CN109246600A - Security protection personal identification method, system and computer readable storage medium - Google Patents

Security protection personal identification method, system and computer readable storage medium Download PDF

Info

Publication number
CN109246600A
CN109246600A CN201811014162.5A CN201811014162A CN109246600A CN 109246600 A CN109246600 A CN 109246600A CN 201811014162 A CN201811014162 A CN 201811014162A CN 109246600 A CN109246600 A CN 109246600A
Authority
CN
China
Prior art keywords
mac address
bluetooth
human body
mobile device
security protection
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811014162.5A
Other languages
Chinese (zh)
Other versions
CN109246600B (en
Inventor
徐惟远
吕彪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Yanhe Technology Co Ltd
Original Assignee
Shenzhen Yanhe Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Yanhe Technology Co Ltd filed Critical Shenzhen Yanhe Technology Co Ltd
Priority to CN201811014162.5A priority Critical patent/CN109246600B/en
Publication of CN109246600A publication Critical patent/CN109246600A/en
Application granted granted Critical
Publication of CN109246600B publication Critical patent/CN109246600B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/061Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Alarm Systems (AREA)

Abstract

Security protection personal identification method of the invention includes: to open bluetooth hardware equipment transmitting pairing signal, bluetooth hardware equipment includes main control chip, it is electrically connected the radio-frequency antenna and Bluetooth adapter of the main control chip, matched and with bluetooth mobile device enter pairing range in connected automatically, receive the MAC Address of the mobile device, and countdown, the MAC Address for the mobile device that the image and the mobile human body for carrying out continuing detecting mobile human body before countdown terminates carry, judge whether the image of mobile human body persistently match with received MAC Address with the match MAC Address of the mobile device carried with mobile human body of the human body image information of storage, if, alarm is not started, after countdown, detect the MAC Address of the mobile device, but corresponding mobile human body is not detected Image, the MAC Address of the mobile device is added in blacklist, bluetooth connection is disconnected.For the present invention using more convenient intelligence, safety is higher.

Description

Security protection personal identification method, system and computer readable storage medium
Technical field
The present invention relates to field of security technology, in particular to a kind of security protection personal identification method, system and computer-readable Storage medium.
Background technique
It is household or known that the problem of being often easy to appear in existing Household security system, which is the people that can not identify back, People or stranger.Because only that just needing to send warning message to household when occurring that stranger, so resulting in mesh Preceding Household security system is all easy to generate false alarm, i.e., is obviously that household goes home, and also has sent alarm to all household's mobile phones Information.
For current recognition of face, prior art mainly passes through face recognition technology to determine whether for household Or known people, and face recognition technology is limited by several objective factors: the angle of face, only works as face and video camera at present Camera lens is in face angle, 15 ° of most side faces;Distance, only working as face at present could identify within 5 meters of video camera, and Accuracy is only 90%;Light, requirement of the recognition of face at present to ambient light is to cannot be below 30Lux.Therefore, recognition of face Monk or known people can not be accurately identified, so as to cause still more seriously existing the problem of false alarm.It is especially right In villa, because household is returned outside courtyard, distance is remote, and not necessarily, and light certainly not has angle when night goes home 30Lux。
Current RF tag is identified, a RF tag is worn to each household, as long as household carries this Label can be found by equipment when going home or leaving home and automatically control other household safety-protection equipment of family, and this mode is similar It is automatic far from rear door as long as can drive with car key close to car door in the noninductive identification method that many automobiles use It latches.But this mode has following defect: must carry an additional label, can force a product to household and take with oneself Band, and for friends and family or often carry out the cleaning worker etc. of family, it is impossible to a label is worn to everyone, is used The RFID technique of label, safe encryption are relatively low.
For current common bluetooth radio frequency identification, can not have to by any labeling apparatus, as long as user's carrying mobile phone ?.But a disadvantage is that must first take out mobile phone before user's identification lights screen, and the APP for entering this product could be completed Identification process afterwards, this mode can bring extra operation to user.For example, ought go home daily before entering, household will first be dug out Mobile phone opens APP, is intended merely to that the equipment of family is allowed to know oneself back, this operation does not obviously meet user's habit.
It, be first before the coverage for going home to reach video camera every time in addition, for the user for being mounted with video camera Cell phone application is opened, after informing system oneself has been gone home, just can enter the coverage of video camera, otherwise video camera will be right This event is alarmed.This method does not constitute huge challenge to user's so one most common habit of going home, therefore not May finally it be received by most of ordinary peoples, use is very inconvenient.
Summary of the invention
The main object of the present invention is to provide a kind of security protection personal identification method, it is intended to use more convenient intelligence, safety It is higher.
To achieve the above object, the present invention proposes a kind of security protection personal identification method, which includes Following steps:
S10: it opens bluetooth hardware equipment and emits pairing signal, bluetooth hardware equipment includes main control chip, is electrically connected institute The radio-frequency antenna and Bluetooth adapter of main control chip are stated,
S60: having matched and with bluetooth mobile device enter pairing range in connected automatically,
S80: receiving the MAC Address of the mobile device, and countdown,
S90: the movement that the image and the mobile human body for carrying out continuing detecting mobile human body before countdown terminates carry is set Standby MAC Address,
S100: judging whether the image of mobile human body matches with the human body image information of storage and mobile human body carries Whether the MAC Address of mobile device persistently matches with received MAC Address, if so, S101: do not start alarm,
S110: it after countdown, detects the MAC Address of the mobile device, but corresponding movement is not detected The MAC Address of the mobile device is added in blacklist, and disconnects bluetooth connection by the image of human body.
Preferably, further comprising the steps of before step S80 after step S60:
S70: judging the mobile device whether in blacklist, if it is not, perform the next step,
Preferably, further comprising the steps of before step S60 after step S10:
S20: bluetooth hardware equipment receives the bind request of the mobile device with bluetooth,
S30: exchanging key and store after successful connection,
S40: the MAC Address of mobile device is matched.
Preferably, further comprising the steps of before step S60 after step S10:
S50: it takes pictures after detecting the image of mobile human body.
Preferably, step S100 specifically includes the following steps:
If it is not, S102: starting the countdown of first time unit, repetition judge mobile human body image whether the people with storage Body image information matches, if be once it is yes, do not start alarm, if be it is no, starting alarm.
Preferably, step S110 specifically includes the following steps:
S111: within a certain period of time, whether the number of the MAC Address of the mobile device of scanning reaches threshold values for judgement, if so, S112: judgement detects whether the number of the image of corresponding mobile human body reaches threshold values.
Preferably, step S112 specifically includes the following steps:
If so, S1121: the number of the MAC Address of the mobile device of scanning is calculated as zero, if it is not, S1122: by the movement The MAC Address of equipment is added in blacklist, and disconnects bluetooth connection.
Preferably, further comprising the steps of after step S1122:
S1123: after the image for detecting mobile human body, emptying blacklist, gradually executes by step S60.
The present invention also proposes that a kind of security protection identification system, the security protection identification system include: memory, service Device, bluetooth hardware equipment, camera, alarm and it is stored in the peace that can be run on the memory and on the server Anti- identification program, the bluetooth hardware equipment include main control chip, the radio-frequency antenna for being electrically connected the main control chip and Bluetooth adapter, the camera and alarm are electrically connected server, in which:
The security protection identification program realizes security protection identification side as described above when being executed by the server The step of method.
The present invention also proposes a kind of computer readable storage medium, is stored with security protection on the computer readable storage medium Identification program, the security protection identification program realize security protection identity as described in any one of the above embodiments when being executed by server The step of recognition methods.
Technical solution of the present invention emits pairing signal by opening bluetooth hardware equipment, and bluetooth hardware equipment includes master control core Piece, the radio-frequency antenna and Bluetooth adapter for being electrically connected the main control chip, have been matched and the mobile device with bluetooth enters It is connected automatically in pairing range, receives the MAC Address of the mobile device, and countdown, carried out before countdown terminates The MAC Address for the mobile device that the image and the mobile human body for persistently detecting mobile human body carry, judges the image of mobile human body Whether with the human body image information of storage match the mobile device carried with mobile human body MAC Address whether with it is received MAC Address persistently matches, if so, S101: not starting alarm, after countdown, detects the MAC of the mobile device Address, but the image of corresponding mobile human body is not detected, the MAC Address of the mobile device is added in blacklist, and is broken Bluetooth connection is opened, enters in pairing range and can be felt in advance as long as making user carry the mobile device with bluetooth with this It should identify, it can be achieved that far distance automatic identification incudes, and not need user and open APP in mobile device, be omitted additional Operation, using more convenient intelligence, safety is also higher.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this Some embodiments of invention for those of ordinary skill in the art without creative efforts, can be with The structure shown according to these attached drawings obtains other attached drawings.
Fig. 1 is the flowage structure schematic diagram of one embodiment of security protection personal identification method of the present invention;
Fig. 2 is the flowage structure schematic diagram of another embodiment of security protection personal identification method of the present invention;
Fig. 3 is the flowage structure schematic diagram of security protection personal identification method another embodiment of the present invention;
Fig. 4 is the flowage structure schematic diagram of the step S100 of Fig. 1, Fig. 2 or Fig. 3 of the present invention;
Fig. 5 is the flowage structure schematic diagram of the step S110 of Fig. 1, Fig. 2 or Fig. 3 of the present invention;
Fig. 6 is the attachment structure schematic diagram of security protection identification system of the present invention.
Drawing reference numeral explanation:
Label Title Label Title
10 Memory 32 Radio-frequency antenna
20 Server 33 Bluetooth adapter
30 Bluetooth hardware equipment 40 Camera
31 Main control chip 50 Alarm
The embodiments will be further described with reference to the accompanying drawings for the realization, the function and the advantages of the object of the present invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiment is only a part of the embodiments of the present invention, instead of all the embodiments.Base Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts it is all its His embodiment, shall fall within the protection scope of the present invention.
It is to be appreciated that the directional instruction (such as up, down, left, right, before and after ...) of institute is only used in the embodiment of the present invention In explaining in relative positional relationship, the motion conditions etc. under a certain particular pose (as shown in the picture) between each component, if should When particular pose changes, then directionality instruction also correspondingly changes correspondingly.
In the present invention unless specifically defined or limited otherwise, term " connection ", " fixation " etc. shall be understood in a broad sense, For example, " fixation " may be a fixed connection, it may be a detachable connection, or integral;It can be mechanical connection, be also possible to Electrical connection;It can be directly connected, the connection inside two elements or two can also be can be indirectly connected through an intermediary The interaction relationship of a element, unless otherwise restricted clearly.It for the ordinary skill in the art, can basis Concrete condition understands the concrete meaning of above-mentioned term in the present invention.
In addition, the description for being such as related to " first ", " second " in the present invention is used for description purposes only, and should not be understood as Its relative importance of indication or suggestion or the quantity for implicitly indicating indicated technical characteristic.Define as a result, " first ", The feature of " second " can explicitly or implicitly include at least one of the features.In addition, the technical side between each embodiment Case can be combined with each other, but must be based on can be realized by those of ordinary skill in the art, when the combination of technical solution Conflicting or cannot achieve when occur will be understood that the combination of this technical solution is not present, also not the present invention claims guarantor Within the scope of shield.
Referring to Fig. 6, the present invention also proposes a kind of security protection identification system, and the security protection identification system includes: to deposit It reservoir 10, server 20, bluetooth hardware equipment 30, camera 40, alarm 50 and is stored on the memory 10 and can be The security protection identification program run on the server 20, the bluetooth hardware equipment 30 include main control chip 31, electrically connect The radio-frequency antenna 32 and Bluetooth adapter 33 of the main control chip 31 are connect, the camera 40 and alarm 50 are electrically connected service Device 20.
Wherein, the memory 10 includes at least a type of readable storage medium storing program for executing, is installed on the peace for storing The operating system of anti-identification system and types of applications software, such as the program code of security protection identification program etc..In addition, The memory 10 can be also used for temporarily storing the Various types of data that has exported or will export.Radio-frequency antenna therein 32 period can be adjusted, preferably 20ms, and radio-frequency antenna can be orientation radio-frequency antenna.Camera 40 therein can be more It is a;Alarm 50 therein is also multiple.
The server 20 can be in some embodiments central server (Central Processing Unit, CPU), controller, microcontroller, microserver or other data processing chips.The server 20 is commonly used in the control peace The overall operation of anti-identification system.In the present embodiment, the server 20 is used to run to store in the memory 10 Program code or processing data, such as run the security protection identification program etc..
Referring to Fig.1 and Fig. 4, when the security protection identification program is executed by the server 20, following steps are realized:
The present invention proposes a kind of security protection personal identification method.
In an embodiment of the present invention, the security protection personal identification method the following steps are included:
S10: it opens bluetooth hardware equipment 30 and emits pairing signal, bluetooth hardware equipment 30 includes main control chip 31, electrical property The radio-frequency antenna 32 and Bluetooth adapter 33 of the main control chip 31 are connected,
S60: having matched and with bluetooth mobile device enter pairing range in connected automatically,
S80: receiving the MAC Address of the mobile device, and countdown,
S90: the movement that the image and the mobile human body for carrying out continuing detecting mobile human body before countdown terminates carry is set Standby MAC Address,
S100: judging whether the image of mobile human body matches with the human body image information of storage and mobile human body carries Whether the MAC Address of mobile device persistently matches with received MAC Address, if so, S101: not starting alarm;If it is not, S102: starting the countdown of first time unit, repetition judge mobile human body image whether the human body image information phase with storage Matching, if once be it is yes, do not start alarm, if be it is no, start alarm.
S110: it after countdown, detects the MAC Address of the mobile device, but corresponding movement is not detected The MAC Address of the mobile device is added in blacklist, and disconnects bluetooth connection by the image of human body.
Mobile human body therein is user and/or household, and the mobile device therein with bluetooth is mobile phone, is hereafter referred to as For household's mobile phone.
First embodiment are as follows:
First stage
Bluetooth hardware equipment 30: the lasting bluetooth for waiting the mobile phone matched pair is attached;
Household's mobile phone: household's Bluetooth of mobile phone signal occurs in orientation range;
Bluetooth hardware equipment 30: household's mobile phone in connection judges whether there is this mobile phone being connected in blacklist, does not go out Present blacklist, then continue;
Bluetooth hardware equipment 30: after successful connection, mobile phone MAC Address is issued into main control chip 31, main control chip 31 is IPC Main control chip;
Main control chip 31: after receiving MAC Address, " alarm stops " being written as " true ", starts 30s countdown, i.e., in 30s It is interior, it is not responding to any alert event, camera 40 persistently detects the image of mobile human body;The 30s time therein can be as needed It is adjusted.
Main control chip 31 works as humanoid judgement event=" true " for receiving the feedback of server 20, i.e. the image of mobile human body is Match with the human body image information of storage, main control chip 31 can send an instruction and give bluetooth hardware equipment;
When bluetooth hardware equipment 30 receives this instruction, record " Human detection threshold value " automatic+1;
Second stage
Household's mobile phone: at the end of 30 countdown of bluetooth hardware equipment, it is possible to which household also fails to enter door;
Main control chip 31: the image of the detecting discovery mobile human body of camera 40 is first passed through, takes pictures, is sent to server 20;
Then, bluetooth hardware equipment 30 scans people's Bluetooth of mobile phone of getting home again, finds household's mobile phone, judges household's mobile phone When MAC Address is not in blacklist, the MAC Address of mobile phone is sent to main control chip 31;
Main control chip 31: the MAC Address for the Bluetooth of mobile phone that bluetooth hardware equipment 30 is sent is received, MAC Address is sent to Server 20, while 30s countdown is restarted, " alarm stops " being written as " true ",
Bluetooth hardware equipment 30: restarting 30s countdown, and connection is scanned to the bluetooth of mobile phone and carries out silence, after The continuous countdown (not restarting new 10min countdown) for carrying out 10min, waits,
Main control chip 31: the image information of the mobile human body of the shooting of camera 40 of the return of server 20, judgement " report are received Whether the instruction of alert stopping " is " true ", if it is not, 3s is waited, it is per second to inquire whether this primary value is " true ", that is, is judged Whether the image of mobile human body matches with the human body image information of storage;
Main control chip 31: if above-mentioned is " true ", that is, matching, and does not start alarm flow (at this point, because bluetooth hardware Equipment 30 has sent alarm immediately, and can determine not when so judging for the first time will start alarm);If " false ", that is, do not match that, starting alarm flow (that is, when bluetooth does not find household's mobile phone, opens alarm);
Referring to Fig. 2, it is preferable that further comprising the steps of before step S60 after step S10:
S20: bluetooth hardware equipment 30 receives the bind request of the mobile device with bluetooth,
S30: exchanging key and store after successful connection,
S40: the MAC Address of mobile device is matched.
It can realize that household binds logic through the above steps, specific embodiment is the APP by installing in mobile device, It initiates household and binds process, and the internet by connecting is sent to main control chip;
Main control chip: bluetooth hardware equipment is issued into the instruction for entering the configuration status of above-mentioned binding;
Bluetooth hardware equipment 30: there may be following several current working conditions;1, from unbound excessively any mobile phone;2, Together with certain handset binding;3, the bluetooth scanning of bluetooth hardware equipment 30 is being carried out, and was having the hand of pairing Machine;
No matter bluetooth hardware equipment 30 is currently at any one of 3 kinds of situations as above, all directly terminates current connection, and Into the passive state for waiting connection, active connection no longer is carried out with the equipment matched before;
Bluetooth equipment actively initiates the connection APP active scan when discovery bluetooth hardware equipment 30 at one's side;Bluetooth hardware is set Standby 30 are passively attached, and key is exchanged after successful connection;The MAC Address of the mobile phone is issued bluetooth hardware by bluetooth by APP Equipment 30;
Bluetooth hardware equipment 30: storage key and the MAC Address for matching mobile phone;
After APP receives the instruction of 30 binding success of bluetooth hardware equipment, actively disconnects this bluetooth connection and (but do not need Turn off the Bluetooth function of this mobile phone);
When there is second mobile device to start to be bound again, it is above-mentioned that repetition is executed by second mobile device Process.
Apparatus bound situation further includes as follows:
It is required that user not allow first the mobile phone for having bound bluetooth match herein near or close bound The bluetooth of the mobile phone of bluetooth, main control chip 31 are hard to bluetooth when cell phone apparatus does not connect external mobile network normally Part equipment 30 sends instructions, and allows bluetooth hardware equipment 30 should not active scan.
Referring to Fig.1 and Fig. 5, it is preferable that step S110 specifically includes the following steps:
S111: within a certain period of time, whether the number of the MAC Address of the mobile device of scanning reaches threshold values for judgement, if so, S112: judgement detects whether the number of the image of corresponding mobile human body reaches threshold values.
Preferably, step S112 specifically includes the following steps:
If so, S1121: the number of the MAC Address of the mobile device of scanning is calculated as zero, if it is not, S1122: by the movement The MAC Address of equipment is added in blacklist, and disconnects bluetooth connection.
Preferably, further comprising the steps of after step S1122:
S1123: after the image for detecting mobile human body, emptying blacklist, gradually executes by step S60.
To prevent household in the case where normal activity, household's mobile phone is accidentally swept to by bluetooth hardware equipment 30, specific real Under applying for example:
Bluetooth hardware equipment 30: scanning manpower machine of getting home for the first time, (at this time by household's mobile phone MAC Address comparison blacklist Household's blacklist is sky), MAC Address then sends MAC Address to main control chip 31 not in blacklist;
Bluetooth hardware equipment 30: the bluetooth connection with mobile phone is disconnected, and is kept a record to this mobile phone MAC Address, and to this MAC Address carries out count+1, i.e., carries out stored counts to MAC Address, then judge whether count numerical value is equal to 6, if waited In 6, then judge the numerical value of " Human detection threshold value ", the human body image information of this numerical value > 3, the i.e. image of mobile human body and storage When the number of detection of matching is greater than 3, then blacklist is not written into corresponding MAC Address, while by the count of this MAC Address Numerical value is reset, and also resets " Human detection threshold value ", when keeping household movable in courtyard always, can not alarmed always, be prevented False alarm.
If this numerical value≤3, i.e. the human body image information of the image of mobile human body and storage match detection number it is small When being equal to 3, blacklist is written into this MAC Address;
Bluetooth hardware equipment 30: starting 30s countdown is restarted another 10min countdown, before starting, first to be judged 10min countdown whether has been had been turned on, when only inactive, has just started 10min countdown;
In bluetooth hardware equipment 30:30s countdown, silence is carried out to the bluetooth scanning connection of mobile phone, after countdown, Continue to scan on the bluetooth of household's mobile phone;
Bluetooth hardware equipment 30: the bluetooth of household's mobile phone, comparison MAC Address and blacklist (blacklist at this time are found again It is empty not yet), MAC Address is sent to main control chip 31;
Bluetooth hardware equipment 30 then disconnects bluetooth connection, this household's mobile phone MAC Address found is continued to keep a record, Count+1 is carried out to this MAC Address;
Wherein bluetooth hardware equipment 30 is in starting 30s countdown, and judges whether to have had been turned on 10min countdown, if It has been turned on, then no longer restarts;After 30s countdown, bluetooth hardware equipment 30 continues searching household's mobile phone.
Referring to Fig. 2, it is preferable that further comprising the steps of before step S80 after step S60:
S70: judging the mobile device whether in blacklist, if it is not, perform the next step,
It includes following scenario described that blacklist, which is wherein added:
Bluetooth hardware equipment 30 can search the mobile phone of some household every time, therefore every 30s just will appear once After 3 minutes, blacklist is written in this MAC Address by count+1;
Bluetooth hardware equipment 30, the mobile phone of some primary household is arrived in scanning once in a while, sweeps to 5 times or more, then writes in 10min Enter blacklist;
Bluetooth hardware equipment 30 can sweep to household's mobile phone every time, but that may sweep to is not the same household, then may be used Multiple household's mobile phone MAC Address can be carried out with count+1, i.e. stored counts multiple household's MAC Address can be written in 10min Blacklist.
When bluetooth hardware equipment 30 carries out count numerical value judgement=6 to some household's mobile phone MAC Address, first by this Blacklist is written in the MAC Address of household;
Further include following embodiment after the MAC Address write-in blacklist of mobile phone:
After blacklist is written, start a 10min identification countdown:
In this countdown, if the MAC Address for having been written into blacklist no longer occurs, blacklist is emptied, is reset simultaneously The count numerical value recorded before this MAC Address;
If the MAC Address having been written into occurs again, count down time is restored to 10min, is continued waiting for;With This can effectively remove wrong report, i.e. head of a family's mobile phone then leaves bluetooth hardware again and set whithin a period of time by accidentally scanning connection Standby 30 scanning area, automatically remove the MAC Address of household from blacklist, so that removing will appear when this household gos out Wrong report.
Bluetooth hardware equipment 30: the MAC Address " multiple scanning prompting " of this household is issued into main control chip 31;
Bluetooth hardware equipment 30: disconnecting the bluetooth connection of this household, and countdown 30s, scans and connects to the bluetooth of mobile phone Tap into row silence;
Main control chip 31: after receiving " multiple scanning prompting " information, start a push process to APP, push content For " equipment Multiple-Scan is got home manpower machine, it is noted that mobile phone location, future are possible to but when you go out, it may appear that primary wrong report It is alert ".
Wherein main control chip 31 continues normally to handle the information exchange between bluetooth hardware equipment 30, not because bluetooth is hard Part equipment 30 is added to blacklist and generates any variation, and main control chip 31 only has a set of alarming logic, uniquely has with blacklist Associated is exactly push event above, remaining is as Normal Alarm behavior;
Even if wherein bluetooth hardware equipment 30 is added to MAC Address and enters blacklist, do not terminate 10min timing still, still after The continuous movement for carrying out count+1, at this time before count=6 MAC Address, will continue to become larger, but will not trigger again to The notice of main control chip 31;If the MAC Address of other household's mobile phones is also found in bluetooth hardware equipment 30, will continue to add black List, and reminded to main control chip 31;When 10min timing terminates, bluetooth hardware equipment 30 is with judging all MAC recorded The count numerical value of location, if value < 6, resets, if it is greater than 6, then do not change;After 10min timing, bluetooth hardware equipment 30, which are likely to also to will continue to scanning, gets home people's Bluetooth of mobile phone, to continue the movement of count+1, but because under movement thus Count can not be equal to 6 again, remind so will not continue to send to main control chip 31.Due to bluetooth hardware equipment 30 because Mobile phone MAC Address to be persistently scanned has entered blacklist, therefore even if sweeping to this mobile phone MAC Address, will not allow master control Chip sends a signal to 50 stop alarm of alarm.
Due to that ought have at this time another household to go home, may result in can not identify this household, persistently carry out falling for 10min Timing can not scan household at the end of countdown again, by the way that blacklist is written in the MAC Address of this household's mobile phone, open One 20min identification countdown can not scan this MAC Address, bluetooth hardware equipment only at the end of this countdown again 30 empty blacklist automatically, and reset the count numerical value of this MAC Address.
When head of a family is movable in institute, and with mobile phone;Main control chip 31 can be found humanoid by camera 40 every time This event is sent to bluetooth hardware equipment 30 by object;Bluetooth hardware equipment 30 receives an instruction, " Human detection threshold value " from Dynamic+1, in 10min, when the count numerical value of some MAC Address is equal to 6, whether judge " Human detection threshold value " > 3, if so, The count numerical value of this MAC Address is then reset, if " Human detection threshold value "≤3, are normally written blacklist.It prevents from working as with this When household is movable in institute, to exclude the false alarm generated when household is movable in institute.
Further, the specific embodiment of blacklist releasing logic is as follows:
The household for being written into blacklist enters 40 visual field of camera;Or another household, when going home, bluetooth hardware is set Standby 30 just because of the bluetooth for the household being connected in family and when being in silent status:
Main control chip 31 finds motion event by camera 40, reports to server 20, obtains " true " humanoid alarm Feedback waits 3s, and bluetooth is not fed back, and sends alarm and gives household's cell phone application;
Main control chip 31 sends an alarm command to bluetooth hardware equipment 30 simultaneously;
When bluetooth hardware equipment 30 receives the alarm command of main control chip 31, blacklist is emptied, while resetting all households Mobile phone count numerical value;
Bluetooth hardware equipment 30 comes back to original state, starts household's mobile phone MAC Address that scanning has been matched.
Referring to Fig. 3, it is preferable that further comprising the steps of before step S60 after step S10:
S50: it takes pictures after detecting the image of mobile human body.
Specifically, the reception of main control chip 31 is successfully instructed and issues when bluetooth hardware equipment 30 identifies, but camera 40 When not being found the image of mobile human body, main control chip 31 can direct stop alarm at this time;It is logical if it is main control chip 31 The image that camera 40 first finds mobile human body is crossed, then bluetooth hardware equipment 30 just finds household's mobile phone, then regards as leaving home Event;
Further: camera 40 first finds motion detecting event, i.e. the image that detects mobile human body of camera 40, into Row is taken pictures, and server is sent to;
Bluetooth hardware equipment 30: search household's mobile phone finds household's mobile phone, judges household's mobile phone MAC Address not in black name Dan Zhong then returns to household's mobile phone MAC Address to main control chip 31;
Main control chip 31: may first receive server 20 return mobile human body image whether the human body image with storage The judging result that information matches, result are " true " (there is human figure object), judge again at this time " alarm stop " whether be The MAC Address for the mobile device that " true ", i.e. mobile human body are carried persistently matches with received MAC Address, if it is not, then Wait 3s, inquiry per second is primary, under this situation, obtained in 3s bluetooth hardware equipment 30 feedback judge above structure be it is yes, " alarm stops " being written as " true ", i.e., is not alarmed;
Another situation first receives the instruction of the return of bluetooth hardware equipment 30, and " alarm stops " being written as " true ", Whether the MAC Address for then receiving the mobile device of the mobile human body carrying of the return of server 20 again is held with received MAC Address The continuous judging result that matches be it is yes, at this time directly can be with stop alarm process.
As long as making user carry the mobile device with bluetooth with this to enter in pairing range or in orientation range Incuded in advance identification, it can be achieved that far distance automatic identification incude, and do not need user opening mobile device on APP, Additional operation is omitted, using more convenient intelligence, safety is also higher.
The above description is only a preferred embodiment of the present invention, is not intended to limit the scope of the invention, all at this Under the inventive concept of invention, using equivalent structure transformation made by description of the invention and accompanying drawing content, or directly/use indirectly It is included in other related technical areas in scope of patent protection of the invention.

Claims (10)

1. a kind of security protection personal identification method, which comprises the following steps:
S10: it opens bluetooth hardware equipment and emits pairing signal, bluetooth hardware equipment includes main control chip, is electrically connected the master The radio-frequency antenna and Bluetooth adapter of chip are controlled,
S60: having matched and with bluetooth mobile device enter pairing range in connected automatically,
S80: receiving the MAC Address of the mobile device, and countdown,
S90: the mobile device that the image and the mobile human body for carrying out continuing detecting mobile human body before countdown terminates carry MAC Address,
S100: judge whether the image of mobile human body matches the movement carried with mobile human body with the human body image information of storage Whether the MAC Address of equipment persistently matches with received MAC Address, if so, S101: do not start alarm,
S110: it after countdown, detects the MAC Address of the mobile device, but corresponding mobile human body is not detected Image, the MAC Address of the mobile device is added in blacklist, and disconnect bluetooth connection.
2. security protection personal identification method as described in claim 1, which is characterized in that after step S60, before step S80, also The following steps are included:
S70: the mobile device is judged whether in blacklist, if it is not, performing the next step.
3. security protection personal identification method as described in claim 1, which is characterized in that after step S10, before step S60 also The following steps are included:
S20: bluetooth hardware equipment receives the bind request of the mobile device with bluetooth,
S30: exchanging key and store after successful connection,
S40: the MAC Address of mobile device is matched.
4. security protection personal identification method as described in any one of claims 1-3, which is characterized in that after step S10, step It is further comprising the steps of before S60:
S50: it takes pictures after detecting the image of mobile human body.
5. security protection personal identification method as described in claim 1, which is characterized in that step S100 specifically includes the following steps:
S102: if it is not, starting the countdown of first time unit, repetition judge mobile human body image whether the human figure with storage As information matches, if be once it is yes, do not start alarm, if being no, starting alarm.
6. security protection personal identification method as described in claim 1, which is characterized in that step S110 specifically includes the following steps:
S111: within a certain period of time, whether the number of the MAC Address of the mobile device of scanning reaches threshold values for judgement, if so, S112: judgement detects whether the number of the image of corresponding mobile human body reaches threshold values.
7. security protection personal identification method as claimed in claim 6, which is characterized in that step S112 specifically includes the following steps:
S1121: if so, the number of the MAC Address of the mobile device of scanning is calculated as zero, S1122: if it is not, by the mobile device MAC Address be added in blacklist, and disconnect bluetooth connection.
8. security protection personal identification method as claimed in claim 7, which is characterized in that further comprising the steps of after step S1122:
S1123: after the image for detecting mobile human body, emptying blacklist, gradually executes by step S60.
9. a kind of security protection identification system, which is characterized in that the security protection identification system include: memory, server, Bluetooth hardware equipment, camera, alarm and it is stored in the security protection body that can be run on the memory and on the server Part recognizer, the bluetooth hardware equipment include main control chip, the radio-frequency antenna and bluetooth for being electrically connected the main control chip Adapter, the camera and alarm are electrically connected server, in which:
Such as peace described in any item of the claim 1 to 8 is realized when the security protection identification program is executed by the server The step of anti-personal identification method.
10. a kind of computer readable storage medium, which is characterized in that be stored with security protection body on the computer readable storage medium Part recognizer, is realized when the security protection identification program is executed by server as described in any item of the claim 1 to 8 The step of security protection personal identification method.
CN201811014162.5A 2018-08-31 2018-08-31 Security identity recognition method, system and computer readable storage medium Expired - Fee Related CN109246600B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811014162.5A CN109246600B (en) 2018-08-31 2018-08-31 Security identity recognition method, system and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811014162.5A CN109246600B (en) 2018-08-31 2018-08-31 Security identity recognition method, system and computer readable storage medium

Publications (2)

Publication Number Publication Date
CN109246600A true CN109246600A (en) 2019-01-18
CN109246600B CN109246600B (en) 2021-08-17

Family

ID=65059878

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811014162.5A Expired - Fee Related CN109246600B (en) 2018-08-31 2018-08-31 Security identity recognition method, system and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN109246600B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113329339A (en) * 2021-05-27 2021-08-31 上海普适导航科技股份有限公司 Anti-disassembly alarm system and method for ship positioning terminal
CN115844351A (en) * 2022-12-01 2023-03-28 来邦科技股份公司 Medical care system with data acquisition and transmission functions based on Internet of things technology

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120146918A1 (en) * 2010-12-08 2012-06-14 At&T Intellectual Property I, L.P. Remote Control of Electronic Devices Via Mobile Device
CN103037370A (en) * 2012-11-05 2013-04-10 李明 Portable storage device and identity authentication method
CN104537746A (en) * 2014-12-31 2015-04-22 小米科技有限责任公司 Intelligent electronic door control method, system and equipment
CN104602204A (en) * 2014-12-31 2015-05-06 小米科技有限责任公司 Visitor informing method and device
CN105848151A (en) * 2016-05-27 2016-08-10 北京奇虎科技有限公司 WiFi access point equipment, WiFi access authentication control method and WiFi access authentication control device
CN106157406A (en) * 2016-07-05 2016-11-23 孔尧 Intelligent entrance guard control method and device
CN106610591A (en) * 2015-10-20 2017-05-03 刘国梁 Wireless smart home security system
CN207051941U (en) * 2017-08-04 2018-02-27 四川省蓝扬科技有限公司 A kind of RFID electronic installations of security protection
WO2018092127A1 (en) * 2016-11-16 2018-05-24 Golan Meir System, methods and software for user authentication
CN108091027A (en) * 2018-01-24 2018-05-29 深圳零匙科技有限公司 A kind of intelligent entrance guard
CN108091015A (en) * 2017-12-21 2018-05-29 广东汇泰龙科技有限公司 A kind of method for unlocking based on recognition of face and Bluetooth function, system

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120146918A1 (en) * 2010-12-08 2012-06-14 At&T Intellectual Property I, L.P. Remote Control of Electronic Devices Via Mobile Device
CN103037370A (en) * 2012-11-05 2013-04-10 李明 Portable storage device and identity authentication method
CN104537746A (en) * 2014-12-31 2015-04-22 小米科技有限责任公司 Intelligent electronic door control method, system and equipment
CN104602204A (en) * 2014-12-31 2015-05-06 小米科技有限责任公司 Visitor informing method and device
CN106610591A (en) * 2015-10-20 2017-05-03 刘国梁 Wireless smart home security system
CN105848151A (en) * 2016-05-27 2016-08-10 北京奇虎科技有限公司 WiFi access point equipment, WiFi access authentication control method and WiFi access authentication control device
CN106157406A (en) * 2016-07-05 2016-11-23 孔尧 Intelligent entrance guard control method and device
WO2018092127A1 (en) * 2016-11-16 2018-05-24 Golan Meir System, methods and software for user authentication
CN207051941U (en) * 2017-08-04 2018-02-27 四川省蓝扬科技有限公司 A kind of RFID electronic installations of security protection
CN108091015A (en) * 2017-12-21 2018-05-29 广东汇泰龙科技有限公司 A kind of method for unlocking based on recognition of face and Bluetooth function, system
CN108091027A (en) * 2018-01-24 2018-05-29 深圳零匙科技有限公司 A kind of intelligent entrance guard

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113329339A (en) * 2021-05-27 2021-08-31 上海普适导航科技股份有限公司 Anti-disassembly alarm system and method for ship positioning terminal
CN115844351A (en) * 2022-12-01 2023-03-28 来邦科技股份公司 Medical care system with data acquisition and transmission functions based on Internet of things technology
CN115844351B (en) * 2022-12-01 2023-07-04 来邦科技股份公司 Medical care system with data acquisition and transmission functions based on Internet of things technology

Also Published As

Publication number Publication date
CN109246600B (en) 2021-08-17

Similar Documents

Publication Publication Date Title
US7865483B2 (en) Device management system and method for managing device management object
JP6371007B2 (en) Target recovery information supply method, apparatus, program, and recording medium
US20090040026A1 (en) Monitoring system, terminal device and main control device thereof, and method and program for registering terminal device
JP2017068449A (en) Car sharing system and vehicle lending and returning method
JP2018190463A (en) Car sharing system and vehicle lending and returning method
CN110363888B (en) Door lock management method and device, electronic equipment and readable storage medium
US20140279397A1 (en) Retrieving Vehicular Collateral via Wi-Fi
CN109981763B (en) Implementation method for establishing communication connection with relational personnel of vehicle and management terminal
CN109246600A (en) Security protection personal identification method, system and computer readable storage medium
US20070156881A1 (en) Method for checking vehicle status in home telematics system
JP2003324777A (en) Wireless data collection system, base station apparatus thereof, and wireless terminal thereof
CN109979047A (en) Multi net voting intelligent door lock control method, storage medium, controller and Fingerprint Lock
CN103955968A (en) Compound security attendance device and system based on android platform
CN108712736A (en) Find the methods, devices and systems of equipment
WO2019058958A1 (en) Theft tracking system and theft tracking method for optical fiber fusion splicing device
KR20160116849A (en) Patrol and vehicles management system
JP6213184B2 (en) Terminal, terminal control method, terminal control program, and system
CN103702440A (en) Terminal and equipment connecting method
KR101477913B1 (en) Black box for vehicle having event notifying function over wifi communication
KR101697282B1 (en) Method and Apparatus for checking quality of data service adaptively depending on the type of an access device through which a wireless data service can be used
CN101883259A (en) Monitoring system and monitoring device and method thereof
JP5260848B2 (en) Information terminal device, automatic execution method, and program
CN105187646B (en) SMS interception method and device
CN112541366A (en) Information prompting method, device, equipment and computer readable storage medium
JP2006092128A (en) Communication terminal equipment, article management system and article management method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20210817