CN107316356A - Control locking method and central lock system - Google Patents

Control locking method and central lock system Download PDF

Info

Publication number
CN107316356A
CN107316356A CN201610266227.XA CN201610266227A CN107316356A CN 107316356 A CN107316356 A CN 107316356A CN 201610266227 A CN201610266227 A CN 201610266227A CN 107316356 A CN107316356 A CN 107316356A
Authority
CN
China
Prior art keywords
user
information
verification mode
identification information
verification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610266227.XA
Other languages
Chinese (zh)
Inventor
赖俊逸
陈炼
谢敏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
FOUNDER BROADBAND NETWORK SERVICE Co Ltd
Peking University Founder Group Co Ltd
Original Assignee
FOUNDER BROADBAND NETWORK SERVICE Co Ltd
Peking University Founder Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by FOUNDER BROADBAND NETWORK SERVICE Co Ltd, Peking University Founder Group Co Ltd filed Critical FOUNDER BROADBAND NETWORK SERVICE Co Ltd
Priority to CN201610266227.XA priority Critical patent/CN107316356A/en
Publication of CN107316356A publication Critical patent/CN107316356A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00563Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys using personal physical data of the operator, e.g. finger prints, retinal images, voicepatterns

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The invention provides one kind control locking method and central lock system, wherein, control locking method includes:After the control lock instruction of terminal transmission is got, the user identification information in parsing control lock instruction;Judge whether user identification information matches with pre-set user identity identification information;When judging that user identification information is matched with pre-set user identity identification information, determine that control lock instructs corresponding verification mode according to the safe class for the type of items for depositing in electrical control cubicles in advance, and after according to verification mode to control lock command verification success, perform control lock instruction.By technical solution of the present invention, verification mode is determined by the safe class according to the type of items deposited in advance in electrical control cubicles, the possibility that user misoperation causes any property loss is reduced, improves the security of remote Program-controlled lock, improve the usage experience of user.

Description

Control locking method and central lock system
Technical field
The present invention relates to field of intelligent control technology, in particular to one kind control locking method and one kind Central lock system.
Background technology
In the related art, remote Program-controlled lock instruction is sent by terminals such as mobile phones to replace to the straight of electrical control cubicles Connect touch control operation, to open electrical control cubicles, not only being customized operation it is interactive, be greatly reduced Running cost and the reliability for improving user identity identification, can also be real for logistics field When receive logistics change information and physical state information.
But, because control lock operation is carried out not in electrical control cubicles, as user because maloperation is triggered out Lock instruction and terminal user not door body it is neighbouring when, it is possible to property is suffered a loss, verify Mode is relatively simple.
Therefore, a kind of new control lock scheme how is designed, further to improve the peace of control electrical control cubicles Full property turns into technical problem urgently to be resolved hurrily.
The content of the invention
The present invention is based at least one above-mentioned technical problem, it is proposed that a kind of new control lock scheme, Pass through the user identification information in the control lock instruction of terminal transmission is judged and the knowledge of pre-set user identity It is further true according to the safe class for the type of items deposited in advance in electrical control cubicles after other information matches Determine verification mode, determine to test by the safe class according to the type of items deposited in advance in electrical control cubicles Card mode, reduces the possibility that user misoperation causes any property loss, improves the peace of remote Program-controlled lock Quan Xing, improves the usage experience of user.
In view of this, the present invention proposes a kind of control locking method, including:Getting terminal transmission After control lock instruction, the user identification information in parsing control lock instruction;Judge that user identity identification is believed Whether breath matches with pre-set user identity identification information;Judging user identification information and default use It is true according to the safe class for the type of items for depositing in electrical control cubicles in advance during the identity identification information matching of family Fixed control lock instructs corresponding verification mode, and after according to verification mode to control lock command verification success, Perform control lock instruction.
In the technical scheme, by judging the user identity identification controlled during lock is instructed that terminal is sent After information is matched with pre-set user identity identification information, further basis is deposited in electrical control cubicles in advance The safe class of type of items determines verification mode, by according to the article deposited in advance in electrical control cubicles The safe class of type determines verification mode, reduces the possibility that user misoperation causes any property loss Property, the security of remote Program-controlled lock is improved, the usage experience of user is improved.
Specifically, control lock instruction include control unlock, control lock, set password, Modify password, And the operation such as authorizing, the type of items of storage is different, and Item Value is different, corresponding safe class Also it is just different.For example, when safe class is higher, the terminal user only specified, which just has permission, to hold Row control lock operation, can now be entered by the characteristic information of acquisition terminal user with default characteristic information Row is compared, to determine that control lock instruction is sent by the terminal user with operating right.And when safety etc. Level than it is relatively low when, directly can set up near-field communication by terminal and electrical control cubicles and be connected and be verified, As long as now ensureing that terminal user can perform control lock instruction in the range of it can set up near-field communication.
In the above-mentioned technical solutions, it is preferable that judging user identification information and pre-set user body During part identification information matching, determined to control according to the safe class for the type of items for depositing in electrical control cubicles in advance The corresponding verification mode of lock instruction, and after according to verification mode to control lock command verification success, perform Control lock instruction, specifically includes following steps:Judging user identification information and pre-set user identity Identification information is matched, and when being the first safe class according to the safe class of the type of items prestored, really Verification mode is determined for the first verification mode;The characteristic information of user is gathered according to the first verification mode;Sentence Whether the characteristic information of disconnected user matches with default characteristic information;Judge user characteristic information with During default characteristic information matching, control lock instruction is performed, wherein, the characteristic information of user includes user With the distance between electrical control cubicles information, the vocal print feature information of user, the fingerprint feature information of user and At least one of image feature information of user.
In the technical scheme, when the safe class of the type of items prestored is the first safe class, It is the first verification mode to determine corresponding verification mode, by the characteristic information for the user for judging to collect When being matched with default characteristic information perform control lock instruction, namely by electrical control cubicles directly gather checking letter The verification mode of authentication verification process is ceased and completed, the validity of control lock instruction is improved, improves control The security of lock scheme.
Such as when the characteristic information of user is the distance between terminal user and electrical control cubicles information, pass through Determine whether the distance between terminal user and electrical control cubicles information is less than or equal to pre-determined distance threshold value and comes true It is fixed whether to perform control lock instruction, specifically, GPS (Global Positioning can be passed through System, global positioning system) the distance between user and electrical control cubicles information is determined, it can also pass through The signal intensity of the control lock instruction received determines the distance between user and electrical control cubicles information.For example, When detecting the distance between terminal user and electrical control cubicles information less than or equal to pre-determined distance threshold value, Assuming that pre-determined distance threshold value is 20 meters, show terminal user in the range of 20 meters of electrical control cubicles, this When control electric control lock in relay close with control switch control lock open, on the one hand save user's Operating time, on the other hand verified by entering row distance, improve the validity of control lock instruction, also carry The high security of control lock scheme.
When it is determined that the characteristic information of user is vocal print feature information, by the vocal print feature for detecting user Information whether with default vocal print feature information matches come determine whether perform control lock instruction, Application on Voiceprint Recognition Including (Text-Independent) two kinds of identifications that text related (Text-Dependent) and text are unrelated Mode, requires that user pronounces according to the content of regulation with the Voiceprint Recognition System of text dependent, and recognizes When must also pronounce by defined content, such as after user identification information is verified, terminal The content of interface display " opening No. 22 electrical control cubicles ", user reads aloud above-mentioned display content, electricity Control cabinet collect user read aloud information and confirm read aloud information with it is default read aloud information it is consistent when, table The bright user, which is authorized to, sends control lock instruction, now i.e. executable control lock instruction, and unrelated with text Identifying system does not provide the pronunciation content of speaker then, and only whether the voiceprint of detection user is with prestoring Voiceprint matching, if the voiceprint for detecting user is matched with the voiceprint prestored, Then show that the user possesses the authority for sending control lock instruction, now i.e. executable control lock instruction.
When the characteristic information of user is fingerprint feature information, by the fingerprint feature information for detecting user Whether match to determine whether to perform control lock instruction with default fingerprint feature information, by being arranged on electricity Control the fingerprint that the finger print acquisition module on cabinet gathers user, when detect the fingerprint feature information of user with During default fingerprint feature information matching, show that the user has operating right, now i.e. executable control Lock instruction.
When the characteristic information of user is the image feature information of user, by detecting that the image of user is special Whether reference breath matches to determine whether to perform control lock instruction with default image feature information, specifically , image capture module is set in electrical control cubicles, the image feature information of user is gathered, when collecting User image feature information and default Image Feature Matching when, now perform control lock instruction, carry The high security of control lock process.
In the above-mentioned technical solutions, it is preferable that judging user identification information and pre-set user body During part identification information matching, determined to control according to the safe class for the type of items for depositing in electrical control cubicles in advance The corresponding verification mode of lock instruction, and after according to verification mode to control lock command verification success, perform Control lock instruction, it is specific further comprising the steps of:Judging user identification information and pre-set user body Part identification information matching, and when being the second safe class according to the safe class of the type of items prestored, It is the second verification mode to determine verification mode;Checking instruction is sent to terminal according to the second verification mode, To pass through terminal notifying user's validation information;Obtain the checking information of terminal feedback;Judge terminal Whether the checking information of feedback matches with default checking information;Judging the checking information of terminal feedback When being matched with default checking information, control lock instruction is performed, wherein, checking information is inputted including user To the character checking information of terminal, touch control operation checking information, speech verification information and face verification letter At least one of breath.
In the technical scheme, when the safe class of the type of items prestored is the second safe class, It is the second verification mode to determine corresponding verification mode, and it is anti-to send receiving terminal after checking instruction to terminal The checking information of feedback, is performed when the checking information for judging terminal feedback is matched with default checking information Control lock instruction, realizes and is sent after gathering checking information by terminal to electrical control cubicles to complete verification process Verification mode, enhance the interactive of terminal and electrical control cubicles, improve the security of control lock process.
Specifically, checking information can be that user is inputted to the character checking information of terminal, such as user Name, can be touch control operation checking information, such as the fingerprint collecting mould by being arranged in terminal The fingerprint feature information for the user that block is collected, can also be the voice of the user collected by terminal Checking information and face verification information.
In the above-mentioned technical solutions, it is preferable that judging user identification information and pre-set user body During part identification information matching, determined to control according to the safe class for the type of items for depositing in electrical control cubicles in advance The corresponding verification mode of lock instruction, and after according to verification mode to control lock command verification success, perform Control lock instruction, it is specific further comprising the steps of:Judging user identification information and pre-set user body Part identification information matching, and when being three safe classes according to the safe class of the type of items prestored, It is the 3rd verification mode to determine verification mode;Cue is sent to terminal according to the 3rd verification mode, With triggering terminal generation checking mark corresponding with cue;Judge that checking identifies whether to test with default Card mark matching;When decision verification mark is matched with default checking mark, control lock instruction is performed, its In, checking mark includes at least one in picture identification, audio identification and the optical indicia of terminal generation Kind.
In the technical scheme, when the safe class of the type of items prestored is three safe class, It is the 3rd verification mode to determine corresponding verification mode, and by sending cue to terminal, triggering is eventually The corresponding checking mark of end generation cue, is matched in judgement checking mark with default checking mark When, control lock instruction is performed, the validation-cross of electrical control cubicles and terminal is realized, simplifies the operation of user Step.
Specifically, checking mark is included in picture identification, audio identification and the optical indicia of terminal generation At least one, such as terminal receive electrical control cubicles transmission cue after, generate according to certain frequency Rate enters the optical indicia of line flicker, electrical control cubicles collect optical indicia and judge flicker frequency with it is default When flicker frequency is consistent, you can perform control lock instruction.
In addition, checking mark can also be bar code or 2 D code information, terminal receives cue Afterwards, corresponding bar code or 2 D code information are automatically generated according to cue, and by this bar code or 2 D code information is sent to electrical control cubicles, can also after this bar code or 2 D code information are by checking Trigger electrical control cubicles and perform control lock instruction.
In the above-mentioned technical solutions, it is preferable that judging user identification information and pre-set user body During part identification information matching, determined to control according to the safe class for the type of items for depositing in electrical control cubicles in advance The corresponding verification mode of lock instruction, and after according to verification mode to control lock command verification success, perform Control lock instruction, it is specific further comprising the steps of:Judging user identification information and pre-set user body Part identification information matching, and when being four safe classes according to the safe class of the type of items prestored, It is the 4th verification mode to determine verification mode;Detected whether to produce closely with terminal according to the 4th verification mode Field induced signal;When detecting with terminal generation near field induced signal, control lock instruction is performed, its In, near field induced signal is included in radio frequency induction signal, bluetooth induced signal and Wi-Fi induced signals At least one.
In the technical scheme, when the safe class of the type of items prestored is four safe class, It is the 4th verification mode to determine corresponding verification mode, by detecting electrical control cubicles and terminal generation near field Control lock instruction is performed during induced signal, realizes and instruction is locked to control using wireless docking and near-field communication Checking, simplifies the operation of user, improves the intellectuality of verification process.
Specifically, the use of the propagation distance of commercial radio transmission apparatus Wi-Fi induced signals it is 300 meters Left and right, is 10 meters to 50 meters or so using household radio route propagation scope.Bluetooth induced signal exists 10 meters or so can only be transmitted in the case of having certain obstacle, in the case of without any obstacle, strictly Transmission of the product manufactured according to standard at most up to 30 meters.RFID(Radio Frequency Identification, also known as radio frequency identification, radio frequency identification) propagation distance under different frequency range Difference, the maximum propagation distance of radio frequency induction signal is 1.2 meters under low frequency band and high-frequency band, Maximum propagation distance under ultra-high frequency band is 4 meters, and under microwave frequency band radio frequency induction signal Maximum propagation distance is 15 meters.It was found from the transmission range of above-mentioned near field induced signal, when detecting When electrical control cubicles and terminal produce near field induced signal, terminal user generally in electrical control cubicles enclosure region, Control lock instruction is performed under the conditions of this, the security for performing control lock instruction can be effectively improved, and Simplify the verification process of user.
According to a second aspect of the present invention, it is also proposed that a kind of central lock system, including:Resolution unit, is used In after the control lock instruction sent, the user identification information in instruction is locked in parsing control;Judging unit, is used In judging whether user identification information matches with pre-set user identity identification information;Verification unit, It is automatically controlled according to depositing in advance when being matched for identity identification information with pre-set user identity identification information The safe class of the type of items of cabinet determines the corresponding verification mode of control lock instruction, and according to authentication After formula is to control lock command verification success, control lock instruction is performed.
In the technical scheme, by judging the user identity identification controlled during lock is instructed that terminal is sent After information is matched with pre-set user identity identification information, further basis is deposited in electrical control cubicles in advance The safe class of type of items determines verification mode, by according to the article deposited in advance in electrical control cubicles The safe class of type determines verification mode, reduces the possibility that user misoperation causes any property loss Property, the security of remote Program-controlled lock is improved, the usage experience of user is improved.
Specifically, control lock instruction include control unlock, control lock, set password, Modify password, And the operation such as authorizing, the type of items of storage is different, and Item Value is different, corresponding safe class Also it is just different.For example, when safe class is higher, the terminal user only specified, which just has permission, to hold Row control lock operation, can now be entered by the characteristic information of acquisition terminal user with default characteristic information Row is compared, to determine that control lock instruction is sent by the terminal user with operating right.And when safety etc. Level than it is relatively low when, directly can set up near-field communication by terminal and electrical control cubicles and be connected and be verified, As long as now ensureing that terminal user can perform control lock instruction in the range of it can set up near-field communication.
In the above-mentioned technical solutions, it is preferable that verification unit is additionally operable to:Judging user identity identification Information is matched with pre-set user identity identification information, and is according to the safe class of the type of items prestored During the first safe class, it is the first verification mode to determine verification mode;Central lock system also includes:Collection Unit, the characteristic information for gathering user according to the first verification mode;Judging unit is additionally operable to:Sentence Whether the characteristic information of disconnected user matches with default characteristic information;Verification unit is additionally operable to:Judging When the characteristic information of user is matched with default characteristic information, control lock instruction is performed, wherein, user's Characteristic information includes the distance between user and electrical control cubicles information, the vocal print feature information of user, user Fingerprint feature information and user at least one of image feature information.
In the technical scheme, when the safe class of the type of items prestored is the first safe class, It is the first verification mode to determine corresponding verification mode, by the characteristic information for the user for judging to collect When being matched with default characteristic information perform control lock instruction, namely by electrical control cubicles directly gather checking letter The verification mode of authentication verification process is ceased and completed, the validity of control lock instruction is improved, improves control The security of lock scheme.
Such as when the characteristic information of user is the distance between terminal user and electrical control cubicles information, pass through Determine whether the distance between terminal user and electrical control cubicles information is less than or equal to pre-determined distance threshold value and comes true It is fixed whether to perform control lock instruction, specifically, GPS (Global Positioning can be passed through System, global positioning system) the distance between user and electrical control cubicles information is determined, it can also pass through The signal intensity of the control lock instruction received determines the distance between user and electrical control cubicles information.For example, When detecting the distance between terminal user and electrical control cubicles information less than or equal to pre-determined distance threshold value, Assuming that pre-determined distance threshold value is 20 meters, show terminal user in the range of 20 meters of electrical control cubicles, this When control electric control lock in relay close with control switch control lock open, on the one hand save user's Operating time, on the other hand verified by entering row distance, improve the validity of control lock instruction, also carry The high security of control lock scheme.
When it is determined that the characteristic information of user is vocal print feature information, by the vocal print feature for detecting user Information whether with default vocal print feature information matches come determine whether perform control lock instruction, Application on Voiceprint Recognition Including (Text-Independent) two kinds of identifications that text related (Text-Dependent) and text are unrelated Mode, requires that user pronounces according to the content of regulation with the Voiceprint Recognition System of text dependent, and recognizes When must also pronounce by defined content, such as after user identification information is verified, terminal The content of interface display " opening No. 22 electrical control cubicles ", user reads aloud above-mentioned display content, electricity Control cabinet collect user read aloud information and confirm read aloud information with it is default read aloud information it is consistent when, table The bright user, which is authorized to, sends control lock instruction, now i.e. executable control lock instruction, and unrelated with text Identifying system does not provide the pronunciation content of speaker then, and only whether the voiceprint of detection user is with prestoring Voiceprint matching, if the voiceprint for detecting user is matched with the voiceprint prestored, Then show that the user possesses the authority for sending control lock instruction, now i.e. executable control lock instruction.
When the characteristic information of user is fingerprint feature information, by the fingerprint feature information for detecting user Whether match to determine whether to perform control lock instruction with default fingerprint feature information, by being arranged on electricity Control the fingerprint that the finger print acquisition module on cabinet gathers user, when detect the fingerprint feature information of user with During default fingerprint feature information matching, show that the user has operating right, now i.e. executable control Lock instruction.
When the characteristic information of user is the image feature information of user, by detecting that the image of user is special Whether reference breath matches to determine whether to perform control lock instruction with default image feature information, specifically , image capture module is set in electrical control cubicles, the image feature information of user is gathered, when collecting User image feature information and default Image Feature Matching when, now perform control lock instruction, carry The high security of control lock process.
In the above-mentioned technical solutions, it is preferable that verification unit is additionally operable to:Judging user identity identification Information is matched with pre-set user identity identification information, and is according to the safe class of the type of items prestored During the second safe class, it is the second verification mode to determine verification mode;Central lock system also includes:Send Unit, for sending checking instruction to terminal according to the second verification mode, to pass through terminal notifying user Validation information;Acquiring unit, the checking information for obtaining terminal feedback;Judging unit is also used In:Judge whether the checking information of terminal feedback matches with default checking information;Verification unit is also used In:When the checking information for judging terminal feedback is matched with default checking information, perform control lock and refer to Order, wherein, checking information is inputted to the character checking information of terminal, touch control operation checking including user At least one of information, speech verification information and face verification information.
In the technical scheme, when the safe class of the type of items prestored is the second safe class, It is the second verification mode to determine corresponding verification mode, and it is anti-to send receiving terminal after checking instruction to terminal The checking information of feedback, is performed when the checking information for judging terminal feedback is matched with default checking information Control lock instruction, realizes and is sent after gathering checking information by terminal to electrical control cubicles to complete verification process Verification mode, enhance the interactive of terminal and electrical control cubicles, improve the security of control lock process.
Specifically, checking information can be that user is inputted to the character checking information of terminal, such as user Name, can be touch control operation checking information, such as the fingerprint collecting mould by being arranged in terminal The fingerprint feature information for the user that block is collected, can also be the voice of the user collected by terminal Checking information and face verification information.
In the above-mentioned technical solutions, it is preferable that verification unit is additionally operable to:Judging user identity identification Information is matched with pre-set user identity identification information, and is according to the safe class of the type of items prestored During three safe classes, it is the 3rd verification mode to determine verification mode;Central lock system also includes:Triggering Unit, for sending cue to terminal according to the 3rd verification mode, with triggering terminal generation with carrying Show the corresponding checking mark of signal;Judging unit is additionally operable to:Judge that checking is identified whether and default checking Mark matching;Verification unit is additionally operable to:When decision verification mark is matched with default checking mark, hold Row control lock instruction, wherein, checking mark includes picture identification, audio identification and the optics of terminal generation At least one of mark.
In the technical scheme, when the safe class of the type of items prestored is three safe class, It is the 3rd verification mode to determine corresponding verification mode, and by sending cue to terminal, triggering is eventually The corresponding checking mark of end generation cue, is matched in judgement checking mark with default checking mark When, control lock instruction is performed, the validation-cross of electrical control cubicles and terminal is realized, simplifies the operation of user Step.
Specifically, checking mark is included in picture identification, audio identification and the optical indicia of terminal generation At least one, such as terminal receive electrical control cubicles transmission cue after, generate according to certain frequency Rate enters the optical indicia of line flicker, electrical control cubicles collect optical indicia and judge flicker frequency with it is default When flicker frequency is consistent, you can perform control lock instruction.
In addition, checking mark can also be bar code or 2 D code information, terminal receives cue Afterwards, corresponding bar code or 2 D code information are automatically generated according to cue, and by this bar code or 2 D code information is sent to electrical control cubicles, can also after this bar code or 2 D code information are by checking Trigger electrical control cubicles and perform control lock instruction.
In the above-mentioned technical solutions, it is preferable that verification unit is additionally operable to:Judging user identity identification Information is matched with pre-set user identity identification information, and is according to the safe class of the type of items prestored During four safe classes, it is the 4th verification mode to determine verification mode;Central lock system also includes:Detection Unit, for being detected whether to produce near field induced signal with terminal according to the 4th verification mode;Verification is single Member is additionally operable to:When detecting with terminal generation near field induced signal, control lock instruction is performed, wherein, Near field induced signal is included in radio frequency induction signal, bluetooth induced signal and Wi-Fi induced signals extremely Few one kind.
In the technical scheme, when the safe class of the type of items prestored is four safe class, It is the 4th verification mode to determine corresponding verification mode, by detecting electrical control cubicles and terminal generation near field Control lock instruction is performed during induced signal, realizes and instruction is locked to control using wireless docking and near-field communication Checking, simplifies the operation of user, improves the intellectuality of verification process.
Specifically, the use of the propagation distance of commercial radio transmission apparatus Wi-Fi induced signals it is 300 meters Left and right, is 10 meters to 50 meters or so using household radio route propagation scope.Bluetooth induced signal exists 10 meters or so can only be transmitted in the case of having certain obstacle, in the case of without any obstacle, strictly Transmission of the product manufactured according to standard at most up to 30 meters.RFID(Radio Frequency Identification, also known as radio frequency identification, radio frequency identification) propagation distance under different frequency range Difference, the maximum propagation distance of radio frequency induction signal is 1.2 meters under low frequency band and high-frequency band, Maximum propagation distance under ultra-high frequency band is 4 meters, and under microwave frequency band radio frequency induction signal Maximum propagation distance is 15 meters.It was found from the transmission range of above-mentioned near field induced signal, when detecting When electrical control cubicles and terminal produce near field induced signal, terminal user generally in electrical control cubicles enclosure region, Control lock instruction is performed under the conditions of this, the security for performing control lock instruction can be effectively improved, and Simplify the verification process of user.
By above technical scheme, by judging user identification information and the knowledge of pre-set user identity It is further true according to the safe class for the type of items deposited in advance in electrical control cubicles after other information matches Determine verification mode, reduce the possibility that user misoperation causes any property loss, improve remote Program-controlled lock Security, improve the usage experience of user.
Brief description of the drawings
Fig. 1 shows the schematic flow diagram of control locking method according to an embodiment of the invention;
Fig. 2 shows the schematic block diagram of central lock system according to an embodiment of the invention;
Fig. 3 shows the schematic flow diagram of control locking method according to another embodiment of the invention;
Fig. 4 shows the schematic flow diagram of control locking method according to still a further embodiment;
Fig. 5 shows the schematic flow diagram of control locking method according to still another embodiment of the invention;
Fig. 6 shows the schematic flow diagram of control locking method according to still another embodiment of the invention.
Embodiment
In order to be more clearly understood that the above objects, features and advantages of the present invention, with reference to attached The present invention is further described in detail for figure and embodiment.It should be noted that not In the case of conflict, the feature in embodiments herein and embodiment can be mutually combined.
Many details are elaborated in the following description to facilitate a thorough understanding of the present invention, still, The present invention can also be different from third party's mode described here to implement using third party, therefore, this The protection domain of invention is not limited by following public specific embodiment.
Fig. 1 shows the schematic flow diagram for controlling locking method according to an embodiment of the invention.
As shown in figure 1, locking method is controlled according to an embodiment of the invention, including:Step 102, exist Get after the control lock instruction of terminal transmission, the user identification information in parsing control lock instruction;Step Rapid 104, judge whether user identification information matches with pre-set user identity identification information;Step 106, when judging that user identification information is matched with pre-set user identity identification information, according to pre- The safe class for first depositing in the type of items of electrical control cubicles determines the corresponding verification mode of control lock instruction, and After according to verification mode to control lock command verification success, control lock instruction is performed.
In the technical scheme, by judging the user identity identification controlled during lock is instructed that terminal is sent After information is matched with pre-set user identity identification information, further basis is deposited in electrical control cubicles in advance The safe class of type of items determines verification mode, by according to the article deposited in advance in electrical control cubicles The safe class of type determines verification mode, reduces the possibility that user misoperation causes any property loss Property, the security of remote Program-controlled lock is improved, the usage experience of user is improved.
Specifically, control lock instruction include control unlock, control lock, set password, Modify password, And the operation such as authorizing, the type of items of storage is different, and Item Value is different, corresponding safe class Also it is just different.For example, when safe class is higher, the terminal user only specified, which just has permission, to hold Row control lock operation, can now be entered by the characteristic information of acquisition terminal user with default characteristic information Row is compared, to determine that control lock instruction is sent by the terminal user with operating right.And when safety etc. Level than it is relatively low when, directly can set up near-field communication by terminal and electrical control cubicles and be connected and be verified, As long as now ensureing that terminal user can perform control lock instruction in the range of it can set up near-field communication.
In the above-mentioned technical solutions, it is preferable that judging user identification information and pre-set user body During part identification information matching, determined to control according to the safe class for the type of items for depositing in electrical control cubicles in advance The corresponding verification mode of lock instruction, and after according to verification mode to control lock command verification success, perform Control lock instruction, specifically includes following steps:Judging user identification information and pre-set user identity Identification information is matched, and when being the first safe class according to the safe class of the type of items prestored, really Verification mode is determined for the first verification mode;The characteristic information of user is gathered according to the first verification mode;Sentence Whether the characteristic information of disconnected user matches with default characteristic information;Judge user characteristic information with During default characteristic information matching, control lock instruction is performed, wherein, the characteristic information of user includes user With the distance between electrical control cubicles information, the vocal print feature information of user, the fingerprint feature information of user and At least one of image feature information of user.
In the technical scheme, when the safe class of the type of items prestored is the first safe class, It is the first verification mode to determine corresponding verification mode, by the characteristic information for the user for judging to collect When being matched with default characteristic information perform control lock instruction, namely by electrical control cubicles directly gather checking letter The verification mode of authentication verification process is ceased and completed, the validity of control lock instruction is improved, improves control The security of lock scheme.
Such as when the characteristic information of user is the distance between terminal user and electrical control cubicles information, pass through Determine whether the distance between terminal user and electrical control cubicles information is less than or equal to pre-determined distance threshold value and comes true It is fixed whether to perform control lock instruction, specifically, GPS (Global Positioning can be passed through System, global positioning system) the distance between user and electrical control cubicles information is determined, it can also pass through The signal intensity of the control lock instruction received determines the distance between user and electrical control cubicles information.For example, When detecting the distance between terminal user and electrical control cubicles information less than or equal to pre-determined distance threshold value, Assuming that pre-determined distance threshold value is 20 meters, show terminal user in the range of 20 meters of electrical control cubicles, this When control electric control lock in relay close with control switch control lock open, on the one hand save user's Operating time, on the other hand verified by entering row distance, improve the validity of control lock instruction, also carry The high security of control lock scheme.
When it is determined that the characteristic information of user is vocal print feature information, by the vocal print feature for detecting user Information whether with default vocal print feature information matches come determine whether perform control lock instruction, Application on Voiceprint Recognition Including (Text-Independent) two kinds of identifications that text related (Text-Dependent) and text are unrelated Mode, requires that user pronounces according to the content of regulation with the Voiceprint Recognition System of text dependent, and recognizes When must also pronounce by defined content, such as after user identification information is verified, terminal The content of interface display " opening No. 22 electrical control cubicles ", user reads aloud above-mentioned display content, electricity Control cabinet collect user read aloud information and confirm read aloud information with it is default read aloud information it is consistent when, table The bright user, which is authorized to, sends control lock instruction, now i.e. executable control lock instruction, and unrelated with text Identifying system does not provide the pronunciation content of speaker then, and only whether the voiceprint of detection user is with prestoring Voiceprint matching, if the voiceprint for detecting user is matched with the voiceprint prestored, Then show that the user possesses the authority for sending control lock instruction, now i.e. executable control lock instruction.
When the characteristic information of user is fingerprint feature information, by the fingerprint feature information for detecting user Whether match to determine whether to perform control lock instruction with default fingerprint feature information, by being arranged on electricity Control the fingerprint that the finger print acquisition module on cabinet gathers user, when detect the fingerprint feature information of user with During default fingerprint feature information matching, show that the user has operating right, now i.e. executable control Lock instruction.
When the characteristic information of user is the image feature information of user, by detecting that the image of user is special Whether reference breath matches to determine whether to perform control lock instruction with default image feature information, specifically , image capture module is set in electrical control cubicles, the image feature information of user is gathered, when collecting User image feature information and default Image Feature Matching when, now perform control lock instruction, carry The high security of control lock process.
In the above-mentioned technical solutions, it is preferable that judging user identification information and pre-set user body During part identification information matching, determined to control according to the safe class for the type of items for depositing in electrical control cubicles in advance The corresponding verification mode of lock instruction, and after according to verification mode to control lock command verification success, perform Control lock instruction, it is specific further comprising the steps of:Judging user identification information and pre-set user body Part identification information matching, and when being the second safe class according to the safe class of the type of items prestored, It is the second verification mode to determine verification mode;Checking instruction is sent to terminal according to the second verification mode, To pass through terminal notifying user's validation information;Obtain the checking information of terminal feedback;Judge terminal Whether the checking information of feedback matches with default checking information;Judging the checking information of terminal feedback When being matched with default checking information, control lock instruction is performed, wherein, checking information is inputted including user To the character checking information of terminal, touch control operation checking information, speech verification information and face verification letter At least one of breath.
In the technical scheme, when the safe class of the type of items prestored is the second safe class, It is the second verification mode to determine corresponding verification mode, and it is anti-to send receiving terminal after checking instruction to terminal The checking information of feedback, is performed when the checking information for judging terminal feedback is matched with default checking information Control lock instruction, realizes and is sent after gathering checking information by terminal to electrical control cubicles to complete verification process Verification mode, enhance the interactive of terminal and electrical control cubicles, improve the security of control lock process.
Specifically, checking information can be that user is inputted to the character checking information of terminal, such as user Name, can be touch control operation checking information, such as the fingerprint collecting mould by being arranged in terminal The fingerprint feature information for the user that block is collected, can also be the voice of the user collected by terminal Checking information and face verification information.
In the above-mentioned technical solutions, it is preferable that judging user identification information and pre-set user body During part identification information matching, determined to control according to the safe class for the type of items for depositing in electrical control cubicles in advance The corresponding verification mode of lock instruction, and after according to verification mode to control lock command verification success, perform Control lock instruction, it is specific further comprising the steps of:Judging user identification information and pre-set user body Part identification information matching, and when being three safe classes according to the safe class of the type of items prestored, It is the 3rd verification mode to determine verification mode;Cue is sent to terminal according to the 3rd verification mode, With triggering terminal generation checking mark corresponding with cue;Judge that checking identifies whether to test with default Card mark matching;When decision verification mark is matched with default checking mark, control lock instruction is performed, its In, checking mark includes at least one in picture identification, audio identification and the optical indicia of terminal generation Kind.
In the technical scheme, when the safe class of the type of items prestored is three safe class, It is the 3rd verification mode to determine corresponding verification mode, and by sending cue to terminal, triggering is eventually The corresponding checking mark of end generation cue, is matched in judgement checking mark with default checking mark When, control lock instruction is performed, the validation-cross of electrical control cubicles and terminal is realized, simplifies the operation of user Step.
Specifically, checking mark is included in picture identification, audio identification and the optical indicia of terminal generation At least one, such as terminal receive electrical control cubicles transmission cue after, generate according to certain frequency Rate enters the optical indicia of line flicker, electrical control cubicles collect optical indicia and judge flicker frequency with it is default When flicker frequency is consistent, you can perform control lock instruction.
In addition, checking mark can also be bar code or 2 D code information, terminal receives cue Afterwards, corresponding bar code or 2 D code information are automatically generated according to cue, and by this bar code or 2 D code information is sent to electrical control cubicles, can also after this bar code or 2 D code information are by checking Trigger electrical control cubicles and perform control lock instruction.
In the above-mentioned technical solutions, it is preferable that judging user identification information and pre-set user body During part identification information matching, determined to control according to the safe class for the type of items for depositing in electrical control cubicles in advance The corresponding verification mode of lock instruction, and after according to verification mode to control lock command verification success, perform Control lock instruction, it is specific further comprising the steps of:Judging user identification information and pre-set user body Part identification information matching, and when being four safe classes according to the safe class of the type of items prestored, It is the 4th verification mode to determine verification mode;Detected whether to produce closely with terminal according to the 4th verification mode Field induced signal;When detecting with terminal generation near field induced signal, control lock instruction is performed, its In, near field induced signal is included in radio frequency induction signal, bluetooth induced signal and Wi-Fi induced signals At least one.
In the technical scheme, when the safe class of the type of items prestored is four safe class, It is the 4th verification mode to determine corresponding verification mode, by detecting electrical control cubicles and terminal generation near field Control lock instruction is performed during induced signal, realizes and instruction is locked to control using wireless docking and near-field communication Checking, simplifies the operation of user, improves the intellectuality of verification process.
Specifically, the use of the propagation distance of commercial radio transmission apparatus Wi-Fi induced signals it is 300 meters Left and right, is 10 meters to 50 meters or so using household radio route propagation scope.Bluetooth induced signal exists 10 meters or so can only be transmitted in the case of having certain obstacle, in the case of without any obstacle, strictly Transmission of the product manufactured according to standard at most up to 30 meters.RFID(Radio Frequency Identification, also known as radio frequency identification, radio frequency identification) propagation distance under different frequency range Difference, the maximum propagation distance of radio frequency induction signal is 1.2 meters under low frequency band and high-frequency band, Maximum propagation distance under ultra-high frequency band is 4 meters, and under microwave frequency band radio frequency induction signal Maximum propagation distance is 15 meters.It was found from the transmission range of above-mentioned near field induced signal, when detecting When electrical control cubicles and terminal produce near field induced signal, terminal user generally in electrical control cubicles enclosure region, Control lock instruction is performed under the conditions of this, the security for performing control lock instruction can be effectively improved, and Simplify the verification process of user.
Fig. 2 shows the schematic block diagram of central lock system according to an embodiment of the invention.
As shown in Fig. 2 central lock system 200 according to an embodiment of the invention, including:Resolution unit 202, after the control lock for sending is instructed, the user identification information in parsing control lock instruction;Judge Unit 204, for judge user identification information and pre-set user identity identification information whether Match somebody with somebody;Verification unit 206, when being matched for identity identification information with pre-set user identity identification information, Determine that control lock instructs corresponding authentication according to the safe class for the type of items for depositing in electrical control cubicles in advance Formula, and after according to verification mode to control lock command verification success, perform control lock instruction.
In the technical scheme, by judging the user identity identification controlled during lock is instructed that terminal is sent After information is matched with pre-set user identity identification information, further basis is deposited in electrical control cubicles in advance The safe class of type of items determines verification mode, by according to the article deposited in advance in electrical control cubicles The safe class of type determines verification mode, reduces the possibility that user misoperation causes any property loss Property, the security of remote Program-controlled lock is improved, the usage experience of user is improved.
Specifically, control lock instruction include control unlock, control lock, set password, Modify password, And the operation such as authorizing, the type of items of storage is different, and Item Value is different, corresponding safe class Also it is just different.For example, when safe class is higher, the terminal user only specified, which just has permission, to hold Row control lock operation, can now be entered by the characteristic information of acquisition terminal user with default characteristic information Row is compared, to determine that control lock instruction is sent by the terminal user with operating right.And when safety etc. Level than it is relatively low when, directly can set up near-field communication by terminal and electrical control cubicles and be connected and be verified, As long as now ensureing that terminal user can perform control lock instruction in the range of it can set up near-field communication.
In the above-mentioned technical solutions, it is preferable that verification unit 206 is additionally operable to:Judging user identity Identification information is matched with pre-set user identity identification information, and the safety according to the type of items prestored etc. When level is the first safe class, it is the first verification mode to determine verification mode;Central lock system 200 is also wrapped Include:Collecting unit 208, the characteristic information for gathering user according to the first verification mode;Judge single Member 204 is additionally operable to:Judge whether the characteristic information of user matches with default characteristic information;Verification is single Member 206 is additionally operable to:When the characteristic information for judging user is matched with default characteristic information, control is performed Lock instruction, wherein, the characteristic information of user includes the distance between user and electrical control cubicles information, user Vocal print feature information, the fingerprint feature information of user and the image feature information of user at least one Kind.
In the technical scheme, when the safe class of the type of items prestored is the first safe class, It is the first verification mode to determine corresponding verification mode, by the characteristic information for the user for judging to collect When being matched with default characteristic information perform control lock instruction, namely by electrical control cubicles directly gather checking letter The verification mode of authentication verification process is ceased and completed, the validity of control lock instruction is improved, improves control The security of lock scheme.
Such as when the characteristic information of user is the distance between terminal user and electrical control cubicles information, pass through Determine whether the distance between terminal user and electrical control cubicles information is less than or equal to pre-determined distance threshold value and comes true It is fixed whether to perform control lock instruction, specifically, GPS (Global Positioning can be passed through System, global positioning system) the distance between user and electrical control cubicles information is determined, it can also pass through The signal intensity of the control lock instruction received determines the distance between user and electrical control cubicles information.For example, When detecting the distance between terminal user and electrical control cubicles information less than or equal to pre-determined distance threshold value, Assuming that pre-determined distance threshold value is 20 meters, show terminal user in the range of 20 meters of electrical control cubicles, this When control electric control lock in relay close with control switch control lock open, on the one hand save user's Operating time, on the other hand verified by entering row distance, improve the validity of control lock instruction, also carry The high security of control lock scheme.
When it is determined that the characteristic information of user is vocal print feature information, by the vocal print feature for detecting user Information whether with default vocal print feature information matches come determine whether perform control lock instruction, Application on Voiceprint Recognition Including (Text-Independent) two kinds of identifications that text related (Text-Dependent) and text are unrelated Mode, requires that user pronounces according to the content of regulation with the Voiceprint Recognition System of text dependent, and recognizes When must also pronounce by defined content, such as after user identification information is verified, terminal The content of interface display " opening No. 22 electrical control cubicles ", user reads aloud above-mentioned display content, electricity Control cabinet collect user read aloud information and confirm read aloud information with it is default read aloud information it is consistent when, table The bright user, which is authorized to, sends control lock instruction, now i.e. executable control lock instruction, and unrelated with text Identifying system does not provide the pronunciation content of speaker then, and only whether the voiceprint of detection user is with prestoring Voiceprint matching, if the voiceprint for detecting user is matched with the voiceprint prestored, Then show that the user possesses the authority for sending control lock instruction, now i.e. executable control lock instruction.
When the characteristic information of user is fingerprint feature information, by the fingerprint feature information for detecting user Whether match to determine whether to perform control lock instruction with default fingerprint feature information, by being arranged on electricity Control the fingerprint that the finger print acquisition module on cabinet gathers user, when detect the fingerprint feature information of user with During default fingerprint feature information matching, show that the user has operating right, now i.e. executable control Lock instruction.
When the characteristic information of user is the image feature information of user, by detecting that the image of user is special Whether reference breath matches to determine whether to perform control lock instruction with default image feature information, specifically , image capture module is set in electrical control cubicles, the image feature information of user is gathered, when collecting User image feature information and default Image Feature Matching when, now perform control lock instruction, carry The high security of control lock process.
In the above-mentioned technical solutions, it is preferable that verification unit 206 is additionally operable to:Judging user identity Identification information is matched with pre-set user identity identification information, and the safety according to the type of items prestored etc. When level is the second safe class, it is the second verification mode to determine verification mode;Central lock system 200 is also wrapped Include:Transmitting element 210, for sending checking instruction to terminal according to the second verification mode, to pass through Terminal notifying user's validation information;Acquiring unit 212, the checking letter for obtaining terminal feedback Breath;Judging unit 204 is additionally operable to:Judge whether the checking information of terminal feedback is believed with default checking Breath matching;Verification unit 206 is additionally operable to:Judging the checking information of terminal feedback and default checking During information matches, control lock instruction is performed, wherein, checking information is inputted to the character of terminal including user At least one in checking information, touch control operation checking information, speech verification information and face verification information Kind.
In the technical scheme, when the safe class of the type of items prestored is the second safe class, It is the second verification mode to determine corresponding verification mode, and it is anti-to send receiving terminal after checking instruction to terminal The checking information of feedback, is performed when the checking information for judging terminal feedback is matched with default checking information Control lock instruction, realizes and is sent after gathering checking information by terminal to electrical control cubicles to complete verification process Verification mode, enhance the interactive of terminal and electrical control cubicles, improve the security of control lock process.
Specifically, checking information can be that user is inputted to the character checking information of terminal, such as user Name, can be touch control operation checking information, such as the fingerprint collecting mould by being arranged in terminal The fingerprint feature information for the user that block is collected, can also be the voice of the user collected by terminal Checking information and face verification information.
In the above-mentioned technical solutions, it is preferable that verification unit 206 is additionally operable to:Judging user identity Identification information is matched with pre-set user identity identification information, and the safety according to the type of items prestored etc. When level is three safe class, it is the 3rd verification mode to determine verification mode;Central lock system 200 is also wrapped Include:Trigger element 214, for sending cue to terminal according to the 3rd verification mode, to trigger Terminal generation checking mark corresponding with cue;Judging unit 204 is additionally operable to:Judge checking mark Know and whether matched with default checking mark;Verification unit 206 is additionally operable to:In decision verification mark and in advance If during checking mark matching, performing control lock instruction, wherein, checking mark includes the picture of terminal generation At least one of mark, audio identification and optical indicia.
In the technical scheme, when the safe class of the type of items prestored is three safe class, It is the 3rd verification mode to determine corresponding verification mode, and by sending cue to terminal, triggering is eventually The corresponding checking mark of end generation cue, is matched in judgement checking mark with default checking mark When, control lock instruction is performed, the validation-cross of electrical control cubicles and terminal is realized, simplifies the operation of user Step.
Specifically, checking mark is included in picture identification, audio identification and the optical indicia of terminal generation At least one, such as terminal receive electrical control cubicles transmission cue after, generate according to certain frequency Rate enters the optical indicia of line flicker, electrical control cubicles collect optical indicia and judge flicker frequency with it is default When flicker frequency is consistent, you can perform control lock instruction.
In addition, checking mark can also be bar code or 2 D code information, terminal receives cue Afterwards, corresponding bar code or 2 D code information are automatically generated according to cue, and by this bar code or 2 D code information is sent to electrical control cubicles, can also after this bar code or 2 D code information are by checking Trigger electrical control cubicles and perform control lock instruction.
In the above-mentioned technical solutions, it is preferable that verification unit 206 is additionally operable to:Judging user identity Identification information is matched with pre-set user identity identification information, and the safety according to the type of items prestored etc. When level is four safe class, it is the 4th verification mode to determine verification mode;Central lock system 200 is also wrapped Include:Detection unit 216, for being detected whether to produce near field sensing with terminal according to the 4th verification mode Signal;Verification unit 206 is additionally operable to:When detecting with terminal generation near field induced signal, perform Control lock instruction, wherein, near field induced signal includes radio frequency induction signal, bluetooth induced signal and Wi- At least one of Fi induced signals.
In the technical scheme, when the safe class of the type of items prestored is four safe class, It is the 4th verification mode to determine corresponding verification mode, by detecting electrical control cubicles and terminal generation near field Control lock instruction is performed during induced signal, realizes and instruction is locked to control using wireless docking and near-field communication Checking, simplifies the operation of user, improves the intellectuality of verification process.
Specifically, the use of the propagation distance of commercial radio transmission apparatus Wi-Fi induced signals it is 300 meters Left and right, is 10 meters to 50 meters or so using household radio route propagation scope.Bluetooth induced signal exists 10 meters or so can only be transmitted in the case of having certain obstacle, in the case of without any obstacle, strictly Transmission of the product manufactured according to standard at most up to 30 meters.RFID(Radio Frequency Identification, also known as radio frequency identification, radio frequency identification) propagation distance under different frequency range Difference, the maximum propagation distance of radio frequency induction signal is 1.2 meters under low frequency band and high-frequency band, Maximum propagation distance under ultra-high frequency band is 4 meters, and under microwave frequency band radio frequency induction signal Maximum propagation distance is 15 meters.It was found from the transmission range of above-mentioned near field induced signal, when detecting When electrical control cubicles and terminal produce near field induced signal, terminal user generally in electrical control cubicles enclosure region, Control lock instruction is performed under the conditions of this, the security for performing control lock instruction can be effectively improved, and Simplify the verification process of user.
Carried out specifically with reference to Fig. 3 to Fig. 6 to controlling lock scheme according to an embodiment of the invention It is bright.
Embodiment one:
As shown in figure 3, control locking method according to another embodiment of the invention, including:Step 302, matched in judgement user identification information with pre-set user identity identification information, and according to pre- When the safe class for the type of items deposited is the first safe class, it is the first authentication to determine verification mode Formula;Step 304, the characteristic information of user is gathered according to the first verification mode;Step 306, judge Whether the characteristic information of user matches with default characteristic information, if so, step 308 is then performed, if It is no, then terminate;Step 308, control lock instruction is performed, wherein, the characteristic information of user includes user With the distance between electrical control cubicles information, the vocal print feature information of user, the fingerprint feature information of user and At least one of image feature information of user.
In the technical scheme, when the safe class of the type of items prestored is the first safe class, It is the first verification mode to determine corresponding verification mode, by the characteristic information for the user for judging to collect Control lock instruction is performed when being matched with default characteristic information, realizes and gathers checking information by electrical control cubicles And the verification mode of authentication verification process is completed, the validity of control lock instruction is improved, control lock is improved The security of process.
Embodiment two:
As shown in figure 4, control locking method according to still a further embodiment, including:Step 402, matched in judgement user identification information with pre-set user identity identification information, and according to pre- When the safe class for the type of items deposited is the second safe class, it is the second authentication to determine verification mode Formula;Step 404, checking instruction is sent to terminal according to the second verification mode, to pass through terminal notifying User's validation information;Step 406, the checking information of terminal feedback is obtained;Step 408, sentence Whether the checking information of disconnected terminal feedback matches with default checking information, if so, then performing step 410, if it is not, then terminating;Step 410, control lock instruction is performed, wherein, checking information includes using Family inputs the character checking information to terminal, touch control operation checking information, speech verification information and face At least one of checking information.
In the technical scheme, when the safe class of the type of items prestored is the second safe class, It is the second verification mode to determine corresponding verification mode, the receiving terminal after checking instruction is sent to terminal The checking information of feedback, during by judging that the checking information that terminal is fed back is matched with default checking information Control lock instruction is performed, is realized by being sent after terminal collection checking information to electrical control cubicles to complete checking The verification mode of process, enhances the interactive of terminal and electrical control cubicles, improves the safety of control lock process Property.
Embodiment three:
As shown in figure 5, control locking method according to still another embodiment of the invention, including:Step 502, matched in judgement user identification information with pre-set user identity identification information, and according to pre- When the safe class for the type of items deposited is three safe class, it is the 3rd authentication to determine verification mode Formula;Step 504, cue is sent to terminal according to the 3rd verification mode, generated with triggering terminal Checking mark corresponding with cue;Step 506, judge that checking is identified whether and default checking mark Matching is known, if so, step 508 is then performed, if it is not, then terminating;Step 508, control lock is performed to refer to Order, wherein, checking mark is included in picture identification, audio identification and the optical indicia of terminal generation It is at least one.
In the technical scheme, when the safe class of the type of items prestored is three safe class, It is the 3rd verification mode to determine corresponding verification mode, by the way that terminal is sent after cue, triggering The corresponding checking mark of terminal generation cue, to judge checking mark and default checking mark During matching, control lock instruction is performed, the validation-cross of electrical control cubicles and terminal is realized, simplifies user's Operating procedure.
Example IV:
As shown in fig. 6, control locking method according to still another embodiment of the invention, including:Step 602, matched in judgement user identification information with pre-set user identity identification information, and according to pre- When the safe class for the type of items deposited is four safe class, it is the 4th authentication to determine verification mode Formula;Step 604, detected whether to produce near field induced signal with terminal according to the 4th verification mode;Step Rapid 606, when detecting with terminal generation near field induced signal, control lock instruction is performed, wherein, closely Field induced signal is included in radio frequency induction signal, bluetooth induced signal and Wi-Fi induced signals at least It is a kind of.
In the technical scheme, when the safe class of the type of items prestored is four safe class, It is the 4th verification mode to determine corresponding verification mode, by detecting electrical control cubicles and terminal generation near field Control lock instruction is performed during induced signal, realizes and instruction is locked to control using wireless docking and near-field communication Checking, simplifies the operation of user, improves the intellectuality of verification process.
Technical scheme is described in detail above in association with accompanying drawing, it is contemplated that in correlation technique how A kind of new control lock scheme is designed, is asked with further improving the technology of security of control electrical control cubicles Topic, the present invention proposes a kind of new control lock scheme, by the control lock instruction of terminal transmission is judged User identification information matched with pre-set user identity identification information after, further according to depositing in advance The safe class for the type of items being put in electrical control cubicles determines verification mode, by according to depositing in advance The safe class of type of items in electrical control cubicles determines verification mode, reduces user misoperation and causes wealth The possibility of loss is produced, the security of remote Program-controlled lock is improved, improves the usage experience of user.
The preferred embodiments of the present invention are the foregoing is only, are not intended to limit the invention, for For those skilled in the art, the present invention can have various modifications and variations.All essences in the present invention God is with principle, and any modification, equivalent substitution and improvements made etc. should be included in the present invention Protection domain within.

Claims (10)

1. one kind control locking method, it is adaptable to electrical control cubicles, it is characterised in that including:
After the control lock instruction of terminal transmission is got, the user identity parsed in the control lock instruction is known Other information;
Judge whether the user identification information matches with pre-set user identity identification information;
When judging that the user identification information is matched with the pre-set user identity identification information, The control lock instruction correspondence is determined according to the safe class for the type of items for depositing in the electrical control cubicles in advance Verification mode, and according to the verification mode to it is described control lock command verification success after, perform institute State control lock instruction.
2. control locking method according to claim 1, it is characterised in that judging the user When identity identification information is matched with the pre-set user identity identification information, according to depositing in advance The safe class of the type of items of electrical control cubicles determines the corresponding verification mode of the control lock instruction, and in root The control is locked after command verification success according to the verification mode, the control lock is performed and instructs, specific bag Include following steps:
Matched in the judgement user identification information with the pre-set user identity identification information, and During according to the safe class of the type of items prestored for the first safe class, determine that the verification mode is First verification mode;
The characteristic information of user is gathered according to the first verification mode;
Judge whether the characteristic information of the user matches with default characteristic information;
When the characteristic information for judging the user is matched with the default characteristic information, perform described Control lock instruction,
Wherein, the characteristic information of the user includes the distance between the user and described electrical control cubicles letter The figure of breath, the vocal print feature information of the user, the fingerprint feature information of the user and the user As at least one of characteristic information.
3. control locking method according to claim 1, it is characterised in that judging the user When identity identification information is matched with the pre-set user identity identification information, according to depositing in advance The safe class of the type of items of electrical control cubicles determines the corresponding verification mode of the control lock instruction, and in root The control is locked after command verification success according to the verification mode, the execution control lock is instructed, specific to go back Comprise the following steps:
Matched in the judgement user identification information with the pre-set user identity identification information, and During according to the safe class of the type of items prestored for the second safe class, determine that the verification mode is Second verification mode;
Checking instruction is sent to the terminal according to the second verification mode, to be used by the terminal notifying Family validation information;
Obtain the checking information of the terminal feedback;
Judge whether the checking information of the terminal feedback matches with default checking information;
When the checking information for judging the terminal feedback is matched with the default checking information, perform The control lock instruction,
Wherein, the checking information including the user input to the character checking information of the terminal, At least one of touch control operation checking information, speech verification information and face verification information.
4. control locking method according to claim 1, it is characterised in that judging the user When identity identification information is matched with the pre-set user identity identification information, according to depositing in advance The safe class of the type of items of electrical control cubicles determines the corresponding verification mode of the control lock instruction, and in root The control is locked after command verification success according to the verification mode, the execution control lock is instructed, specific to go back Comprise the following steps:
Matched in the judgement user identification information with the pre-set user identity identification information, and During according to the safe class of the type of items prestored for three safe classes, determine that the verification mode is 3rd verification mode;
Cue is sent to the terminal according to the 3rd verification mode, with trigger terminal generation with The cue is corresponding to verify mark;
Judge that the checking identifies whether to match with default checking mark;
When judging that the checking mark is matched with the default checking mark, perform the control lock and refer to Order,
Wherein, the checking mark includes picture identification, audio identification and the optics of the terminal generation At least one of mark.
5. the control locking method according to any one of Claims 1-4, it is characterised in that When judging that the user identification information is matched with the pre-set user identity identification information, according to The safe class for depositing in the type of items of the electrical control cubicles in advance determines that the control lock instructs corresponding test Card mode, and after according to the verification mode to the control lock command verification success, perform the control Lock instruction, it is specific further comprising the steps of:
Matched in the judgement user identification information with the pre-set user identity identification information, and During according to the safe class of the type of items prestored for four safe classes, determine that the verification mode is 4th verification mode;
Detected whether to produce near field induced signal with the terminal according to the 4th verification mode;
When detecting with terminal generation near field induced signal, the control lock instruction is performed,
Wherein, the near field induced signal includes radio frequency induction signal, bluetooth induced signal and Wi-Fi At least one of induced signal.
6. a kind of central lock system, it is adaptable to electrical control cubicles, it is characterised in that including:
Resolution unit, after the control lock for sending is instructed, parses the user identity knowledge in the control lock instruction Other information;
Judging unit, for judging the user identification information and pre-set user identity identification information Whether match;
Verification unit, when being matched for identity identification information with the pre-set user identity identification information, The control lock instruction correspondence is determined according to the safe class for the type of items for depositing in the electrical control cubicles in advance Verification mode, and according to the verification mode to it is described control lock command verification success after, perform institute State control lock instruction.
7. central lock system according to claim 6, it is characterised in that
The verification unit is additionally operable to:Judging the user identification information and the pre-set user Identity identification information is matched, and is the first safe class according to the safe class of the type of items prestored When, it is the first verification mode to determine the verification mode;
The central lock system also includes:
Collecting unit, the characteristic information for gathering user according to the first verification mode;
The judging unit is additionally operable to:Judge whether the characteristic information of the user is believed with default feature Breath matching;
The verification unit is additionally operable to:Judging the characteristic information and the default feature of the user During information matches, the control lock instruction is performed,
Wherein, the characteristic information of the user includes the distance between the user and described electrical control cubicles letter The figure of breath, the vocal print feature information of the user, the fingerprint feature information of the user and the user As at least one of characteristic information.
8. central lock system according to claim 6, it is characterised in that
The verification unit is additionally operable to:Judging the user identification information and the pre-set user Identity identification information is matched, and is the second safe class according to the safe class of the type of items prestored When, it is the second verification mode to determine the verification mode;
The central lock system also includes:
Transmitting element, for sending checking instruction to the terminal according to the second verification mode, to pass through The terminal notifying user validation information;
Acquiring unit, the checking information for obtaining the terminal feedback;
The judging unit is additionally operable to:Judge whether the checking information of the terminal feedback is tested with default Demonstrate,prove information matches;
The verification unit is additionally operable to:Judge the checking information of terminal feedback with it is described default When checking information is matched, the control lock instruction is performed,
Wherein, the checking information including the user input to the character checking information of the terminal, At least one of touch control operation checking information, speech verification information and face verification information.
9. central lock system according to claim 6, it is characterised in that
The verification unit is additionally operable to:Judging the user identification information and the pre-set user Identity identification information is matched, and is the 3rd safe class according to the safe class of the type of items prestored When, it is the 3rd verification mode to determine the verification mode;
The central lock system also includes:
Trigger element, for sending cue to the terminal according to the 3rd verification mode, to trigger The terminal generation is corresponding with the cue to verify mark;
The judging unit is additionally operable to:Judge that the checking identifies whether to match with default checking mark;
The verification unit is additionally operable to:Matched judging that the checking mark is identified with the default checking When, the control lock instruction is performed,
Wherein, the checking mark includes picture identification, audio identification and the optics of the terminal generation At least one of mark.
10. the central lock system according to any one of claim 6 to 9, it is characterised in that
The verification unit is additionally operable to:Judging the user identification information and the pre-set user Identity identification information is matched, and is the 4th safe class according to the safe class of the type of items prestored When, it is the 4th verification mode to determine the verification mode;
The central lock system also includes:
Detection unit, for being detected whether to produce near field with the terminal according to the 4th verification mode Induced signal;
The verification unit is additionally operable to:When detecting with terminal generation near field induced signal, hold The row control lock instruction,
Wherein, the near field induced signal includes radio frequency induction signal, bluetooth induced signal and Wi-Fi At least one of induced signal.
CN201610266227.XA 2016-04-26 2016-04-26 Control locking method and central lock system Pending CN107316356A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610266227.XA CN107316356A (en) 2016-04-26 2016-04-26 Control locking method and central lock system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610266227.XA CN107316356A (en) 2016-04-26 2016-04-26 Control locking method and central lock system

Publications (1)

Publication Number Publication Date
CN107316356A true CN107316356A (en) 2017-11-03

Family

ID=60184302

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610266227.XA Pending CN107316356A (en) 2016-04-26 2016-04-26 Control locking method and central lock system

Country Status (1)

Country Link
CN (1) CN107316356A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108109233A (en) * 2017-12-14 2018-06-01 华南理工大学 Multilevel security protection system based on biological information of human body
WO2019090834A1 (en) * 2017-11-10 2019-05-16 广州势必可赢网络科技有限公司 Express cabinet pickup method and apparatus based on voiceprint
CN109949457A (en) * 2019-03-04 2019-06-28 北京华大智宝电子系统有限公司 Intelligent door lock control method and relevant apparatus
CN112863032A (en) * 2019-11-28 2021-05-28 比亚迪汽车工业有限公司 Gate control method and device, storage medium and electronic equipment
CN113436376A (en) * 2021-06-02 2021-09-24 杭州海康威视数字技术股份有限公司 Access control system, method and device and biological key card
CN118334783A (en) * 2024-05-14 2024-07-12 深圳市智汇安行科技有限公司 Control method, device, equipment and storage medium of intelligent electronic lock

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1776704A (en) * 2004-11-19 2006-05-24 株式会社日立制作所 Safety system, identifying server, identifying method and program
CN101615309A (en) * 2008-12-05 2009-12-30 张小鹏 Identification presentation device and based on the personal identification method and the system thereof of this device
CN101644124A (en) * 2009-08-28 2010-02-10 广州广电运通金融电子股份有限公司 Automatic storage/retrieval safe
CN102037706A (en) * 2008-03-21 2011-04-27 人性化基本输入输出系统有限责任公司 Method for the temporary personalization of a communication device
CN102542647A (en) * 2012-02-08 2012-07-04 广东步步高电子工业有限公司 Method and system for opening safe or entrance guard device by utilizing mobile terminal
CN103093531A (en) * 2013-01-18 2013-05-08 陈志衍 Lock system controlled by internet
CN203102405U (en) * 2012-12-31 2013-07-31 于净 Bullet cabinet
CN103500394A (en) * 2013-10-28 2014-01-08 苏州大学 Unattended operation logistics distribution and goods picking method and system
CN103726742A (en) * 2013-12-30 2014-04-16 北京瑞福临科技有限公司 Vertical type fingerprint confidential cabinet and control system thereof
CN104219374A (en) * 2013-06-04 2014-12-17 李旭阳 Human-computer interaction system on basis of next-generation intelligent mobile phone
CN104517170A (en) * 2013-09-30 2015-04-15 北大方正集团有限公司 Equipment and method for monitoring articles
CN105516060A (en) * 2014-09-25 2016-04-20 宇龙计算机通信科技(深圳)有限公司 Entrance guard system, terminal, cloud server and safety strategy setting method

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1776704A (en) * 2004-11-19 2006-05-24 株式会社日立制作所 Safety system, identifying server, identifying method and program
CN102037706A (en) * 2008-03-21 2011-04-27 人性化基本输入输出系统有限责任公司 Method for the temporary personalization of a communication device
CN101615309A (en) * 2008-12-05 2009-12-30 张小鹏 Identification presentation device and based on the personal identification method and the system thereof of this device
CN101644124A (en) * 2009-08-28 2010-02-10 广州广电运通金融电子股份有限公司 Automatic storage/retrieval safe
CN102542647A (en) * 2012-02-08 2012-07-04 广东步步高电子工业有限公司 Method and system for opening safe or entrance guard device by utilizing mobile terminal
CN203102405U (en) * 2012-12-31 2013-07-31 于净 Bullet cabinet
CN103093531A (en) * 2013-01-18 2013-05-08 陈志衍 Lock system controlled by internet
CN104219374A (en) * 2013-06-04 2014-12-17 李旭阳 Human-computer interaction system on basis of next-generation intelligent mobile phone
CN104517170A (en) * 2013-09-30 2015-04-15 北大方正集团有限公司 Equipment and method for monitoring articles
CN103500394A (en) * 2013-10-28 2014-01-08 苏州大学 Unattended operation logistics distribution and goods picking method and system
CN103726742A (en) * 2013-12-30 2014-04-16 北京瑞福临科技有限公司 Vertical type fingerprint confidential cabinet and control system thereof
CN105516060A (en) * 2014-09-25 2016-04-20 宇龙计算机通信科技(深圳)有限公司 Entrance guard system, terminal, cloud server and safety strategy setting method

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019090834A1 (en) * 2017-11-10 2019-05-16 广州势必可赢网络科技有限公司 Express cabinet pickup method and apparatus based on voiceprint
CN108109233A (en) * 2017-12-14 2018-06-01 华南理工大学 Multilevel security protection system based on biological information of human body
CN109949457A (en) * 2019-03-04 2019-06-28 北京华大智宝电子系统有限公司 Intelligent door lock control method and relevant apparatus
CN112863032A (en) * 2019-11-28 2021-05-28 比亚迪汽车工业有限公司 Gate control method and device, storage medium and electronic equipment
CN113436376A (en) * 2021-06-02 2021-09-24 杭州海康威视数字技术股份有限公司 Access control system, method and device and biological key card
CN118334783A (en) * 2024-05-14 2024-07-12 深圳市智汇安行科技有限公司 Control method, device, equipment and storage medium of intelligent electronic lock

Similar Documents

Publication Publication Date Title
CN107316356A (en) Control locking method and central lock system
CN106204817B (en) A kind of control method of control of bluetooth access
CN107578519A (en) A kind of intelligent access control system and intelligent entrance guard method for unlocking
US20060136997A1 (en) Authentication system and method
CN202679415U (en) Vehicle remote control system based on voice command, communication terminal and cloud computing platform server
KR101218297B1 (en) System and Method for Controlling Door Lock
CN105590363A (en) Method for unlocking intelligent door lock based on distance change induction and intelligent door lock system thereof
CN110011811A (en) Vehicle unlock authentication method and device based on terminal device
CN111554020A (en) Internet of things access control system based on RFID and biological identification
CN106274807A (en) Automobile intelligent control method based on mobile terminal and device
CN212256412U (en) Internet of things access control system based on RFID and biological identification
CN109402941A (en) A kind of control method for washing machine and clothes washing system
CN110164012A (en) A kind of community's access control system and working method thereof
CN102158473A (en) Remote entry system
CN205210991U (en) Access control system based on two take place ofs ID cards and face identification
CN206522020U (en) A kind of intelligent door lock and system
CN105574967A (en) Intelligent access control system and operation method thereof
CN105939336A (en) Identity authentication method and system
CN105991652A (en) Identity authentication method and system
CN105991654A (en) Authorization authentication method, device and system
CN103791686A (en) Intelligent refrigerator with iris recognition function
CN103806789A (en) Intelligent safety box with iris recognition function
CN109671192A (en) A kind of method and earphone using earphone unlock intelligent door lock
CN205091815U (en) Access control system based on iris and radio frequency card identification technique
KR20180009278A (en) Method for authenticating opening of digital doorlock

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20171103

RJ01 Rejection of invention patent application after publication