CN106504390A - Control method for door lock, apparatus and system - Google Patents

Control method for door lock, apparatus and system Download PDF

Info

Publication number
CN106504390A
CN106504390A CN201611034980.2A CN201611034980A CN106504390A CN 106504390 A CN106504390 A CN 106504390A CN 201611034980 A CN201611034980 A CN 201611034980A CN 106504390 A CN106504390 A CN 106504390A
Authority
CN
China
Prior art keywords
terminal
visitor
identification information
verification information
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201611034980.2A
Other languages
Chinese (zh)
Inventor
宋建文
刘欢欢
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Xiaomi Mobile Software Co Ltd
Original Assignee
Beijing Xiaomi Mobile Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Xiaomi Mobile Software Co Ltd filed Critical Beijing Xiaomi Mobile Software Co Ltd
Priority to CN201611034980.2A priority Critical patent/CN106504390A/en
Publication of CN106504390A publication Critical patent/CN106504390A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00563Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys using personal physical data of the operator, e.g. finger prints, retinal images, voicepatterns
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/32Individual registration on entry or exit not involving the use of a pass in combination with an identity check
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/30Individual registration on entry or exit not involving the use of a pass
    • G07C9/32Individual registration on entry or exit not involving the use of a pass in combination with an identity check
    • G07C9/37Individual registration on entry or exit not involving the use of a pass in combination with an identity check using biometric data, e.g. fingerprints, iris scans or voice recognition

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The disclosure discloses a kind of control method for door lock, belongs to smart home field.Methods described includes:The Authority Verification information that visitor is gathered by checking information collecting unit;When the authority that the visitor does not have opening door lock is verified by the authentication information, the identity identification information that the visitor is gathered by identification information collecting unit;The identity identification information is sent to terminal;When the unlocking instruction that the terminal is returned is received, control door lock is opened, access control equipment is when the authority that visitor does not have unlocking is verified, to the identity identification information that terminal sends visitor, unlocking instruction is sent by terminal by householder, the situation for having visitor to be required for householder's determination to be unlocking when visiting every time is avoided, is operated so as to simplify the unnecessary confirmation of householder.

Description

Door lock control method, device and system
Technical Field
The disclosure relates to the field of smart home, in particular to a door lock control method, device and system.
Background
With the continuous development of smart home technology, as an important component in smart homes, the application of intelligent access control is more and more extensive.
In the related art, an intelligent access control usually includes an outdoor unit and an indoor unit, a visitor sends an access request through the outdoor unit, and a householder controls a door lock to be opened through the indoor unit. For example, when a visitor presses an access request key in the outdoor unit, the indoor unit is triggered to send out a doorbell sound prompt, after the householder hears a doorbell sound, a video intercommunication function between the indoor unit and the outdoor unit is started, and after the householder confirms the identity of the visitor through video intercommunication, the door lock can be unlocked on the indoor unit so as to open the door lock.
Disclosure of Invention
The present disclosure provides a door lock control method. The technical scheme is as follows:
according to a first aspect of embodiments of the present disclosure, there is provided a door lock control method including:
acquiring authority verification information of the visitor through a verification information acquisition unit;
when the visitor does not have the authority of opening the door lock through the identity authentication information, acquiring the identity identification information of the visitor through an identification information acquisition unit;
sending the identity identification information to a terminal;
and when an unlocking instruction returned by the terminal is received, controlling the door lock to be unlocked.
Optionally, the right verification information includes: at least one of a fingerprint, a voiceprint, an iris image, and a face image.
Optionally, the identification information includes: at least one of an image or a voice.
Optionally, the method further includes:
and when the identity identification information is failed to be sent to the terminal, or the feedback of the terminal is not received within a preset time period after the identity information is successfully sent to the terminal, storing the identity identification information.
Optionally, when it is verified that the visitor does not have the authority to open the door lock through the authentication information, acquiring, by an identification information acquisition unit, identification information of the visitor, including:
matching the authority verification information with at least one verification information template to obtain a matching result;
and when the matching result indicates that the permission verification information is matched with one of the at least one verification information template, executing the step of acquiring the identity identification information of the visitor by an identification information acquisition unit.
Optionally, the matching the authority verification information with at least one verification information template to obtain a matching result includes:
matching the authority verification information with the at least one verification information template which is obtained from the terminal in advance and stored to obtain the matching result;
or sending a verification request containing the authority verification information to the terminal, wherein the verification request is used for indicating the terminal to match the authority verification information with the at least one verification information template stored in the terminal; and receiving the matching result returned by the terminal.
According to a second aspect of the embodiments of the present disclosure, there is provided a door lock control method including:
receiving identity identification information of a visitor sent by an access control device, wherein the identity identification information is acquired and sent when the access control device verifies that the visitor does not have the authority to open a door lock according to the authority verification information of the visitor;
displaying the identification information;
and when receiving unlocking operation executed based on the identity identification information, sending an unlocking instruction to the access control equipment, wherein the unlocking instruction is used for indicating the access control equipment to control the door lock to be opened.
Optionally, the method further includes:
before receiving the identity identification information of the visitor sent by the access control equipment, receiving at least one input verification information template.
Optionally, the method further includes:
before receiving identity identification information of a visitor sent by an access control device, receiving a verification request containing permission verification information sent by the access control device; matching the authority verification information with the at least one verification information template; returning a matching result to the terminal;
and/or providing the at least one verification information template to the access control device.
According to a third aspect of the embodiments of the present disclosure, there is provided a door lock control device including:
the verification information acquisition module is used for acquiring the authority verification information of the visitor through the verification information acquisition unit;
the identification information acquisition module is used for acquiring the identification information of the visitor through an identification information acquisition unit when the visitor is verified to have no authority of opening the door lock through the identification information;
the information sending module is used for sending the identity identification information to the terminal;
and the control module is used for controlling the door lock to be opened when receiving the unlocking instruction returned by the terminal.
Optionally, the right verification information includes: at least one of a fingerprint, a voiceprint, an iris image, and a face image.
Optionally, the identification information includes: at least one of an image or a voice.
Optionally, the apparatus further comprises:
and the storage module is used for storing the identity recognition information when the identity recognition information fails to be sent to the terminal or the feedback of the terminal is not received within a preset time period after the identity recognition information is successfully sent to the terminal.
Optionally, the identification information collecting module includes:
the matching submodule is used for matching the authority verification information with at least one verification information template to obtain a matching result;
and the acquisition submodule is used for acquiring the identity identification information of the visitor through an identification information acquisition unit when the matching result indicates that the authority verification information is matched with one of the at least one verification information template.
Optionally, the matching sub-module is configured to match the permission verification information with the at least one verification information template that is obtained and stored from the terminal in advance, so as to obtain the matching result; or, the matching sub-module is configured to send a verification request including the permission verification information to the terminal, where the verification request is used to instruct the terminal to match the permission verification information with the at least one verification information template stored in the terminal, and receive the matching result returned by the terminal.
According to a fourth aspect of the embodiments of the present disclosure, there is provided a door lock control device including:
the system comprises an information receiving module, a door lock unlocking module and a door lock unlocking module, wherein the information receiving module is used for receiving identity identification information of a visitor, which is sent by door control equipment, and the identity identification information is acquired and sent when the door control equipment verifies that the visitor does not have the authority to unlock the door lock according to authority verification information of the visitor;
the information display module is used for displaying the identity identification information;
and the instruction sending module is used for sending an unlocking instruction to the access control equipment when receiving unlocking operation executed based on the identity identification information, and the unlocking instruction is used for indicating the access control equipment to control the door lock to be opened.
Optionally, the apparatus further comprises:
the template receiving module is used for receiving at least one input verification information template before receiving the identity identification information of the visitor sent by the access control equipment.
Optionally, the apparatus further includes a request receiving module, a matching module, and a result returning module, and/or the apparatus further includes a template providing module;
the request receiving module is used for receiving a verification request containing the permission verification information sent by the access control equipment before receiving the identity identification information of the visitor sent by the access control equipment;
the matching module is used for matching the authority verification information with the at least one verification information template;
and the result returning module is used for returning the matching result to the terminal.
The template providing module is used for providing the at least one verification information template for the access control equipment.
According to a fifth aspect of the embodiments of the present disclosure, there is provided a door lock control device including:
a processor;
a memory for storing executable instructions of the processor;
wherein the processor is configured to:
acquiring authority verification information of the visitor through a verification information acquisition unit;
when the visitor does not have the authority of opening the door lock through the identity authentication information, acquiring the identity identification information of the visitor through an identification information acquisition unit;
sending the identity identification information to a terminal;
and when an unlocking instruction returned by the terminal is received, controlling the door lock to be unlocked.
According to a sixth aspect of the embodiments of the present disclosure, there is provided a door lock control device including:
a processor;
a memory for storing executable instructions of the processor;
wherein the processor is configured to:
receiving identity identification information of a visitor sent by an access control device, wherein the identity identification information is acquired and sent when the access control device verifies that the visitor does not have the authority to open a door lock according to the authority verification information of the visitor;
displaying the identification information;
and when receiving unlocking operation executed based on the identity identification information, sending an unlocking instruction to the access control equipment, wherein the unlocking instruction is used for indicating the access control equipment to control the door lock to be opened.
According to a seventh aspect of the embodiments of the present disclosure, there is provided a door lock control system, including: access control equipment and a terminal;
the door lock control device according to the third aspect or various possible implementations of the third aspect is included in the door access device;
the terminal comprises a door lock control device as described in the fourth aspect or various possible implementations of the fourth aspect.
The technical scheme provided by the embodiment of the disclosure can have the following beneficial effects:
acquiring authority verification information of the visitor through a verification information acquisition unit; when the visitor is verified to have no authority to open the door lock through the identity verification information, acquiring identity identification information of the visitor through an identification information acquisition unit; sending the identity identification information to the terminal; when an unlocking instruction returned by the terminal is received, the door lock is controlled to be opened, the access control equipment sends the identity identification information of the visitor to the terminal when verifying that the visitor does not have the unlocking right, and the owner sends the unlocking instruction through the terminal, so that the condition that the owner needs to determine that the visitor is unlocked every time the visitor visits is avoided, and unnecessary confirmation operation of the owner is simplified.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present disclosure and together with the description, serve to explain the principles of the disclosure.
FIG. 1 is a schematic illustration of an environment in which a door lock control method according to some exemplary embodiments is implemented;
FIG. 2 is a flow chart illustrating a door lock control method according to an exemplary embodiment;
FIG. 3 is a flow chart illustrating a door lock control method according to an exemplary embodiment;
FIG. 4 is a flow chart illustrating a door lock control method according to an exemplary embodiment;
fig. 5 is a device frame diagram of an access control device according to the embodiment shown in fig. 4;
FIG. 6 is a flow chart illustrating a door lock control method according to an exemplary embodiment;
FIG. 7 is a block diagram illustrating a door lock control apparatus according to one exemplary embodiment;
FIG. 8 is a block diagram illustrating a door lock control apparatus according to one exemplary embodiment;
FIG. 9 is a block diagram illustrating a door lock control system according to an exemplary embodiment;
FIG. 10 is a block diagram illustrating an apparatus in accordance with an example embodiment.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The implementations described in the exemplary embodiments below are not intended to represent all implementations consistent with the present disclosure. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the present disclosure, as detailed in the appended claims.
It is to be understood that reference herein to "a number" means one or more and "a plurality" means two or more. "and/or" describes the association relationship of the associated objects, meaning that there may be three relationships, e.g., a and/or B, which may mean: a exists alone, A and B exist simultaneously, and B exists alone. The character "/" generally indicates that the former and latter associated objects are in an "or" relationship.
Fig. 1 is a schematic diagram of an implementation environment related to a door lock control method according to some exemplary embodiments, and as shown in fig. 1, the implementation environment may include: access control device 110 and terminal 120.
The access control device 110 may be a part of an entrance door or a unit door, or may be a control device installed corresponding to the entrance door or the unit door but independent of the entrance door or the unit door.
The access control device 110 may include an authentication information acquisition unit 112 and an identification information acquisition unit 114. The verification information collection unit 112 is configured to collect authority verification information of a visitor, and the access control device 110 may automatically verify that the visitor has no authority to open the door lock through the authority verification information, for example, the authority verification information may be at least one of a fingerprint, a voiceprint, an iris image, and a face image of the visitor, and correspondingly, the verification information collection unit 112 may be at least one of a fingerprint collection unit, a voiceprint collection unit, and a camera unit (configured to collect an iris image or a face image). The identification information collecting unit 114 is used for collecting identification information of the visitor, by which the owner can manually confirm the identity of the visitor, for example, the identification information may be at least one of a facial image (such as a dynamic video image or a still image) of the visitor and a voice of the visitor, and accordingly, the identification information collecting unit 114 may be at least one of a camera and a microphone.
Optionally, the access control device 110 may further include a display screen and/or a speaker (not shown in fig. 1) to facilitate a video or voice call between the visitor and the home owner.
The terminal 120 may be a portable smart terminal such as a smart phone, a tablet computer, an e-book reader, or the terminal 120 may also be a wearable smart terminal such as a smart watch, a smart bracelet, or smart glasses.
The access control device 110 and the terminal 120 may communicate with each other through a wired or wireless network. For example, the access control device 110 and the terminal 120 may be directly connected through a short-range wireless communication network, for example, directly communicate through communication modes such as bluetooth, ZigBee (ZigBee), UWB (Ultra Wideband), Home Radio Frequency (Home Radio Frequency), and Wi-Fi. Alternatively, the access control device 110 and the terminal 120 may access the server 130 in the internet, respectively, and perform indirect communication through the server 130 in the internet.
Fig. 2 is a flowchart illustrating a door lock control method according to an exemplary embodiment, and as shown in fig. 2, the door lock control method is applied to the access control device 110 in the implementation environment shown in fig. 1, and the method may include the following steps.
In step 201, the authorization verification information of the visitor is collected by the verification information collection unit.
In step 202, when it is verified that the visitor does not have the authority to open the door lock through the authentication information, the identification information of the visitor is collected through the identification information collecting unit.
In step 203, the identification information is sent to the terminal.
In step 204, when an unlocking instruction returned by the terminal is received, the door lock is controlled to be unlocked.
In summary, in the door lock control method provided by the embodiment of the present disclosure, the permission verification information of the visitor is collected by the verification information collection unit; when the visitor is verified to have no authority to open the door lock through the identity verification information, acquiring identity identification information of the visitor through an identification information acquisition unit; sending the identity identification information to the terminal; when an unlocking instruction returned by the terminal is received, the door lock is controlled to be opened, the access control equipment sends the identity identification information of the visitor to the terminal when verifying that the visitor does not have the unlocking right, and the owner sends the unlocking instruction through the terminal, so that the condition that the owner needs to determine that the visitor is unlocked every time the visitor visits is avoided, and unnecessary confirmation operation of the owner is simplified.
Fig. 3 is a flowchart illustrating a door lock control method according to an exemplary embodiment, which is applied to the terminal 120 in the implementation environment shown in fig. 1, as shown in fig. 3, and may include the following steps.
In step 301, identity information of a visitor sent by an access control device is received, where the identity information is collected and sent when the access control device verifies that the visitor does not have the authority to open a door lock according to authority verification information of the visitor.
In step 302, the identification information is presented.
In step 303, when an unlocking operation performed based on the identification information is received, an unlocking instruction is sent to the access control device, where the unlocking instruction is used to instruct the access control device to control the door lock to be opened.
In summary, according to the door lock control method provided in the embodiment of the present disclosure, when the door access device receives the permission verification information of the visitor collected by the verification information collection unit and verifies that the visitor does not have the permission to open the door lock, the identification information collection unit collects the identification information of the visitor and displays the identification information to the householder, and when an instruction for the householder to confirm unlocking is received, an unlocking instruction is sent to the door access device, thereby avoiding a situation that the householder needs to confirm that the door lock is unlocked every time the visitor visits, and simplifying unnecessary confirmation operations of the householder.
Fig. 4 is a flowchart illustrating a door lock control method according to an exemplary embodiment, which may be applied to the implementation environment shown in fig. 1, as shown in fig. 4, and which may include the following steps, as shown in fig. 4.
In step 401, the access control device collects the permission verification information of the visitor through the verification information collection unit.
The right verification information includes: at least one of a fingerprint, a voiceprint, an iris image, and a face image.
In the embodiment of the present disclosure, the access control device may be installed in an operation panel at a unit doorway in a building, or may be integrated with an entrance door. The access control device provides a verification information acquisition unit through which a visitor can input one or more of a fingerprint, a voiceprint, an iris image, and a face image.
Optionally, the embodiment of the present disclosure only takes the permission verification information as at least one of a fingerprint, a voiceprint, an iris image, and a facial image as an example, in practical applications, the permission verification information may further include other types of information as long as the information can be used by the access control device to identify the identity of the visitor, for example, the permission verification information may also be personal information of the visitor obtained from a resident identification card of the visitor through an identification card scanning device, or the permission verification information may also be human biological characteristic information such as ear characteristic information or eye surrounding characteristic information of the visitor. The embodiment of the present disclosure does not limit the type of the right verification information.
In step 402, the access control device determines whether the visitor has the right to open the door lock, if so, step 407 is performed, otherwise, step 403 is performed.
The access control device may verify whether the visitor has the right to open the door lock through the identity verification information, for example, the access control device may match the right verification information with at least one verification information template stored in advance to obtain a matching result, where the matching result may indicate whether the right verification information matches with one of the at least one verification information template, for example, when the matching result shows that the similarity between the right verification information and one of the at least one verification information template exceeds a certain similarity threshold, the right verification information may be considered to be matched with the template, the visitor is considered to have the right to open the door lock, and step 407 is entered; and when the matching result shows that the similarity between the authority verification information and any one template in the at least one verification information template does not exceed the similarity threshold, the visitor is considered not to have the authority to open the door lock, and the process goes to step 403.
The verification information template can be preset and corresponds to each user authorized to unlock.
In step 403, the access control device collects the identification information of the visitor through the identification information collection unit.
The identification information includes: at least one of an image or a voice.
In the embodiment of the present disclosure, the identification information may be information that other users (such as the owner of the user) can manually recognize the identity of the visitor through visual or auditory perception, such as a video or a still image of the visitor, or the voice of the visitor, etc.
In step 404, the access control device sends the identification information to the terminal.
Correspondingly, the terminal receives the identity identification information sent by the access control equipment.
The access control equipment can be connected with the terminal in advance, for example, when the terminal is located indoors, short-distance wireless connection such as Bluetooth or Wi-Fi direct connection can be established between the access control equipment and the terminal in advance; or, the access control device may also establish an indirect connection with the terminal in advance through a router or a server in the internet.
Alternatively, when a connection is not established between the access control device and the terminal in advance, the access control device may search for a connectable terminal and establish a connection in real time when it is detected that a visitor visits.
In step 405, the terminal presents the identification information.
In the embodiment of the disclosure, when the access control device judges that the visitor does not have the unlocking authority through the acquired authority verification information, the image and/or voice which can be manually distinguished by the householder are acquired, the acquired image and/or voice are sent to the terminal of the householder, and the terminal displays the acquired image and/or voice to the householder so that the householder can distinguish the identity of the visitor.
Wherein, when above-mentioned identification information can include image and pronunciation simultaneously, the image and the pronunciation of visitor can be gathered simultaneously to entrance guard's equipment to image and the pronunciation of gathering are sent for the terminal, for example, entrance guard's equipment can gather control picture and pronunciation and real-time transmission in front of the door for the terminal through camera and microphone, in order to realize the real time monitoring in front of the terminal side to the door, perhaps, also can put through two-way video conversation between entrance guard's equipment and the terminal.
Optionally, the access control device may also collect images (which may be dynamic video images or static images) of the visitors first, and send the images to the terminal, when the identity of the visitor cannot be distinguished by the owner through the images, the operation of obtaining voices may be performed on the terminal, at this time, the terminal sends a voice obtaining instruction to the access control device, the access control device collects voices of the visitors again and sends the voices to the terminal, and the voices are played to the owner by the terminal, for example, a voice call may be connected between the access control device and the terminal. Or the access control equipment can collect the voice of the visitor and send the voice to the terminal, the terminal plays the voice to the householder, when the householder cannot distinguish the identity of the visitor through the voice, the operation of obtaining the image can be executed on the terminal, the terminal sends an image obtaining instruction to the access control equipment at the moment, the access control equipment collects the image of the visitor again, sends the image to the terminal, and the terminal shows the image to the householder.
If the identification information only contains images or voices, the access control equipment only sends the acquired images or voices to the terminal, and the terminal displays the acquired images or voices to the householder.
In step 406, when the terminal receives an unlocking operation executed based on the identification information, an unlocking instruction is sent to the access control device.
Correspondingly, the entrance guard equipment receives an unlocking instruction returned by the terminal, and the unlocking instruction is used for indicating the entrance guard equipment to control the door lock to be opened.
In the embodiment of the disclosure, if the owner recognizes the identity of the visitor through the identity information displayed by the terminal and agrees to access the visitor, the unlocking operation may be performed in the terminal based on the displayed identity information, for example, the user may click a virtual or physical key in the terminal to perform the unlocking operation. And after the terminal detects the unlocking operation, an unlocking instruction is sent to the access control equipment.
In step 407, the access control device controls the door lock to open.
After the entrance guard equipment receives the unlocking instruction, the entrance guard equipment can control the entrance door or the mechanical lock on the unit door to unlock so that the visitor can enter the unit building or enter the room.
Optionally, in the scheme shown in the embodiment of the present disclosure, when sending the identity information to the terminal fails, or when receiving no feedback from the terminal within a preset time period after the identity information is successfully sent to the terminal, the access control device may store the collected identity information.
If the visitor visits, the access control equipment cannot establish connection with the terminal, or the access control equipment is successfully connected with the terminal but fails to send the identification information, or the access control equipment successfully sends the identification information to the terminal, but the owner does not check the identification information in time, the access control equipment can store the identification information so as to be provided for the owner to check the identification information later, for example, the owner can obtain the identification information of the stored visitor from the access control equipment through the terminal at a certain moment, or the owner can check the identification information of the visitor stored in the access control equipment through a display screen or a loudspeaker of the access control equipment, so that the visitor visits in time.
Optionally, when the identity information is unsuccessfully sent to the terminal, or when the feedback of the terminal is not received within a preset time period after the identity information is successfully sent to the terminal, the access control device may further control the doorbell to send out a ring tone.
For example, please refer to fig. 5, which shows a device frame diagram of an access control device according to an embodiment of the present disclosure, wherein the access control device 50 is installed in an entrance door and can be divided into a doorbell subsystem 51, an access control subsystem 52, a voice subsystem 53 and an electronic lock subsystem 54. The doorbell subsystem 51 comprises a doorbell 512, a fingerprint acquisition unit 514, a first control unit 516 and a fingerprint storage unit 518; the access control subsystem 52 comprises a second control unit 522, an image acquisition unit 524 (which may be a camera), a bluetooth communication unit 526 and a storage unit 528; the speech subsystem 53 comprises a speech unit 532 (which may be a microphone + speaker combination) and a third control unit 534; the electronic lock subsystem 54 includes a drive unit 542 and a mechanical lock 544.
Taking the access control device shown in fig. 5 as an example, a little a goes to a colleague and a little z has a serial door, the access control device is installed in the entrance door of the little z, the little a inputs its fingerprint in the fingerprint acquisition unit 514 of the access control device, the first control unit 516 matches the fingerprint input by the little a with the fingerprint template pre-stored in the fingerprint storage unit 518, if the fingerprint input by the little a matches with a certain fingerprint template pre-stored in the fingerprint storage unit 518, it is indicated that the fingerprint of the little a has been pre-entered into the access control device, at this time, the first control unit 516 determines that the little a has the unlocking authority, and sends an unlocking command to the driving unit 542 in the electronic lock subsystem 54, and the driving unit 542 controls the mechanical lock 544 to unlock so as to open the entrance door. If the input fingerprint of the xiao a does not match with each fingerprint template pre-stored in the fingerprint storage unit 518, the first control unit 516 determines that the xiao a has no unlocking authority, at this time, the first control unit 516 sends an instruction of visiting an unfamiliar visitor to the second control unit 522 in the access control system 52, the second control unit 522 checks whether the bluetooth communication unit 526 is connected with the mobile phone, if the terminal is not connected, the bluetooth communication unit 526 is instructed to search a default paired mobile phone (which can be a cell phone of the xiao z) for connection, meanwhile, the second control unit 522 controls the image acquisition unit 524 to acquire an image right in front of an entrance door, and sends the acquired image to the connected mobile phone through the bluetooth communication unit 526, the image transmitted by the access control device is played or displayed by the mobile phone, and after the xiao z looks up the image through the mobile phone, if the xiao a is in front of the door, then, an unlocking button displayed together with the image on the screen of the mobile phone is pressed, the mobile phone sends an unlocking instruction to the access control device, after the second control unit 522 detects the unlocking instruction, an unlocking instruction is sent to the driving unit 542, and the driving unit 542 controls the mechanical lock 544 to unlock. If the visitor is the small a, which cannot be identified by the image displayed by the mobile phone, the small z can press the voice button displayed together with the image in the mobile phone screen, and simultaneously ask the visitor in front of the door if the inquiry voice is entered, and after the small z releases the finger, the mobile phone sends the inquiry voice to the access control device, the second control unit 522 detects the inquiry voice, and sends the inquiry voice to the third control unit 534, the third control unit 534 controls the loudspeaker in the voice unit 532 to play the inquiry voice, and simultaneously starts the microphone in the voice unit 532, after the small a hears the inquiry voice, the small a can input the answer voice through the microphone to indicate the identity of the small a, after the answer voice is collected by the microphone by the third control unit 534, the answer voice is sent to the second control unit 522, and the second control unit 522 controls the bluetooth communication unit 526 to send the answer voice to the mobile phone, the mobile phone plays the answer voice, after confirming that the visitor is Xiao a through the answer voice, the Xiao z presses an unlocking button displayed together with the image in the mobile phone screen, the mobile phone sends an unlocking instruction to the access control device, after detecting the unlocking instruction, the second control unit 522 sends an unlocking instruction to the driving unit 542, and the driving unit 542 controls the mechanical lock 544 to unlock. If the access control device and the mobile phone of the small z are not connected through bluetooth (for example, the small z is not at home), or the small z is at home but does not pay attention to the image received by the mobile phone and cannot send any instruction through the mobile phone in time, at this time, the second control unit 522 may store the image acquired by the image acquisition unit 524 in the storage unit 528, and the second control unit 522 may also send an instruction to obtain a message to the third control unit 534, the third control unit 534 controls the voice unit 532 to prompt the small a to leave a message, acquires the message voice of the small a, sends the message voice to the second control unit 522, and the second control unit 522 stores the message voice in the storage unit 528. When the subsequent small z returns to home or notices the reminding of the visitor in the mobile phone, the image and the message voice in the storage unit 528 can be acquired by the mobile phone to check who the visitor visits.
In summary, in the door lock control method provided in the embodiment of the present disclosure, the access control device acquires the permission verification information of the visitor through the verification information acquisition unit; when the visitor is verified to have no authority to open the door lock through the identity verification information, acquiring identity identification information of the visitor through an identification information acquisition unit; sending the identity identification information to the terminal; when an unlocking instruction returned by the terminal is received, the door lock is controlled to be opened, the access control equipment sends the identity identification information of the visitor to the terminal when verifying that the visitor does not have the unlocking right, and the owner sends the unlocking instruction through the terminal, so that the condition that the owner needs to determine that the visitor is unlocked every time the visitor visits is avoided, and unnecessary confirmation operation of the owner is simplified.
In the scheme shown in the embodiment of the disclosure, at least one verification information template used for matching with the authority verification information can be input into the terminal by a user owner or other users, and is provided for the access control device by the terminal. The following embodiments of the present disclosure will be described taking the example where the terminal receives the authentication information template.
Fig. 6 is a flowchart illustrating a door lock control method according to another exemplary embodiment, which may be applied to the implementation environment illustrated in fig. 1, as illustrated in fig. 6, and which may include the following steps, as illustrated in fig. 6.
In step 601, the terminal receives at least one authentication information template entered in the terminal.
In the embodiment of the present disclosure, a terminal may be internally or externally connected with a collection unit similar to the verification information collection unit in the access control device, and the collection unit is configured to collect at least one verification information template. Alternatively, the at least one verification information template may also be transmitted to the terminal through wired or wireless data, for example, the terminal may receive the at least one verification information template transmitted by the network server or other terminal device through a wired or wireless data channel.
In step 602, the access control device collects the authority verification information of the visitor through the verification information collection unit.
The right verification information includes: at least one of a fingerprint, a voiceprint, an iris image, and a face image.
The process of acquiring the authorization verification information by the access control device may refer to the description in step 401 in the embodiment corresponding to fig. 4, and is not described herein again.
In step 603, the access control device matches the permission verification information with at least one verification information template to obtain a matching result.
In step 601, after the terminal acquires the at least one verification information template, the at least one verification information template may be provided to the access control device, the access control device stores the at least one verification information template, and after the subsequent access control device acquires the authority verification information of the visitor, the authority verification information is matched with the at least one verification information template acquired from the terminal in advance and stored, so as to obtain a matching result.
Or after the terminal acquires the at least one verification information template, the terminal may not provide the at least one information template to the access control device, after the access control device acquires the authority verification information of the visitor, the access control device sends a verification request containing the authority verification information to the terminal, the verification request is used for instructing the terminal to match the authority verification information with the at least one verification information template stored in the terminal, after the terminal matches the authority verification information with the at least one verification information template stored in the terminal to obtain a matching result, the matching result is returned to the access control device, and the access control device receives the matching result.
In step 604, the access control device determines whether the visitor has the right to open the door lock according to the matching result, if so, step 609 is performed, otherwise, step 605 is performed.
Wherein the matching result may indicate whether the permission verification information matches with one of the at least one verification information template, for example, when the matching result shows that the similarity between the permission verification information and one of the at least one verification information template exceeds a certain similarity threshold, the permission verification information may be considered to match with the template, the visitor is considered to have the permission to open the door lock, and step 609 is entered; when the matching result shows that the similarity between the permission verification information and any one template in the at least one verification information template does not exceed the similarity threshold, the visitor is considered not to have the permission to open the door lock, and then the step 605 is entered.
In step 605, the access control device collects the identification information of the visitor through the identification information collecting unit.
The identification information includes: at least one of an image or a voice.
In step 606, the access control device sends the identification information to the terminal.
Correspondingly, the terminal receives the identity identification information sent by the access control equipment.
In step 607, the terminal presents the identification information.
In step 608, when the terminal receives an unlocking operation executed based on the identification information, an unlocking instruction is sent to the access control device.
Correspondingly, the entrance guard equipment receives an unlocking instruction returned by the terminal, and the unlocking instruction is used for indicating the entrance guard equipment to control the door lock to be opened.
In step 609, the access control device controls the door lock to open.
The implementation process of steps 605 to 609 may refer to the description of steps 403 to 407 in the embodiment corresponding to fig. 4, and is not described herein again.
Optionally, in the scheme shown in the embodiment of the present disclosure, when sending the identity information to the terminal fails, or when receiving no feedback from the terminal within a preset time period after the identity information is successfully sent to the terminal, the access control device may store the collected identity information.
For example, taking the access control system shown in fig. 5 as an example, let xiaoz invite co-workers xiaoz to go to xiaoz home to participate in a party on weekend, let xiaoz enter the fingerprint in xiaoz's mobile phone, after xiaoz gets back to home, the mobile phone establishes bluetooth connection with the access control device, and transmits the fingerprint of xiaoz to the access control device, and the access control device stores in the fingerprint storage unit, when xiaoz arrives on weekend, the fingerprint is entered again in the fingerprint acquisition unit of the access control device, and after the access control device inquires that the fingerprint of local storage unit stores the matched fingerprint, the access control device directly unlocks to allow xiaoz to enter. Or the fingerprint of the small a can be only stored in the small z mobile phone, when the small a inputs the fingerprint again in the fingerprint acquisition unit of the access control device, the access control device sends the acquired fingerprint to the small z mobile phone, and the small z mobile phone informs the access control device to unlock after confirming the identity of the small a through fingerprint matching.
Or, the access control device may also include a network access unit (e.g., a Wi-Fi unit), the access control device accesses a server in the internet through the network access unit, and is indirectly connected to the mobile phone of the xiaoz through the server, in this case, after the xiaoz enters a fingerprint in the mobile phone of the xiaoz, the mobile phone of the xiaoz does not need to establish a bluetooth connection with the access control device, and the access control device may allow the xiaoz to enter. For example, little z has important article to fall at home, and little z has something to do at the company and can not leave again, can entrust little a to go to little z's family and take article this moment, and little a only need enter the fingerprint in little z's cell-phone, can be to unblank through entering the fingerprint again before the entrance guard's equipment. After receiving the fingerprint of the small a, the mobile phone of the small z can immediately send the fingerprint to the access control device through the server, or the mobile phone can also receive the fingerprint of the small a collected and sent by the access control device, match the fingerprint sent by the access control device with the fingerprint input by the small a in the mobile phone, and return a matching result.
In summary, in the door lock control method provided in the embodiment of the present disclosure, the access control device acquires the permission verification information of the visitor through the verification information acquisition unit; when the visitor is verified to have no authority to open the door lock through the identity verification information, acquiring identity identification information of the visitor through an identification information acquisition unit; sending the identity identification information to the terminal; when an unlocking instruction returned by the terminal is received, the door lock is controlled to be opened, the access control equipment sends the identity identification information of the visitor to the terminal when verifying that the visitor does not have the unlocking right, and the owner sends the unlocking instruction through the terminal, so that the condition that the owner needs to determine that the visitor is unlocked every time the visitor visits is avoided, and unnecessary confirmation operation of the owner is simplified.
In addition, according to the door lock control method provided by the embodiment of the disclosure, the at least one verification information template is acquired through the terminal, so that the access control device can match the authority verification information with the verification information template when acquiring the authority verification information, the acquisition way of the verification information template is increased, the use scene of access control verification is expanded, and the user experience is improved.
The following are embodiments of the disclosed apparatus that may be used to perform embodiments of the disclosed methods. For details not disclosed in the embodiments of the apparatus of the present disclosure, refer to the embodiments of the method of the present disclosure.
Fig. 7 is a block diagram illustrating a door lock control device according to an exemplary embodiment, and as shown in fig. 7, the door lock control device 70 may be implemented as all or part of the door access device 110 in the implementation environment shown in fig. 1 through hardware or a combination of hardware and software. The door lock control device 70 may include:
the verification information acquisition module 701 is used for acquiring the authority verification information of the visitor through the verification information acquisition unit;
an identification information collecting module 702, configured to collect, by an identification information collecting unit, identification information of the visitor when it is verified that the visitor does not have a right to open a door lock through the identification information;
an information sending module 703, configured to send the identity information to a terminal;
and the control module 704 is used for controlling the door lock to be opened when receiving an unlocking instruction returned by the terminal.
In summary, in the door lock control device provided in the embodiment of the present disclosure, the access control device acquires the permission verification information of the visitor through the verification information acquisition unit; when the visitor is verified to have no authority to open the door lock through the identity verification information, acquiring identity identification information of the visitor through an identification information acquisition unit; sending the identity identification information to the terminal; when an unlocking instruction returned by the terminal is received, the door lock is controlled to be opened, the access control equipment sends the identity identification information of the visitor to the terminal when verifying that the visitor does not have the unlocking right, and the owner sends the unlocking instruction through the terminal, so that the condition that the owner needs to determine that the visitor is unlocked every time the visitor visits is avoided, and unnecessary confirmation operation of the owner is simplified.
Fig. 8 is a block diagram illustrating a door lock control device according to an exemplary embodiment, and as shown in fig. 8, the door lock control device 80 may be implemented by hardware or a combination of hardware and software as all or part of the terminal 120 in the implementation environment shown in fig. 1. The door lock control device 80 may include:
the information receiving module 801 is configured to receive identity identification information of a visitor sent by an access control device, where the identity identification information is acquired and sent by the access control device when the access control device verifies that the visitor does not have the authority to open a door lock according to authority verification information of the visitor;
an information display module 802, configured to display the identity information;
and the instruction sending module 803 is configured to send an unlocking instruction to the access control device when receiving an unlocking operation executed based on the identification information, where the unlocking instruction is used to instruct the access control device to control the door lock to be opened.
In summary, the door lock control device provided in the embodiment of the present disclosure receives the access control device, when the access control device verifies that the visitor does not have the right to open the door lock through the right verification information of the visitor collected by the verification information collection unit, collects the identification information of the visitor through the identification information collection unit, and displays the identification information to the householder, and when receiving the instruction for confirming the unlocking by the householder, sends the unlocking instruction to the access control device, thereby avoiding the situation that the householder needs to confirm that the door lock is unlocked every time the visitor visits, and simplifying unnecessary confirmation operation of the householder.
Fig. 9 is a block diagram illustrating a door lock control system according to an exemplary embodiment, and as shown in fig. 9, the door lock control system may include an apparatus 70 and an apparatus 80, where the apparatus 70 may be implemented as all or part of the access control device 110 in the implementation environment shown in fig. 1 through hardware or a combination of hardware and software, and the apparatus 80 may be implemented as all or part of the terminal 120 in the implementation environment shown in fig. 1 through hardware or a combination of hardware and software. The door lock control system may include:
the apparatus 70 may include:
the verification information acquisition module 701 is used for acquiring the authority verification information of the visitor through the verification information acquisition unit;
an identification information collecting module 702, configured to collect, by an identification information collecting unit, identification information of the visitor when it is verified that the visitor does not have a right to open a door lock through the identification information;
an information sending module 703, configured to send the identity information to a terminal;
and the control module 704 is used for controlling the door lock to be opened when receiving an unlocking instruction returned by the terminal.
Optionally, the right verification information includes: at least one of a fingerprint, a voiceprint, an iris image, and a face image.
Optionally, the identification information includes: at least one of an image or a voice.
Optionally, the apparatus 70 further includes:
the storage module 705 is configured to store the identity information when the sending of the identity information to the terminal fails, or the feedback of the terminal is not received within a preset time period after the identity information is successfully sent to the terminal.
Optionally, the identification information collecting module 702 includes:
the matching sub-module 702a is configured to match the permission verification information with at least one verification information template to obtain a matching result;
the acquisition sub-module 702b is configured to acquire, by an identification information acquisition unit, identification information of the visitor when the matching result indicates that the permission verification information matches one of the at least one verification information template.
Optionally, the matching sub-module 702a is configured to match the permission verification information with the at least one verification information template that is obtained and stored from the terminal in advance, so as to obtain the matching result; or, the matching sub-module 702a is configured to send a verification request including the permission verification information to the terminal, where the verification request is used to instruct the terminal to match the permission verification information with the at least one verification information template stored in the terminal, and receive the matching result returned by the terminal.
The apparatus 80 may comprise:
the information receiving module 801 is configured to receive identity identification information of a visitor sent by an access control device, where the identity identification information is acquired and sent by the access control device when the access control device verifies that the visitor does not have the authority to open a door lock according to authority verification information of the visitor;
an information display module 802, configured to display the identity information;
and the instruction sending module 803 is configured to send an unlocking instruction to the access control device when receiving an unlocking operation executed based on the identification information, where the unlocking instruction is used to instruct the access control device to control the door lock to be opened.
Optionally, the apparatus 80 further comprises:
the template receiving module 804 is configured to receive at least one input verification information template before receiving the identification information of the visitor sent by the access control device.
Optionally, the apparatus 80 further includes a request receiving module 805, a matching module 806, and a result returning module 807, and/or the apparatus 80 further includes a template providing module 808:
a request receiving module 805, configured to receive, before receiving identity identification information of a visitor sent by an access control device, a verification request containing the permission verification information sent by the access control device;
a matching module 806, configured to match the permission verification information with the at least one verification information template;
a result returning module 807 for returning the matching result to the terminal.
A template providing module 808, configured to provide the at least one authentication information template to the access device.
In summary, in the door lock control system provided in the embodiment of the present disclosure, the access control device acquires the permission verification information of the visitor through the verification information acquisition unit; when the visitor is verified to have no authority to open the door lock through the identity verification information, acquiring identity identification information of the visitor through an identification information acquisition unit; sending the identity identification information to the terminal; when an unlocking instruction returned by the terminal is received, the door lock is controlled to be opened, the access control equipment sends the identity identification information of the visitor to the terminal when verifying that the visitor does not have the unlocking right, and the owner sends the unlocking instruction through the terminal, so that the condition that the owner needs to determine that the visitor is unlocked every time the visitor visits is avoided, and unnecessary confirmation operation of the owner is simplified.
In addition, the door lock control system provided by the embodiment of the disclosure acquires at least one verification information template through the terminal, so that the access control device can match the authority verification information with the verification information template when acquiring the authority verification information, thereby increasing the acquisition path of the verification information template, expanding the use scene of access control verification and improving the user experience.
An exemplary embodiment of the present disclosure provides a door lock control device capable of implementing a door lock control method provided by the present disclosure, the door lock control device including: a processor, a memory for storing processor-executable instructions;
wherein the processor is configured to:
acquiring authority verification information of the visitor through a verification information acquisition unit;
when the visitor does not have the authority of opening the door lock through the identity authentication information, acquiring the identity identification information of the visitor through an identification information acquisition unit;
sending the identity identification information to a terminal;
and when an unlocking instruction returned by the terminal is received, controlling the door lock to be unlocked.
Optionally, the right verification information includes: at least one of a fingerprint, a voiceprint, an iris image, and a face image.
Optionally, the identification information includes: at least one of an image or a voice.
Optionally, the processor is further configured to:
and when the identity identification information is failed to be sent to the terminal, or the feedback of the terminal is not received within a preset time period after the identity information is successfully sent to the terminal, storing the identity identification information.
Optionally, when it is verified that the visitor does not have the authority to open the door lock through the authentication information, acquiring, by an identification information acquisition unit, identification information of the visitor, including:
matching the authority verification information with at least one verification information template to obtain a matching result;
and when the matching result indicates that the permission verification information is matched with one of the at least one verification information template, executing the step of acquiring the identity identification information of the visitor by an identification information acquisition unit.
Optionally, the matching the authority verification information with at least one verification information template to obtain a matching result includes:
matching the authority verification information with the at least one verification information template which is obtained from the terminal in advance and stored to obtain the matching result; or,
sending a verification request containing the authority verification information to the terminal, wherein the verification request is used for indicating the terminal to match the authority verification information with the at least one verification information template stored in the terminal; and receiving the matching result returned by the terminal.
An exemplary embodiment of the present disclosure provides a door lock control device capable of implementing a door lock control method provided by the present disclosure, the door lock control device including: a processor, a memory for storing processor-executable instructions;
wherein the processor is configured to:
receiving identity identification information of a visitor sent by an access control device, wherein the identity identification information is acquired and sent when the access control device verifies that the visitor does not have the authority to open a door lock according to the authority verification information of the visitor;
displaying the identification information;
and when receiving unlocking operation executed based on the identity identification information, sending an unlocking instruction to the access control equipment, wherein the unlocking instruction is used for indicating the access control equipment to control the door lock to be opened.
Optionally, the processor is further configured to:
before receiving the identity identification information of the visitor sent by the access control equipment, receiving at least one input verification information template.
Optionally, the processor is further configured to:
before receiving identity identification information of a visitor sent by an access control device, receiving a verification request containing permission verification information sent by the access control device; matching the authority verification information with the at least one verification information template; returning a matching result to the terminal;
and/or providing the at least one verification information template to the access control device.
An exemplary embodiment of the present disclosure provides a door lock control system, including: entrance guard's equipment and terminal.
The access control device may be the access control device 110 in the implementation environment shown in fig. 1, and the access control device includes the door lock control device 70 shown in fig. 7 or fig. 9.
The terminal may be the terminal device 120 in the embodiment shown in fig. 1, and the door lock control device 80 shown in fig. 7 or fig. 9 is included in the terminal.
FIG. 10 is a block diagram illustrating an apparatus in accordance with an example embodiment. For example, the apparatus 1000 may be a mobile phone, a computer, a digital broadcast terminal, a messaging device, a game console, a tablet device, a medical device, a fitness device, a personal digital assistant, or a door access device, and the like, and the apparatus 1000 may be implemented as the door access device 110 or the terminal 120 of the implementation environment of fig. 1.
Referring to fig. 10, the apparatus 1000 may include one or more of the following components: processing component 1002, memory 1004, power component 1006, multimedia component 1008, audio component 1010, input/output (I/O) interface 1012, sensor component 1014, and communications component 1016.
The processing component 1002 generally controls the overall operation of the device 1000, such as operations associated with display, telephone calls, data communications, camera operations, and recording operations. The processing components 1002 may include one or more processors 1018 to execute instructions to perform all or a portion of the steps of the methods described above. Further, processing component 1002 may include one or more modules that facilitate interaction between processing component 1002 and other components. For example, the processing component 1002 may include a multimedia module to facilitate interaction between the multimedia component 1008 and the processing component 1002.
The memory 1004 is configured to store various types of data to support operations at the apparatus 1000. Examples of such data include instructions for any application or method operating on device 1000, contact data, phonebook data, messages, pictures, videos, and so forth. The memory 1004 may be implemented by any type or combination of volatile or non-volatile memory devices such as Static Random Access Memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable read-only memory (EPROM), programmable read-only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic or optical disks.
The power supply component 1006 provides power to the various components of the device 1000. The power components 1006 may include a power management system, one or more power supplies, and other components associated with generating, managing, and distributing power for the device 1000.
The multimedia component 1008 includes a screen that provides an output interface between the device 1000 and a user. In some embodiments, the screen may include a Liquid Crystal Display (LCD) and a Touch Panel (TP). If the screen includes a touch panel, the screen may be implemented as a touch screen to receive an input signal from a user. The touch panel includes one or more touch sensors to sense touch, slide, and gestures on the touch panel. The touch sensor may not only sense the boundary of a touch or slide action, but also detect the duration and pressure associated with the touch or slide operation. In some embodiments, the multimedia component 1008 includes a front facing camera and/or a rear facing camera. The front camera and/or the rear camera may receive external multimedia data when the device 1000 is in an operating mode, such as a shooting mode or a video mode. Each front camera and rear camera may be a fixed optical lens system or have a focal length and optical zoom capability.
The audio component 1010 is configured to output and/or input audio signals. For example, audio component 1010 includes a Microphone (MIC) configured to receive external audio signals when apparatus 1000 is in an operational mode, such as a call mode, a recording mode, and a voice recognition mode. The received audio signal may further be stored in the memory 1004 or transmitted via the communication component 1016. In some embodiments, audio component 1010 also includes a speaker for outputting audio signals.
I/O interface 1012 provides an interface between processing component 1002 and peripheral interface modules, which may be keyboards, click wheels, buttons, etc. These buttons may include, but are not limited to: a home button, a volume button, a start button, and a lock button.
The sensor assembly 1014 includes one or more sensors for providing various aspects of status assessment for the device 1000. For example, sensor assembly 1014 may detect an open/closed state of device 1000, the relative positioning of components, such as a display and keypad of device 1000, sensor assembly 1014 may also detect a change in position of device 1000 or a component of device 1000, the presence or absence of user contact with device 1000, orientation or acceleration/deceleration of device 1000, and a change in temperature of device 1000. The sensor assembly 1014 may include a proximity sensor configured to detect the presence of a nearby object without any physical contact. The sensor assembly 1014 may also include a light sensor, such as a CMOS or CCD image sensor, for use in imaging applications. In some embodiments, the sensor assembly 1014 may also include an acceleration sensor, a gyroscope sensor, a magnetic sensor, a pressure sensor, or a temperature sensor.
The communication component 1016 is configured to facilitate communications between the apparatus 1000 and other devices in a wired or wireless manner. The device 1000 may access a wireless network based on a communication standard, such as Wi-Fi, 2G, or 3G, or a combination thereof. In an exemplary embodiment, the communication component 1016 receives a broadcast signal or broadcast related information from an external broadcast management system via a broadcast channel. In an exemplary embodiment, the communications component 1016 further includes a Near Field Communication (NFC) module to facilitate short-range communications. For example, the NFC module may be implemented based on Radio Frequency Identification (RFID) technology, infrared data association (IrDA) technology, Ultra Wideband (UWB) technology, Bluetooth (BT) technology, and other technologies.
Optionally, the apparatus 1000 may further include a fingerprint collecting unit for collecting a fingerprint input by a user.
In an exemplary embodiment, the apparatus 1000 may be implemented by one or more Application Specific Integrated Circuits (ASICs), Digital Signal Processors (DSPs), Digital Signal Processing Devices (DSPDs), Programmable Logic Devices (PLDs), Field Programmable Gate Arrays (FPGAs), controllers, micro-controllers, microprocessors or other electronic components for performing all or part of the steps performed by the access control device or the terminal in any of the methods shown in fig. 2, 3, 4 or 6.
In an exemplary embodiment, a non-transitory computer readable storage medium comprising instructions, such as the memory 1004 comprising instructions, executable by the processor 1018 of the apparatus 1000 to perform all or part of the steps performed by the access device or terminal in the method of any of fig. 2, 3, 4 or 6, is also provided. For example, the non-transitory computer readable storage medium may be a ROM, a Random Access Memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, an optical data storage device, and the like.
Other embodiments of the disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the disclosure disclosed herein. This application is intended to cover any variations, uses, or adaptations of the disclosure following, in general, the principles of the disclosure and including such departures from the present disclosure as come within known or customary practice within the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the disclosure being indicated by the following claims.
It will be understood that the present disclosure is not limited to the precise arrangements described above and shown in the drawings and that various modifications and changes may be made without departing from the scope thereof. The scope of the present disclosure is limited only by the appended claims.

Claims (19)

1. A door lock control method, characterized in that the method comprises:
acquiring authority verification information of the visitor through a verification information acquisition unit;
when the visitor does not have the authority of opening the door lock through the identity authentication information, acquiring the identity identification information of the visitor through an identification information acquisition unit;
sending the identity identification information to a terminal;
and when an unlocking instruction returned by the terminal is received, controlling the door lock to be unlocked.
2. The method of claim 1, wherein the rights verification information comprises: at least one of a fingerprint, a voiceprint, an iris image, and a face image.
3. The method of claim 1, wherein the identification information comprises: at least one of an image or a voice.
4. The method of claim 1, further comprising:
and when the identity identification information is failed to be sent to the terminal, or the feedback of the terminal is not received within a preset time period after the identity information is successfully sent to the terminal, storing the identity identification information.
5. The method of claim 1, wherein collecting the identification information of the visitor through an identification information collecting unit when it is verified that the visitor does not have the authority to open the door lock through the identification information verifying unit comprises:
matching the authority verification information with at least one verification information template to obtain a matching result;
and when the matching result indicates that the permission verification information is matched with one of the at least one verification information template, executing the step of acquiring the identity identification information of the visitor by an identification information acquisition unit.
6. The method according to claim 5, wherein the matching the authority verification information with at least one verification information template to obtain a matching result comprises:
matching the authority verification information with the at least one verification information template which is obtained from the terminal in advance and stored to obtain the matching result;
or sending a verification request containing the authority verification information to the terminal, wherein the verification request is used for indicating the terminal to match the authority verification information with the at least one verification information template stored in the terminal; and receiving the matching result returned by the terminal.
7. A door lock control method, characterized in that the method comprises:
receiving identity identification information of a visitor sent by an access control device, wherein the identity identification information is acquired and sent when the access control device verifies that the visitor does not have the authority to open a door lock according to the authority verification information of the visitor;
displaying the identification information;
and when receiving unlocking operation executed based on the identity identification information, sending an unlocking instruction to the access control equipment, wherein the unlocking instruction is used for indicating the access control equipment to control the door lock to be opened.
8. The method of claim 7, further comprising:
before receiving the identity identification information of the visitor sent by the access control equipment, receiving at least one input verification information template.
9. The method of claim 8, further comprising:
before receiving identity identification information of a visitor sent by an access control device, receiving a verification request containing permission verification information sent by the access control device; matching the authority verification information with the at least one verification information template; returning a matching result to the terminal;
and/or providing the at least one verification information template to the access control device.
10. A door lock control apparatus, characterized in that the apparatus comprises:
the verification information acquisition module is used for acquiring the authority verification information of the visitor through the verification information acquisition unit;
the identification information acquisition module is used for acquiring the identification information of the visitor through an identification information acquisition unit when the visitor is verified to have no authority of opening the door lock through the identification information;
the information sending module is used for sending the identity identification information to the terminal;
and the control module is used for controlling the door lock to be opened when receiving the unlocking instruction returned by the terminal.
11. The apparatus of claim 10, wherein the rights verification information comprises: at least one of a fingerprint, a voiceprint, an iris image, and a face image.
12. The apparatus of claim 10, wherein the identification information comprises: at least one of an image or a voice.
13. The apparatus of claim 10, further comprising:
and the storage module is used for storing the identity recognition information when the identity recognition information fails to be sent to the terminal or the feedback of the terminal is not received within a preset time period after the identity recognition information is successfully sent to the terminal.
14. The apparatus of claim 10, wherein the identification information collection module comprises:
the matching submodule is used for matching the authority verification information with at least one verification information template to obtain a matching result;
and the acquisition submodule is used for acquiring the identity identification information of the visitor through an identification information acquisition unit when the matching result indicates that the authority verification information is matched with one of the at least one verification information template.
15. The apparatus of claim 14,
the matching sub-module is used for matching the authority verification information with the at least one verification information template which is acquired from the terminal in advance and stored to acquire the matching result;
or, the matching sub-module is configured to send a verification request including the permission verification information to the terminal, where the verification request is used to instruct the terminal to match the permission verification information with the at least one verification information template stored in the terminal, and receive the matching result returned by the terminal.
16. A door lock control apparatus, characterized in that the apparatus comprises:
the system comprises an information receiving module, a door lock unlocking module and a door lock unlocking module, wherein the information receiving module is used for receiving identity identification information of a visitor, which is sent by door control equipment, and the identity identification information is acquired and sent when the door control equipment verifies that the visitor does not have the authority to unlock the door lock according to authority verification information of the visitor;
the information display module is used for displaying the identity identification information;
and the instruction sending module is used for sending an unlocking instruction to the access control equipment when receiving unlocking operation executed based on the identity identification information, and the unlocking instruction is used for indicating the access control equipment to control the door lock to be opened.
17. The apparatus of claim 16, further comprising:
the template receiving module is used for receiving at least one input verification information template before receiving the identity identification information of the visitor sent by the access control equipment.
18. The apparatus according to claim 17, wherein the apparatus further comprises a request receiving module, a matching module and a result returning module, and/or the apparatus further comprises a template providing module;
the request receiving module is used for receiving a verification request containing the permission verification information sent by the access control equipment before receiving the identity identification information of the visitor sent by the access control equipment;
the matching module is used for matching the authority verification information with the at least one verification information template;
the result returning module is used for returning the matching result to the terminal;
the template providing module is used for providing the at least one verification information template for the access control equipment.
19. A door lock control system, characterized in that the door lock control system comprises: access control equipment and a terminal;
the door lock control device of any one of claims 10 to 15 is contained in the access control equipment;
the terminal includes a door lock control device as claimed in any one of claims 16 to 18.
CN201611034980.2A 2016-11-09 2016-11-09 Control method for door lock, apparatus and system Pending CN106504390A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611034980.2A CN106504390A (en) 2016-11-09 2016-11-09 Control method for door lock, apparatus and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611034980.2A CN106504390A (en) 2016-11-09 2016-11-09 Control method for door lock, apparatus and system

Publications (1)

Publication Number Publication Date
CN106504390A true CN106504390A (en) 2017-03-15

Family

ID=58328323

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611034980.2A Pending CN106504390A (en) 2016-11-09 2016-11-09 Control method for door lock, apparatus and system

Country Status (1)

Country Link
CN (1) CN106504390A (en)

Cited By (41)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107193267A (en) * 2017-07-11 2017-09-22 合肥众磊信息科技有限公司 A kind of intelligent building project monitor and control management system
CN107341390A (en) * 2017-06-30 2017-11-10 深圳前海弘稼科技有限公司 Monitoring information calling method and system and planting equipment
CN107610306A (en) * 2017-10-26 2018-01-19 国网黑龙江省电力有限公司信息通信公司 A kind of computer room gate control system and the control method for entering computer room
CN107767502A (en) * 2017-09-25 2018-03-06 南京律智诚专利技术开发有限公司 Visitor's house lead in system based on Internet of Things
CN107845177A (en) * 2017-12-18 2018-03-27 信利光电股份有限公司 A kind of auth method, device, equipment and computer-readable recording medium
CN107862776A (en) * 2017-12-05 2018-03-30 北京数码视讯软件技术发展有限公司 A kind of gate control system
CN107978042A (en) * 2017-11-24 2018-05-01 移康智能科技(上海)股份有限公司 The method for unlocking and intelligent door lock system of a kind of intelligent door lock
CN108038950A (en) * 2017-12-27 2018-05-15 上海京颐科技股份有限公司 For the Door-access control method and device in ward, storage medium, terminal
CN108053536A (en) * 2017-12-27 2018-05-18 上海京颐科技股份有限公司 For the Door-access control method and device in ward, storage medium, terminal
CN108460874A (en) * 2018-03-14 2018-08-28 深圳励飞科技有限公司 Access control management method, device, terminal and storage medium
CN108495081A (en) * 2018-02-09 2018-09-04 青岛海尔智能家电科技有限公司 A kind of monitoring method and building doorway machine, server, terminal of building gate inhibition
CN108550201A (en) * 2018-03-05 2018-09-18 珠海格力电器股份有限公司 Access control management method and corresponding access control system
CN108734818A (en) * 2017-04-25 2018-11-02 北京猎户星空科技有限公司 Gate inhibition's operating method, device, terminal device and server
CN109035539A (en) * 2018-10-30 2018-12-18 四川洪诚电气科技有限公司 access control system
CN109064609A (en) * 2018-08-13 2018-12-21 长虹美菱股份有限公司 The linked system of intelligent refrigerator and access control equipment
CN109118632A (en) * 2018-09-26 2019-01-01 上海与德科技有限公司 access control method, device, equipment and storage medium
CN109285259A (en) * 2018-09-21 2019-01-29 上海箴安建筑设计咨询中心 A kind of control system and its control method for intelligent entrance guard
CN109300203A (en) * 2018-08-17 2019-02-01 奇酷互联网络科技(深圳)有限公司 Mobile terminal and unlocking method, device
CN109326016A (en) * 2018-07-18 2019-02-12 广东工业大学 A kind of long-distance intelligent access control device and control method based on Cloud Server
CN109345676A (en) * 2018-11-27 2019-02-15 奇瑞汽车股份有限公司 Vehicle safe box and its control method, device
CN109472897A (en) * 2018-10-31 2019-03-15 银河水滴科技(北京)有限公司 Entrance guard identification method and device
CN109658579A (en) * 2019-02-28 2019-04-19 中新智擎科技有限公司 A kind of access control method, system, equipment and storage medium
CN109803061A (en) * 2018-12-04 2019-05-24 厦门中控智慧信息技术有限公司 Building gate control system and its communication means, gate inhibition's outdoor unit
CN109920106A (en) * 2019-02-18 2019-06-21 云南电网有限责任公司文山供电局 Channel dynamic gate system and method based on 4G/5G
CN109949466A (en) * 2019-04-28 2019-06-28 桂林微网互联信息技术有限公司 A kind of intelligent entrance guard control system and method
CN110349313A (en) * 2019-07-09 2019-10-18 江苏万贝科技有限公司 A kind of tele-control system and method based on Fingerprint Lock
CN110363892A (en) * 2019-07-08 2019-10-22 江苏橙贝科技有限公司 The protection system and method for intelligent fingerprint lock
CN110443912A (en) * 2018-05-02 2019-11-12 深圳吉祥星科技股份有限公司 A kind of access control management method, device and terminal device
CN111145391A (en) * 2018-11-05 2020-05-12 赵青贺 Door lock control method and device
CN111275866A (en) * 2020-02-20 2020-06-12 佳乐科技有限责任公司 Access control system with body temperature detection function
CN111273556A (en) * 2020-01-19 2020-06-12 珠海格力电器股份有限公司 Household control method and device and door lock
CN111343433A (en) * 2020-03-17 2020-06-26 南通感创电子科技有限公司 Safety wisdom building video monitor system based on thing networking
CN111415448A (en) * 2019-12-20 2020-07-14 阿里巴巴集团控股有限公司 Access control system, method and device and intelligent sound box
CN111445612A (en) * 2020-04-02 2020-07-24 北京声智科技有限公司 Unlocking method, control equipment, electronic equipment and access control system
CN111583484A (en) * 2020-04-02 2020-08-25 北京声智科技有限公司 Device control method, device, electronic device and computer-readable storage medium
CN111696230A (en) * 2020-06-09 2020-09-22 歌尔科技有限公司 Intelligent door lock control method and system
CN111862411A (en) * 2020-07-10 2020-10-30 广州博冠智能科技有限公司 Intelligent household door lock control method, device, equipment and storage medium
CN111951452A (en) * 2020-08-24 2020-11-17 合肥优恩物联网科技有限公司 Thousand people thousand faces information push cloud platform based on entrance guard video information gathers
CN113467388A (en) * 2020-07-14 2021-10-01 青岛海信电子产业控股股份有限公司 Intelligent household equipment control method and control equipment and intelligent household equipment
CN113645344A (en) * 2021-10-14 2021-11-12 北京创米智汇物联科技有限公司 Message processing method, device and storage medium
CN114550350A (en) * 2022-02-17 2022-05-27 珠海格力电器股份有限公司 Method and device for unlocking door lock, electronic equipment and storage medium

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101043400A (en) * 2006-01-09 2007-09-26 三星电子株式会社 Access authentication system and method using smart communicator
CN101751707A (en) * 2008-12-22 2010-06-23 上海乐金广电电子有限公司 Camera and system using camera to control electronic door
CN101833804A (en) * 2010-04-30 2010-09-15 中山大学 Access control system with remote identity authentication
US8164614B2 (en) * 2002-10-15 2012-04-24 Revolutionary Concepts, Inc. Communication and monitoring system
CN103489243A (en) * 2013-09-29 2014-01-01 西安祥泰软件设备系统有限责任公司 Intelligent lock with image collection function and control method of intelligent lock
CN104484929A (en) * 2014-12-22 2015-04-01 唐玉勇 Novel community safety application system and implementing method
CN104715528A (en) * 2015-03-05 2015-06-17 福建新大陆通信科技股份有限公司 Set top box-based household access control system
CN105447928A (en) * 2014-08-29 2016-03-30 青岛海尔智能家电科技有限公司 Entrance guard control method and control system thereof

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8164614B2 (en) * 2002-10-15 2012-04-24 Revolutionary Concepts, Inc. Communication and monitoring system
CN101043400A (en) * 2006-01-09 2007-09-26 三星电子株式会社 Access authentication system and method using smart communicator
CN101751707A (en) * 2008-12-22 2010-06-23 上海乐金广电电子有限公司 Camera and system using camera to control electronic door
CN101833804A (en) * 2010-04-30 2010-09-15 中山大学 Access control system with remote identity authentication
CN103489243A (en) * 2013-09-29 2014-01-01 西安祥泰软件设备系统有限责任公司 Intelligent lock with image collection function and control method of intelligent lock
CN105447928A (en) * 2014-08-29 2016-03-30 青岛海尔智能家电科技有限公司 Entrance guard control method and control system thereof
CN104484929A (en) * 2014-12-22 2015-04-01 唐玉勇 Novel community safety application system and implementing method
CN104715528A (en) * 2015-03-05 2015-06-17 福建新大陆通信科技股份有限公司 Set top box-based household access control system

Cited By (47)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108734818A (en) * 2017-04-25 2018-11-02 北京猎户星空科技有限公司 Gate inhibition's operating method, device, terminal device and server
CN107341390A (en) * 2017-06-30 2017-11-10 深圳前海弘稼科技有限公司 Monitoring information calling method and system and planting equipment
CN107193267A (en) * 2017-07-11 2017-09-22 合肥众磊信息科技有限公司 A kind of intelligent building project monitor and control management system
CN107767502A (en) * 2017-09-25 2018-03-06 南京律智诚专利技术开发有限公司 Visitor's house lead in system based on Internet of Things
CN107610306A (en) * 2017-10-26 2018-01-19 国网黑龙江省电力有限公司信息通信公司 A kind of computer room gate control system and the control method for entering computer room
CN107978042A (en) * 2017-11-24 2018-05-01 移康智能科技(上海)股份有限公司 The method for unlocking and intelligent door lock system of a kind of intelligent door lock
CN107862776A (en) * 2017-12-05 2018-03-30 北京数码视讯软件技术发展有限公司 A kind of gate control system
CN107845177A (en) * 2017-12-18 2018-03-27 信利光电股份有限公司 A kind of auth method, device, equipment and computer-readable recording medium
CN108038950A (en) * 2017-12-27 2018-05-15 上海京颐科技股份有限公司 For the Door-access control method and device in ward, storage medium, terminal
CN108053536A (en) * 2017-12-27 2018-05-18 上海京颐科技股份有限公司 For the Door-access control method and device in ward, storage medium, terminal
CN108495081A (en) * 2018-02-09 2018-09-04 青岛海尔智能家电科技有限公司 A kind of monitoring method and building doorway machine, server, terminal of building gate inhibition
CN108550201A (en) * 2018-03-05 2018-09-18 珠海格力电器股份有限公司 Access control management method and corresponding access control system
CN108460874A (en) * 2018-03-14 2018-08-28 深圳励飞科技有限公司 Access control management method, device, terminal and storage medium
WO2019174361A1 (en) * 2018-03-14 2019-09-19 深圳励飞科技有限公司 Access control management method and apparatus, and terminal and storage medium
CN110443912A (en) * 2018-05-02 2019-11-12 深圳吉祥星科技股份有限公司 A kind of access control management method, device and terminal device
CN109326016A (en) * 2018-07-18 2019-02-12 广东工业大学 A kind of long-distance intelligent access control device and control method based on Cloud Server
CN109064609A (en) * 2018-08-13 2018-12-21 长虹美菱股份有限公司 The linked system of intelligent refrigerator and access control equipment
CN109300203A (en) * 2018-08-17 2019-02-01 奇酷互联网络科技(深圳)有限公司 Mobile terminal and unlocking method, device
CN109285259A (en) * 2018-09-21 2019-01-29 上海箴安建筑设计咨询中心 A kind of control system and its control method for intelligent entrance guard
CN109285259B (en) * 2018-09-21 2023-10-31 上海学敬会展服务中心 Control system for intelligent access control and control method thereof
CN109118632A (en) * 2018-09-26 2019-01-01 上海与德科技有限公司 access control method, device, equipment and storage medium
CN109118632B (en) * 2018-09-26 2021-11-23 昆山品源知识产权运营科技有限公司 Access control method, device, equipment and storage medium
CN109035539A (en) * 2018-10-30 2018-12-18 四川洪诚电气科技有限公司 access control system
CN109472897A (en) * 2018-10-31 2019-03-15 银河水滴科技(北京)有限公司 Entrance guard identification method and device
CN111145391A (en) * 2018-11-05 2020-05-12 赵青贺 Door lock control method and device
CN109345676A (en) * 2018-11-27 2019-02-15 奇瑞汽车股份有限公司 Vehicle safe box and its control method, device
CN109803061A (en) * 2018-12-04 2019-05-24 厦门中控智慧信息技术有限公司 Building gate control system and its communication means, gate inhibition's outdoor unit
CN109920106A (en) * 2019-02-18 2019-06-21 云南电网有限责任公司文山供电局 Channel dynamic gate system and method based on 4G/5G
CN109658579A (en) * 2019-02-28 2019-04-19 中新智擎科技有限公司 A kind of access control method, system, equipment and storage medium
CN109949466A (en) * 2019-04-28 2019-06-28 桂林微网互联信息技术有限公司 A kind of intelligent entrance guard control system and method
CN110363892A (en) * 2019-07-08 2019-10-22 江苏橙贝科技有限公司 The protection system and method for intelligent fingerprint lock
CN110349313B (en) * 2019-07-09 2021-09-21 江苏万贝科技有限公司 Remote control system and method based on fingerprint lock
CN110349313A (en) * 2019-07-09 2019-10-18 江苏万贝科技有限公司 A kind of tele-control system and method based on Fingerprint Lock
CN111415448A (en) * 2019-12-20 2020-07-14 阿里巴巴集团控股有限公司 Access control system, method and device and intelligent sound box
CN111273556A (en) * 2020-01-19 2020-06-12 珠海格力电器股份有限公司 Household control method and device and door lock
CN111273556B (en) * 2020-01-19 2024-03-26 珠海格力电器股份有限公司 Household control method and device and door lock
CN111275866A (en) * 2020-02-20 2020-06-12 佳乐科技有限责任公司 Access control system with body temperature detection function
CN111343433A (en) * 2020-03-17 2020-06-26 南通感创电子科技有限公司 Safety wisdom building video monitor system based on thing networking
CN111583484A (en) * 2020-04-02 2020-08-25 北京声智科技有限公司 Device control method, device, electronic device and computer-readable storage medium
CN111445612A (en) * 2020-04-02 2020-07-24 北京声智科技有限公司 Unlocking method, control equipment, electronic equipment and access control system
CN111696230A (en) * 2020-06-09 2020-09-22 歌尔科技有限公司 Intelligent door lock control method and system
CN111862411A (en) * 2020-07-10 2020-10-30 广州博冠智能科技有限公司 Intelligent household door lock control method, device, equipment and storage medium
CN113467388A (en) * 2020-07-14 2021-10-01 青岛海信电子产业控股股份有限公司 Intelligent household equipment control method and control equipment and intelligent household equipment
CN111951452A (en) * 2020-08-24 2020-11-17 合肥优恩物联网科技有限公司 Thousand people thousand faces information push cloud platform based on entrance guard video information gathers
CN113645344A (en) * 2021-10-14 2021-11-12 北京创米智汇物联科技有限公司 Message processing method, device and storage medium
CN113645344B (en) * 2021-10-14 2022-01-07 北京创米智汇物联科技有限公司 Message processing method, device and storage medium
CN114550350A (en) * 2022-02-17 2022-05-27 珠海格力电器股份有限公司 Method and device for unlocking door lock, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
CN106504390A (en) Control method for door lock, apparatus and system
US10123196B2 (en) Method and device for alarm triggering
CN110675539B (en) Identity verification method and device, electronic equipment and storage medium
CN105847243B (en) Method and device for accessing intelligent camera
CN105468767B (en) Card information acquisition methods and device
CN104065836A (en) Method and device for monitoring calls
CN113386129B (en) Service robot and safety interaction device
CN111489464A (en) Identity verification method and device, electronic equipment and computer readable storage medium
US10856043B2 (en) Simultaneous motion of users to trigger establishment of network communications channel
CN104282064B (en) Gate inhibition's answer method and device
CN104602204A (en) Visitor informing method and device
CN109407528A (en) Safety access method, device, server and storage medium
CN110992562A (en) Access control method and device, electronic equipment and storage medium
CN107733872B (en) Information printing method and device
CN107783715A (en) Using startup method and device
CN103986840A (en) Method and device for controlling conversation information
JP2009100334A (en) Apparatus and mobile terminal for dealing with visitor, and system therefor
CN104378596B (en) A kind of method and device carrying out distance communicating with picture pick-up device
CN111028835A (en) Resource replacement method, device, system and computer readable storage medium
CN112053486A (en) Access control method, device and system and electronic equipment
CN106896917B (en) Method and device for assisting user in experiencing virtual reality and electronic equipment
CN107911380A (en) Auth method and device
CN111091384A (en) Resource replacement method, device, system and computer readable storage medium
CN111541922A (en) Method, device and storage medium for displaying interface input information
CN109785469A (en) Access control equipment control method and system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20170315

RJ01 Rejection of invention patent application after publication