CN109246600A - Security protection personal identification method, system and computer readable storage medium - Google Patents
Security protection personal identification method, system and computer readable storage medium Download PDFInfo
- Publication number
- CN109246600A CN109246600A CN201811014162.5A CN201811014162A CN109246600A CN 109246600 A CN109246600 A CN 109246600A CN 201811014162 A CN201811014162 A CN 201811014162A CN 109246600 A CN109246600 A CN 109246600A
- Authority
- CN
- China
- Prior art keywords
- mac address
- bluetooth
- human body
- mobile device
- security protection
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 32
- 238000001514 detection method Methods 0.000 description 8
- 238000010586 diagram Methods 0.000 description 6
- 230000008569 process Effects 0.000 description 5
- 230000006870 function Effects 0.000 description 2
- 230000006399 behavior Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000004140 cleaning Methods 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 238000002372 labelling Methods 0.000 description 1
- 230000002045 lasting effect Effects 0.000 description 1
- 238000002360 preparation method Methods 0.000 description 1
- 238000010408 sweeping Methods 0.000 description 1
- 230000009466 transformation Effects 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/02—Services making use of location information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/061—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/80—Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Power Engineering (AREA)
- Mobile Radio Communication Systems (AREA)
- Alarm Systems (AREA)
Abstract
Security protection personal identification method of the invention includes: to open bluetooth hardware equipment transmitting pairing signal, bluetooth hardware equipment includes main control chip, it is electrically connected the radio-frequency antenna and Bluetooth adapter of the main control chip, matched and with bluetooth mobile device enter pairing range in connected automatically, receive the MAC Address of the mobile device, and countdown, the MAC Address for the mobile device that the image and the mobile human body for carrying out continuing detecting mobile human body before countdown terminates carry, judge whether the image of mobile human body persistently match with received MAC Address with the match MAC Address of the mobile device carried with mobile human body of the human body image information of storage, if, alarm is not started, after countdown, detect the MAC Address of the mobile device, but corresponding mobile human body is not detected Image, the MAC Address of the mobile device is added in blacklist, bluetooth connection is disconnected.For the present invention using more convenient intelligence, safety is higher.
Description
Technical field
The present invention relates to field of security technology, in particular to a kind of security protection personal identification method, system and computer-readable
Storage medium.
Background technique
It is household or known that the problem of being often easy to appear in existing Household security system, which is the people that can not identify back,
People or stranger.Because only that just needing to send warning message to household when occurring that stranger, so resulting in mesh
Preceding Household security system is all easy to generate false alarm, i.e., is obviously that household goes home, and also has sent alarm to all household's mobile phones
Information.
For current recognition of face, prior art mainly passes through face recognition technology to determine whether for household
Or known people, and face recognition technology is limited by several objective factors: the angle of face, only works as face and video camera at present
Camera lens is in face angle, 15 ° of most side faces;Distance, only working as face at present could identify within 5 meters of video camera, and
Accuracy is only 90%;Light, requirement of the recognition of face at present to ambient light is to cannot be below 30Lux.Therefore, recognition of face
Monk or known people can not be accurately identified, so as to cause still more seriously existing the problem of false alarm.It is especially right
In villa, because household is returned outside courtyard, distance is remote, and not necessarily, and light certainly not has angle when night goes home
30Lux。
Current RF tag is identified, a RF tag is worn to each household, as long as household carries this
Label can be found by equipment when going home or leaving home and automatically control other household safety-protection equipment of family, and this mode is similar
It is automatic far from rear door as long as can drive with car key close to car door in the noninductive identification method that many automobiles use
It latches.But this mode has following defect: must carry an additional label, can force a product to household and take with oneself
Band, and for friends and family or often carry out the cleaning worker etc. of family, it is impossible to a label is worn to everyone, is used
The RFID technique of label, safe encryption are relatively low.
For current common bluetooth radio frequency identification, can not have to by any labeling apparatus, as long as user's carrying mobile phone
?.But a disadvantage is that must first take out mobile phone before user's identification lights screen, and the APP for entering this product could be completed
Identification process afterwards, this mode can bring extra operation to user.For example, ought go home daily before entering, household will first be dug out
Mobile phone opens APP, is intended merely to that the equipment of family is allowed to know oneself back, this operation does not obviously meet user's habit.
It, be first before the coverage for going home to reach video camera every time in addition, for the user for being mounted with video camera
Cell phone application is opened, after informing system oneself has been gone home, just can enter the coverage of video camera, otherwise video camera will be right
This event is alarmed.This method does not constitute huge challenge to user's so one most common habit of going home, therefore not
May finally it be received by most of ordinary peoples, use is very inconvenient.
Summary of the invention
The main object of the present invention is to provide a kind of security protection personal identification method, it is intended to use more convenient intelligence, safety
It is higher.
To achieve the above object, the present invention proposes a kind of security protection personal identification method, which includes
Following steps:
S10: it opens bluetooth hardware equipment and emits pairing signal, bluetooth hardware equipment includes main control chip, is electrically connected institute
The radio-frequency antenna and Bluetooth adapter of main control chip are stated,
S60: having matched and with bluetooth mobile device enter pairing range in connected automatically,
S80: receiving the MAC Address of the mobile device, and countdown,
S90: the movement that the image and the mobile human body for carrying out continuing detecting mobile human body before countdown terminates carry is set
Standby MAC Address,
S100: judging whether the image of mobile human body matches with the human body image information of storage and mobile human body carries
Whether the MAC Address of mobile device persistently matches with received MAC Address, if so, S101: do not start alarm,
S110: it after countdown, detects the MAC Address of the mobile device, but corresponding movement is not detected
The MAC Address of the mobile device is added in blacklist, and disconnects bluetooth connection by the image of human body.
Preferably, further comprising the steps of before step S80 after step S60:
S70: judging the mobile device whether in blacklist, if it is not, perform the next step,
Preferably, further comprising the steps of before step S60 after step S10:
S20: bluetooth hardware equipment receives the bind request of the mobile device with bluetooth,
S30: exchanging key and store after successful connection,
S40: the MAC Address of mobile device is matched.
Preferably, further comprising the steps of before step S60 after step S10:
S50: it takes pictures after detecting the image of mobile human body.
Preferably, step S100 specifically includes the following steps:
If it is not, S102: starting the countdown of first time unit, repetition judge mobile human body image whether the people with storage
Body image information matches, if be once it is yes, do not start alarm, if be it is no, starting alarm.
Preferably, step S110 specifically includes the following steps:
S111: within a certain period of time, whether the number of the MAC Address of the mobile device of scanning reaches threshold values for judgement, if so,
S112: judgement detects whether the number of the image of corresponding mobile human body reaches threshold values.
Preferably, step S112 specifically includes the following steps:
If so, S1121: the number of the MAC Address of the mobile device of scanning is calculated as zero, if it is not, S1122: by the movement
The MAC Address of equipment is added in blacklist, and disconnects bluetooth connection.
Preferably, further comprising the steps of after step S1122:
S1123: after the image for detecting mobile human body, emptying blacklist, gradually executes by step S60.
The present invention also proposes that a kind of security protection identification system, the security protection identification system include: memory, service
Device, bluetooth hardware equipment, camera, alarm and it is stored in the peace that can be run on the memory and on the server
Anti- identification program, the bluetooth hardware equipment include main control chip, the radio-frequency antenna for being electrically connected the main control chip and
Bluetooth adapter, the camera and alarm are electrically connected server, in which:
The security protection identification program realizes security protection identification side as described above when being executed by the server
The step of method.
The present invention also proposes a kind of computer readable storage medium, is stored with security protection on the computer readable storage medium
Identification program, the security protection identification program realize security protection identity as described in any one of the above embodiments when being executed by server
The step of recognition methods.
Technical solution of the present invention emits pairing signal by opening bluetooth hardware equipment, and bluetooth hardware equipment includes master control core
Piece, the radio-frequency antenna and Bluetooth adapter for being electrically connected the main control chip, have been matched and the mobile device with bluetooth enters
It is connected automatically in pairing range, receives the MAC Address of the mobile device, and countdown, carried out before countdown terminates
The MAC Address for the mobile device that the image and the mobile human body for persistently detecting mobile human body carry, judges the image of mobile human body
Whether with the human body image information of storage match the mobile device carried with mobile human body MAC Address whether with it is received
MAC Address persistently matches, if so, S101: not starting alarm, after countdown, detects the MAC of the mobile device
Address, but the image of corresponding mobile human body is not detected, the MAC Address of the mobile device is added in blacklist, and is broken
Bluetooth connection is opened, enters in pairing range and can be felt in advance as long as making user carry the mobile device with bluetooth with this
It should identify, it can be achieved that far distance automatic identification incudes, and not need user and open APP in mobile device, be omitted additional
Operation, using more convenient intelligence, safety is also higher.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below
There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this
Some embodiments of invention for those of ordinary skill in the art without creative efforts, can be with
The structure shown according to these attached drawings obtains other attached drawings.
Fig. 1 is the flowage structure schematic diagram of one embodiment of security protection personal identification method of the present invention;
Fig. 2 is the flowage structure schematic diagram of another embodiment of security protection personal identification method of the present invention;
Fig. 3 is the flowage structure schematic diagram of security protection personal identification method another embodiment of the present invention;
Fig. 4 is the flowage structure schematic diagram of the step S100 of Fig. 1, Fig. 2 or Fig. 3 of the present invention;
Fig. 5 is the flowage structure schematic diagram of the step S110 of Fig. 1, Fig. 2 or Fig. 3 of the present invention;
Fig. 6 is the attachment structure schematic diagram of security protection identification system of the present invention.
Drawing reference numeral explanation:
Label | Title | Label | Title |
10 | Memory | 32 | Radio-frequency antenna |
20 | Server | 33 | Bluetooth adapter |
30 | Bluetooth hardware equipment | 40 | Camera |
31 | Main control chip | 50 | Alarm |
The embodiments will be further described with reference to the accompanying drawings for the realization, the function and the advantages of the object of the present invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiment is only a part of the embodiments of the present invention, instead of all the embodiments.Base
Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts it is all its
His embodiment, shall fall within the protection scope of the present invention.
It is to be appreciated that the directional instruction (such as up, down, left, right, before and after ...) of institute is only used in the embodiment of the present invention
In explaining in relative positional relationship, the motion conditions etc. under a certain particular pose (as shown in the picture) between each component, if should
When particular pose changes, then directionality instruction also correspondingly changes correspondingly.
In the present invention unless specifically defined or limited otherwise, term " connection ", " fixation " etc. shall be understood in a broad sense,
For example, " fixation " may be a fixed connection, it may be a detachable connection, or integral;It can be mechanical connection, be also possible to
Electrical connection;It can be directly connected, the connection inside two elements or two can also be can be indirectly connected through an intermediary
The interaction relationship of a element, unless otherwise restricted clearly.It for the ordinary skill in the art, can basis
Concrete condition understands the concrete meaning of above-mentioned term in the present invention.
In addition, the description for being such as related to " first ", " second " in the present invention is used for description purposes only, and should not be understood as
Its relative importance of indication or suggestion or the quantity for implicitly indicating indicated technical characteristic.Define as a result, " first ",
The feature of " second " can explicitly or implicitly include at least one of the features.In addition, the technical side between each embodiment
Case can be combined with each other, but must be based on can be realized by those of ordinary skill in the art, when the combination of technical solution
Conflicting or cannot achieve when occur will be understood that the combination of this technical solution is not present, also not the present invention claims guarantor
Within the scope of shield.
Referring to Fig. 6, the present invention also proposes a kind of security protection identification system, and the security protection identification system includes: to deposit
It reservoir 10, server 20, bluetooth hardware equipment 30, camera 40, alarm 50 and is stored on the memory 10 and can be
The security protection identification program run on the server 20, the bluetooth hardware equipment 30 include main control chip 31, electrically connect
The radio-frequency antenna 32 and Bluetooth adapter 33 of the main control chip 31 are connect, the camera 40 and alarm 50 are electrically connected service
Device 20.
Wherein, the memory 10 includes at least a type of readable storage medium storing program for executing, is installed on the peace for storing
The operating system of anti-identification system and types of applications software, such as the program code of security protection identification program etc..In addition,
The memory 10 can be also used for temporarily storing the Various types of data that has exported or will export.Radio-frequency antenna therein
32 period can be adjusted, preferably 20ms, and radio-frequency antenna can be orientation radio-frequency antenna.Camera 40 therein can be more
It is a;Alarm 50 therein is also multiple.
The server 20 can be in some embodiments central server (Central Processing Unit,
CPU), controller, microcontroller, microserver or other data processing chips.The server 20 is commonly used in the control peace
The overall operation of anti-identification system.In the present embodiment, the server 20 is used to run to store in the memory 10
Program code or processing data, such as run the security protection identification program etc..
Referring to Fig.1 and Fig. 4, when the security protection identification program is executed by the server 20, following steps are realized:
The present invention proposes a kind of security protection personal identification method.
In an embodiment of the present invention, the security protection personal identification method the following steps are included:
S10: it opens bluetooth hardware equipment 30 and emits pairing signal, bluetooth hardware equipment 30 includes main control chip 31, electrical property
The radio-frequency antenna 32 and Bluetooth adapter 33 of the main control chip 31 are connected,
S60: having matched and with bluetooth mobile device enter pairing range in connected automatically,
S80: receiving the MAC Address of the mobile device, and countdown,
S90: the movement that the image and the mobile human body for carrying out continuing detecting mobile human body before countdown terminates carry is set
Standby MAC Address,
S100: judging whether the image of mobile human body matches with the human body image information of storage and mobile human body carries
Whether the MAC Address of mobile device persistently matches with received MAC Address, if so, S101: not starting alarm;If it is not,
S102: starting the countdown of first time unit, repetition judge mobile human body image whether the human body image information phase with storage
Matching, if once be it is yes, do not start alarm, if be it is no, start alarm.
S110: it after countdown, detects the MAC Address of the mobile device, but corresponding movement is not detected
The MAC Address of the mobile device is added in blacklist, and disconnects bluetooth connection by the image of human body.
Mobile human body therein is user and/or household, and the mobile device therein with bluetooth is mobile phone, is hereafter referred to as
For household's mobile phone.
First embodiment are as follows:
First stage
Bluetooth hardware equipment 30: the lasting bluetooth for waiting the mobile phone matched pair is attached;
Household's mobile phone: household's Bluetooth of mobile phone signal occurs in orientation range;
Bluetooth hardware equipment 30: household's mobile phone in connection judges whether there is this mobile phone being connected in blacklist, does not go out
Present blacklist, then continue;
Bluetooth hardware equipment 30: after successful connection, mobile phone MAC Address is issued into main control chip 31, main control chip 31 is IPC
Main control chip;
Main control chip 31: after receiving MAC Address, " alarm stops " being written as " true ", starts 30s countdown, i.e., in 30s
It is interior, it is not responding to any alert event, camera 40 persistently detects the image of mobile human body;The 30s time therein can be as needed
It is adjusted.
Main control chip 31 works as humanoid judgement event=" true " for receiving the feedback of server 20, i.e. the image of mobile human body is
Match with the human body image information of storage, main control chip 31 can send an instruction and give bluetooth hardware equipment;
When bluetooth hardware equipment 30 receives this instruction, record " Human detection threshold value " automatic+1;
Second stage
Household's mobile phone: at the end of 30 countdown of bluetooth hardware equipment, it is possible to which household also fails to enter door;
Main control chip 31: the image of the detecting discovery mobile human body of camera 40 is first passed through, takes pictures, is sent to server 20;
Then, bluetooth hardware equipment 30 scans people's Bluetooth of mobile phone of getting home again, finds household's mobile phone, judges household's mobile phone
When MAC Address is not in blacklist, the MAC Address of mobile phone is sent to main control chip 31;
Main control chip 31: the MAC Address for the Bluetooth of mobile phone that bluetooth hardware equipment 30 is sent is received, MAC Address is sent to
Server 20, while 30s countdown is restarted, " alarm stops " being written as " true ",
Bluetooth hardware equipment 30: restarting 30s countdown, and connection is scanned to the bluetooth of mobile phone and carries out silence, after
The continuous countdown (not restarting new 10min countdown) for carrying out 10min, waits,
Main control chip 31: the image information of the mobile human body of the shooting of camera 40 of the return of server 20, judgement " report are received
Whether the instruction of alert stopping " is " true ", if it is not, 3s is waited, it is per second to inquire whether this primary value is " true ", that is, is judged
Whether the image of mobile human body matches with the human body image information of storage;
Main control chip 31: if above-mentioned is " true ", that is, matching, and does not start alarm flow (at this point, because bluetooth hardware
Equipment 30 has sent alarm immediately, and can determine not when so judging for the first time will start alarm);If
" false ", that is, do not match that, starting alarm flow (that is, when bluetooth does not find household's mobile phone, opens alarm);
Referring to Fig. 2, it is preferable that further comprising the steps of before step S60 after step S10:
S20: bluetooth hardware equipment 30 receives the bind request of the mobile device with bluetooth,
S30: exchanging key and store after successful connection,
S40: the MAC Address of mobile device is matched.
It can realize that household binds logic through the above steps, specific embodiment is the APP by installing in mobile device,
It initiates household and binds process, and the internet by connecting is sent to main control chip;
Main control chip: bluetooth hardware equipment is issued into the instruction for entering the configuration status of above-mentioned binding;
Bluetooth hardware equipment 30: there may be following several current working conditions;1, from unbound excessively any mobile phone;2,
Together with certain handset binding;3, the bluetooth scanning of bluetooth hardware equipment 30 is being carried out, and was having the hand of pairing
Machine;
No matter bluetooth hardware equipment 30 is currently at any one of 3 kinds of situations as above, all directly terminates current connection, and
Into the passive state for waiting connection, active connection no longer is carried out with the equipment matched before;
Bluetooth equipment actively initiates the connection APP active scan when discovery bluetooth hardware equipment 30 at one's side;Bluetooth hardware is set
Standby 30 are passively attached, and key is exchanged after successful connection;The MAC Address of the mobile phone is issued bluetooth hardware by bluetooth by APP
Equipment 30;
Bluetooth hardware equipment 30: storage key and the MAC Address for matching mobile phone;
After APP receives the instruction of 30 binding success of bluetooth hardware equipment, actively disconnects this bluetooth connection and (but do not need
Turn off the Bluetooth function of this mobile phone);
When there is second mobile device to start to be bound again, it is above-mentioned that repetition is executed by second mobile device
Process.
Apparatus bound situation further includes as follows:
It is required that user not allow first the mobile phone for having bound bluetooth match herein near or close bound
The bluetooth of the mobile phone of bluetooth, main control chip 31 are hard to bluetooth when cell phone apparatus does not connect external mobile network normally
Part equipment 30 sends instructions, and allows bluetooth hardware equipment 30 should not active scan.
Referring to Fig.1 and Fig. 5, it is preferable that step S110 specifically includes the following steps:
S111: within a certain period of time, whether the number of the MAC Address of the mobile device of scanning reaches threshold values for judgement, if so,
S112: judgement detects whether the number of the image of corresponding mobile human body reaches threshold values.
Preferably, step S112 specifically includes the following steps:
If so, S1121: the number of the MAC Address of the mobile device of scanning is calculated as zero, if it is not, S1122: by the movement
The MAC Address of equipment is added in blacklist, and disconnects bluetooth connection.
Preferably, further comprising the steps of after step S1122:
S1123: after the image for detecting mobile human body, emptying blacklist, gradually executes by step S60.
To prevent household in the case where normal activity, household's mobile phone is accidentally swept to by bluetooth hardware equipment 30, specific real
Under applying for example:
Bluetooth hardware equipment 30: scanning manpower machine of getting home for the first time, (at this time by household's mobile phone MAC Address comparison blacklist
Household's blacklist is sky), MAC Address then sends MAC Address to main control chip 31 not in blacklist;
Bluetooth hardware equipment 30: the bluetooth connection with mobile phone is disconnected, and is kept a record to this mobile phone MAC Address, and to this
MAC Address carries out count+1, i.e., carries out stored counts to MAC Address, then judge whether count numerical value is equal to 6, if waited
In 6, then judge the numerical value of " Human detection threshold value ", the human body image information of this numerical value > 3, the i.e. image of mobile human body and storage
When the number of detection of matching is greater than 3, then blacklist is not written into corresponding MAC Address, while by the count of this MAC Address
Numerical value is reset, and also resets " Human detection threshold value ", when keeping household movable in courtyard always, can not alarmed always, be prevented
False alarm.
If this numerical value≤3, i.e. the human body image information of the image of mobile human body and storage match detection number it is small
When being equal to 3, blacklist is written into this MAC Address;
Bluetooth hardware equipment 30: starting 30s countdown is restarted another 10min countdown, before starting, first to be judged
10min countdown whether has been had been turned on, when only inactive, has just started 10min countdown;
In bluetooth hardware equipment 30:30s countdown, silence is carried out to the bluetooth scanning connection of mobile phone, after countdown,
Continue to scan on the bluetooth of household's mobile phone;
Bluetooth hardware equipment 30: the bluetooth of household's mobile phone, comparison MAC Address and blacklist (blacklist at this time are found again
It is empty not yet), MAC Address is sent to main control chip 31;
Bluetooth hardware equipment 30 then disconnects bluetooth connection, this household's mobile phone MAC Address found is continued to keep a record,
Count+1 is carried out to this MAC Address;
Wherein bluetooth hardware equipment 30 is in starting 30s countdown, and judges whether to have had been turned on 10min countdown, if
It has been turned on, then no longer restarts;After 30s countdown, bluetooth hardware equipment 30 continues searching household's mobile phone.
Referring to Fig. 2, it is preferable that further comprising the steps of before step S80 after step S60:
S70: judging the mobile device whether in blacklist, if it is not, perform the next step,
It includes following scenario described that blacklist, which is wherein added:
Bluetooth hardware equipment 30 can search the mobile phone of some household every time, therefore every 30s just will appear once
After 3 minutes, blacklist is written in this MAC Address by count+1;
Bluetooth hardware equipment 30, the mobile phone of some primary household is arrived in scanning once in a while, sweeps to 5 times or more, then writes in 10min
Enter blacklist;
Bluetooth hardware equipment 30 can sweep to household's mobile phone every time, but that may sweep to is not the same household, then may be used
Multiple household's mobile phone MAC Address can be carried out with count+1, i.e. stored counts multiple household's MAC Address can be written in 10min
Blacklist.
When bluetooth hardware equipment 30 carries out count numerical value judgement=6 to some household's mobile phone MAC Address, first by this
Blacklist is written in the MAC Address of household;
Further include following embodiment after the MAC Address write-in blacklist of mobile phone:
After blacklist is written, start a 10min identification countdown:
In this countdown, if the MAC Address for having been written into blacklist no longer occurs, blacklist is emptied, is reset simultaneously
The count numerical value recorded before this MAC Address;
If the MAC Address having been written into occurs again, count down time is restored to 10min, is continued waiting for;With
This can effectively remove wrong report, i.e. head of a family's mobile phone then leaves bluetooth hardware again and set whithin a period of time by accidentally scanning connection
Standby 30 scanning area, automatically remove the MAC Address of household from blacklist, so that removing will appear when this household gos out
Wrong report.
Bluetooth hardware equipment 30: the MAC Address " multiple scanning prompting " of this household is issued into main control chip 31;
Bluetooth hardware equipment 30: disconnecting the bluetooth connection of this household, and countdown 30s, scans and connects to the bluetooth of mobile phone
Tap into row silence;
Main control chip 31: after receiving " multiple scanning prompting " information, start a push process to APP, push content
For " equipment Multiple-Scan is got home manpower machine, it is noted that mobile phone location, future are possible to but when you go out, it may appear that primary wrong report
It is alert ".
Wherein main control chip 31 continues normally to handle the information exchange between bluetooth hardware equipment 30, not because bluetooth is hard
Part equipment 30 is added to blacklist and generates any variation, and main control chip 31 only has a set of alarming logic, uniquely has with blacklist
Associated is exactly push event above, remaining is as Normal Alarm behavior;
Even if wherein bluetooth hardware equipment 30 is added to MAC Address and enters blacklist, do not terminate 10min timing still, still after
The continuous movement for carrying out count+1, at this time before count=6 MAC Address, will continue to become larger, but will not trigger again to
The notice of main control chip 31;If the MAC Address of other household's mobile phones is also found in bluetooth hardware equipment 30, will continue to add black
List, and reminded to main control chip 31;When 10min timing terminates, bluetooth hardware equipment 30 is with judging all MAC recorded
The count numerical value of location, if value < 6, resets, if it is greater than 6, then do not change;After 10min timing, bluetooth hardware equipment
30, which are likely to also to will continue to scanning, gets home people's Bluetooth of mobile phone, to continue the movement of count+1, but because under movement thus
Count can not be equal to 6 again, remind so will not continue to send to main control chip 31.Due to bluetooth hardware equipment 30 because
Mobile phone MAC Address to be persistently scanned has entered blacklist, therefore even if sweeping to this mobile phone MAC Address, will not allow master control
Chip sends a signal to 50 stop alarm of alarm.
Due to that ought have at this time another household to go home, may result in can not identify this household, persistently carry out falling for 10min
Timing can not scan household at the end of countdown again, by the way that blacklist is written in the MAC Address of this household's mobile phone, open
One 20min identification countdown can not scan this MAC Address, bluetooth hardware equipment only at the end of this countdown again
30 empty blacklist automatically, and reset the count numerical value of this MAC Address.
When head of a family is movable in institute, and with mobile phone;Main control chip 31 can be found humanoid by camera 40 every time
This event is sent to bluetooth hardware equipment 30 by object;Bluetooth hardware equipment 30 receives an instruction, " Human detection threshold value " from
Dynamic+1, in 10min, when the count numerical value of some MAC Address is equal to 6, whether judge " Human detection threshold value " > 3, if so,
The count numerical value of this MAC Address is then reset, if " Human detection threshold value "≤3, are normally written blacklist.It prevents from working as with this
When household is movable in institute, to exclude the false alarm generated when household is movable in institute.
Further, the specific embodiment of blacklist releasing logic is as follows:
The household for being written into blacklist enters 40 visual field of camera;Or another household, when going home, bluetooth hardware is set
Standby 30 just because of the bluetooth for the household being connected in family and when being in silent status:
Main control chip 31 finds motion event by camera 40, reports to server 20, obtains " true " humanoid alarm
Feedback waits 3s, and bluetooth is not fed back, and sends alarm and gives household's cell phone application;
Main control chip 31 sends an alarm command to bluetooth hardware equipment 30 simultaneously;
When bluetooth hardware equipment 30 receives the alarm command of main control chip 31, blacklist is emptied, while resetting all households
Mobile phone count numerical value;
Bluetooth hardware equipment 30 comes back to original state, starts household's mobile phone MAC Address that scanning has been matched.
Referring to Fig. 3, it is preferable that further comprising the steps of before step S60 after step S10:
S50: it takes pictures after detecting the image of mobile human body.
Specifically, the reception of main control chip 31 is successfully instructed and issues when bluetooth hardware equipment 30 identifies, but camera 40
When not being found the image of mobile human body, main control chip 31 can direct stop alarm at this time;It is logical if it is main control chip 31
The image that camera 40 first finds mobile human body is crossed, then bluetooth hardware equipment 30 just finds household's mobile phone, then regards as leaving home
Event;
Further: camera 40 first finds motion detecting event, i.e. the image that detects mobile human body of camera 40, into
Row is taken pictures, and server is sent to;
Bluetooth hardware equipment 30: search household's mobile phone finds household's mobile phone, judges household's mobile phone MAC Address not in black name
Dan Zhong then returns to household's mobile phone MAC Address to main control chip 31;
Main control chip 31: may first receive server 20 return mobile human body image whether the human body image with storage
The judging result that information matches, result are " true " (there is human figure object), judge again at this time " alarm stop " whether be
The MAC Address for the mobile device that " true ", i.e. mobile human body are carried persistently matches with received MAC Address, if it is not, then
Wait 3s, inquiry per second is primary, under this situation, obtained in 3s bluetooth hardware equipment 30 feedback judge above structure be it is yes,
" alarm stops " being written as " true ", i.e., is not alarmed;
Another situation first receives the instruction of the return of bluetooth hardware equipment 30, and " alarm stops " being written as " true ",
Whether the MAC Address for then receiving the mobile device of the mobile human body carrying of the return of server 20 again is held with received MAC Address
The continuous judging result that matches be it is yes, at this time directly can be with stop alarm process.
As long as making user carry the mobile device with bluetooth with this to enter in pairing range or in orientation range
Incuded in advance identification, it can be achieved that far distance automatic identification incude, and do not need user opening mobile device on APP,
Additional operation is omitted, using more convenient intelligence, safety is also higher.
The above description is only a preferred embodiment of the present invention, is not intended to limit the scope of the invention, all at this
Under the inventive concept of invention, using equivalent structure transformation made by description of the invention and accompanying drawing content, or directly/use indirectly
It is included in other related technical areas in scope of patent protection of the invention.
Claims (10)
1. a kind of security protection personal identification method, which comprises the following steps:
S10: it opens bluetooth hardware equipment and emits pairing signal, bluetooth hardware equipment includes main control chip, is electrically connected the master
The radio-frequency antenna and Bluetooth adapter of chip are controlled,
S60: having matched and with bluetooth mobile device enter pairing range in connected automatically,
S80: receiving the MAC Address of the mobile device, and countdown,
S90: the mobile device that the image and the mobile human body for carrying out continuing detecting mobile human body before countdown terminates carry
MAC Address,
S100: judge whether the image of mobile human body matches the movement carried with mobile human body with the human body image information of storage
Whether the MAC Address of equipment persistently matches with received MAC Address, if so, S101: do not start alarm,
S110: it after countdown, detects the MAC Address of the mobile device, but corresponding mobile human body is not detected
Image, the MAC Address of the mobile device is added in blacklist, and disconnect bluetooth connection.
2. security protection personal identification method as described in claim 1, which is characterized in that after step S60, before step S80, also
The following steps are included:
S70: the mobile device is judged whether in blacklist, if it is not, performing the next step.
3. security protection personal identification method as described in claim 1, which is characterized in that after step S10, before step S60 also
The following steps are included:
S20: bluetooth hardware equipment receives the bind request of the mobile device with bluetooth,
S30: exchanging key and store after successful connection,
S40: the MAC Address of mobile device is matched.
4. security protection personal identification method as described in any one of claims 1-3, which is characterized in that after step S10, step
It is further comprising the steps of before S60:
S50: it takes pictures after detecting the image of mobile human body.
5. security protection personal identification method as described in claim 1, which is characterized in that step S100 specifically includes the following steps:
S102: if it is not, starting the countdown of first time unit, repetition judge mobile human body image whether the human figure with storage
As information matches, if be once it is yes, do not start alarm, if being no, starting alarm.
6. security protection personal identification method as described in claim 1, which is characterized in that step S110 specifically includes the following steps:
S111: within a certain period of time, whether the number of the MAC Address of the mobile device of scanning reaches threshold values for judgement, if so,
S112: judgement detects whether the number of the image of corresponding mobile human body reaches threshold values.
7. security protection personal identification method as claimed in claim 6, which is characterized in that step S112 specifically includes the following steps:
S1121: if so, the number of the MAC Address of the mobile device of scanning is calculated as zero, S1122: if it is not, by the mobile device
MAC Address be added in blacklist, and disconnect bluetooth connection.
8. security protection personal identification method as claimed in claim 7, which is characterized in that further comprising the steps of after step S1122:
S1123: after the image for detecting mobile human body, emptying blacklist, gradually executes by step S60.
9. a kind of security protection identification system, which is characterized in that the security protection identification system include: memory, server,
Bluetooth hardware equipment, camera, alarm and it is stored in the security protection body that can be run on the memory and on the server
Part recognizer, the bluetooth hardware equipment include main control chip, the radio-frequency antenna and bluetooth for being electrically connected the main control chip
Adapter, the camera and alarm are electrically connected server, in which:
Such as peace described in any item of the claim 1 to 8 is realized when the security protection identification program is executed by the server
The step of anti-personal identification method.
10. a kind of computer readable storage medium, which is characterized in that be stored with security protection body on the computer readable storage medium
Part recognizer, is realized when the security protection identification program is executed by server as described in any item of the claim 1 to 8
The step of security protection personal identification method.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811014162.5A CN109246600B (en) | 2018-08-31 | 2018-08-31 | Security identity recognition method, system and computer readable storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811014162.5A CN109246600B (en) | 2018-08-31 | 2018-08-31 | Security identity recognition method, system and computer readable storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109246600A true CN109246600A (en) | 2019-01-18 |
CN109246600B CN109246600B (en) | 2021-08-17 |
Family
ID=65059878
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811014162.5A Expired - Fee Related CN109246600B (en) | 2018-08-31 | 2018-08-31 | Security identity recognition method, system and computer readable storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109246600B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113329339A (en) * | 2021-05-27 | 2021-08-31 | 上海普适导航科技股份有限公司 | Anti-disassembly alarm system and method for ship positioning terminal |
CN115844351A (en) * | 2022-12-01 | 2023-03-28 | 来邦科技股份公司 | Medical care system with data acquisition and transmission functions based on Internet of things technology |
Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120146918A1 (en) * | 2010-12-08 | 2012-06-14 | At&T Intellectual Property I, L.P. | Remote Control of Electronic Devices Via Mobile Device |
CN103037370A (en) * | 2012-11-05 | 2013-04-10 | 李明 | Portable storage device and identity authentication method |
CN104537746A (en) * | 2014-12-31 | 2015-04-22 | 小米科技有限责任公司 | Intelligent electronic door control method, system and equipment |
CN104602204A (en) * | 2014-12-31 | 2015-05-06 | 小米科技有限责任公司 | Visitor informing method and device |
CN105848151A (en) * | 2016-05-27 | 2016-08-10 | 北京奇虎科技有限公司 | WiFi access point equipment, WiFi access authentication control method and WiFi access authentication control device |
CN106157406A (en) * | 2016-07-05 | 2016-11-23 | 孔尧 | Intelligent entrance guard control method and device |
CN106610591A (en) * | 2015-10-20 | 2017-05-03 | 刘国梁 | Wireless smart home security system |
CN207051941U (en) * | 2017-08-04 | 2018-02-27 | 四川省蓝扬科技有限公司 | A kind of RFID electronic installations of security protection |
WO2018092127A1 (en) * | 2016-11-16 | 2018-05-24 | Golan Meir | System, methods and software for user authentication |
CN108091027A (en) * | 2018-01-24 | 2018-05-29 | 深圳零匙科技有限公司 | A kind of intelligent entrance guard |
CN108091015A (en) * | 2017-12-21 | 2018-05-29 | 广东汇泰龙科技有限公司 | A kind of method for unlocking based on recognition of face and Bluetooth function, system |
-
2018
- 2018-08-31 CN CN201811014162.5A patent/CN109246600B/en not_active Expired - Fee Related
Patent Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120146918A1 (en) * | 2010-12-08 | 2012-06-14 | At&T Intellectual Property I, L.P. | Remote Control of Electronic Devices Via Mobile Device |
CN103037370A (en) * | 2012-11-05 | 2013-04-10 | 李明 | Portable storage device and identity authentication method |
CN104537746A (en) * | 2014-12-31 | 2015-04-22 | 小米科技有限责任公司 | Intelligent electronic door control method, system and equipment |
CN104602204A (en) * | 2014-12-31 | 2015-05-06 | 小米科技有限责任公司 | Visitor informing method and device |
CN106610591A (en) * | 2015-10-20 | 2017-05-03 | 刘国梁 | Wireless smart home security system |
CN105848151A (en) * | 2016-05-27 | 2016-08-10 | 北京奇虎科技有限公司 | WiFi access point equipment, WiFi access authentication control method and WiFi access authentication control device |
CN106157406A (en) * | 2016-07-05 | 2016-11-23 | 孔尧 | Intelligent entrance guard control method and device |
WO2018092127A1 (en) * | 2016-11-16 | 2018-05-24 | Golan Meir | System, methods and software for user authentication |
CN207051941U (en) * | 2017-08-04 | 2018-02-27 | 四川省蓝扬科技有限公司 | A kind of RFID electronic installations of security protection |
CN108091015A (en) * | 2017-12-21 | 2018-05-29 | 广东汇泰龙科技有限公司 | A kind of method for unlocking based on recognition of face and Bluetooth function, system |
CN108091027A (en) * | 2018-01-24 | 2018-05-29 | 深圳零匙科技有限公司 | A kind of intelligent entrance guard |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113329339A (en) * | 2021-05-27 | 2021-08-31 | 上海普适导航科技股份有限公司 | Anti-disassembly alarm system and method for ship positioning terminal |
CN115844351A (en) * | 2022-12-01 | 2023-03-28 | 来邦科技股份公司 | Medical care system with data acquisition and transmission functions based on Internet of things technology |
CN115844351B (en) * | 2022-12-01 | 2023-07-04 | 来邦科技股份公司 | Medical care system with data acquisition and transmission functions based on Internet of things technology |
Also Published As
Publication number | Publication date |
---|---|
CN109246600B (en) | 2021-08-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7865483B2 (en) | Device management system and method for managing device management object | |
JP6371007B2 (en) | Target recovery information supply method, apparatus, program, and recording medium | |
US20090040026A1 (en) | Monitoring system, terminal device and main control device thereof, and method and program for registering terminal device | |
JP2017068449A (en) | Car sharing system and vehicle lending and returning method | |
JP2018190463A (en) | Car sharing system and vehicle lending and returning method | |
CN110363888B (en) | Door lock management method and device, electronic equipment and readable storage medium | |
US20140279397A1 (en) | Retrieving Vehicular Collateral via Wi-Fi | |
CN109981763B (en) | Implementation method for establishing communication connection with relational personnel of vehicle and management terminal | |
CN109246600A (en) | Security protection personal identification method, system and computer readable storage medium | |
US20070156881A1 (en) | Method for checking vehicle status in home telematics system | |
JP2003324777A (en) | Wireless data collection system, base station apparatus thereof, and wireless terminal thereof | |
CN109979047A (en) | Multi net voting intelligent door lock control method, storage medium, controller and Fingerprint Lock | |
CN103955968A (en) | Compound security attendance device and system based on android platform | |
CN108712736A (en) | Find the methods, devices and systems of equipment | |
WO2019058958A1 (en) | Theft tracking system and theft tracking method for optical fiber fusion splicing device | |
KR20160116849A (en) | Patrol and vehicles management system | |
JP6213184B2 (en) | Terminal, terminal control method, terminal control program, and system | |
CN103702440A (en) | Terminal and equipment connecting method | |
KR101477913B1 (en) | Black box for vehicle having event notifying function over wifi communication | |
KR101697282B1 (en) | Method and Apparatus for checking quality of data service adaptively depending on the type of an access device through which a wireless data service can be used | |
CN101883259A (en) | Monitoring system and monitoring device and method thereof | |
JP5260848B2 (en) | Information terminal device, automatic execution method, and program | |
CN105187646B (en) | SMS interception method and device | |
CN112541366A (en) | Information prompting method, device, equipment and computer readable storage medium | |
JP2006092128A (en) | Communication terminal equipment, article management system and article management method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20210817 |