive locks in a target monitoring area, after a passive lock cylinder is inserted into a key blank to realize power supply, the total unlocking failure condition and the unlocking success condition of the target monitoring area are counted in a designated time period or in a designated time period, namely, the unlocking failure times of the target monitoring area are counted; and then comparing the unlocking failure times with an unlocking time threshold value to determine whether to perform the next personnel identity recognition operation according to the comparison result of the unlocking failure times and the unlocking time threshold value.
When the unlocking failure times exceed the unlocking times threshold, the monitoring video of the current passive lock core camera shooting acquisition device is obtained, the monitoring video is subjected to framing treatment, and as people are unlocking operation at the moment, multi-frame portrait images to be judged can be obtained, behavioral analysis is carried out in the portrait images to be judged of each frame so as to obtain corresponding personnel behavioral analysis results, specific behaviors of people in the monitoring video can be obtained through the personnel behavioral analysis results, the personnel behaviors in the personnel behavioral analysis results can be detected through a preset behavioral abnormality detection model, corresponding abnormal behavior judgment data can be obtained rapidly, abnormal abnormality early warning information is output when obvious abnormality of the people is detected, so that personnel monitoring management efficiency of a target monitoring area is improved, timely early warning prompt is carried out on abnormal personnel unlocking behaviors, and safety of the target monitoring area is improved.
In a preferred example, the present application: and when the identity recognition result of the portrait image to be judged is that the identity recognition fails, performing behavior analysis on the portrait image to be judged frame by frame to obtain a corresponding behavior analysis result, wherein the method specifically comprises the following steps of:
when the identity recognition result of the portrait image to be judged is determined to be identity recognition failure, sending an identity recognition failure prompt to a preset user terminal, and comparing action difference information among the portrait images to be judged frame by frame from the collected portrait image of the first frame;
if the action difference information is smaller than a preset difference threshold, merging the corresponding portrait images to be judged, and recording the merged frame number as a behavior analysis library;
and performing behavior analysis on the action difference information and the behavior analysis library to obtain a corresponding behavior analysis result.
By adopting the technical scheme, after the unlocking failure times of the current unlocking personnel are identified to be more (namely, after the corresponding unlocking failure times exceed the unlocking frequency threshold value), the identity of the personnel performing unlocking currently is identified, when the identity identification result of the portrait image to be judged is determined to be the identity identification failure, the portrait image of the current unlocking personnel is represented to be not in the personnel image stored in advance in the user identification model, the current unlocking personnel is represented to be stranger, and suspicious behaviors that the door lock is prized or the stranger steps on the spot to steal exist at the moment; in order to further improve the behavior abnormality judgment accuracy of abnormal suspicious personnel, the current identity recognition failure result is sent to the user terminal so as to prompt the user that potential safety hazards exist at the moment and improve the safety performance of the door lock monitoring system; specifically, the action difference information is analyzed frame by frame, so that the actions of the pre-judging personnel can be analyzed, the pre-judging and processing of suspicious actions of suspicious personnel with failed identity recognition are facilitated, meanwhile, the to-be-judged portrait images with the action difference information smaller than the difference threshold value are combined, the calculated amount of action analysis can be reduced, and meanwhile, the recorded combined frame number is combined into the action analysis library, so that the action analysis library can be further analyzed.
In a preferred example, the present application: the passive lock is also connected with a high-definition video device; the method for acquiring the unlocking operation information of the plurality of passive locks in the target monitoring area in the appointed time period, extracting the corresponding unlocking failure times based on the unlocking operation information, and then further comprises the following steps:
comparing the corresponding unlocking failure times with a preset unlocking time comparison threshold value; when the corresponding unlocking failure times exceeds the preset unlocking times comparison threshold value, starting the high-definition video recording device to record the current unlocking personnel to obtain a real-time monitoring video record, obtaining the lock core identification of the current passive lock core,
and generating an information checking instruction based on the real-time monitoring video and the corresponding lock core identifier, sending the information checking instruction to a preset user terminal, and obtaining a corresponding personnel checking result based on the information checking instruction.
By adopting the technical scheme, the unlocking failure times and the unlocking times are compared with the threshold value, so that whether the high-definition video recording device is started to execute real-time video recording operation is determined according to the comparison result of the unlocking failure times and the unlocking times, and under normal conditions, the high-definition video recording device can be set to work in a dormant state, so that the working power consumption consumed by the high-definition video recording device in working is effectively reduced, the purpose of saving the use energy consumption of the high-definition video recording device is achieved, the energy is saved, and the service life of the high-definition video recording device is prolonged; when the unlocking failure times of the current passive lock are monitored to be more, namely the unlocking failure times exceed a preset unlocking time comparison threshold value, the fact that the personnel performing unlocking at the moment has unlocking failure for multiple times is characterized, the suspicious of lock picking or stranger theft exists, a high-definition video recording device is started to conduct real-time monitoring video recording on the current suspicious region and suspicious personnel, and meanwhile, the lock core identification of the passive lock core is obtained, so that the position of the suspicious personnel and the position of the specific passive lock can be conveniently located; meanwhile, an information checking instruction is generated and sent to the user terminal, so that after the user checks the real-time monitoring video, a corresponding personnel checking result is obtained, and an information prompt and abnormal situation checking mode for detecting abnormal unlocking behaviors in real time is provided.
In a third aspect, the object of the present application is achieved by the following technical solutions:
an intelligent device comprising a memory, a processor and a computer program stored in the memory and executable on the processor, the processor implementing the steps of a door lock monitoring method as described above when executing the computer program.
In a fourth aspect, the object of the present application is achieved by the following technical solutions:
a computer readable storage medium storing a computer program which when executed by a processor implements the steps of a door lock monitoring method as described above.
In summary, the present application includes at least one of the following beneficial technical effects:
1. the terminal management platform is an APP management background which is convenient to carry, and when a user opens and closes a lock, the portable terminal management platform can carry out the operation of opening and closing the lock so as to monitor the states of the current passive lock cylinder and the active key in real time; specifically, the terminal management platform is in communication connection with the active key, when the active key is inserted into the passive lock cylinder, the active key supplies power to the passive lock cylinder through a lock cylinder probe in a key hole of the passive lock cylinder, so that the passive lock cylinder and the active key are in communication connection, at the moment, the active key obtains a product identifier (a product identifier is a unique product information code on the passive lock cylinder) on the passive lock cylinder, corresponding unlocking information (the unlocking information comprises an unlocking angle and an unlocking direction) is judged based on the product identifier of the currently inserted passive lock cylinder, after an unlocking instruction to be operated is generated according to the unlocking information, the current unlocking instruction of the passive lock is output to a user, and therefore the user can accurately know the unlocking operation of the current passive lock cylinder, the active key is moved to realize the unlocking operation (at the moment, a detection unit on the active key detects the direction and the angle of the active key which is twisted so as to determine the unlocking operation information is generated);
Further, by detecting the angle and the direction of the operation information of the switch lock and comparing the angle and the data of the direction of the instruction of the switch lock, a lock state authentication result which is whether the switch lock is unlocked, closed and opened or not is obtained through the result of the data comparison, then the active key sends the lock state authentication result to the terminal management platform, the terminal management platform updates the current lock state of the passive lock based on the lock state authentication result, the purpose of updating the lock state information of the passive lock in real time is conveniently achieved, the effect of accurately judging the unlocking and locking operation of the passive lock is facilitated, and the monitoring effect on the lock state is improved;
2. the power supply connection information is information for realizing power supply connection between the active key and the passive lock cylinder, when the power supply connection information of the active key is obtained, the active key is characterized to be inserted into a key hole of the passive lock cylinder, then the product identification of the currently inserted passive lock cylinder is collected, so that corresponding unlocking and locking information is obtained based on the product identification of the passive lock cylinder, the unlocking and locking information is the angle and the direction required to be twisted when the current passive lock cylinder is unlocked or locked, an unlocking and locking instruction is output to a terminal management platform connected with a user according to the unlocking and locking information, so that the user can conveniently obtain the correct operation of the unlocking and locking, the switching operation efficiency of the user on the current unlocking and locking is improved, and the operation time is saved; further, when the user twists the active key to realize the unlocking operation, corresponding unlocking operation information is determined (at this time, a detection unit on the active key detects the direction and the angle in which the active key is twisted so as to determine to generate the unlocking operation information); comparing the unlocking instruction with corresponding unlocking operation information to obtain a corresponding lockset state authentication result (the lockset state authentication result comprises unlocking, locking and unlocking success or unlocking failure), then sending the lockset state authentication result to a terminal management platform by an active key, and automatically updating the lockset state of the current passive lock by the terminal management platform based on the lockset state authentication result, thereby being convenient for realizing the purpose of updating the lockset state information of the passive lock in real time, being beneficial to realizing the effect of accurately judging the unlocking and locking operation of the passive lock and improving the monitoring effect on the lockset state;
3. After the fact that unlocking failure times of current unlocking personnel are more is identified (namely, after the corresponding unlocking failure times exceed an unlocking frequency threshold value), identity identification is carried out on the personnel performing unlocking currently, when the identity identification result of the portrait image to be judged is determined to be the identity identification failure, the portrait image representing the current unlocking personnel is not stored in a personnel image stored in advance in a user identification model, the current unlocking personnel is represented as stranger, and suspicious behaviors that the door lock is pried or the stranger is stolen at a stepping point are presented at the moment; in order to further improve the behavior abnormality judgment accuracy of abnormal suspicious personnel, the current identity recognition failure result is sent to the user terminal so as to prompt the user that potential safety hazards exist at the moment and improve the safety performance of the door lock monitoring system; specifically, the action difference information is analyzed frame by frame, so that the actions of the pre-judging personnel can be analyzed, the pre-judging and processing of suspicious actions of suspicious personnel with failed identity recognition are facilitated, meanwhile, the to-be-judged portrait images with the action difference information smaller than the difference threshold value are combined, the calculated amount of action analysis can be reduced, and meanwhile, the recorded combined frame number is combined into the action analysis library, so that the action analysis library can be further analyzed.
Drawings
FIG. 1 is a system block diagram of a door lock monitoring system in an embodiment of the present application;
FIG. 2 is a flow chart of a door lock monitoring method according to an embodiment of the present application;
FIG. 3 is another flow chart of a door lock monitoring method according to an embodiment of the present application;
fig. 4 is a flowchart of step S40 in a door lock monitoring method according to an embodiment of the present application.
Description of the embodiments
The present application is described in further detail below with reference to the accompanying drawings.
In one embodiment, as shown in fig. 1, the application discloses a door lock monitoring system, which comprises a passive lock cylinder provided with a key hole, an active key matched with the passive lock cylinder for use, and a terminal management platform for monitoring the state of a door lock; the passive lock core is associated with a product identifier, and the product identifier is a unique product information code; the active key comprises a key circuit board, wherein the key circuit board is provided with a communication unit in communication connection with the terminal management platform, and the communication unit is a communication chip arranged on the key circuit board; the circumferential side wall of the key hole is provided with a detection unit for detecting the rotation direction and the rotation angle of the active key; the detecting unit comprises a triaxial sensor, and the triaxial sensor can accurately detect the rotation angle and the rotation direction of a key blank of the active key.
The key hole is characterized in that lock core probes are arranged on the hole wall of the key hole, power supply contacts and communication contacts are arranged on a key blank of an active key at intervals along the length direction, a plurality of communication contacts are arranged at intervals, a plurality of lock core probes are arranged at intervals, a plurality of communication contacts are arranged in one-to-one correspondence with the lock core probes, and one lock core probe is arranged in correspondence with the power supply contacts; the plurality of lock core probes are beneficial to improving the power supply connection and communication connection effects of the passive lock core and the active key; in the embodiment, one power supply contact is arranged, two communication contacts are arranged, and three lock core probes are arranged; the power supply contact is electrically connected with the key circuit board; when a key blank of the active key is inserted into a key hole, the power supply contact is electrically connected with the lock cylinder probe, and the communication contact is in communication connection with the terminal management platform through the lock cylinder probe, so that the active key is in communication connection with the terminal management platform, namely, when the active key is inserted into the key hole of the passive lock cylinder, the active key is electrically connected with the passive lock cylinder and in communication connection with the passive lock cylinder; the active key is enabled to be in butt joint with the lock cylinder probe in the key hole through the power supply contact and the communication contact on the key blank, so that the function of detecting whether the active key and the lock cylinder probe are in electric connection and communication connection is achieved.
Acquiring the unlocking and locking information of the currently inserted passive lock cylinder based on the acquired product identifier, and outputting an unlocking and locking instruction based on the current unlocking and locking information; the detection unit collects the twisted direction and angle of the active key, determines unlocking and locking operation information, and the terminal management platform compares the unlocking and locking instruction with the unlocking and locking operation information to obtain a lockset state authentication result; the terminal management platform updates the door lock state of the corresponding passive lock cylinder based on the lock state authentication result; specifically, when the power supply contact and the communication contact on the active key are abutted with the key hole of the passive lock cylinder, the active key and the passive lock cylinder are electrically and communicatively connected; sending a corresponding unlocking and locking instruction to unlocking personnel based on the product identifier of the current passive lock cylinder; the unlocking personnel can conveniently conduct unlocking operation on the current passive lock based on the unlocking instruction.
Further, through detecting the angle and the direction of the switch lock operation information and comparing with the angle and the data size of the switch lock instruction, the lock state authentication result whether the switch lock is successfully unlocked, closed and opened is obtained through the result of the data size comparison, then the active key sends the lock state authentication result to the terminal management platform, the terminal management platform updates the current lock state of the passive lock based on the lock state authentication result, the purpose of updating the lock state information of the passive lock in real time is conveniently achieved, the effect of accurately judging the unlocking and locking operation of the passive lock is facilitated, and the monitoring effect on the lock state is improved.
In one embodiment, a door lock monitoring method is provided, which is applied to a door lock monitoring system as described above.
As shown in fig. 2, the application discloses a door lock monitoring method, which specifically includes the following steps:
s1: and acquiring power supply connection information of the active key, and acquiring a product identifier of the currently inserted passive lock cylinder based on the power supply connection information.
In this embodiment, the power supply connection information is communication information that the active key and the passive lock cylinder realize power supply conduction when the active key is inserted into a key hole of the passive lock cylinder; the product identification is a unique product information code of the passive lock cylinder, and different passive lock cylinders are provided with different product identifications.
Specifically, the terminal management platform is an APP management background which is convenient to carry, and a user can carry the terminal management platform with him to perform unlocking and locking operations when unlocking and locking so as to monitor the states of the current passive lock cylinder and the active key in real time; specifically, the terminal management platform is in communication connection with the active key, when the active key is inserted into the passive lock cylinder, the active key supplies power to the passive lock cylinder through a lock cylinder probe in a key hole of the passive lock cylinder, so that the passive lock cylinder and the active key are in communication connection, and at the moment, the active key obtains a product identifier on the passive lock cylinder.
S2: and acquiring corresponding unlocking and locking information based on the product identifier of the passive lock cylinder, and outputting an unlocking and locking instruction according to the unlocking and locking information.
In this embodiment, the switch lock information is the total rotation direction and rotation angle of the active key required to be twisted when the currently inserted passive lock cylinder is unlocked or locked, for example, the passive lock cylinder a of the product identifier a needs to be rotated 180 ° to the left for unlocking in the locked state, and the passive lock cylinder B of the product identifier B needs to be rotated 270 ° to the right in the locked state, and the switch lock information includes the rotation direction and rotation angle of the active key required to be rotated.
Specifically, corresponding unlocking information (the unlocking information comprises an unlocking angle and an unlocking direction) is judged based on the product identification of the currently inserted passive lock cylinder, and after an unlocking instruction to be operated is generated according to the unlocking information, the unlocking instruction of the current passive lock is output to a user, so that the user can accurately know the unlocking operation of the current passive lock cylinder, the unlocking operation time of the user is saved, and the operation is faster.
S3: when the active key is twisted in the key hole, corresponding switch lock operation information is determined according to the twisted direction and angle of the active key acquired by the detection unit.
In this embodiment, the opening and closing lock operation information is data information of an actual rotation angle and a rotation direction when the user rotates the active key; the user twists the active key based on the received unlocking instruction to realize unlocking operation, and a detection unit on the active key detects the twisted direction and angle of the active key in real time at the moment so as to determine to generate unlocking operation information.
S4: comparing the unlocking instruction with corresponding unlocking operation information to obtain a corresponding lockset state authentication result; and sending a lock state update instruction to the terminal management platform based on the lock state authentication result, wherein the lock state update instruction comprises a corresponding product identifier.
In this embodiment, the lock state authentication result includes state information such as unlocking, locking, unlocking success, unlocking failure, locking success, locking failure, etc.; the terminal management platform is a visual APP management platform.
Specifically, comparing the angle and the direction of the detected switch lock operation information with the angle and the data of the direction of the switch lock instruction, determining whether the lock state authentication result is successful or not according to the comparison result of the data, and then transmitting the lock state authentication result to the terminal management platform by the active key.
S5: and the terminal management platform updates the door lock and lock state of the passive lock cylinder corresponding to the product identifier based on the state update instruction and the lock state authentication result.
In this embodiment, the terminal management platform updates the current lock state of the passive lock based on the lock state authentication result, so as to achieve the purpose of updating the lock state information of the passive lock in real time, thereby being beneficial to achieving the effect of accurately judging the unlocking and locking operations of the passive lock and improving the monitoring effect on the lock state.
In one embodiment, as shown in fig. 3, the door lock monitoring method further includes:
s10: and acquiring the unlocking operation information of a plurality of passive locks in the target monitoring area in a specified time period, and extracting corresponding unlocking failure times based on the unlocking operation information.
In the embodiment, a passive lock cylinder is connected with a camera acquisition device; the camera shooting acquisition device can be arranged at the upper part of the passive lock and the outer side wall of the door, and can acquire the position of the face image information; the target monitoring area is a monitoring area range in which a plurality of passive locks are set for a certain use scene area; the designated time period is a set monitoring duration, and can be defined by a user.
Specifically, in order to realize the lock monitoring of a plurality of passive locks in a target monitoring area, after the passive lock cylinder is inserted into a key blank to realize power supply, the total unlocking failure condition and the unlocking success condition of the target monitoring area are counted in a specified time period, namely the unlocking failure times of the target monitoring area are counted.
Further, a plurality of camera shooting and collecting devices which can detect the flowing condition of field personnel in the target monitoring area are arranged in the target monitoring area, and a plurality of monitoring videos are acquired in real time, namely, besides one camera shooting and collecting device is required to be arranged on a door of a passive lock, the camera shooting and collecting device is also required to be additionally arranged in an area for monitoring the flowing condition of personnel in the target monitoring area; in the present embodiment, the image pickup apparatus is provided with a plurality of.
S20: comparing the corresponding unlocking failure times with a preset unlocking time threshold; and when the corresponding unlocking failure times exceed a preset unlocking time threshold, acquiring a monitoring video of the camera acquisition device, and carrying out framing processing on the monitoring video to obtain a portrait image to be judged.
In this embodiment, the unlocking frequency threshold is preset unlocking failure frequency, and the unlocking frequency threshold is set to be 2 times, so that when the unlocking failure frequency of the current user exceeds 2 times, the monitoring video of the camera acquisition device is immediately acquired, so that the subsequent analysis of personnel behaviors is facilitated.
Specifically, the unlocking failure times and the unlocking times threshold are compared in numerical value, so as to determine whether to perform the next personnel identity recognition operation according to the comparison result of the unlocking failure times and the unlocking times threshold, when the unlocking failure times exceed the unlocking times threshold, the monitoring video of the current passive lock core camera shooting and collecting device is obtained, the monitoring video is subjected to framing processing within a set time interval (such as every 0.5 seconds, the specific time can be defined and changed by oneself), and the personnel is subjected to unlocking operation at the moment, so that the personnel image is detected in the monitoring video, and the multi-frame personnel image to be judged can be obtained.
S30: inputting the portrait image to be judged into a preset user identification model, and carrying out user identification to obtain an identification result; the identity recognition result comprises identity recognition failure and identity recognition success.
In this embodiment, the user identification model is a preset target neural network identification model for identifying facial biometric information from the portrait image to be determined, and a plurality of user images are pre-stored in the user identification model so as to facilitate image identification of the portrait image to be determined.
S40: and when the identity recognition result of the portrait image to be judged is that the identity recognition fails, carrying out behavior analysis on the portrait image to be judged frame by frame to obtain a corresponding behavior analysis result.
In this embodiment, when the identity recognition result of the portrait image to be determined is that the identity recognition fails, the user recognition model is characterized in that the current unlocking person is a stranger person, and potential safety hazards exist for a thief to pick the lock.
Specifically, according to the difference of the postures of the portrait images to be determined in each frame, continuous actions are connected, and the obtained actions are used as the behavior analysis results. The behavior analysis results include the behavior analysis results of the behavior composition of the head and the limbs, such as rapid head twist, head raising hope, standing still of a person, and the like.
S50: and inputting the behavior analysis result into a preset behavior abnormality detection model to obtain corresponding abnormal behavior judgment data, and outputting abnormality early warning information based on the abnormal behavior judgment data.
In this embodiment, the behavioral anomaly detection model is a target neural network identification model that is preset and is used to analyze whether the behavior of each person is abnormal or not and suspicious from the actions of each person; the abnormal behavior determination data is data for determining the type of behavior of the current unlocking person or the suspicious person.
Specifically, the preset behavior anomaly detection model is used for detecting the behaviors of the personnel in the personnel behavior analysis result, corresponding anomaly behavior judgment data can be obtained quickly, and anomaly early warning information is output when obvious anomalies of the personnel are detected, so that personnel monitoring management efficiency of a target monitoring area is improved, early warning prompt is timely carried out on abnormal personnel unlocking behaviors, and safety of the target monitoring area is improved.
In one embodiment, as shown in fig. 4, in step S40, when the identity recognition result of the portrait image to be determined is that the identity recognition fails, performing behavior analysis on the portrait image to be determined frame by frame to obtain a corresponding behavior analysis result, which specifically includes:
S401: and when the identity recognition result of the portrait image to be judged is the identity recognition failure, sending an identity recognition failure prompt to a preset user terminal, and comparing action difference information between the portrait images to be judged frame by frame from the collected portrait image of the first frame.
In this embodiment, the motion difference information refers to difference information between motion postures of people in to-be-determined portrait images of two adjacent frames; after the fact that unlocking failure times of current unlocking personnel are more is identified (namely, when the corresponding unlocking failure times exceed an unlocking frequency threshold value), identity identification is carried out on personnel performing unlocking currently, when the identity identification result of the portrait image to be judged is determined to be the identity identification failure, the portrait image of the current unlocking personnel is represented to be unfastened by a stranger if the portrait image of the current unlocking personnel does not exist in the personnel image stored in advance in the user identification model, and suspicious behaviors that the door lock is pried and/or the stranger is stepped on by the point to be stolen are represented; in order to further improve the behavior abnormality judgment accuracy of abnormal suspicious personnel, the current identity recognition failure result is sent to the user terminal, so that the user is prompted to have potential safety hazards at the moment, and the safety performance of the door lock monitoring system is improved.
Specifically, the action difference information is analyzed frame by frame, so that the behavior of the pre-judging personnel can be analyzed, and the pre-judging and processing of the suspicious behavior of the suspicious personnel with failed identity recognition are facilitated.
S402: and if the action difference information is smaller than a preset difference threshold, merging the corresponding portrait images to be judged, and recording the merged frame number as a behavior analysis library.
Specifically, a difference threshold of the action difference information is preset, and when the action difference information of the person is smaller than the difference threshold, that is, the action amplitude of the person is smaller, it can be determined that the person is in a stay state. The behavior analysis library is a behavior database for analyzing the stay time of the personnel; so as to judge whether abnormal personnel behaviors of stepping points exist in the target monitoring area.
S403: and performing behavior analysis on the action difference information and the behavior analysis library to obtain a corresponding behavior analysis result.
In this embodiment, by analyzing the behavior of the abnormal person action with respect to the action difference information, the time for which the person is standing in is calculated with respect to the behavior analysis library, and the result of the analysis is used as the corresponding behavior analysis result.
Specifically, the to-be-determined portrait images with motion difference information smaller than the difference threshold value are combined, so that the calculation amount of behavior analysis can be reduced, and meanwhile, the recorded combined frame number is combined into a behavior analysis library, so that the behavior analysis library can be further analyzed.
In one embodiment, in step S10: acquiring the unlocking operation information of a plurality of passive locks in the target monitoring area in a designated time period, and extracting corresponding unlocking failure times based on the unlocking operation information, wherein the method further comprises the following steps:
s101: comparing the corresponding unlocking failure times with a preset unlocking times comparison threshold value; when the corresponding unlocking failure times exceed a preset unlocking time comparison threshold value, starting a high-definition video recording device to record the current unlocking personnel so as to obtain a real-time monitoring video, and obtaining the lock core identification of the current passive lock core.
In this embodiment, the passive lock is further connected with a high-definition video device, where the high-definition video device in this embodiment refers to video equipment that can monitor the personnel flow condition in the target monitoring area, such as a high-definition monitor, a 360 ° camera, and the like.
The unlocking failure times and the unlocking times are compared with a threshold value, so that whether the high-definition video recording device is started to execute real-time video recording operation is determined according to the comparison result of the unlocking failure times and the unlocking times, and under normal conditions, the high-definition video recording device can be set to work in a dormant state, so that the working power consumption consumed by the high-definition video recording device in working is effectively reduced, the purpose of saving the use energy consumption of the high-definition video recording device is achieved, energy is saved, and the service life of the high-definition video recording device is prolonged.
Specifically, when the current unlocking failure times of the passive lock are monitored to be more, namely the unlocking failure times exceed a preset unlocking time comparison threshold, the fact that the personnel performing unlocking at the moment has unlocking failure for multiple times is characterized in that the personnel performing unlocking are suspicious of lock picking or stranger theft, a high-definition video recording device is started to conduct real-time monitoring video recording on the current suspicious region and suspicious personnel, and meanwhile the lock core identification of the passive lock core is obtained, so that the position of the suspicious personnel and the position of the specific passive lock can be conveniently located.
S102: based on the real-time monitoring video and the corresponding lock core identification, an information checking instruction is generated and sent to a preset user terminal, and a corresponding personnel checking result is obtained based on the information checking instruction.
In this embodiment, the user terminal is a visual terminal device that is in communication connection with the passive lock; the information checking instruction refers to an instruction for acquiring personnel checking information of the current passive lock to be opened and closed, which is sent to the user terminal; the personnel checking result is a checking result obtained after the user performs personnel checking on the video content of the real-time monitoring video based on the information checking instruction.
Specifically, an information checking instruction is generated and sent to a user terminal, so that a user can check the real-time monitoring video to obtain a corresponding personnel checking result, and an information prompt and abnormal situation checking mode for detecting abnormal unlocking behaviors in real time is provided.
It should be understood that the sequence number of each step in the foregoing embodiment does not mean that the execution sequence of each process should be determined by the function and the internal logic of each process, and should not limit the implementation process of the embodiment of the present application in any way.
In one embodiment, a smart device is provided, which may be a computer device and a server. The intelligent device comprises a processor, a memory, a network interface and a database which are connected through a system bus. Wherein the processor of the smart device is configured to provide computing and control capabilities. The memory of the intelligent device comprises a nonvolatile storage medium and an internal memory. The non-volatile storage medium stores an operating system, computer programs, and a database. The internal memory provides an environment for the operation of the operating system and computer programs in the non-volatile storage media. The database of the intelligent device is used for storing a user identification model, a behavior abnormality detection model, a monitoring video and the like. The network interface of the intelligent device is used for communicating with an external terminal through network connection. The computer program, when executed by a processor, implements a door lock monitoring method.
In one embodiment, a smart device is provided that includes a memory, a processor, and a computer program stored in the memory and executable on the processor, the processor implementing the following steps when executing the computer program:
S1: acquiring power supply connection information of an active key, and acquiring a product identifier of a currently inserted passive lock cylinder based on the power supply connection information;
s2: acquiring corresponding unlocking and locking information based on the product identifier of the passive lock cylinder, and outputting an unlocking and locking instruction according to the unlocking and locking information;
s3: when the active key is twisted in the key hole, corresponding unlocking and locking operation information is determined according to the twisted direction and angle of the active key acquired by the detection unit;
s4: comparing the unlocking instruction with corresponding unlocking operation information to obtain a corresponding lockset state authentication result; based on the lock state authentication result, a lock state update instruction is sent to the terminal management platform, wherein the lock state update instruction comprises a corresponding product identifier;
s5: and the terminal management platform updates the door lock and lock state of the passive lock cylinder corresponding to the product identifier based on the state update instruction and the lock state authentication result.
In one embodiment, a computer readable storage medium is provided having a computer program stored thereon, which when executed by a processor, performs the steps of:
s1: acquiring power supply connection information of an active key, and acquiring a product identifier of a currently inserted passive lock cylinder based on the power supply connection information;
S2: acquiring corresponding unlocking and locking information based on the product identifier of the passive lock cylinder, and outputting an unlocking and locking instruction according to the unlocking and locking information;
s3: when the active key is twisted in the key hole, corresponding unlocking and locking operation information is determined according to the twisted direction and angle of the active key acquired by the detection unit;
s4: comparing the unlocking instruction with corresponding unlocking operation information to obtain a corresponding lockset state authentication result; based on the lock state authentication result, a lock state update instruction is sent to the terminal management platform, wherein the lock state update instruction comprises a corresponding product identifier;
s5: and the terminal management platform updates the door lock and lock state of the passive lock cylinder corresponding to the product identifier based on the state update instruction and the lock state authentication result.
Those skilled in the art will appreciate that implementing all or part of the above described methods may be accomplished by way of a computer program stored on a non-transitory computer readable storage medium, which when executed, may comprise the steps of the embodiments of the methods described above. Any reference to memory, storage, database, or other medium used in the various embodiments provided herein may include non-volatile and/or volatile memory. The nonvolatile memory can include Read Only Memory (ROM), programmable ROM (PROM), electrically Programmable ROM (EPROM), electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double Data Rate SDRAM (DDRSDRAM), enhanced SDRAM (ESDRAM), synchronous Link DRAM (SLDRAM), memory bus direct RAM (RDRAM), direct memory bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM), among others.
It will be apparent to those skilled in the art that, for convenience and brevity of description, only the above-described division of the functional units and modules is illustrated, and in practical application, the above-described functional distribution may be performed by different functional units and modules according to needs, i.e. the internal structure of the apparatus is divided into different functional units or modules to perform all or part of the above-described functions.
The above embodiments are only for illustrating the technical solution of the present application, and are not limiting; although the present application has been described in detail with reference to the foregoing embodiments, those of ordinary skill in the art will understand; the technical scheme described in the foregoing embodiments can be modified or some of the features thereof can be replaced by equivalents; such modifications and substitutions do not depart from the spirit and scope of the technical solutions of the embodiments of the present application, and are intended to be included in the scope of the present application.

Claims (8)

1. A door lock monitoring system, comprising: the passive lock cylinder is provided with a key hole, and an active key matched with the passive lock cylinder for use, wherein the circumferential side wall of the key hole is provided with a detection unit for detecting the rotation direction and the rotation angle of the active key; the door lock monitoring system further comprises a terminal management platform for monitoring the state of the door lock;
A lock cylinder probe is arranged on the wall of the key hole, and when the active key is inserted into the key hole of the passive lock cylinder, the active key is abutted against the lock cylinder probe and is electrically connected with the passive lock cylinder through the lock cylinder probe;
the passive lock cylinder is associated with a product identifier; acquiring the currently inserted switch lock information of the passive lock cylinder based on the acquired product identifier, and outputting a switch lock instruction based on the current switch lock information;
the detection unit acquires the twisted direction and angle of the active key and determines the unlocking and locking operation information, and the terminal management platform compares the unlocking and locking instruction with the unlocking and locking operation information to obtain a lockset state authentication result;
the terminal management platform updates the corresponding door lock state of the passive lock cylinder based on the lock state authentication result;
the key circuit board is provided with a communication unit which is in communication connection with the terminal management platform; the key blank of the active key is provided with a power supply contact and a communication contact at intervals, and the power supply contact and the communication contact are electrically connected with a key circuit board; and when the key blank of the active key is inserted into the key hole, the power supply contact and the communication contact are electrically connected with the lock cylinder probe.
2. The door lock monitoring system of claim 1, wherein a plurality of communication contacts are provided, and a plurality of lock cylinder probes are provided at intervals; the communication contacts are arranged in one-to-one correspondence with the lock cylinder probes, and one lock cylinder probe is arranged in correspondence with the power supply contact; the detection unit comprises a triaxial sensor.
3. A door lock monitoring method, applied to the door lock monitoring system of any one of claims 1-2, the method comprising:
acquiring power supply connection information of the active key, and acquiring a product identifier of the currently inserted passive lock cylinder based on the power supply connection information;
acquiring corresponding unlocking and locking information based on the product identifier of the passive lock cylinder, and outputting an unlocking and locking instruction according to the unlocking and locking information;
when the active key is twisted in the key hole, corresponding unlocking and locking operation information is determined according to the direction and the angle, acquired by the detection unit, of the active key which is twisted;
comparing the unlocking instruction with corresponding unlocking operation information to obtain a corresponding lockset state authentication result; transmitting a lock state update instruction to the terminal management platform based on the lock state authentication result, wherein the lock state update instruction comprises a corresponding product identifier;
And the terminal management platform updates the door lock and lock state of the passive lock cylinder corresponding to the product identifier based on the state update instruction and the lock state authentication result.
4. A door lock monitoring method according to claim 3, wherein the passive lock cylinder is connected with a camera acquisition device, the method further comprising:
acquiring unlocking operation information of a plurality of passive locks in a target monitoring area in a specified time period, and extracting corresponding unlocking failure times based on the unlocking operation information;
comparing the corresponding unlocking failure times with a preset unlocking time threshold; when the corresponding unlocking failure times exceed the preset unlocking times threshold value, acquiring a monitoring video of the camera acquisition device, and carrying out framing treatment on the monitoring video to obtain a portrait image to be judged;
inputting the portrait image to be judged into a preset user identification model, and carrying out user identification to obtain an identification result; the identity recognition result comprises identity recognition failure and identity recognition success;
when the identity recognition result of the portrait image to be judged is that the identity recognition fails, carrying out behavior analysis on the portrait image to be judged frame by frame to obtain a corresponding behavior analysis result;
And inputting the behavior analysis result into a preset behavior abnormality detection model to obtain corresponding abnormal behavior judgment data, and outputting abnormality early warning information based on the abnormal behavior judgment data.
5. The door lock monitoring method according to claim 4, wherein when the identification result of the portrait image to be determined is that the identification fails, performing the behavioral analysis on the portrait image to be determined frame by frame to obtain a corresponding behavioral analysis result, specifically comprising:
when the identity recognition result of the portrait image to be judged is determined to be identity recognition failure, sending an identity recognition failure prompt to a preset user terminal, and comparing action difference information among the portrait images to be judged frame by frame from the collected portrait image of the first frame;
if the action difference information is smaller than a preset difference threshold, merging the corresponding portrait images to be judged, and recording the merged frame number as a behavior analysis library;
and performing behavior analysis on the action difference information and the behavior analysis library to obtain a corresponding behavior analysis result.
6. The door lock monitoring method according to claim 5, wherein the passive lock is further connected with a high-definition video device; the method for acquiring the unlocking operation information of the plurality of passive locks in the target monitoring area in the appointed time period, extracting the corresponding unlocking failure times based on the unlocking operation information, and then further comprises the following steps:
Comparing the corresponding unlocking failure times with a preset unlocking time comparison threshold value; when the corresponding unlocking failure times exceeds the preset unlocking times comparison threshold value, starting the high-definition video recording device to record the current unlocking personnel to obtain a real-time monitoring video record, obtaining the lock core identification of the current passive lock core,
and generating an information checking instruction based on the real-time monitoring video and the corresponding lock core identifier, sending the information checking instruction to a preset user terminal, and obtaining a corresponding personnel checking result based on the information checking instruction.
7. A smart device comprising a memory, a processor and a computer program stored in the memory and executable on the processor, characterized in that the processor implements the steps of the door lock monitoring method according to any of claims 3 to 6 when the computer program is executed.
8. A computer readable storage medium storing a computer program, characterized in that the computer program when executed by a processor implements the steps of the door lock monitoring method according to any one of claims 3 to 6.
CN202410122079.9A 2024-01-30 2024-01-30 Door lock monitoring system, method, equipment and storage medium Active CN117649714B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202410122079.9A CN117649714B (en) 2024-01-30 2024-01-30 Door lock monitoring system, method, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202410122079.9A CN117649714B (en) 2024-01-30 2024-01-30 Door lock monitoring system, method, equipment and storage medium

Publications (2)

Publication Number Publication Date
CN117649714A CN117649714A (en) 2024-03-05
CN117649714B true CN117649714B (en) 2024-03-29

Family

ID=90045505

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202410122079.9A Active CN117649714B (en) 2024-01-30 2024-01-30 Door lock monitoring system, method, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN117649714B (en)

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2000017917A (en) * 1998-07-06 2000-01-18 Omron Corp Locking control device
CN103527000A (en) * 2013-10-15 2014-01-22 中国科学院深圳先进技术研究院 Door locking reminding device and method and intelligent key
CN204609521U (en) * 2015-02-03 2015-09-02 吉林省施泰信息技术股份有限公司 Magnetic control smart lock, case and cabinet and magnetic control system
CN208056840U (en) * 2018-01-15 2018-11-06 张正伟 Dynamic formula wheel mortice lock and key afterwards
CN109615737A (en) * 2018-11-29 2019-04-12 成都大汇智联科技有限公司 The management method disposably unlocked
CN109830024A (en) * 2019-03-06 2019-05-31 珠海优特电力科技股份有限公司 A kind of electron key unlocking method, device and electron key
CN110593655A (en) * 2019-08-05 2019-12-20 珠海优特物联科技有限公司 Control method of electronic lock, key and lock
CN210141054U (en) * 2019-01-16 2020-03-13 中国电力科学研究院有限公司 Passive electric field lockset
CN111476927A (en) * 2020-02-28 2020-07-31 深圳市康拓普信息技术有限公司 Passive padlock management method and system and key
CN111768517A (en) * 2019-03-14 2020-10-13 菜鸟智能物流控股有限公司 Door lock control system, method and device of logistics object management device and electronic equipment
CN114550353A (en) * 2022-02-24 2022-05-27 广东电网有限责任公司 Intelligent lock control system of transformer substation
CN116311608A (en) * 2023-02-23 2023-06-23 珠海理想科技有限公司 Intelligent key, intelligent lock system and method for judging lock opening and closing states

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090205384A1 (en) * 2008-02-18 2009-08-20 Sandisk Il Ltd. Electromechanical locking system

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2000017917A (en) * 1998-07-06 2000-01-18 Omron Corp Locking control device
CN103527000A (en) * 2013-10-15 2014-01-22 中国科学院深圳先进技术研究院 Door locking reminding device and method and intelligent key
CN204609521U (en) * 2015-02-03 2015-09-02 吉林省施泰信息技术股份有限公司 Magnetic control smart lock, case and cabinet and magnetic control system
CN208056840U (en) * 2018-01-15 2018-11-06 张正伟 Dynamic formula wheel mortice lock and key afterwards
CN109615737A (en) * 2018-11-29 2019-04-12 成都大汇智联科技有限公司 The management method disposably unlocked
CN210141054U (en) * 2019-01-16 2020-03-13 中国电力科学研究院有限公司 Passive electric field lockset
CN109830024A (en) * 2019-03-06 2019-05-31 珠海优特电力科技股份有限公司 A kind of electron key unlocking method, device and electron key
CN111768517A (en) * 2019-03-14 2020-10-13 菜鸟智能物流控股有限公司 Door lock control system, method and device of logistics object management device and electronic equipment
CN110593655A (en) * 2019-08-05 2019-12-20 珠海优特物联科技有限公司 Control method of electronic lock, key and lock
CN111476927A (en) * 2020-02-28 2020-07-31 深圳市康拓普信息技术有限公司 Passive padlock management method and system and key
CN114550353A (en) * 2022-02-24 2022-05-27 广东电网有限责任公司 Intelligent lock control system of transformer substation
CN116311608A (en) * 2023-02-23 2023-06-23 珠海理想科技有限公司 Intelligent key, intelligent lock system and method for judging lock opening and closing states

Also Published As

Publication number Publication date
CN117649714A (en) 2024-03-05

Similar Documents

Publication Publication Date Title
CN109830009A (en) Gate inhibition's unlocking method, device, computer equipment and storage medium
CN106600774A (en) Face identification gate inhibition control method provided with door opening detection area and system thereof
CN109726663A (en) Online testing monitoring method, device, computer equipment and storage medium
CN107992739A (en) User authentication method, apparatus and system
CN109886709B (en) Intelligent lock management method, system, computer equipment and storage medium
CN105844737A (en) Camera based electronic lock system and use method
CN112364722A (en) Nuclear power operator monitoring processing method and device and computer equipment
CN111860152A (en) Method, system, equipment and computer equipment for detecting personnel state
CN111582179B (en) Monitoring video analysis method and device, computer equipment and storage medium
CN109389028A (en) Face identification method, device, equipment and storage medium based on motion analysis
CN113658366A (en) Safety management and control system for limited space operation of thermal power plant
CN117649714B (en) Door lock monitoring system, method, equipment and storage medium
CN106295276A (en) A kind of user of record inputs the method that BIOS password enters system
CN114268453A (en) Power system unlocking method and device, computer equipment and storage medium
CN109040742A (en) Camera intelligent fault is sought because of method, apparatus and camera
CN110675540B (en) Lock management method and device for equipment maintenance and intelligent electronic lock
CN112489258A (en) Door lock alarm processing method and device, computer equipment and storage medium
CN116416665A (en) Face recognition method and device based on security system and storage medium
CN115437901A (en) Computer user identification management system and method based on big data
CN114419475A (en) Construction safety discrimination method and system based on video information behavior pattern recognition
CN114172717A (en) Account risk evaluation method based on event tracking
CN113642462A (en) Driving behavior assessment method and device, terminal equipment and storage medium
CN112489257A (en) Intelligent safety lock for cabinet door of power distribution network box
CN111311792A (en) Intelligent lock verification system and method
CN117975540A (en) Computer image acquisition method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant