CN108629876A - Alarm method, equipment and the computer readable storage medium of lockset - Google Patents

Alarm method, equipment and the computer readable storage medium of lockset Download PDF

Info

Publication number
CN108629876A
CN108629876A CN201810396432.7A CN201810396432A CN108629876A CN 108629876 A CN108629876 A CN 108629876A CN 201810396432 A CN201810396432 A CN 201810396432A CN 108629876 A CN108629876 A CN 108629876A
Authority
CN
China
Prior art keywords
user
lockset
alarm
illegal unlock
illegal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810396432.7A
Other languages
Chinese (zh)
Inventor
周长金
周军
彭程
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Cool Intelligent Technology Co Ltd
Original Assignee
Shenzhen Cool Intelligent Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Cool Intelligent Technology Co Ltd filed Critical Shenzhen Cool Intelligent Technology Co Ltd
Priority to CN201810396432.7A priority Critical patent/CN108629876A/en
Publication of CN108629876A publication Critical patent/CN108629876A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00563Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys using personal physical data of the operator, e.g. finger prints, retinal images, voicepatterns
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/18Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength
    • G08B13/189Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems
    • G08B13/194Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems
    • G08B13/196Actuation by interference with heat, light, or radiation of shorter wavelength; Actuation by intruding sources of heat, light, or radiation of shorter wavelength using passive radiation detection systems using image scanning and comparing systems using television cameras
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B21/00Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
    • G08B21/18Status alarms
    • G08B21/182Level alarms, e.g. alarms responsive to variables exceeding a threshold

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • Emergency Management (AREA)
  • Alarm Systems (AREA)

Abstract

The invention discloses a kind of alarm methods of lockset, the described method comprises the following steps:When receiving user's input illegal unlock instruction, Image Acquisition mechanism is opened, the facial image of the user is acquired;Statistics receives the number that user inputs illegal unlock instruction;The number that illegal unlock instruction is inputted according to collected user's facial image and user judges whether to reach preset alarm condition;When reaching preset alarm condition, the number that illegal unlock instruction is inputted according to collected user's facial image and user obtains corresponding alarm mechanism, and is alarmed according to the alarm mechanism got.The invention also discloses a kind of warning device of lockset and computer readable storage mediums.The present invention can realize lockset remote control and management, realize lockset intelligent management, prevent the generation of insecurity.

Description

Alarm method, equipment and the computer readable storage medium of lockset
Technical field
The present invention relates to a kind of smart home security technical field more particularly to alarm method of lockset, equipment and calculating Machine readable storage medium storing program for executing.
Background technology
With the development and improvement of living standard of social economy, people require also constantly to increase to the security protection of modern society Add, the especially security protection of the various occasions such as household, office, production and monitoring problem has been increasingly becoming people and has increasingly compeled The problem of cutting concern.
Security product in the market, it is existing can alarm lockset, when detecting that someone is illegal in use, judging simultaneously Alarm measure is taken, but in actual life, the case where there are user misoperations, such as user go to the wrong way floor, cause accidentally to make When with the locksets of other floors, existing lockset can carry out alarm, can not be identified to the maloperation of user, be made to user At inconvenience, intelligent management cannot achieve.
Invention content
It is a primary object of the present invention to propose a kind of alarm method of lockset, equipment and computer readable storage medium, It aims to solve the problem that the maloperation of user can not be identified in existing lockset, causes inconvenience to user, cannot achieve intelligence The technical issues of management.
To achieve the above object, the present invention provides a kind of alarm method of lockset, the method includes:
When receiving user's input illegal unlock instruction, Image Acquisition mechanism is opened, the face figure of the user is acquired Picture;
Statistics receives the number that user inputs illegal unlock instruction;
The number that illegal unlock instruction is inputted according to collected user's facial image and user judges whether to reach default Alert if;
When reaching preset alarm condition, illegal unlock is inputted according to collected user's facial image and user and is referred to The number of order obtains corresponding alarm mechanism, and is alarmed according to the alarm mechanism got.
One embodiment of the present invention, it is described that illegal unlock instruction is inputted according to collected user's facial image and user Number the step of judging whether to reach alarm threshold value include:
When the user inputs the number that illegal unlock instructs and reaches the first preset value, by each collected user's Facial image is compared;
If the corresponding user of facial image of each collected user is same user, it is determined that reach alarm threshold value.
Another embodiment of the present invention, it is default that the number that illegal unlock instruction is inputted in the user reaches first When value, after the step of facial image of each collected user is compared, further include:
If the corresponding user of facial image of each collected user is different user, it is determined that do not reach warning level Value, and continue the number of counting user input illegal unlock instruction;
When the user inputs the number that illegal unlock instructs and reaches the second preset value, determination reaches alarm threshold value.
Another embodiment of the present invention, it is described illegally to be opened according to collected user's facial image and user's input Locking the step of number instructed extracts corresponding alarm mechanism includes:
The number that illegal unlock instruction is inputted in the user reaches the first preset value, and the people of collected user every time When the corresponding user of face image is same user, the first alarm mechanism is extracted;
The number that illegal unlock instruction is inputted in the user reaches the second preset value, and the people of collected user every time When the corresponding user of face image is different user, the second alarm mechanism is extracted;
The number that illegal unlock instruction is inputted in the user reaches the second preset value, and the people of collected user every time When the corresponding user of face image is same user, third alarm mechanism is extracted.
Another embodiment of the present invention, the user input illegal unlock instruction and include:User inputs illegal fingerprint, uses Family inputs illegal unlock password, user inputs illegal face, user inputs at least one of illegal iris.
In addition, to achieve the above object, the present invention also provides a kind of warning device of lockset, the warning devices of the lockset Including processor, network interface, user interface and memory, the alert program of lockset is stored in the memory;The place The step of reason device is used to execute the alert program of the lockset, alarm method to realize lockset as described above.
In addition, to achieve the above object, it is described computer-readable the present invention also provides a kind of computer readable storage medium It is stored with the alert program of lockset on storage medium, is realized when the alert program of the lockset is executed by processor as described above The step of alarm method of lockset.
Alarm method, equipment and the computer readable storage medium of lockset proposed by the present invention are inputted when receiving user When illegal unlock instructs, Image Acquisition mechanism is opened, the facial image of the user is acquired;Then statistics receives user's input The number of illegal unlock instruction;And the number that illegal unlock instruction is inputted according to collected user's facial image and user judges Whether preset alarm condition is reached;When reaching preset alarm condition, according to collected user's facial image and user The number for inputting illegal unlock instruction obtains corresponding alarm mechanism, and is alarmed according to the alarm mechanism got, passes through Aforesaid way is instructed according to collected facial image and illegal unlock first in the illegal unlock instruction for receiving user Number judges whether to reach alarm threshold value, specifically be handled further according to judging result, for example alarm or do not alarm, to keep away Exempt from also to alarm in the case where user's triggering opens by mistake lock, realizes lockset intelligent management and lockset remote control and pipe Reason, and the generation of insecurity is prevented, improve user experience.
Description of the drawings
Fig. 1 is the flow diagram of the alarm method first embodiment of lockset of the present invention;
Fig. 2 be lockset of the present invention alarm method second embodiment according to collected user's facial image and use The refinement flow diagram for the step of number of family input illegal unlock instruction extracts corresponding alarm mechanism;
Fig. 3 is the device structure schematic diagram for the hardware running environment that the embodiment of the present invention is related to.
The embodiments will be further described with reference to the accompanying drawings for the realization, the function and the advantages of the object of the present invention.
Specific implementation mode
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
The embodiment of the present invention provides a kind of alarm method of lockset.
Referring to Fig.1, Fig. 1 is the flow diagram of the alarm method first embodiment of lockset of the present invention.
In the present embodiment, this method includes:
Step S10 opens Image Acquisition mechanism, acquires the user when receiving user's input illegal unlock instruction Facial image;
In the present embodiment, each embodiment of the present invention is realized by intelligent lock system, wherein the intelligent lock system System may include lockset, camera, iris lens, fingerprint capturer, communication unit, Password Input screen or keyboard etc., can be with Understand, different locksets may include different component, for example fingerprint lock only needs to include fingerprint capturer, camera And communication unit, need not include the component of whole, such as the first-class component of iridoscope, it is of course also possible to including whole Component is not limited herein, and certain lockset can also be including screen awakening device, doorbell button, handle etc., specifically, can To acquire the facial image of user by camera, the iris of user is acquired by iris lens, is acquired by fingerprint capturer The fingerprint of user handles the user images, iris, fingerprint etc. by communication unit, and passes through the communication unit It carries out judging whether the unlocking instruction received is illegal unlock instruction.
User can first click on screen awakening device before inputting unlocking instruction, wake up screen, and it is input by user right to receive Answer unlocking instruction, such as fingerprint, password, face iris etc., then by the unlocking instruction received and the unlocking information that prestores into Row comparison, to judge whether the unlocking instruction that receives is illegal unlocking instruction, specifically, the unlocking information to prestore It may include the unlocking information of multiple people, such as the finger print information of multiple people, the unlocking information of a people can also be only included, because This in the unlocking instruction that receives and prestores when being compared the unlocking instruction received and the unlocking information that prestores A unlocking information in unlocking information is consistent, you can determines that the unlocking instruction received is valid instruction, if what is received opens Lock instruction and unlocking information are all inconsistent, it is determined that the unlocking instruction received is illegal instruction;When determining that receive user defeated When entering illegal unlock instruction, then Image Acquisition mechanism is opened, and acquire the facial image of the user, consequently facilitating judging current User is to trigger unlocking instruction due to maloperation, or deliberately trigger unlocking instruction, attempts to carry out unlawful activities.
Further, the user, which inputs illegal unlock and instructs, includes:User inputs illegal fingerprint, user's input is illegally opened Lock cipher, user input illegal face, user inputs at least one of illegal iris.
Since the component that different locksets includes is inconsistent, illegal unlock instruction input by user may include one kind It is a variety of or a kind of, such as input illegal fingerprint, input illegal unlock password, the illegal face of input, the illegal iris of input etc., This is not limited.
Step S20, statistics receive the number that user inputs illegal unlock instruction;
After the facial image of acquisition user, need further to count time for receiving user's input illegal unlock instruction Number, the number to input illegal unlock instruction according to the facial image and user judge whether to need to alarm.
Step S30, the number that illegal unlock instruction is inputted according to collected user's facial image and user judge whether Reach preset alarm condition;
After the number that statistics obtains user's input illegal unlock instruction, you can according to collected user's facial image And user inputs the number that illegal unlock instructs and judges whether to reach preset alarm condition;It is possible to further the week to statistics Phase is configured, for example the number that every ten minutes statistics obtain is arranged and is reported, and then starts to count again.
Further, the number that illegal unlock instruction is inputted according to collected user's facial image and user judges The step of whether reaching preset alarm condition include:
When the user inputs the number that illegal unlock instructs and reaches the first preset value, by each collected user's Facial image is compared;
If the corresponding user of facial image of each collected user is same user, it is determined that reach preset alarm item Part.
Specifically, first determine whether that user inputs whether the number that illegal unlock instructs reaches the first preset value, in the use The number of family input illegal unlock instruction is when reaching the first preset value, due to triggering illegally instruct be all same user when, base Originally can exclude user be due to maloperation and trigger illegal unlock instruction or user be to trigger and illegally open due to maloperation The probability for locking instruction is smaller, it is therefore desirable to further compare the facial image of each collected user;Thus into one Step determines whether the user of triggering illegal unlock instruction every time is same user, if the user of triggering illegal unlock instruction is every time Same user can determine at this time there are user's illegal unlock, the behavior that violence is registered one's residence can then determine and reach preset alarm item Part;Specifically, first preset value can be twice or other be more than two integer number, do not limit herein.
It further, will be each when the number that illegal unlock instruction is inputted in the user reaches the first preset value After the step of facial image of collected user compares, further include:
If the corresponding user of facial image of each collected user is different user, it is determined that do not reach default Alert if, and continue the number of counting user input illegal unlock instruction;
When the user inputs the number that illegal unlock instructs and reaches the second preset value, determination reaches preset alarm item Part.
Specifically, if the user of triggering illegal unlock instruction is equal different user every time, triggering can further be counted The number of illegal unlock instruction, when the number that the user inputs illegal unlock instruction reaches the second preset value, due to triggering Illegal unlocking instruction is more, in order to prevent insecurity, it may be determined that reaches preset alarm condition at this time.Specifically, institute State the second preset value can be three times or other be more than three integer number, do not limit herein.
Step S40 is non-according to collected user's facial image and user's input when reaching preset alarm condition The number of method unlocking instruction obtains corresponding alarm mechanism, and is alarmed according to the alarm mechanism got.
When reaching preset alarm condition, since different situations corresponds to different alarm mechanisms, it is therefore desirable to according to institute It states collected user's facial image and user and inputs the number of illegal unlock instruction and obtain corresponding alarm mechanism, and according to obtaining The alarm mechanism got is alarmed.For example, the number that illegal unlock instruction is inputted in the user reaches the first preset value, and When the corresponding user of facial image of each collected user is same user, the first alarm mechanism is extracted;Wherein, described One alarm mechanism can be that lock system is automatic locking and trigger notice information, wherein the system self-locking time can be First preset time, for example differ for one minute to one hour, trigger notice information may include that notification information is sent to and is locked Have system relationship user terminal, and/or with the associated security system of lock system, handled to ensure public security, for example will touch Send out user's expulsion etc. of illegal unlock instruction.
The alarm method for the lockset that the present embodiment proposes opens image when receiving user's input illegal unlock instruction Collection mechanism acquires the facial image of the user;Then statistics receives the number that user inputs illegal unlock instruction;And root The number that illegal unlock instruction is inputted according to collected user's facial image and user judges whether to reach preset alarm condition;When When reaching preset alarm condition, the number that illegal unlock instruction is inputted according to collected user's facial image and user obtains Corresponding alarm mechanism is taken, and is alarmed according to the alarm mechanism got, by the above-mentioned means, receiving the non-of user When method unlocking instruction, judge whether to reach alarm threshold value according to collected facial image and illegal unlock instruction number first, It is specifically handled further according to judging result, for example alarms or do not alarm, to avoid the case where user's triggering opens by mistake lock Under also alarm, realize lockset intelligence pipe and lockset remote control and management, and prevent the generation of insecurity, Improve user experience.
Further, with reference to Fig. 2, the alarm method first embodiment based on lockset of the present invention proposes the report of lockset of the present invention Alarm method second embodiment.
In the present embodiment, the step 40 includes:
Step 41, the number that illegal unlock instruction is inputted in the user reaches the first preset value, and collected every time When the corresponding user of facial image of user is same user, the first alarm mechanism is extracted;
Step 42, the number that illegal unlock instruction is inputted in the user reaches the second preset value, and collected every time When the corresponding user of facial image of user is different user, the second alarm mechanism is extracted;
Step 43, the number that illegal unlock instruction is inputted in the user reaches the second preset value, and collected every time When the corresponding user of facial image of user is same user, third alarm mechanism is extracted.
In the present embodiment, the number for illegal unlock instruction being inputted in the user reaches the first preset value, and adopts every time When the corresponding user of facial image of the user collected is same user, the first alarm mechanism is extracted, wherein first alarm Mechanism can be that lock system is automatic locking and triggering authentication mistake is registered wherein, and the system self-locking time can be first Preset time, for example differ for one minute to one hour, the registration of triggering authentication mistake is that active user is registered as authentication error, That is the not no user of unlocking authority;
The number that illegal unlock instruction is inputted in the user reaches the first preset value, but the people of collected user every time The corresponding user of face image is different user, then continues statistics and receive user's input illegal unlock instruction, defeated in the user The number for entering illegal unlock instruction reaches the second preset value, and the corresponding user of facial image of collected user is every time When different user, the second alarm mechanism is extracted;Wherein, second alarm mechanism can be automatic locking for lock system and be triggered Notification information, trigger notice information may include by notification information be sent to the associated user terminal of lock system, and/or with The associated security system of lock system, is handled to ensure public security, such as the user's expulsion etc. that will trigger illegal unlock instruction.Its In, distinct, the second alarm mechanism pair between the system self-locking time of the second alarm mechanism and the first alarm mechanism The system self-locking time answered can be to differ for one hour to 48 hours;
The number that illegal unlock instruction is inputted in the user reaches the second preset value, and the people of collected user every time When the corresponding user of face image is same user, third alarm mechanism is extracted.Wherein, the third alarm mechanism can be lockset System is automatic locking and starts wireless live broadcast, when the system of third alarm mechanism and the first, second alarm mechanism is self-locking Between between it is distinct, the corresponding system of the third alarm mechanism self-locking time can permanently lock, that is, close unlock Permission can just be unlocked again only after the corresponding owner of current lockset carries out releasing permission, start wireless live broadcast The picture video of active user's illegal unlock is subjected to wireless live broadcast, it is possible to further push to the live streaming and lockset The user terminal of system relationship, and/or with the associated security system of lock system, to cause the attention of house-owner and security personnel, To be handled in time.
The present invention further provides a kind of warning devices of lockset.
With reference to Fig. 3, Fig. 3 is the device structure schematic diagram for the hardware running environment that the embodiment of the present invention is related to.
As shown in figure 3, the warning device of the lockset may include:Processor 1001, such as CPU, network interface 1002 are used Family interface 1003, memory 1004.Connection communication between these components can be realized by communication bus.Network interface 1002 It is optional may include the wireline interface (for connecting cable network) of standard, wireless interface (such as WI-FI interfaces, blue tooth interface, Infrared interface etc., for connecting wireless network).User interface 1003 may include display screen (Display), input unit ratio Such as keyboard (Keyboard), optional user interface 1003 can also include the wireline interface of standard (such as connecting wired key Disk, wire mouse etc.) and/or wireless interface (such as connecting Wireless Keyboard, wireless mouse).Memory 1004 can be high Fast RAM memory can also be stable memory (non-volatile memory), such as magnetic disk storage.Memory The 1004 optional storage devices that can also be independently of aforementioned processor 1001.
Optionally, the warning device of the lockset can also include camera, RF (Radio Frequency, radio frequency) circuit, Sensor, voicefrequency circuit, WiFi module etc..
It will be understood by those skilled in the art that the warning device structure of lockset shown in Fig. 3 is not constituted to lockset The restriction of warning device may include either combining certain components or different components than illustrating more or fewer components Arrangement.
As shown in figure 3, as may include that operating system, network are logical in a kind of memory 1004 of computer storage media Believe module, the alert program of Subscriber Interface Module SIM and lockset.Wherein, operating system is the warning device of management and control lockset The program of hardware and software resource supports the alert program and other programs of network communication module, Subscriber Interface Module SIM, lockset Or the operation of software;Network communication module is for managing and controlling network interface 1002;Subscriber Interface Module SIM is for managing and controlling User interface 1003 processed.
In the warning device of lockset shown in Fig. 3, network interface 1002 be mainly used for connect database, with database into Row data communication;User interface 1003 is mainly used for connecting client (can be understood as user terminal), and data are carried out with client Communication such as shows information to client by window, or receives the operation information that client is sent;And processor 1001 can be with Alert program for executing the lockset stored in memory 1004, to realize following steps:
When receiving user's input illegal unlock instruction, Image Acquisition mechanism is opened, the face figure of the user is acquired Picture;
Statistics receives the number that user inputs illegal unlock instruction;
The number that illegal unlock instruction is inputted according to collected user's facial image and user judges whether to reach default Alert if;
When reaching preset alarm condition, illegal unlock is inputted according to collected user's facial image and user and is referred to The number of order obtains corresponding alarm mechanism, and is alarmed according to the alarm mechanism got.
Further, the processor 1001 is additionally operable to execute the alert program of the lockset stored in memory 1004, with Realize following steps:
When the user inputs the number that illegal unlock instructs and reaches the first preset value, by each collected user's Facial image is compared;
If the corresponding user of facial image of each collected user is same user, it is determined that reach alarm threshold value.
Further, the processor 1001 is additionally operable to execute the alert program of the lockset stored in memory 1004, with Realize following steps:
If the corresponding user of facial image of each collected user is different user, it is determined that do not reach warning level Value, and continue the number of counting user input illegal unlock instruction;
When the user inputs the number that illegal unlock instructs and reaches the second preset value, determination reaches alarm threshold value.
Further, the processor 1001 is additionally operable to execute the alert program of the lockset stored in memory 1004, with Realize following steps:
The number that illegal unlock instruction is inputted in the user reaches the first preset value, and the people of collected user every time When the corresponding user of face image is same user, the first alarm mechanism is extracted;
The number that illegal unlock instruction is inputted in the user reaches the second preset value, and the people of collected user every time When the corresponding user of face image is different user, the second alarm mechanism is extracted;
The number that illegal unlock instruction is inputted in the user reaches the second preset value, and the people of collected user every time When the corresponding user of face image is same user, third alarm mechanism is extracted.
Further, the user, which inputs illegal unlock and instructs, includes:User inputs illegal fingerprint, user's input is illegally opened Lock cipher, user input illegal face, user inputs at least one of illegal iris.
The specific embodiment of the warning device of lockset of the present invention and each embodiment of alarm method of above-mentioned lockset are essentially identical, Therefore not to repeat here.
The present invention also provides a kind of computer readable storage medium, there are one the computer-readable recording medium storages Or multiple programs, one or more of programs can be executed by one or more processor, to realize following steps:
When receiving user's input illegal unlock instruction, Image Acquisition mechanism is opened, the face figure of the user is acquired Picture;
Statistics receives the number that user inputs illegal unlock instruction;
The number that illegal unlock instruction is inputted according to collected user's facial image and user judges whether to reach default Alert if;
When reaching preset alarm condition, illegal unlock is inputted according to collected user's facial image and user and is referred to The number of order obtains corresponding alarm mechanism, and is alarmed according to the alarm mechanism got.
Further, one or more of programs can be executed by one or more of processors, also realize with Lower step:
When the user inputs the number that illegal unlock instructs and reaches the first preset value, by each collected user's Facial image is compared;
If the corresponding user of facial image of each collected user is same user, it is determined that reach alarm threshold value.
Further, one or more of programs can be executed by one or more of processors, also realize with Lower step:
If the corresponding user of facial image of each collected user is different user, it is determined that do not reach warning level Value, and continue the number of counting user input illegal unlock instruction;
When the user inputs the number that illegal unlock instructs and reaches the second preset value, determination reaches alarm threshold value.
Further, one or more of programs can be executed by one or more of processors, also realize with Lower step:
The number that illegal unlock instruction is inputted in the user reaches the first preset value, and the people of collected user every time When the corresponding user of face image is same user, the first alarm mechanism is extracted;
The number that illegal unlock instruction is inputted in the user reaches the second preset value, and the people of collected user every time When the corresponding user of face image is different user, the second alarm mechanism is extracted;
The number that illegal unlock instruction is inputted in the user reaches the second preset value, and the people of collected user every time When the corresponding user of face image is same user, third alarm mechanism is extracted.
Further, the user, which inputs illegal unlock and instructs, includes:User inputs illegal fingerprint, user's input is illegally opened Lock cipher, user input illegal face, user inputs at least one of illegal iris.
The alarm of the specific embodiment of computer readable storage medium of the present invention and the alarm method and lockset of above-mentioned lockset Each embodiment of equipment is essentially identical, and therefore not to repeat here.
It should also be noted that, herein, the terms "include", "comprise" or its any other variant are intended to non- It is exclusive to include, so that process, method, article or device including a series of elements include not only those elements, But also include other elements that are not explicitly listed, or further include solid by this process, method, article or device Some elements.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including There is also other identical elements in the process of the element, method, article or device.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side Method can add the mode of required general hardware platform to realize by software, naturally it is also possible to by hardware, but in many cases The former is more preferably embodiment.Based on this understanding, technical scheme of the present invention substantially in other words does the prior art Going out the part of contribution can be expressed in the form of software products, which is stored in a storage medium In (such as ROM/RAM, magnetic disc, CD), including some instructions are used so that a station terminal equipment (can be mobile phone, computer, clothes Be engaged in device, air conditioner or the network equipment etc.) method that executes each embodiment of the present invention.
It these are only the preferred embodiment of the present invention, be not intended to limit the scope of the invention, it is every to utilize this hair Equivalent structure or equivalent flow shift made by bright specification and accompanying drawing content is applied directly or indirectly in other relevant skills Art field, is included within the scope of the present invention.

Claims (10)

1. a kind of alarm method of lockset, which is characterized in that the described method comprises the following steps:
When receiving user's input illegal unlock instruction, Image Acquisition mechanism is opened, the facial image of the user is acquired;
Statistics receives the number that user inputs illegal unlock instruction;
The number that illegal unlock instruction is inputted according to collected user's facial image and user judges whether to reach preset alarm Condition;
When reaching alarm preset condition, illegal unlock instruction is inputted according to collected user's facial image and user Number obtains corresponding alarm mechanism, and is alarmed according to the alarm mechanism got.
2. the alarm method of lockset as described in claim 1, which is characterized in that described according to collected user's facial image And user inputs the number that illegal unlock instructs and judges whether that the step of reaching preset alarm condition includes:
When the user inputs the number that illegal unlock instructs and reaches the first preset value, by the face of each collected user Image is compared;
If the corresponding user of facial image of each collected user is same user, it is determined that reach alarm threshold value.
3. the alarm method of lockset as claimed in claim 2, which is characterized in that described to refer in user input illegal unlock When the number of order reaches the first preset value, after the step of facial image of each collected user is compared, also wrap It includes:
If the corresponding user of facial image of each collected user is different user, it is determined that do not reach alarm threshold value, And continue the number of counting user input illegal unlock instruction;
When the user inputs the number that illegal unlock instructs and reaches the second preset value, determination reaches alert if.
4. the alarm method of lockset as described in claim 1, which is characterized in that described according to collected user's face The step of number that image and user input illegal unlock instruction obtains corresponding alarm mechanism include:
The number that illegal unlock instruction is inputted in the user reaches the first preset value, and the face figure of collected user every time As corresponding user be same user when, extract the first alarm mechanism;
The number that illegal unlock instruction is inputted in the user reaches the second preset value, and the face figure of collected user every time When being different user as corresponding user, the second alarm mechanism is extracted;
The number that illegal unlock instruction is inputted in the user reaches the second preset value, and the face figure of collected user every time As corresponding user be same user when, extract third alarm mechanism.
5. the alarm method of lockset as described in claim 1, which is characterized in that the user inputs illegal unlock instruction packet It includes:User inputs illegal fingerprint, user inputs illegal unlock password, user inputs illegal face, user inputs in illegal iris At least one.
6. a kind of warning device of lockset, which is characterized in that the warning device of the lockset includes processor, network interface, use Family interface and memory are stored with the alert program of lockset in the memory;The processor is for executing the lockset Alert program, to realize following steps:
When receiving user's input illegal unlock instruction, Image Acquisition mechanism is opened, the facial image of the user is acquired;
Statistics receives the number that user inputs illegal unlock instruction;
The number that illegal unlock instruction is inputted according to collected user's facial image and user judges whether to reach preset alarm Condition;
When reaching preset alarm condition, illegal unlock instruction is inputted according to collected user's facial image and user Number obtains corresponding alarm mechanism, and is alarmed according to the alarm mechanism got.
7. the warning device of lockset as claimed in claim 6, which is characterized in that the processor is additionally operable to execute the lockset Alert program, to realize following steps:
When the user inputs the number that illegal unlock instructs and reaches the first preset value, by the face of each collected user Image is compared;
If the corresponding user of facial image of each collected user is same user, it is determined that reach alarm threshold value.
8. the warning device of lockset as claimed in claim 7, which is characterized in that the processor is additionally operable to execute the lockset Alert program, to realize following steps:
If the corresponding user of facial image of each collected user is different user, it is determined that do not reach alarm threshold value, And continue the number of counting user input illegal unlock instruction;
When the user inputs the number that illegal unlock instructs and reaches the second preset value, determination reaches alarm threshold value.
9. the warning device of lockset as claimed in claim 6, which is characterized in that the processor is additionally operable to execute the lockset Alert program, to realize following steps:
The number that illegal unlock instruction is inputted in the user reaches the first preset value, and the face figure of collected user every time As corresponding user be same user when, extract the first alarm mechanism;
The number that illegal unlock instruction is inputted in the user reaches the second preset value, and the face figure of collected user every time When being different user as corresponding user, the second alarm mechanism is extracted;
The number that illegal unlock instruction is inputted in the user reaches the second preset value, and the face figure of collected user every time As corresponding user be same user when, extract third alarm mechanism.
10. a kind of computer readable storage medium, which is characterized in that be stored with lockset on the computer readable storage medium The lockset as described in any one of claim 1 to 5 is realized when the alert program of alert program, the lockset is executed by processor Alarm method the step of.
CN201810396432.7A 2018-04-27 2018-04-27 Alarm method, equipment and the computer readable storage medium of lockset Pending CN108629876A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810396432.7A CN108629876A (en) 2018-04-27 2018-04-27 Alarm method, equipment and the computer readable storage medium of lockset

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810396432.7A CN108629876A (en) 2018-04-27 2018-04-27 Alarm method, equipment and the computer readable storage medium of lockset

Publications (1)

Publication Number Publication Date
CN108629876A true CN108629876A (en) 2018-10-09

Family

ID=63694742

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810396432.7A Pending CN108629876A (en) 2018-04-27 2018-04-27 Alarm method, equipment and the computer readable storage medium of lockset

Country Status (1)

Country Link
CN (1) CN108629876A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110264597A (en) * 2019-06-13 2019-09-20 北京深思数盾科技股份有限公司 Intelligent lock and its method of unlocking
CN114202833A (en) * 2021-12-10 2022-03-18 珠海格力电器股份有限公司 Intelligent door lock alarm method, device, equipment and storage medium
CN116311714A (en) * 2023-04-24 2023-06-23 深圳市锦锐科技股份有限公司 Method and system for preventing false alarm of intelligent door lock

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1336372A2 (en) * 2002-02-19 2003-08-20 Delphi Technologies, Inc. Eye tracking system with person identification
CN201605898U (en) * 2009-03-16 2010-10-13 徐克林 Burglar alarm lock capable of photographing and sending short messages
CN103899156A (en) * 2014-04-09 2014-07-02 东莞安尔发智能科技股份有限公司 Door lock extensive application implementation method and door lock extensive application implementation system
CN107195036A (en) * 2017-05-11 2017-09-22 广东汇泰龙科技有限公司 A kind of method and its system of the improper unlocking of identification intelligent door lock
CN107424274A (en) * 2017-08-01 2017-12-01 上海传英信息技术有限公司 The method, apparatus and intelligent door lock that a kind of intelligent door lock is unlocked

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1336372A2 (en) * 2002-02-19 2003-08-20 Delphi Technologies, Inc. Eye tracking system with person identification
CN201605898U (en) * 2009-03-16 2010-10-13 徐克林 Burglar alarm lock capable of photographing and sending short messages
CN103899156A (en) * 2014-04-09 2014-07-02 东莞安尔发智能科技股份有限公司 Door lock extensive application implementation method and door lock extensive application implementation system
CN107195036A (en) * 2017-05-11 2017-09-22 广东汇泰龙科技有限公司 A kind of method and its system of the improper unlocking of identification intelligent door lock
CN107424274A (en) * 2017-08-01 2017-12-01 上海传英信息技术有限公司 The method, apparatus and intelligent door lock that a kind of intelligent door lock is unlocked

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110264597A (en) * 2019-06-13 2019-09-20 北京深思数盾科技股份有限公司 Intelligent lock and its method of unlocking
CN114202833A (en) * 2021-12-10 2022-03-18 珠海格力电器股份有限公司 Intelligent door lock alarm method, device, equipment and storage medium
CN116311714A (en) * 2023-04-24 2023-06-23 深圳市锦锐科技股份有限公司 Method and system for preventing false alarm of intelligent door lock

Similar Documents

Publication Publication Date Title
AU2017276840B2 (en) Padlock device, systems including a padlock device, and methods of operating therefor
CN108537929B (en) Remote unlocking system and remote unlocking method
KR101296863B1 (en) Entry authentication system using nfc door lock
WO2016184195A1 (en) Door lock control method, apparatus and terminal
CN108629876A (en) Alarm method, equipment and the computer readable storage medium of lockset
CN106506442A (en) A kind of smart home multi-user identification and its Rights Management System
TW201706895A (en) Systems and methods for redundant access control systems based on mobile devices
KR101910105B1 (en) Method and system for controlling doorlock
CN103731633A (en) Television device capable of carrying out remote monitoring and control method of television device
CN108537927B (en) Lockset terminal and method for controlling lockset terminal through regional management
WO2017185457A1 (en) Control method and apparatus for access control lock, and terminal
CN105893823A (en) Security protection method and device, and intelligent terminal
WO2018014322A1 (en) Residential intelligent door lock system and control method thereof
CN105574477A (en) Secure anti-theft method, apparatus and system
CN105913513A (en) Control method and system for door lock system
CN101630421A (en) Remote visual door control system
CN106650361A (en) Unblocking method and device
US10026299B2 (en) Mobile supported disarming
CN108035621A (en) A kind of intelligent door lock control method and device
CN111243127B (en) Intelligent door lock configuration method and device and intelligent door lock system
CN110113423A (en) A method of message is used based on internet push intelligent door lock
WO2017113719A1 (en) Remote mobile terminal locking method and system
CN108509783B (en) Intelligent terminal application program management system
JP3830360B2 (en) Security protection device and method
CN115802090A (en) Video occlusion method, system, computer device and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20181009

RJ01 Rejection of invention patent application after publication