CN107316356A - Control locking method and central lock system - Google Patents
Control locking method and central lock system Download PDFInfo
- Publication number
- CN107316356A CN107316356A CN201610266227.XA CN201610266227A CN107316356A CN 107316356 A CN107316356 A CN 107316356A CN 201610266227 A CN201610266227 A CN 201610266227A CN 107316356 A CN107316356 A CN 107316356A
- Authority
- CN
- China
- Prior art keywords
- user
- information
- verification mode
- identification information
- verification
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00563—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys using personal physical data of the operator, e.g. finger prints, retinal images, voicepatterns
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Lock And Its Accessories (AREA)
Abstract
The invention provides one kind control locking method and central lock system, wherein, control locking method includes:After the control lock instruction of terminal transmission is got, the user identification information in parsing control lock instruction;Judge whether user identification information matches with pre-set user identity identification information;When judging that user identification information is matched with pre-set user identity identification information, determine that control lock instructs corresponding verification mode according to the safe class for the type of items for depositing in electrical control cubicles in advance, and after according to verification mode to control lock command verification success, perform control lock instruction.By technical solution of the present invention, verification mode is determined by the safe class according to the type of items deposited in advance in electrical control cubicles, the possibility that user misoperation causes any property loss is reduced, improves the security of remote Program-controlled lock, improve the usage experience of user.
Description
Technical field
The present invention relates to field of intelligent control technology, in particular to one kind control locking method and one kind
Central lock system.
Background technology
In the related art, remote Program-controlled lock instruction is sent by terminals such as mobile phones to replace to the straight of electrical control cubicles
Connect touch control operation, to open electrical control cubicles, not only being customized operation it is interactive, be greatly reduced
Running cost and the reliability for improving user identity identification, can also be real for logistics field
When receive logistics change information and physical state information.
But, because control lock operation is carried out not in electrical control cubicles, as user because maloperation is triggered out
Lock instruction and terminal user not door body it is neighbouring when, it is possible to property is suffered a loss, verify
Mode is relatively simple.
Therefore, a kind of new control lock scheme how is designed, further to improve the peace of control electrical control cubicles
Full property turns into technical problem urgently to be resolved hurrily.
The content of the invention
The present invention is based at least one above-mentioned technical problem, it is proposed that a kind of new control lock scheme,
Pass through the user identification information in the control lock instruction of terminal transmission is judged and the knowledge of pre-set user identity
It is further true according to the safe class for the type of items deposited in advance in electrical control cubicles after other information matches
Determine verification mode, determine to test by the safe class according to the type of items deposited in advance in electrical control cubicles
Card mode, reduces the possibility that user misoperation causes any property loss, improves the peace of remote Program-controlled lock
Quan Xing, improves the usage experience of user.
In view of this, the present invention proposes a kind of control locking method, including:Getting terminal transmission
After control lock instruction, the user identification information in parsing control lock instruction;Judge that user identity identification is believed
Whether breath matches with pre-set user identity identification information;Judging user identification information and default use
It is true according to the safe class for the type of items for depositing in electrical control cubicles in advance during the identity identification information matching of family
Fixed control lock instructs corresponding verification mode, and after according to verification mode to control lock command verification success,
Perform control lock instruction.
In the technical scheme, by judging the user identity identification controlled during lock is instructed that terminal is sent
After information is matched with pre-set user identity identification information, further basis is deposited in electrical control cubicles in advance
The safe class of type of items determines verification mode, by according to the article deposited in advance in electrical control cubicles
The safe class of type determines verification mode, reduces the possibility that user misoperation causes any property loss
Property, the security of remote Program-controlled lock is improved, the usage experience of user is improved.
Specifically, control lock instruction include control unlock, control lock, set password, Modify password,
And the operation such as authorizing, the type of items of storage is different, and Item Value is different, corresponding safe class
Also it is just different.For example, when safe class is higher, the terminal user only specified, which just has permission, to hold
Row control lock operation, can now be entered by the characteristic information of acquisition terminal user with default characteristic information
Row is compared, to determine that control lock instruction is sent by the terminal user with operating right.And when safety etc.
Level than it is relatively low when, directly can set up near-field communication by terminal and electrical control cubicles and be connected and be verified,
As long as now ensureing that terminal user can perform control lock instruction in the range of it can set up near-field communication.
In the above-mentioned technical solutions, it is preferable that judging user identification information and pre-set user body
During part identification information matching, determined to control according to the safe class for the type of items for depositing in electrical control cubicles in advance
The corresponding verification mode of lock instruction, and after according to verification mode to control lock command verification success, perform
Control lock instruction, specifically includes following steps:Judging user identification information and pre-set user identity
Identification information is matched, and when being the first safe class according to the safe class of the type of items prestored, really
Verification mode is determined for the first verification mode;The characteristic information of user is gathered according to the first verification mode;Sentence
Whether the characteristic information of disconnected user matches with default characteristic information;Judge user characteristic information with
During default characteristic information matching, control lock instruction is performed, wherein, the characteristic information of user includes user
With the distance between electrical control cubicles information, the vocal print feature information of user, the fingerprint feature information of user and
At least one of image feature information of user.
In the technical scheme, when the safe class of the type of items prestored is the first safe class,
It is the first verification mode to determine corresponding verification mode, by the characteristic information for the user for judging to collect
When being matched with default characteristic information perform control lock instruction, namely by electrical control cubicles directly gather checking letter
The verification mode of authentication verification process is ceased and completed, the validity of control lock instruction is improved, improves control
The security of lock scheme.
Such as when the characteristic information of user is the distance between terminal user and electrical control cubicles information, pass through
Determine whether the distance between terminal user and electrical control cubicles information is less than or equal to pre-determined distance threshold value and comes true
It is fixed whether to perform control lock instruction, specifically, GPS (Global Positioning can be passed through
System, global positioning system) the distance between user and electrical control cubicles information is determined, it can also pass through
The signal intensity of the control lock instruction received determines the distance between user and electrical control cubicles information.For example,
When detecting the distance between terminal user and electrical control cubicles information less than or equal to pre-determined distance threshold value,
Assuming that pre-determined distance threshold value is 20 meters, show terminal user in the range of 20 meters of electrical control cubicles, this
When control electric control lock in relay close with control switch control lock open, on the one hand save user's
Operating time, on the other hand verified by entering row distance, improve the validity of control lock instruction, also carry
The high security of control lock scheme.
When it is determined that the characteristic information of user is vocal print feature information, by the vocal print feature for detecting user
Information whether with default vocal print feature information matches come determine whether perform control lock instruction, Application on Voiceprint Recognition
Including (Text-Independent) two kinds of identifications that text related (Text-Dependent) and text are unrelated
Mode, requires that user pronounces according to the content of regulation with the Voiceprint Recognition System of text dependent, and recognizes
When must also pronounce by defined content, such as after user identification information is verified, terminal
The content of interface display " opening No. 22 electrical control cubicles ", user reads aloud above-mentioned display content, electricity
Control cabinet collect user read aloud information and confirm read aloud information with it is default read aloud information it is consistent when, table
The bright user, which is authorized to, sends control lock instruction, now i.e. executable control lock instruction, and unrelated with text
Identifying system does not provide the pronunciation content of speaker then, and only whether the voiceprint of detection user is with prestoring
Voiceprint matching, if the voiceprint for detecting user is matched with the voiceprint prestored,
Then show that the user possesses the authority for sending control lock instruction, now i.e. executable control lock instruction.
When the characteristic information of user is fingerprint feature information, by the fingerprint feature information for detecting user
Whether match to determine whether to perform control lock instruction with default fingerprint feature information, by being arranged on electricity
Control the fingerprint that the finger print acquisition module on cabinet gathers user, when detect the fingerprint feature information of user with
During default fingerprint feature information matching, show that the user has operating right, now i.e. executable control
Lock instruction.
When the characteristic information of user is the image feature information of user, by detecting that the image of user is special
Whether reference breath matches to determine whether to perform control lock instruction with default image feature information, specifically
, image capture module is set in electrical control cubicles, the image feature information of user is gathered, when collecting
User image feature information and default Image Feature Matching when, now perform control lock instruction, carry
The high security of control lock process.
In the above-mentioned technical solutions, it is preferable that judging user identification information and pre-set user body
During part identification information matching, determined to control according to the safe class for the type of items for depositing in electrical control cubicles in advance
The corresponding verification mode of lock instruction, and after according to verification mode to control lock command verification success, perform
Control lock instruction, it is specific further comprising the steps of:Judging user identification information and pre-set user body
Part identification information matching, and when being the second safe class according to the safe class of the type of items prestored,
It is the second verification mode to determine verification mode;Checking instruction is sent to terminal according to the second verification mode,
To pass through terminal notifying user's validation information;Obtain the checking information of terminal feedback;Judge terminal
Whether the checking information of feedback matches with default checking information;Judging the checking information of terminal feedback
When being matched with default checking information, control lock instruction is performed, wherein, checking information is inputted including user
To the character checking information of terminal, touch control operation checking information, speech verification information and face verification letter
At least one of breath.
In the technical scheme, when the safe class of the type of items prestored is the second safe class,
It is the second verification mode to determine corresponding verification mode, and it is anti-to send receiving terminal after checking instruction to terminal
The checking information of feedback, is performed when the checking information for judging terminal feedback is matched with default checking information
Control lock instruction, realizes and is sent after gathering checking information by terminal to electrical control cubicles to complete verification process
Verification mode, enhance the interactive of terminal and electrical control cubicles, improve the security of control lock process.
Specifically, checking information can be that user is inputted to the character checking information of terminal, such as user
Name, can be touch control operation checking information, such as the fingerprint collecting mould by being arranged in terminal
The fingerprint feature information for the user that block is collected, can also be the voice of the user collected by terminal
Checking information and face verification information.
In the above-mentioned technical solutions, it is preferable that judging user identification information and pre-set user body
During part identification information matching, determined to control according to the safe class for the type of items for depositing in electrical control cubicles in advance
The corresponding verification mode of lock instruction, and after according to verification mode to control lock command verification success, perform
Control lock instruction, it is specific further comprising the steps of:Judging user identification information and pre-set user body
Part identification information matching, and when being three safe classes according to the safe class of the type of items prestored,
It is the 3rd verification mode to determine verification mode;Cue is sent to terminal according to the 3rd verification mode,
With triggering terminal generation checking mark corresponding with cue;Judge that checking identifies whether to test with default
Card mark matching;When decision verification mark is matched with default checking mark, control lock instruction is performed, its
In, checking mark includes at least one in picture identification, audio identification and the optical indicia of terminal generation
Kind.
In the technical scheme, when the safe class of the type of items prestored is three safe class,
It is the 3rd verification mode to determine corresponding verification mode, and by sending cue to terminal, triggering is eventually
The corresponding checking mark of end generation cue, is matched in judgement checking mark with default checking mark
When, control lock instruction is performed, the validation-cross of electrical control cubicles and terminal is realized, simplifies the operation of user
Step.
Specifically, checking mark is included in picture identification, audio identification and the optical indicia of terminal generation
At least one, such as terminal receive electrical control cubicles transmission cue after, generate according to certain frequency
Rate enters the optical indicia of line flicker, electrical control cubicles collect optical indicia and judge flicker frequency with it is default
When flicker frequency is consistent, you can perform control lock instruction.
In addition, checking mark can also be bar code or 2 D code information, terminal receives cue
Afterwards, corresponding bar code or 2 D code information are automatically generated according to cue, and by this bar code or
2 D code information is sent to electrical control cubicles, can also after this bar code or 2 D code information are by checking
Trigger electrical control cubicles and perform control lock instruction.
In the above-mentioned technical solutions, it is preferable that judging user identification information and pre-set user body
During part identification information matching, determined to control according to the safe class for the type of items for depositing in electrical control cubicles in advance
The corresponding verification mode of lock instruction, and after according to verification mode to control lock command verification success, perform
Control lock instruction, it is specific further comprising the steps of:Judging user identification information and pre-set user body
Part identification information matching, and when being four safe classes according to the safe class of the type of items prestored,
It is the 4th verification mode to determine verification mode;Detected whether to produce closely with terminal according to the 4th verification mode
Field induced signal;When detecting with terminal generation near field induced signal, control lock instruction is performed, its
In, near field induced signal is included in radio frequency induction signal, bluetooth induced signal and Wi-Fi induced signals
At least one.
In the technical scheme, when the safe class of the type of items prestored is four safe class,
It is the 4th verification mode to determine corresponding verification mode, by detecting electrical control cubicles and terminal generation near field
Control lock instruction is performed during induced signal, realizes and instruction is locked to control using wireless docking and near-field communication
Checking, simplifies the operation of user, improves the intellectuality of verification process.
Specifically, the use of the propagation distance of commercial radio transmission apparatus Wi-Fi induced signals it is 300 meters
Left and right, is 10 meters to 50 meters or so using household radio route propagation scope.Bluetooth induced signal exists
10 meters or so can only be transmitted in the case of having certain obstacle, in the case of without any obstacle, strictly
Transmission of the product manufactured according to standard at most up to 30 meters.RFID(Radio Frequency
Identification, also known as radio frequency identification, radio frequency identification) propagation distance under different frequency range
Difference, the maximum propagation distance of radio frequency induction signal is 1.2 meters under low frequency band and high-frequency band,
Maximum propagation distance under ultra-high frequency band is 4 meters, and under microwave frequency band radio frequency induction signal
Maximum propagation distance is 15 meters.It was found from the transmission range of above-mentioned near field induced signal, when detecting
When electrical control cubicles and terminal produce near field induced signal, terminal user generally in electrical control cubicles enclosure region,
Control lock instruction is performed under the conditions of this, the security for performing control lock instruction can be effectively improved, and
Simplify the verification process of user.
According to a second aspect of the present invention, it is also proposed that a kind of central lock system, including:Resolution unit, is used
In after the control lock instruction sent, the user identification information in instruction is locked in parsing control;Judging unit, is used
In judging whether user identification information matches with pre-set user identity identification information;Verification unit,
It is automatically controlled according to depositing in advance when being matched for identity identification information with pre-set user identity identification information
The safe class of the type of items of cabinet determines the corresponding verification mode of control lock instruction, and according to authentication
After formula is to control lock command verification success, control lock instruction is performed.
In the technical scheme, by judging the user identity identification controlled during lock is instructed that terminal is sent
After information is matched with pre-set user identity identification information, further basis is deposited in electrical control cubicles in advance
The safe class of type of items determines verification mode, by according to the article deposited in advance in electrical control cubicles
The safe class of type determines verification mode, reduces the possibility that user misoperation causes any property loss
Property, the security of remote Program-controlled lock is improved, the usage experience of user is improved.
Specifically, control lock instruction include control unlock, control lock, set password, Modify password,
And the operation such as authorizing, the type of items of storage is different, and Item Value is different, corresponding safe class
Also it is just different.For example, when safe class is higher, the terminal user only specified, which just has permission, to hold
Row control lock operation, can now be entered by the characteristic information of acquisition terminal user with default characteristic information
Row is compared, to determine that control lock instruction is sent by the terminal user with operating right.And when safety etc.
Level than it is relatively low when, directly can set up near-field communication by terminal and electrical control cubicles and be connected and be verified,
As long as now ensureing that terminal user can perform control lock instruction in the range of it can set up near-field communication.
In the above-mentioned technical solutions, it is preferable that verification unit is additionally operable to:Judging user identity identification
Information is matched with pre-set user identity identification information, and is according to the safe class of the type of items prestored
During the first safe class, it is the first verification mode to determine verification mode;Central lock system also includes:Collection
Unit, the characteristic information for gathering user according to the first verification mode;Judging unit is additionally operable to:Sentence
Whether the characteristic information of disconnected user matches with default characteristic information;Verification unit is additionally operable to:Judging
When the characteristic information of user is matched with default characteristic information, control lock instruction is performed, wherein, user's
Characteristic information includes the distance between user and electrical control cubicles information, the vocal print feature information of user, user
Fingerprint feature information and user at least one of image feature information.
In the technical scheme, when the safe class of the type of items prestored is the first safe class,
It is the first verification mode to determine corresponding verification mode, by the characteristic information for the user for judging to collect
When being matched with default characteristic information perform control lock instruction, namely by electrical control cubicles directly gather checking letter
The verification mode of authentication verification process is ceased and completed, the validity of control lock instruction is improved, improves control
The security of lock scheme.
Such as when the characteristic information of user is the distance between terminal user and electrical control cubicles information, pass through
Determine whether the distance between terminal user and electrical control cubicles information is less than or equal to pre-determined distance threshold value and comes true
It is fixed whether to perform control lock instruction, specifically, GPS (Global Positioning can be passed through
System, global positioning system) the distance between user and electrical control cubicles information is determined, it can also pass through
The signal intensity of the control lock instruction received determines the distance between user and electrical control cubicles information.For example,
When detecting the distance between terminal user and electrical control cubicles information less than or equal to pre-determined distance threshold value,
Assuming that pre-determined distance threshold value is 20 meters, show terminal user in the range of 20 meters of electrical control cubicles, this
When control electric control lock in relay close with control switch control lock open, on the one hand save user's
Operating time, on the other hand verified by entering row distance, improve the validity of control lock instruction, also carry
The high security of control lock scheme.
When it is determined that the characteristic information of user is vocal print feature information, by the vocal print feature for detecting user
Information whether with default vocal print feature information matches come determine whether perform control lock instruction, Application on Voiceprint Recognition
Including (Text-Independent) two kinds of identifications that text related (Text-Dependent) and text are unrelated
Mode, requires that user pronounces according to the content of regulation with the Voiceprint Recognition System of text dependent, and recognizes
When must also pronounce by defined content, such as after user identification information is verified, terminal
The content of interface display " opening No. 22 electrical control cubicles ", user reads aloud above-mentioned display content, electricity
Control cabinet collect user read aloud information and confirm read aloud information with it is default read aloud information it is consistent when, table
The bright user, which is authorized to, sends control lock instruction, now i.e. executable control lock instruction, and unrelated with text
Identifying system does not provide the pronunciation content of speaker then, and only whether the voiceprint of detection user is with prestoring
Voiceprint matching, if the voiceprint for detecting user is matched with the voiceprint prestored,
Then show that the user possesses the authority for sending control lock instruction, now i.e. executable control lock instruction.
When the characteristic information of user is fingerprint feature information, by the fingerprint feature information for detecting user
Whether match to determine whether to perform control lock instruction with default fingerprint feature information, by being arranged on electricity
Control the fingerprint that the finger print acquisition module on cabinet gathers user, when detect the fingerprint feature information of user with
During default fingerprint feature information matching, show that the user has operating right, now i.e. executable control
Lock instruction.
When the characteristic information of user is the image feature information of user, by detecting that the image of user is special
Whether reference breath matches to determine whether to perform control lock instruction with default image feature information, specifically
, image capture module is set in electrical control cubicles, the image feature information of user is gathered, when collecting
User image feature information and default Image Feature Matching when, now perform control lock instruction, carry
The high security of control lock process.
In the above-mentioned technical solutions, it is preferable that verification unit is additionally operable to:Judging user identity identification
Information is matched with pre-set user identity identification information, and is according to the safe class of the type of items prestored
During the second safe class, it is the second verification mode to determine verification mode;Central lock system also includes:Send
Unit, for sending checking instruction to terminal according to the second verification mode, to pass through terminal notifying user
Validation information;Acquiring unit, the checking information for obtaining terminal feedback;Judging unit is also used
In:Judge whether the checking information of terminal feedback matches with default checking information;Verification unit is also used
In:When the checking information for judging terminal feedback is matched with default checking information, perform control lock and refer to
Order, wherein, checking information is inputted to the character checking information of terminal, touch control operation checking including user
At least one of information, speech verification information and face verification information.
In the technical scheme, when the safe class of the type of items prestored is the second safe class,
It is the second verification mode to determine corresponding verification mode, and it is anti-to send receiving terminal after checking instruction to terminal
The checking information of feedback, is performed when the checking information for judging terminal feedback is matched with default checking information
Control lock instruction, realizes and is sent after gathering checking information by terminal to electrical control cubicles to complete verification process
Verification mode, enhance the interactive of terminal and electrical control cubicles, improve the security of control lock process.
Specifically, checking information can be that user is inputted to the character checking information of terminal, such as user
Name, can be touch control operation checking information, such as the fingerprint collecting mould by being arranged in terminal
The fingerprint feature information for the user that block is collected, can also be the voice of the user collected by terminal
Checking information and face verification information.
In the above-mentioned technical solutions, it is preferable that verification unit is additionally operable to:Judging user identity identification
Information is matched with pre-set user identity identification information, and is according to the safe class of the type of items prestored
During three safe classes, it is the 3rd verification mode to determine verification mode;Central lock system also includes:Triggering
Unit, for sending cue to terminal according to the 3rd verification mode, with triggering terminal generation with carrying
Show the corresponding checking mark of signal;Judging unit is additionally operable to:Judge that checking is identified whether and default checking
Mark matching;Verification unit is additionally operable to:When decision verification mark is matched with default checking mark, hold
Row control lock instruction, wherein, checking mark includes picture identification, audio identification and the optics of terminal generation
At least one of mark.
In the technical scheme, when the safe class of the type of items prestored is three safe class,
It is the 3rd verification mode to determine corresponding verification mode, and by sending cue to terminal, triggering is eventually
The corresponding checking mark of end generation cue, is matched in judgement checking mark with default checking mark
When, control lock instruction is performed, the validation-cross of electrical control cubicles and terminal is realized, simplifies the operation of user
Step.
Specifically, checking mark is included in picture identification, audio identification and the optical indicia of terminal generation
At least one, such as terminal receive electrical control cubicles transmission cue after, generate according to certain frequency
Rate enters the optical indicia of line flicker, electrical control cubicles collect optical indicia and judge flicker frequency with it is default
When flicker frequency is consistent, you can perform control lock instruction.
In addition, checking mark can also be bar code or 2 D code information, terminal receives cue
Afterwards, corresponding bar code or 2 D code information are automatically generated according to cue, and by this bar code or
2 D code information is sent to electrical control cubicles, can also after this bar code or 2 D code information are by checking
Trigger electrical control cubicles and perform control lock instruction.
In the above-mentioned technical solutions, it is preferable that verification unit is additionally operable to:Judging user identity identification
Information is matched with pre-set user identity identification information, and is according to the safe class of the type of items prestored
During four safe classes, it is the 4th verification mode to determine verification mode;Central lock system also includes:Detection
Unit, for being detected whether to produce near field induced signal with terminal according to the 4th verification mode;Verification is single
Member is additionally operable to:When detecting with terminal generation near field induced signal, control lock instruction is performed, wherein,
Near field induced signal is included in radio frequency induction signal, bluetooth induced signal and Wi-Fi induced signals extremely
Few one kind.
In the technical scheme, when the safe class of the type of items prestored is four safe class,
It is the 4th verification mode to determine corresponding verification mode, by detecting electrical control cubicles and terminal generation near field
Control lock instruction is performed during induced signal, realizes and instruction is locked to control using wireless docking and near-field communication
Checking, simplifies the operation of user, improves the intellectuality of verification process.
Specifically, the use of the propagation distance of commercial radio transmission apparatus Wi-Fi induced signals it is 300 meters
Left and right, is 10 meters to 50 meters or so using household radio route propagation scope.Bluetooth induced signal exists
10 meters or so can only be transmitted in the case of having certain obstacle, in the case of without any obstacle, strictly
Transmission of the product manufactured according to standard at most up to 30 meters.RFID(Radio Frequency
Identification, also known as radio frequency identification, radio frequency identification) propagation distance under different frequency range
Difference, the maximum propagation distance of radio frequency induction signal is 1.2 meters under low frequency band and high-frequency band,
Maximum propagation distance under ultra-high frequency band is 4 meters, and under microwave frequency band radio frequency induction signal
Maximum propagation distance is 15 meters.It was found from the transmission range of above-mentioned near field induced signal, when detecting
When electrical control cubicles and terminal produce near field induced signal, terminal user generally in electrical control cubicles enclosure region,
Control lock instruction is performed under the conditions of this, the security for performing control lock instruction can be effectively improved, and
Simplify the verification process of user.
By above technical scheme, by judging user identification information and the knowledge of pre-set user identity
It is further true according to the safe class for the type of items deposited in advance in electrical control cubicles after other information matches
Determine verification mode, reduce the possibility that user misoperation causes any property loss, improve remote Program-controlled lock
Security, improve the usage experience of user.
Brief description of the drawings
Fig. 1 shows the schematic flow diagram of control locking method according to an embodiment of the invention;
Fig. 2 shows the schematic block diagram of central lock system according to an embodiment of the invention;
Fig. 3 shows the schematic flow diagram of control locking method according to another embodiment of the invention;
Fig. 4 shows the schematic flow diagram of control locking method according to still a further embodiment;
Fig. 5 shows the schematic flow diagram of control locking method according to still another embodiment of the invention;
Fig. 6 shows the schematic flow diagram of control locking method according to still another embodiment of the invention.
Embodiment
In order to be more clearly understood that the above objects, features and advantages of the present invention, with reference to attached
The present invention is further described in detail for figure and embodiment.It should be noted that not
In the case of conflict, the feature in embodiments herein and embodiment can be mutually combined.
Many details are elaborated in the following description to facilitate a thorough understanding of the present invention, still,
The present invention can also be different from third party's mode described here to implement using third party, therefore, this
The protection domain of invention is not limited by following public specific embodiment.
Fig. 1 shows the schematic flow diagram for controlling locking method according to an embodiment of the invention.
As shown in figure 1, locking method is controlled according to an embodiment of the invention, including:Step 102, exist
Get after the control lock instruction of terminal transmission, the user identification information in parsing control lock instruction;Step
Rapid 104, judge whether user identification information matches with pre-set user identity identification information;Step
106, when judging that user identification information is matched with pre-set user identity identification information, according to pre-
The safe class for first depositing in the type of items of electrical control cubicles determines the corresponding verification mode of control lock instruction, and
After according to verification mode to control lock command verification success, control lock instruction is performed.
In the technical scheme, by judging the user identity identification controlled during lock is instructed that terminal is sent
After information is matched with pre-set user identity identification information, further basis is deposited in electrical control cubicles in advance
The safe class of type of items determines verification mode, by according to the article deposited in advance in electrical control cubicles
The safe class of type determines verification mode, reduces the possibility that user misoperation causes any property loss
Property, the security of remote Program-controlled lock is improved, the usage experience of user is improved.
Specifically, control lock instruction include control unlock, control lock, set password, Modify password,
And the operation such as authorizing, the type of items of storage is different, and Item Value is different, corresponding safe class
Also it is just different.For example, when safe class is higher, the terminal user only specified, which just has permission, to hold
Row control lock operation, can now be entered by the characteristic information of acquisition terminal user with default characteristic information
Row is compared, to determine that control lock instruction is sent by the terminal user with operating right.And when safety etc.
Level than it is relatively low when, directly can set up near-field communication by terminal and electrical control cubicles and be connected and be verified,
As long as now ensureing that terminal user can perform control lock instruction in the range of it can set up near-field communication.
In the above-mentioned technical solutions, it is preferable that judging user identification information and pre-set user body
During part identification information matching, determined to control according to the safe class for the type of items for depositing in electrical control cubicles in advance
The corresponding verification mode of lock instruction, and after according to verification mode to control lock command verification success, perform
Control lock instruction, specifically includes following steps:Judging user identification information and pre-set user identity
Identification information is matched, and when being the first safe class according to the safe class of the type of items prestored, really
Verification mode is determined for the first verification mode;The characteristic information of user is gathered according to the first verification mode;Sentence
Whether the characteristic information of disconnected user matches with default characteristic information;Judge user characteristic information with
During default characteristic information matching, control lock instruction is performed, wherein, the characteristic information of user includes user
With the distance between electrical control cubicles information, the vocal print feature information of user, the fingerprint feature information of user and
At least one of image feature information of user.
In the technical scheme, when the safe class of the type of items prestored is the first safe class,
It is the first verification mode to determine corresponding verification mode, by the characteristic information for the user for judging to collect
When being matched with default characteristic information perform control lock instruction, namely by electrical control cubicles directly gather checking letter
The verification mode of authentication verification process is ceased and completed, the validity of control lock instruction is improved, improves control
The security of lock scheme.
Such as when the characteristic information of user is the distance between terminal user and electrical control cubicles information, pass through
Determine whether the distance between terminal user and electrical control cubicles information is less than or equal to pre-determined distance threshold value and comes true
It is fixed whether to perform control lock instruction, specifically, GPS (Global Positioning can be passed through
System, global positioning system) the distance between user and electrical control cubicles information is determined, it can also pass through
The signal intensity of the control lock instruction received determines the distance between user and electrical control cubicles information.For example,
When detecting the distance between terminal user and electrical control cubicles information less than or equal to pre-determined distance threshold value,
Assuming that pre-determined distance threshold value is 20 meters, show terminal user in the range of 20 meters of electrical control cubicles, this
When control electric control lock in relay close with control switch control lock open, on the one hand save user's
Operating time, on the other hand verified by entering row distance, improve the validity of control lock instruction, also carry
The high security of control lock scheme.
When it is determined that the characteristic information of user is vocal print feature information, by the vocal print feature for detecting user
Information whether with default vocal print feature information matches come determine whether perform control lock instruction, Application on Voiceprint Recognition
Including (Text-Independent) two kinds of identifications that text related (Text-Dependent) and text are unrelated
Mode, requires that user pronounces according to the content of regulation with the Voiceprint Recognition System of text dependent, and recognizes
When must also pronounce by defined content, such as after user identification information is verified, terminal
The content of interface display " opening No. 22 electrical control cubicles ", user reads aloud above-mentioned display content, electricity
Control cabinet collect user read aloud information and confirm read aloud information with it is default read aloud information it is consistent when, table
The bright user, which is authorized to, sends control lock instruction, now i.e. executable control lock instruction, and unrelated with text
Identifying system does not provide the pronunciation content of speaker then, and only whether the voiceprint of detection user is with prestoring
Voiceprint matching, if the voiceprint for detecting user is matched with the voiceprint prestored,
Then show that the user possesses the authority for sending control lock instruction, now i.e. executable control lock instruction.
When the characteristic information of user is fingerprint feature information, by the fingerprint feature information for detecting user
Whether match to determine whether to perform control lock instruction with default fingerprint feature information, by being arranged on electricity
Control the fingerprint that the finger print acquisition module on cabinet gathers user, when detect the fingerprint feature information of user with
During default fingerprint feature information matching, show that the user has operating right, now i.e. executable control
Lock instruction.
When the characteristic information of user is the image feature information of user, by detecting that the image of user is special
Whether reference breath matches to determine whether to perform control lock instruction with default image feature information, specifically
, image capture module is set in electrical control cubicles, the image feature information of user is gathered, when collecting
User image feature information and default Image Feature Matching when, now perform control lock instruction, carry
The high security of control lock process.
In the above-mentioned technical solutions, it is preferable that judging user identification information and pre-set user body
During part identification information matching, determined to control according to the safe class for the type of items for depositing in electrical control cubicles in advance
The corresponding verification mode of lock instruction, and after according to verification mode to control lock command verification success, perform
Control lock instruction, it is specific further comprising the steps of:Judging user identification information and pre-set user body
Part identification information matching, and when being the second safe class according to the safe class of the type of items prestored,
It is the second verification mode to determine verification mode;Checking instruction is sent to terminal according to the second verification mode,
To pass through terminal notifying user's validation information;Obtain the checking information of terminal feedback;Judge terminal
Whether the checking information of feedback matches with default checking information;Judging the checking information of terminal feedback
When being matched with default checking information, control lock instruction is performed, wherein, checking information is inputted including user
To the character checking information of terminal, touch control operation checking information, speech verification information and face verification letter
At least one of breath.
In the technical scheme, when the safe class of the type of items prestored is the second safe class,
It is the second verification mode to determine corresponding verification mode, and it is anti-to send receiving terminal after checking instruction to terminal
The checking information of feedback, is performed when the checking information for judging terminal feedback is matched with default checking information
Control lock instruction, realizes and is sent after gathering checking information by terminal to electrical control cubicles to complete verification process
Verification mode, enhance the interactive of terminal and electrical control cubicles, improve the security of control lock process.
Specifically, checking information can be that user is inputted to the character checking information of terminal, such as user
Name, can be touch control operation checking information, such as the fingerprint collecting mould by being arranged in terminal
The fingerprint feature information for the user that block is collected, can also be the voice of the user collected by terminal
Checking information and face verification information.
In the above-mentioned technical solutions, it is preferable that judging user identification information and pre-set user body
During part identification information matching, determined to control according to the safe class for the type of items for depositing in electrical control cubicles in advance
The corresponding verification mode of lock instruction, and after according to verification mode to control lock command verification success, perform
Control lock instruction, it is specific further comprising the steps of:Judging user identification information and pre-set user body
Part identification information matching, and when being three safe classes according to the safe class of the type of items prestored,
It is the 3rd verification mode to determine verification mode;Cue is sent to terminal according to the 3rd verification mode,
With triggering terminal generation checking mark corresponding with cue;Judge that checking identifies whether to test with default
Card mark matching;When decision verification mark is matched with default checking mark, control lock instruction is performed, its
In, checking mark includes at least one in picture identification, audio identification and the optical indicia of terminal generation
Kind.
In the technical scheme, when the safe class of the type of items prestored is three safe class,
It is the 3rd verification mode to determine corresponding verification mode, and by sending cue to terminal, triggering is eventually
The corresponding checking mark of end generation cue, is matched in judgement checking mark with default checking mark
When, control lock instruction is performed, the validation-cross of electrical control cubicles and terminal is realized, simplifies the operation of user
Step.
Specifically, checking mark is included in picture identification, audio identification and the optical indicia of terminal generation
At least one, such as terminal receive electrical control cubicles transmission cue after, generate according to certain frequency
Rate enters the optical indicia of line flicker, electrical control cubicles collect optical indicia and judge flicker frequency with it is default
When flicker frequency is consistent, you can perform control lock instruction.
In addition, checking mark can also be bar code or 2 D code information, terminal receives cue
Afterwards, corresponding bar code or 2 D code information are automatically generated according to cue, and by this bar code or
2 D code information is sent to electrical control cubicles, can also after this bar code or 2 D code information are by checking
Trigger electrical control cubicles and perform control lock instruction.
In the above-mentioned technical solutions, it is preferable that judging user identification information and pre-set user body
During part identification information matching, determined to control according to the safe class for the type of items for depositing in electrical control cubicles in advance
The corresponding verification mode of lock instruction, and after according to verification mode to control lock command verification success, perform
Control lock instruction, it is specific further comprising the steps of:Judging user identification information and pre-set user body
Part identification information matching, and when being four safe classes according to the safe class of the type of items prestored,
It is the 4th verification mode to determine verification mode;Detected whether to produce closely with terminal according to the 4th verification mode
Field induced signal;When detecting with terminal generation near field induced signal, control lock instruction is performed, its
In, near field induced signal is included in radio frequency induction signal, bluetooth induced signal and Wi-Fi induced signals
At least one.
In the technical scheme, when the safe class of the type of items prestored is four safe class,
It is the 4th verification mode to determine corresponding verification mode, by detecting electrical control cubicles and terminal generation near field
Control lock instruction is performed during induced signal, realizes and instruction is locked to control using wireless docking and near-field communication
Checking, simplifies the operation of user, improves the intellectuality of verification process.
Specifically, the use of the propagation distance of commercial radio transmission apparatus Wi-Fi induced signals it is 300 meters
Left and right, is 10 meters to 50 meters or so using household radio route propagation scope.Bluetooth induced signal exists
10 meters or so can only be transmitted in the case of having certain obstacle, in the case of without any obstacle, strictly
Transmission of the product manufactured according to standard at most up to 30 meters.RFID(Radio Frequency
Identification, also known as radio frequency identification, radio frequency identification) propagation distance under different frequency range
Difference, the maximum propagation distance of radio frequency induction signal is 1.2 meters under low frequency band and high-frequency band,
Maximum propagation distance under ultra-high frequency band is 4 meters, and under microwave frequency band radio frequency induction signal
Maximum propagation distance is 15 meters.It was found from the transmission range of above-mentioned near field induced signal, when detecting
When electrical control cubicles and terminal produce near field induced signal, terminal user generally in electrical control cubicles enclosure region,
Control lock instruction is performed under the conditions of this, the security for performing control lock instruction can be effectively improved, and
Simplify the verification process of user.
Fig. 2 shows the schematic block diagram of central lock system according to an embodiment of the invention.
As shown in Fig. 2 central lock system 200 according to an embodiment of the invention, including:Resolution unit
202, after the control lock for sending is instructed, the user identification information in parsing control lock instruction;Judge
Unit 204, for judge user identification information and pre-set user identity identification information whether
Match somebody with somebody;Verification unit 206, when being matched for identity identification information with pre-set user identity identification information,
Determine that control lock instructs corresponding authentication according to the safe class for the type of items for depositing in electrical control cubicles in advance
Formula, and after according to verification mode to control lock command verification success, perform control lock instruction.
In the technical scheme, by judging the user identity identification controlled during lock is instructed that terminal is sent
After information is matched with pre-set user identity identification information, further basis is deposited in electrical control cubicles in advance
The safe class of type of items determines verification mode, by according to the article deposited in advance in electrical control cubicles
The safe class of type determines verification mode, reduces the possibility that user misoperation causes any property loss
Property, the security of remote Program-controlled lock is improved, the usage experience of user is improved.
Specifically, control lock instruction include control unlock, control lock, set password, Modify password,
And the operation such as authorizing, the type of items of storage is different, and Item Value is different, corresponding safe class
Also it is just different.For example, when safe class is higher, the terminal user only specified, which just has permission, to hold
Row control lock operation, can now be entered by the characteristic information of acquisition terminal user with default characteristic information
Row is compared, to determine that control lock instruction is sent by the terminal user with operating right.And when safety etc.
Level than it is relatively low when, directly can set up near-field communication by terminal and electrical control cubicles and be connected and be verified,
As long as now ensureing that terminal user can perform control lock instruction in the range of it can set up near-field communication.
In the above-mentioned technical solutions, it is preferable that verification unit 206 is additionally operable to:Judging user identity
Identification information is matched with pre-set user identity identification information, and the safety according to the type of items prestored etc.
When level is the first safe class, it is the first verification mode to determine verification mode;Central lock system 200 is also wrapped
Include:Collecting unit 208, the characteristic information for gathering user according to the first verification mode;Judge single
Member 204 is additionally operable to:Judge whether the characteristic information of user matches with default characteristic information;Verification is single
Member 206 is additionally operable to:When the characteristic information for judging user is matched with default characteristic information, control is performed
Lock instruction, wherein, the characteristic information of user includes the distance between user and electrical control cubicles information, user
Vocal print feature information, the fingerprint feature information of user and the image feature information of user at least one
Kind.
In the technical scheme, when the safe class of the type of items prestored is the first safe class,
It is the first verification mode to determine corresponding verification mode, by the characteristic information for the user for judging to collect
When being matched with default characteristic information perform control lock instruction, namely by electrical control cubicles directly gather checking letter
The verification mode of authentication verification process is ceased and completed, the validity of control lock instruction is improved, improves control
The security of lock scheme.
Such as when the characteristic information of user is the distance between terminal user and electrical control cubicles information, pass through
Determine whether the distance between terminal user and electrical control cubicles information is less than or equal to pre-determined distance threshold value and comes true
It is fixed whether to perform control lock instruction, specifically, GPS (Global Positioning can be passed through
System, global positioning system) the distance between user and electrical control cubicles information is determined, it can also pass through
The signal intensity of the control lock instruction received determines the distance between user and electrical control cubicles information.For example,
When detecting the distance between terminal user and electrical control cubicles information less than or equal to pre-determined distance threshold value,
Assuming that pre-determined distance threshold value is 20 meters, show terminal user in the range of 20 meters of electrical control cubicles, this
When control electric control lock in relay close with control switch control lock open, on the one hand save user's
Operating time, on the other hand verified by entering row distance, improve the validity of control lock instruction, also carry
The high security of control lock scheme.
When it is determined that the characteristic information of user is vocal print feature information, by the vocal print feature for detecting user
Information whether with default vocal print feature information matches come determine whether perform control lock instruction, Application on Voiceprint Recognition
Including (Text-Independent) two kinds of identifications that text related (Text-Dependent) and text are unrelated
Mode, requires that user pronounces according to the content of regulation with the Voiceprint Recognition System of text dependent, and recognizes
When must also pronounce by defined content, such as after user identification information is verified, terminal
The content of interface display " opening No. 22 electrical control cubicles ", user reads aloud above-mentioned display content, electricity
Control cabinet collect user read aloud information and confirm read aloud information with it is default read aloud information it is consistent when, table
The bright user, which is authorized to, sends control lock instruction, now i.e. executable control lock instruction, and unrelated with text
Identifying system does not provide the pronunciation content of speaker then, and only whether the voiceprint of detection user is with prestoring
Voiceprint matching, if the voiceprint for detecting user is matched with the voiceprint prestored,
Then show that the user possesses the authority for sending control lock instruction, now i.e. executable control lock instruction.
When the characteristic information of user is fingerprint feature information, by the fingerprint feature information for detecting user
Whether match to determine whether to perform control lock instruction with default fingerprint feature information, by being arranged on electricity
Control the fingerprint that the finger print acquisition module on cabinet gathers user, when detect the fingerprint feature information of user with
During default fingerprint feature information matching, show that the user has operating right, now i.e. executable control
Lock instruction.
When the characteristic information of user is the image feature information of user, by detecting that the image of user is special
Whether reference breath matches to determine whether to perform control lock instruction with default image feature information, specifically
, image capture module is set in electrical control cubicles, the image feature information of user is gathered, when collecting
User image feature information and default Image Feature Matching when, now perform control lock instruction, carry
The high security of control lock process.
In the above-mentioned technical solutions, it is preferable that verification unit 206 is additionally operable to:Judging user identity
Identification information is matched with pre-set user identity identification information, and the safety according to the type of items prestored etc.
When level is the second safe class, it is the second verification mode to determine verification mode;Central lock system 200 is also wrapped
Include:Transmitting element 210, for sending checking instruction to terminal according to the second verification mode, to pass through
Terminal notifying user's validation information;Acquiring unit 212, the checking letter for obtaining terminal feedback
Breath;Judging unit 204 is additionally operable to:Judge whether the checking information of terminal feedback is believed with default checking
Breath matching;Verification unit 206 is additionally operable to:Judging the checking information of terminal feedback and default checking
During information matches, control lock instruction is performed, wherein, checking information is inputted to the character of terminal including user
At least one in checking information, touch control operation checking information, speech verification information and face verification information
Kind.
In the technical scheme, when the safe class of the type of items prestored is the second safe class,
It is the second verification mode to determine corresponding verification mode, and it is anti-to send receiving terminal after checking instruction to terminal
The checking information of feedback, is performed when the checking information for judging terminal feedback is matched with default checking information
Control lock instruction, realizes and is sent after gathering checking information by terminal to electrical control cubicles to complete verification process
Verification mode, enhance the interactive of terminal and electrical control cubicles, improve the security of control lock process.
Specifically, checking information can be that user is inputted to the character checking information of terminal, such as user
Name, can be touch control operation checking information, such as the fingerprint collecting mould by being arranged in terminal
The fingerprint feature information for the user that block is collected, can also be the voice of the user collected by terminal
Checking information and face verification information.
In the above-mentioned technical solutions, it is preferable that verification unit 206 is additionally operable to:Judging user identity
Identification information is matched with pre-set user identity identification information, and the safety according to the type of items prestored etc.
When level is three safe class, it is the 3rd verification mode to determine verification mode;Central lock system 200 is also wrapped
Include:Trigger element 214, for sending cue to terminal according to the 3rd verification mode, to trigger
Terminal generation checking mark corresponding with cue;Judging unit 204 is additionally operable to:Judge checking mark
Know and whether matched with default checking mark;Verification unit 206 is additionally operable to:In decision verification mark and in advance
If during checking mark matching, performing control lock instruction, wherein, checking mark includes the picture of terminal generation
At least one of mark, audio identification and optical indicia.
In the technical scheme, when the safe class of the type of items prestored is three safe class,
It is the 3rd verification mode to determine corresponding verification mode, and by sending cue to terminal, triggering is eventually
The corresponding checking mark of end generation cue, is matched in judgement checking mark with default checking mark
When, control lock instruction is performed, the validation-cross of electrical control cubicles and terminal is realized, simplifies the operation of user
Step.
Specifically, checking mark is included in picture identification, audio identification and the optical indicia of terminal generation
At least one, such as terminal receive electrical control cubicles transmission cue after, generate according to certain frequency
Rate enters the optical indicia of line flicker, electrical control cubicles collect optical indicia and judge flicker frequency with it is default
When flicker frequency is consistent, you can perform control lock instruction.
In addition, checking mark can also be bar code or 2 D code information, terminal receives cue
Afterwards, corresponding bar code or 2 D code information are automatically generated according to cue, and by this bar code or
2 D code information is sent to electrical control cubicles, can also after this bar code or 2 D code information are by checking
Trigger electrical control cubicles and perform control lock instruction.
In the above-mentioned technical solutions, it is preferable that verification unit 206 is additionally operable to:Judging user identity
Identification information is matched with pre-set user identity identification information, and the safety according to the type of items prestored etc.
When level is four safe class, it is the 4th verification mode to determine verification mode;Central lock system 200 is also wrapped
Include:Detection unit 216, for being detected whether to produce near field sensing with terminal according to the 4th verification mode
Signal;Verification unit 206 is additionally operable to:When detecting with terminal generation near field induced signal, perform
Control lock instruction, wherein, near field induced signal includes radio frequency induction signal, bluetooth induced signal and Wi-
At least one of Fi induced signals.
In the technical scheme, when the safe class of the type of items prestored is four safe class,
It is the 4th verification mode to determine corresponding verification mode, by detecting electrical control cubicles and terminal generation near field
Control lock instruction is performed during induced signal, realizes and instruction is locked to control using wireless docking and near-field communication
Checking, simplifies the operation of user, improves the intellectuality of verification process.
Specifically, the use of the propagation distance of commercial radio transmission apparatus Wi-Fi induced signals it is 300 meters
Left and right, is 10 meters to 50 meters or so using household radio route propagation scope.Bluetooth induced signal exists
10 meters or so can only be transmitted in the case of having certain obstacle, in the case of without any obstacle, strictly
Transmission of the product manufactured according to standard at most up to 30 meters.RFID(Radio Frequency
Identification, also known as radio frequency identification, radio frequency identification) propagation distance under different frequency range
Difference, the maximum propagation distance of radio frequency induction signal is 1.2 meters under low frequency band and high-frequency band,
Maximum propagation distance under ultra-high frequency band is 4 meters, and under microwave frequency band radio frequency induction signal
Maximum propagation distance is 15 meters.It was found from the transmission range of above-mentioned near field induced signal, when detecting
When electrical control cubicles and terminal produce near field induced signal, terminal user generally in electrical control cubicles enclosure region,
Control lock instruction is performed under the conditions of this, the security for performing control lock instruction can be effectively improved, and
Simplify the verification process of user.
Carried out specifically with reference to Fig. 3 to Fig. 6 to controlling lock scheme according to an embodiment of the invention
It is bright.
Embodiment one:
As shown in figure 3, control locking method according to another embodiment of the invention, including:Step
302, matched in judgement user identification information with pre-set user identity identification information, and according to pre-
When the safe class for the type of items deposited is the first safe class, it is the first authentication to determine verification mode
Formula;Step 304, the characteristic information of user is gathered according to the first verification mode;Step 306, judge
Whether the characteristic information of user matches with default characteristic information, if so, step 308 is then performed, if
It is no, then terminate;Step 308, control lock instruction is performed, wherein, the characteristic information of user includes user
With the distance between electrical control cubicles information, the vocal print feature information of user, the fingerprint feature information of user and
At least one of image feature information of user.
In the technical scheme, when the safe class of the type of items prestored is the first safe class,
It is the first verification mode to determine corresponding verification mode, by the characteristic information for the user for judging to collect
Control lock instruction is performed when being matched with default characteristic information, realizes and gathers checking information by electrical control cubicles
And the verification mode of authentication verification process is completed, the validity of control lock instruction is improved, control lock is improved
The security of process.
Embodiment two:
As shown in figure 4, control locking method according to still a further embodiment, including:Step
402, matched in judgement user identification information with pre-set user identity identification information, and according to pre-
When the safe class for the type of items deposited is the second safe class, it is the second authentication to determine verification mode
Formula;Step 404, checking instruction is sent to terminal according to the second verification mode, to pass through terminal notifying
User's validation information;Step 406, the checking information of terminal feedback is obtained;Step 408, sentence
Whether the checking information of disconnected terminal feedback matches with default checking information, if so, then performing step
410, if it is not, then terminating;Step 410, control lock instruction is performed, wherein, checking information includes using
Family inputs the character checking information to terminal, touch control operation checking information, speech verification information and face
At least one of checking information.
In the technical scheme, when the safe class of the type of items prestored is the second safe class,
It is the second verification mode to determine corresponding verification mode, the receiving terminal after checking instruction is sent to terminal
The checking information of feedback, during by judging that the checking information that terminal is fed back is matched with default checking information
Control lock instruction is performed, is realized by being sent after terminal collection checking information to electrical control cubicles to complete checking
The verification mode of process, enhances the interactive of terminal and electrical control cubicles, improves the safety of control lock process
Property.
Embodiment three:
As shown in figure 5, control locking method according to still another embodiment of the invention, including:Step
502, matched in judgement user identification information with pre-set user identity identification information, and according to pre-
When the safe class for the type of items deposited is three safe class, it is the 3rd authentication to determine verification mode
Formula;Step 504, cue is sent to terminal according to the 3rd verification mode, generated with triggering terminal
Checking mark corresponding with cue;Step 506, judge that checking is identified whether and default checking mark
Matching is known, if so, step 508 is then performed, if it is not, then terminating;Step 508, control lock is performed to refer to
Order, wherein, checking mark is included in picture identification, audio identification and the optical indicia of terminal generation
It is at least one.
In the technical scheme, when the safe class of the type of items prestored is three safe class,
It is the 3rd verification mode to determine corresponding verification mode, by the way that terminal is sent after cue, triggering
The corresponding checking mark of terminal generation cue, to judge checking mark and default checking mark
During matching, control lock instruction is performed, the validation-cross of electrical control cubicles and terminal is realized, simplifies user's
Operating procedure.
Example IV:
As shown in fig. 6, control locking method according to still another embodiment of the invention, including:Step
602, matched in judgement user identification information with pre-set user identity identification information, and according to pre-
When the safe class for the type of items deposited is four safe class, it is the 4th authentication to determine verification mode
Formula;Step 604, detected whether to produce near field induced signal with terminal according to the 4th verification mode;Step
Rapid 606, when detecting with terminal generation near field induced signal, control lock instruction is performed, wherein, closely
Field induced signal is included in radio frequency induction signal, bluetooth induced signal and Wi-Fi induced signals at least
It is a kind of.
In the technical scheme, when the safe class of the type of items prestored is four safe class,
It is the 4th verification mode to determine corresponding verification mode, by detecting electrical control cubicles and terminal generation near field
Control lock instruction is performed during induced signal, realizes and instruction is locked to control using wireless docking and near-field communication
Checking, simplifies the operation of user, improves the intellectuality of verification process.
Technical scheme is described in detail above in association with accompanying drawing, it is contemplated that in correlation technique how
A kind of new control lock scheme is designed, is asked with further improving the technology of security of control electrical control cubicles
Topic, the present invention proposes a kind of new control lock scheme, by the control lock instruction of terminal transmission is judged
User identification information matched with pre-set user identity identification information after, further according to depositing in advance
The safe class for the type of items being put in electrical control cubicles determines verification mode, by according to depositing in advance
The safe class of type of items in electrical control cubicles determines verification mode, reduces user misoperation and causes wealth
The possibility of loss is produced, the security of remote Program-controlled lock is improved, improves the usage experience of user.
The preferred embodiments of the present invention are the foregoing is only, are not intended to limit the invention, for
For those skilled in the art, the present invention can have various modifications and variations.All essences in the present invention
God is with principle, and any modification, equivalent substitution and improvements made etc. should be included in the present invention
Protection domain within.
Claims (10)
1. one kind control locking method, it is adaptable to electrical control cubicles, it is characterised in that including:
After the control lock instruction of terminal transmission is got, the user identity parsed in the control lock instruction is known
Other information;
Judge whether the user identification information matches with pre-set user identity identification information;
When judging that the user identification information is matched with the pre-set user identity identification information,
The control lock instruction correspondence is determined according to the safe class for the type of items for depositing in the electrical control cubicles in advance
Verification mode, and according to the verification mode to it is described control lock command verification success after, perform institute
State control lock instruction.
2. control locking method according to claim 1, it is characterised in that judging the user
When identity identification information is matched with the pre-set user identity identification information, according to depositing in advance
The safe class of the type of items of electrical control cubicles determines the corresponding verification mode of the control lock instruction, and in root
The control is locked after command verification success according to the verification mode, the control lock is performed and instructs, specific bag
Include following steps:
Matched in the judgement user identification information with the pre-set user identity identification information, and
During according to the safe class of the type of items prestored for the first safe class, determine that the verification mode is
First verification mode;
The characteristic information of user is gathered according to the first verification mode;
Judge whether the characteristic information of the user matches with default characteristic information;
When the characteristic information for judging the user is matched with the default characteristic information, perform described
Control lock instruction,
Wherein, the characteristic information of the user includes the distance between the user and described electrical control cubicles letter
The figure of breath, the vocal print feature information of the user, the fingerprint feature information of the user and the user
As at least one of characteristic information.
3. control locking method according to claim 1, it is characterised in that judging the user
When identity identification information is matched with the pre-set user identity identification information, according to depositing in advance
The safe class of the type of items of electrical control cubicles determines the corresponding verification mode of the control lock instruction, and in root
The control is locked after command verification success according to the verification mode, the execution control lock is instructed, specific to go back
Comprise the following steps:
Matched in the judgement user identification information with the pre-set user identity identification information, and
During according to the safe class of the type of items prestored for the second safe class, determine that the verification mode is
Second verification mode;
Checking instruction is sent to the terminal according to the second verification mode, to be used by the terminal notifying
Family validation information;
Obtain the checking information of the terminal feedback;
Judge whether the checking information of the terminal feedback matches with default checking information;
When the checking information for judging the terminal feedback is matched with the default checking information, perform
The control lock instruction,
Wherein, the checking information including the user input to the character checking information of the terminal,
At least one of touch control operation checking information, speech verification information and face verification information.
4. control locking method according to claim 1, it is characterised in that judging the user
When identity identification information is matched with the pre-set user identity identification information, according to depositing in advance
The safe class of the type of items of electrical control cubicles determines the corresponding verification mode of the control lock instruction, and in root
The control is locked after command verification success according to the verification mode, the execution control lock is instructed, specific to go back
Comprise the following steps:
Matched in the judgement user identification information with the pre-set user identity identification information, and
During according to the safe class of the type of items prestored for three safe classes, determine that the verification mode is
3rd verification mode;
Cue is sent to the terminal according to the 3rd verification mode, with trigger terminal generation with
The cue is corresponding to verify mark;
Judge that the checking identifies whether to match with default checking mark;
When judging that the checking mark is matched with the default checking mark, perform the control lock and refer to
Order,
Wherein, the checking mark includes picture identification, audio identification and the optics of the terminal generation
At least one of mark.
5. the control locking method according to any one of Claims 1-4, it is characterised in that
When judging that the user identification information is matched with the pre-set user identity identification information, according to
The safe class for depositing in the type of items of the electrical control cubicles in advance determines that the control lock instructs corresponding test
Card mode, and after according to the verification mode to the control lock command verification success, perform the control
Lock instruction, it is specific further comprising the steps of:
Matched in the judgement user identification information with the pre-set user identity identification information, and
During according to the safe class of the type of items prestored for four safe classes, determine that the verification mode is
4th verification mode;
Detected whether to produce near field induced signal with the terminal according to the 4th verification mode;
When detecting with terminal generation near field induced signal, the control lock instruction is performed,
Wherein, the near field induced signal includes radio frequency induction signal, bluetooth induced signal and Wi-Fi
At least one of induced signal.
6. a kind of central lock system, it is adaptable to electrical control cubicles, it is characterised in that including:
Resolution unit, after the control lock for sending is instructed, parses the user identity knowledge in the control lock instruction
Other information;
Judging unit, for judging the user identification information and pre-set user identity identification information
Whether match;
Verification unit, when being matched for identity identification information with the pre-set user identity identification information,
The control lock instruction correspondence is determined according to the safe class for the type of items for depositing in the electrical control cubicles in advance
Verification mode, and according to the verification mode to it is described control lock command verification success after, perform institute
State control lock instruction.
7. central lock system according to claim 6, it is characterised in that
The verification unit is additionally operable to:Judging the user identification information and the pre-set user
Identity identification information is matched, and is the first safe class according to the safe class of the type of items prestored
When, it is the first verification mode to determine the verification mode;
The central lock system also includes:
Collecting unit, the characteristic information for gathering user according to the first verification mode;
The judging unit is additionally operable to:Judge whether the characteristic information of the user is believed with default feature
Breath matching;
The verification unit is additionally operable to:Judging the characteristic information and the default feature of the user
During information matches, the control lock instruction is performed,
Wherein, the characteristic information of the user includes the distance between the user and described electrical control cubicles letter
The figure of breath, the vocal print feature information of the user, the fingerprint feature information of the user and the user
As at least one of characteristic information.
8. central lock system according to claim 6, it is characterised in that
The verification unit is additionally operable to:Judging the user identification information and the pre-set user
Identity identification information is matched, and is the second safe class according to the safe class of the type of items prestored
When, it is the second verification mode to determine the verification mode;
The central lock system also includes:
Transmitting element, for sending checking instruction to the terminal according to the second verification mode, to pass through
The terminal notifying user validation information;
Acquiring unit, the checking information for obtaining the terminal feedback;
The judging unit is additionally operable to:Judge whether the checking information of the terminal feedback is tested with default
Demonstrate,prove information matches;
The verification unit is additionally operable to:Judge the checking information of terminal feedback with it is described default
When checking information is matched, the control lock instruction is performed,
Wherein, the checking information including the user input to the character checking information of the terminal,
At least one of touch control operation checking information, speech verification information and face verification information.
9. central lock system according to claim 6, it is characterised in that
The verification unit is additionally operable to:Judging the user identification information and the pre-set user
Identity identification information is matched, and is the 3rd safe class according to the safe class of the type of items prestored
When, it is the 3rd verification mode to determine the verification mode;
The central lock system also includes:
Trigger element, for sending cue to the terminal according to the 3rd verification mode, to trigger
The terminal generation is corresponding with the cue to verify mark;
The judging unit is additionally operable to:Judge that the checking identifies whether to match with default checking mark;
The verification unit is additionally operable to:Matched judging that the checking mark is identified with the default checking
When, the control lock instruction is performed,
Wherein, the checking mark includes picture identification, audio identification and the optics of the terminal generation
At least one of mark.
10. the central lock system according to any one of claim 6 to 9, it is characterised in that
The verification unit is additionally operable to:Judging the user identification information and the pre-set user
Identity identification information is matched, and is the 4th safe class according to the safe class of the type of items prestored
When, it is the 4th verification mode to determine the verification mode;
The central lock system also includes:
Detection unit, for being detected whether to produce near field with the terminal according to the 4th verification mode
Induced signal;
The verification unit is additionally operable to:When detecting with terminal generation near field induced signal, hold
The row control lock instruction,
Wherein, the near field induced signal includes radio frequency induction signal, bluetooth induced signal and Wi-Fi
At least one of induced signal.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610266227.XA CN107316356A (en) | 2016-04-26 | 2016-04-26 | Control locking method and central lock system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610266227.XA CN107316356A (en) | 2016-04-26 | 2016-04-26 | Control locking method and central lock system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107316356A true CN107316356A (en) | 2017-11-03 |
Family
ID=60184302
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610266227.XA Pending CN107316356A (en) | 2016-04-26 | 2016-04-26 | Control locking method and central lock system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107316356A (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108109233A (en) * | 2017-12-14 | 2018-06-01 | 华南理工大学 | Multilevel security protection system based on biological information of human body |
WO2019090834A1 (en) * | 2017-11-10 | 2019-05-16 | 广州势必可赢网络科技有限公司 | Express cabinet pickup method and apparatus based on voiceprint |
CN109949457A (en) * | 2019-03-04 | 2019-06-28 | 北京华大智宝电子系统有限公司 | Intelligent door lock control method and relevant apparatus |
CN112863032A (en) * | 2019-11-28 | 2021-05-28 | 比亚迪汽车工业有限公司 | Gate control method and device, storage medium and electronic equipment |
CN113436376A (en) * | 2021-06-02 | 2021-09-24 | 杭州海康威视数字技术股份有限公司 | Access control system, method and device and biological key card |
CN118334783A (en) * | 2024-05-14 | 2024-07-12 | 深圳市智汇安行科技有限公司 | Control method, device, equipment and storage medium of intelligent electronic lock |
Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1776704A (en) * | 2004-11-19 | 2006-05-24 | 株式会社日立制作所 | Safety system, identifying server, identifying method and program |
CN101615309A (en) * | 2008-12-05 | 2009-12-30 | 张小鹏 | Identification presentation device and based on the personal identification method and the system thereof of this device |
CN101644124A (en) * | 2009-08-28 | 2010-02-10 | 广州广电运通金融电子股份有限公司 | Automatic storage/retrieval safe |
CN102037706A (en) * | 2008-03-21 | 2011-04-27 | 人性化基本输入输出系统有限责任公司 | Method for the temporary personalization of a communication device |
CN102542647A (en) * | 2012-02-08 | 2012-07-04 | 广东步步高电子工业有限公司 | Method and system for opening safe or entrance guard device by utilizing mobile terminal |
CN103093531A (en) * | 2013-01-18 | 2013-05-08 | 陈志衍 | Lock system controlled by internet |
CN203102405U (en) * | 2012-12-31 | 2013-07-31 | 于净 | Bullet cabinet |
CN103500394A (en) * | 2013-10-28 | 2014-01-08 | 苏州大学 | Unattended operation logistics distribution and goods picking method and system |
CN103726742A (en) * | 2013-12-30 | 2014-04-16 | 北京瑞福临科技有限公司 | Vertical type fingerprint confidential cabinet and control system thereof |
CN104219374A (en) * | 2013-06-04 | 2014-12-17 | 李旭阳 | Human-computer interaction system on basis of next-generation intelligent mobile phone |
CN104517170A (en) * | 2013-09-30 | 2015-04-15 | 北大方正集团有限公司 | Equipment and method for monitoring articles |
CN105516060A (en) * | 2014-09-25 | 2016-04-20 | 宇龙计算机通信科技(深圳)有限公司 | Entrance guard system, terminal, cloud server and safety strategy setting method |
-
2016
- 2016-04-26 CN CN201610266227.XA patent/CN107316356A/en active Pending
Patent Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1776704A (en) * | 2004-11-19 | 2006-05-24 | 株式会社日立制作所 | Safety system, identifying server, identifying method and program |
CN102037706A (en) * | 2008-03-21 | 2011-04-27 | 人性化基本输入输出系统有限责任公司 | Method for the temporary personalization of a communication device |
CN101615309A (en) * | 2008-12-05 | 2009-12-30 | 张小鹏 | Identification presentation device and based on the personal identification method and the system thereof of this device |
CN101644124A (en) * | 2009-08-28 | 2010-02-10 | 广州广电运通金融电子股份有限公司 | Automatic storage/retrieval safe |
CN102542647A (en) * | 2012-02-08 | 2012-07-04 | 广东步步高电子工业有限公司 | Method and system for opening safe or entrance guard device by utilizing mobile terminal |
CN203102405U (en) * | 2012-12-31 | 2013-07-31 | 于净 | Bullet cabinet |
CN103093531A (en) * | 2013-01-18 | 2013-05-08 | 陈志衍 | Lock system controlled by internet |
CN104219374A (en) * | 2013-06-04 | 2014-12-17 | 李旭阳 | Human-computer interaction system on basis of next-generation intelligent mobile phone |
CN104517170A (en) * | 2013-09-30 | 2015-04-15 | 北大方正集团有限公司 | Equipment and method for monitoring articles |
CN103500394A (en) * | 2013-10-28 | 2014-01-08 | 苏州大学 | Unattended operation logistics distribution and goods picking method and system |
CN103726742A (en) * | 2013-12-30 | 2014-04-16 | 北京瑞福临科技有限公司 | Vertical type fingerprint confidential cabinet and control system thereof |
CN105516060A (en) * | 2014-09-25 | 2016-04-20 | 宇龙计算机通信科技(深圳)有限公司 | Entrance guard system, terminal, cloud server and safety strategy setting method |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2019090834A1 (en) * | 2017-11-10 | 2019-05-16 | 广州势必可赢网络科技有限公司 | Express cabinet pickup method and apparatus based on voiceprint |
CN108109233A (en) * | 2017-12-14 | 2018-06-01 | 华南理工大学 | Multilevel security protection system based on biological information of human body |
CN109949457A (en) * | 2019-03-04 | 2019-06-28 | 北京华大智宝电子系统有限公司 | Intelligent door lock control method and relevant apparatus |
CN112863032A (en) * | 2019-11-28 | 2021-05-28 | 比亚迪汽车工业有限公司 | Gate control method and device, storage medium and electronic equipment |
CN113436376A (en) * | 2021-06-02 | 2021-09-24 | 杭州海康威视数字技术股份有限公司 | Access control system, method and device and biological key card |
CN118334783A (en) * | 2024-05-14 | 2024-07-12 | 深圳市智汇安行科技有限公司 | Control method, device, equipment and storage medium of intelligent electronic lock |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107316356A (en) | Control locking method and central lock system | |
CN106204817B (en) | A kind of control method of control of bluetooth access | |
CN107578519A (en) | A kind of intelligent access control system and intelligent entrance guard method for unlocking | |
US20060136997A1 (en) | Authentication system and method | |
CN202679415U (en) | Vehicle remote control system based on voice command, communication terminal and cloud computing platform server | |
KR101218297B1 (en) | System and Method for Controlling Door Lock | |
CN105590363A (en) | Method for unlocking intelligent door lock based on distance change induction and intelligent door lock system thereof | |
CN110011811A (en) | Vehicle unlock authentication method and device based on terminal device | |
CN111554020A (en) | Internet of things access control system based on RFID and biological identification | |
CN106274807A (en) | Automobile intelligent control method based on mobile terminal and device | |
CN212256412U (en) | Internet of things access control system based on RFID and biological identification | |
CN109402941A (en) | A kind of control method for washing machine and clothes washing system | |
CN110164012A (en) | A kind of community's access control system and working method thereof | |
CN102158473A (en) | Remote entry system | |
CN205210991U (en) | Access control system based on two take place ofs ID cards and face identification | |
CN206522020U (en) | A kind of intelligent door lock and system | |
CN105574967A (en) | Intelligent access control system and operation method thereof | |
CN105939336A (en) | Identity authentication method and system | |
CN105991652A (en) | Identity authentication method and system | |
CN105991654A (en) | Authorization authentication method, device and system | |
CN103791686A (en) | Intelligent refrigerator with iris recognition function | |
CN103806789A (en) | Intelligent safety box with iris recognition function | |
CN109671192A (en) | A kind of method and earphone using earphone unlock intelligent door lock | |
CN205091815U (en) | Access control system based on iris and radio frequency card identification technique | |
KR20180009278A (en) | Method for authenticating opening of digital doorlock |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20171103 |
|
RJ01 | Rejection of invention patent application after publication |