CN109523661A - Security monitoring method, device, system, server and readable storage medium - Google Patents

Security monitoring method, device, system, server and readable storage medium Download PDF

Info

Publication number
CN109523661A
CN109523661A CN201811222031.6A CN201811222031A CN109523661A CN 109523661 A CN109523661 A CN 109523661A CN 201811222031 A CN201811222031 A CN 201811222031A CN 109523661 A CN109523661 A CN 109523661A
Authority
CN
China
Prior art keywords
door lock
server
unlocking
opened
time
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811222031.6A
Other languages
Chinese (zh)
Inventor
陆愿基
王智强
杨万波
谌进
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Gree Electric Appliances Inc of Zhuhai
Original Assignee
Gree Electric Appliances Inc of Zhuhai
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Gree Electric Appliances Inc of Zhuhai filed Critical Gree Electric Appliances Inc of Zhuhai
Priority to CN201811222031.6A priority Critical patent/CN109523661A/en
Publication of CN109523661A publication Critical patent/CN109523661A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Lock And Its Accessories (AREA)
  • Alarm Systems (AREA)

Abstract

The invention discloses a safety monitoring method, a device, a system, a server and a readable storage medium, wherein the method comprises the following steps: if the fact that the door lock connected with the server is opened is recognized, acquiring the time when the door lock is opened; judging whether the time for opening the door lock is within a normal unlocking time period corresponding to the door lock which is preserved in advance; if not, the prompt information that the door lock is opened within the abnormal unlocking time period is pushed to the user terminal corresponding to the door lock. When the door lock connected with the server is opened, if the time for opening the door lock is not within the pre-stored normal unlocking time period, the user terminal corresponding to the door lock is prompted that the door lock is opened within the abnormal unlocking time period, so that a user of the user terminal can know that unsafe unlocking behaviors exist in time, and the safety of the environment where the door lock is located is improved to a certain extent.

Description

Security monitoring method, device, system, server and readable storage medium
Technical Field
The invention relates to the technical field of smart home, in particular to a safety monitoring method, a safety monitoring device, a safety monitoring system, a safety monitoring server and a readable storage medium.
Background
The existing intelligent door lock provides multiple unlocking modes for users, such as fingerprint unlocking, password unlocking and the like, and greatly facilitates the life of people. However, at present, there is no reasonable mechanism for monitoring whether the unlocking behavior of the door lock is safe, which results in greatly reduced safety of the environment where the door lock is located.
Disclosure of Invention
The invention provides a security monitoring method, a security monitoring device, a security monitoring system, a server and a readable storage medium, which are used for solving the problem of low security of the environment where a door lock is located in the prior art.
The invention provides a safety monitoring method, which is applied to a server and comprises the following steps:
if the fact that the door lock connected with the server is opened is recognized, acquiring the time when the door lock is opened;
judging whether the time for opening the door lock is within a normal unlocking time period corresponding to the door lock which is preserved in advance;
if not, the prompt information that the door lock is opened within the abnormal unlocking time period is pushed to the user terminal corresponding to the door lock.
Further, the process of recognizing that the door lock connected to the server is opened includes:
and if unlocking data sent by a door lock connected with the server is received, determining that the door lock is opened, wherein the unlocking data is sent after the door lock identifies that the lock core built-in circuit of the door lock completes the unlocking action.
Further, the acquiring the time when the door lock is opened comprises:
and determining the time when the unlocking data is received as the time when the door lock is opened.
Further, if the unlocking data carries the time when the door lock is opened, the acquiring the time when the door lock is opened includes:
and acquiring the time when the door lock is opened in the unlocking data.
Further, if the unlocking data is encrypted data, the obtaining the time when the door lock is opened in the unlocking data includes:
and decrypting the unlocking data, and acquiring the time of the door lock being opened from the decrypted unlocking data.
Further, if the unlocking data is encrypted by an encryption key and/or an encryption function, the decrypting the unlocking data includes:
decrypting the unlocking data by adopting a decryption key corresponding to the encryption key; and/or
And decrypting the unlocking data by adopting a decryption function corresponding to the encryption function.
Further, receiving unlocking data sent by a door lock connected with the server comprises:
and receiving unlocking data sent by a door lock connected with the server in a preset communication mode, wherein the preset communication mode comprises wireless fidelity (WiFi) communication or ZigBee communication.
Further, if ZigBee communication is adopted, the receiving unlocking data sent by the door lock connected to the server includes:
and receiving unlocking data sent by a door lock connected with the server through the ZigBee gateway and the router.
Further, the method further comprises:
and storing the received unlocking data.
The invention provides a safety monitoring device, which is applied to a server and comprises:
the acquisition module is used for acquiring the time when the door lock connected with the server is opened if the door lock connected with the server is identified to be opened;
the judging module is used for judging whether the time for opening the door lock is within the normal unlocking time period corresponding to the door lock which is stored in advance; if not, triggering a pushing module;
the pushing module is used for pushing prompt information that the door lock is opened within an abnormal unlocking time period to a user terminal corresponding to the door lock.
Further, the obtaining module is specifically configured to determine that the door lock is opened if unlocking data sent by the door lock connected to the server is received, where the unlocking data is sent after the door lock recognizes that the lock cylinder built-in circuit of the door lock completes an unlocking action.
Further, the obtaining module is specifically configured to determine a time when the unlocking data is received as a time when the door lock is opened.
Further, if the unlocking data carries the time when the door lock is opened, the obtaining module is specifically configured to obtain the time when the door lock is opened in the unlocking data.
Further, if the unlocking data is encrypted data, the obtaining module is specifically configured to decrypt the unlocking data, and obtain the time when the door lock is opened from the decrypted unlocking data.
Further, if the unlocking data is encrypted by an encryption key and/or an encryption function, the obtaining module is specifically configured to decrypt the unlocking data by using a decryption key corresponding to the encryption key; and/or decrypting the unlocking data by adopting a decryption function corresponding to the encryption function.
Further, the obtaining module is specifically configured to receive unlocking data sent by a door lock connected to the server in a preset communication mode, where the preset communication mode includes wireless fidelity WiFi communication or ZigBee communication.
Further, if the ZigBee communication is adopted, the obtaining module is specifically used for receiving unlocking data sent by a door lock connected with the server through the ZigBee gateway and the router.
Further, the apparatus further comprises:
and the storage module is used for storing the received unlocking data.
The present invention provides a server, comprising: the system comprises a processor, a communication interface, a memory and a communication bus, wherein the processor, the communication interface and the memory complete mutual communication through the communication bus;
the memory has stored therein a computer program which, when executed by the processor, causes the processor to perform the steps of any of the methods described above.
The present invention provides a computer readable storage medium storing a computer program executable by a server, the program, when run on the server, causing the server to perform the steps of any of the methods described above.
The invention provides a safety monitoring system, which comprises a door lock, a server and a user terminal, wherein the door lock is arranged on the server; wherein,
the server is used for acquiring the time when the door lock connected with the server is opened if the door lock is identified to be opened; judging whether the time for opening the door lock is within a normal unlocking time period corresponding to the door lock which is preserved in advance; if not, pushing prompt information that the door lock is opened within an abnormal unlocking time period to a user terminal corresponding to the door lock;
and the user terminal is used for receiving prompt information that the door lock is opened within an abnormal unlocking time period.
Further, the door lock is specifically used for sending unlocking data if the lock core built-in circuit of the door lock is recognized to complete the unlocking action;
the server is specifically configured to determine that the door lock is opened if unlocking data sent by the door lock connected to the server is received.
Further, the server is specifically configured to determine a time when the unlocking data is received as a time when the door lock is opened.
Further, the server is specifically configured to, if the unlocking data carries the time when the door lock is opened, obtain, in the unlocking data, the time when the door lock is opened.
Further, the server is specifically configured to decrypt the unlocking data if the unlocking data is encrypted data, and obtain the time when the door lock is opened in the decrypted unlocking data.
Further, the server is specifically configured to decrypt the unlocking data by using a decryption key corresponding to the encryption key if the unlocking data is encrypted by using an encryption key and/or an encryption function; and/or decrypting the unlocking data by adopting a decryption function corresponding to the encryption function.
Further, the door lock is specifically used for sending unlocking data in a preset communication mode, wherein the preset communication mode comprises wireless fidelity (WiFi) communication or ZigBee communication;
the server is specifically used for receiving unlocking data sent by the door lock in a preset communication mode.
Furthermore, the system also comprises a ZigBee gateway and a router;
the door lock is specifically used for sending unlocking data through a ZigBee gateway and a router if ZigBee communication is adopted;
the server is specifically used for receiving unlocking data sent by the door lock through the ZigBee gateway and the router.
Further, the server is further configured to store the received unlocking data.
The invention provides a safety monitoring method, a device, a system, a server and a readable storage medium, wherein the method comprises the following steps: if the fact that the door lock connected with the server is opened is recognized, acquiring the time when the door lock is opened; judging whether the time for opening the door lock is within a normal unlocking time period corresponding to the door lock which is preserved in advance; if not, the prompt information that the door lock is opened within the abnormal unlocking time period is pushed to the user terminal corresponding to the door lock. When the door lock connected with the server is opened, if the time for opening the door lock is not within the pre-stored normal unlocking time period, the user terminal corresponding to the door lock is prompted that the door lock is opened within the abnormal unlocking time period, so that a user of the user terminal can know that unsafe unlocking behaviors exist in time, and the safety of the environment where the door lock is located is improved to a certain extent.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a schematic diagram of a security monitoring process provided in embodiment 1 of the present invention;
fig. 2 is a schematic diagram of a data transmission process according to embodiment 5 of the present invention;
fig. 3 is a schematic structural diagram of a security monitoring system according to embodiment 7 of the present invention;
fig. 4 is a schematic structural diagram of a security monitoring system according to embodiment 7 of the present invention;
fig. 5 is a schematic structural diagram of a server according to embodiment 8 of the present invention;
fig. 6 is a schematic diagram of a safety monitoring device according to an embodiment of the present invention.
Detailed Description
In order to facilitate a user terminal user to obtain unsafe unlocking behaviors in time and improve the safety of the environment where the door lock is located, the embodiment of the invention provides a safety monitoring method, a device, a system, a server and a readable storage medium.
In order to make the objects, technical solutions and advantages of the present invention clearer, the present invention will be described in further detail with reference to the accompanying drawings, and it is apparent that the described embodiments are only a part of the embodiments of the present invention, not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Example 1:
fig. 1 is a schematic diagram of a security monitoring process according to an embodiment of the present invention, where the process includes the following steps:
s101: and if the fact that the door lock connected with the server is opened is recognized, acquiring the time when the door lock is opened.
The security monitoring method provided by the embodiment of the invention is applied to a server, the server is connected with one or more door locks, the connection mode of the server and the door locks can determine the communication mode between the server and the door locks, the server can store the identification information of the door locks connected with the server, and the identification information of the door locks can be information which can uniquely identify the door locks, such as communication address information of the door locks.
When the server is performing security monitoring, the security monitoring may be performed on one door lock, may be performed on a plurality of door locks, and if the security monitoring is performed on the plurality of door locks, the security monitoring is performed on each of the plurality of door locks.
The server can identify whether the door lock connected with the server is opened, for example, when the door lock identifies that the server is opened, the server mainly sends information of door lock opening or unlocking data to the connected server, if the information of door lock opening or unlocking data sent by the door lock is received, the server considers that the door lock is opened, otherwise, the server considers that the door lock is not opened; the server may send an inquiry request to the door lock connected to the server at a set time interval, determine that the door lock is opened if an already opened response replied by the door lock is received, and otherwise, consider that the door lock is not opened, and the like.
If the server recognizes that the door lock connected with the server is opened, the server acquires the time when the opened door lock is opened, when the server acquires the time when the door lock is opened, the server determines the time when the door lock is opened as the time when the door lock is opened, the server can actively transmit the time when the door lock is opened to the server, the server determines the time when the door lock is transmitted as the time when the door lock is opened, and the like. The Time that the door lock is opened may be UTC (coordinated universal Time).
S102: judging whether the time for opening the door lock is within a normal unlocking time period corresponding to the door lock which is preserved in advance; if not, S103 is carried out; if so, proceed to S104.
The server stores in advance a normal unlocking time period corresponding to the door lock connected thereto, and specifically, may store a correspondence relationship between identification information of each door lock connected to the server and the normal start time period, so that the server can determine the normal unlocking time period corresponding to the opened door lock.
The normal unlocking time period corresponding to the door lock pre-stored in the server can be set by the user, can be stored by the server according to the habit of using the door lock of the user acquired within the set time period, and the like.
And after the server acquires the time for opening the door lock, judging whether the time for opening the door lock is within a normal unlocking time period corresponding to the door lock, and executing different steps according to different judgment results.
S103: and pushing prompt information that the door lock is opened within an abnormal unlocking time period to a user terminal corresponding to the door lock.
If the time for opening the door lock is not within the normal unlocking time period corresponding to the door lock, the door lock can be considered to be opened within the abnormal unlocking time period, and in order to improve the safety of the environment where the door lock is located, prompt information for opening the door lock within the abnormal unlocking time period can be pushed to a user terminal corresponding to the door lock, so that a user of the user terminal can know that unsafe unlocking behaviors exist in time and perform corresponding processing.
The server also stores a user terminal corresponding to the door lock, and the user terminal may be a user terminal used by a user, a manager, or the like for monitoring the door lock. Specifically, the server may store in advance a correspondence between identification information of the door lock and identification information of the user terminal, and the identification information of the user terminal may include information that can uniquely identify the user terminal, such as communication address information of the user terminal.
S104: the push of the prompt information is not performed.
If the time when the door lock is opened is within the normal unlocking time period corresponding to the door lock, the door lock can be considered to be opened within the normal unlocking time period, and the prompt message can not be pushed at the moment in order to avoid pushing the message to disturb the user every time the door lock is opened.
When the door lock connected with the server is opened in the embodiment of the invention, if the time for opening the door lock is not within the pre-stored normal unlocking time period, the user terminal corresponding to the door lock is prompted that the door lock is opened within the abnormal unlocking time period, so that a user of the user terminal can know that unsafe unlocking behaviors exist in time, and the safety of the environment where the door lock is located is improved to a certain extent.
Example 2:
in order to improve the real-time performance of security monitoring and save network resources, on the basis of the foregoing embodiments, in an embodiment of the present invention, a process of identifying that a door lock connected to the server is opened includes:
and if unlocking data sent by a door lock connected with the server is received, determining that the door lock is opened, wherein the unlocking data is sent after the door lock identifies that the lock core built-in circuit of the door lock completes the unlocking action.
If the server inquires whether the door lock is opened or not according to the set time interval, the fact that the door lock is opened cannot be timely recognized, and before the fact that the door lock is opened is recognized, the server may send inquiry requests for multiple times, waste of network resources is caused, therefore, when the door lock determines that the door lock is opened, unlocking data can be actively sent to the server, the server is informed that the door lock is opened timely, and the network resources can be saved.
The door lock is provided with a lock cylinder built-in circuit, the door lock can identify whether the lock cylinder built-in circuit completes unlocking action, when the door lock identifies that the lock cylinder built-in circuit of the door lock completes the unlocking action, the door lock determines that the door lock is opened, the unlocking data acquired by the door lock is sent to a connected server, and the server receives the unlocking data sent by the door lock and determines that the door lock is opened.
The process of identifying whether the unlocking action is completed by the door lock belongs to the prior art, and is not described in detail in the embodiment of the invention.
If the server does not receive the unlocking data sent by the door lock, the door lock can be considered not to be opened.
The unlocking data of the door lock can be simultaneously sent to the user terminal when the server pushes the prompt message to the user terminal, and a user using the user terminal can judge whether the unlocking behavior is abnormal or not according to the unlocking data.
According to the embodiment of the invention, the unlocking data is sent to the server after the door lock is determined to be opened, and the server determines that the door lock is opened, so that the real-time performance of safety monitoring can be improved, and network resources can be saved.
Example 3:
on the basis of the foregoing embodiments, in an embodiment of the present invention, the acquiring the time when the door lock is opened includes:
and determining the time when the unlocking data is received as the time when the door lock is opened.
If the unlocking data carries the time when the door lock is opened, the acquiring the time when the door lock is opened comprises:
and acquiring the time when the door lock is opened in the unlocking data.
In order to improve the flexibility of safety monitoring, the embodiment of the invention provides various modes for acquiring the time when the door lock is opened.
The server can obtain and record the time of receiving the unlocking data when receiving the unlocking data sent by the door lock, and determine the time of receiving the unlocking data as the time of opening the door lock.
The unlock data may or may not carry the time the door lock was opened. Whether the unlocking data carries the time when the door lock is opened or not, the server can determine the time when the unlocking data is received as the time when the door lock is opened.
Of course, in order to improve the accuracy of security monitoring, the door lock may carry the time when the door lock is opened in the unlocking data and send the unlocking data to the server when determining that the door lock is opened, and at this time, the server receives the unlocking data and carries the time when the door lock is opened.
If the server confirms that the received unlocking data carries the time when the door lock is opened, the server can acquire the time when the door lock is opened from the unlocking data, and specifically, the time when the door lock carried in the unlocking data is opened can be determined as the time when the door lock is opened. At the moment, when the server judges whether the subsequent time for opening the door lock is within the normal unlocking time period corresponding to the door lock, a more accurate judgment result can be obtained, and the accuracy of safety monitoring is never improved.
In addition, the unlocking data may also include identification information of the door lock, such as communication address information of the door lock, identification information of a family to which the door lock belongs, a location position where the door lock is located, an unlocking mode of the door lock, and the like. If the unlocking data of the door lock is sent to the user terminal at the same time, a user using the user terminal can judge whether the unlocking behavior is abnormal according to the unlocking data, the user can determine which door lock in which family the door lock belongs to according to the identification information of the family to which the door lock belongs and the positioning position of the door lock, and can more visually determine the position of the door lock, for example, the door lock can be used as a bedroom door lock in a family, a hotel or an industrial park and the like, a door lock of a guest room or a park gate and the like, and the user can determine whether the unlocking behavior is an unlocking mode commonly used by the user in the environment where the door lock is located according to the unlocking mode of the door lock and the like. The unlocking mode of the door lock comprises at least one of password unlocking, fingerprint unlocking, iris unlocking, face unlocking and the like.
The unlocking data can be transmitted in a plaintext mode in the transmission process, and in order to guarantee data safety, ciphertext transmission can be adopted, namely encrypted unlocking data are transmitted.
The embodiment of the invention provides a plurality of modes for acquiring the time when the door lock is opened, thereby improving the flexibility of safety monitoring.
Example 4:
in order to ensure the security of the unlocking data and improve the accuracy of security monitoring, on the basis of the above embodiments, in an embodiment of the present invention, if the unlocking data is encrypted data, the acquiring, in the unlocking data, the time when the door lock is opened includes:
and decrypting the unlocking data, and acquiring the time of the door lock being opened from the decrypted unlocking data.
If the unlocking data is encrypted by an encryption key and/or an encryption function, the decrypting the unlocking data comprises:
decrypting the unlocking data by adopting a decryption key corresponding to the encryption key; and/or
And decrypting the unlocking data by adopting a decryption function corresponding to the encryption function.
If the unlocking data is transmitted in a plaintext, the unlocking data is easy to intercept or tamper, and the result of safety monitoring is possibly deviated, so that the unlocking data can be encrypted in order to ensure the safety of the unlocking data and improve the safety of the safety monitoring.
If the unlocking data is encrypted data, in order to ensure that the time for obtaining the door lock opening time in the unlocking data is accurately obtained, the server can decrypt the unlocking data firstly and obtain the time for obtaining the door lock opening time in the decrypted unlocking data.
The server can decrypt by adopting a decryption mode corresponding to the encryption mode in the unlocking data encryption process when decrypting, and the unlocking data in the form of the ciphertext is restored into the plaintext.
If the unlock data is encrypted by the encryption key, the server may decrypt with a decryption key corresponding to the encryption key. The encryption key may be the same or different from the corresponding decryption key.
If the unlocking data is encrypted through the encryption function, the server can decrypt through a decryption function corresponding to the encryption function. The encryption function may be the same or different from the corresponding decryption key.
If the unlocking data is decrypted through the encryption key and the encryption function, the server can decrypt by adopting the decryption key corresponding to the encryption key and the decryption function corresponding to the encryption function. It should be noted that, in the decryption, the order of decryption using the decryption key and the decryption function should be opposite to the order of encryption using the encryption key and the encryption function.
In order to further ensure the security of security monitoring, before the unlocking data is decrypted, the user information or the network information may be verified, and after the verification is passed, the subsequent decryption operation may be performed.
Taking the verification of the network information as an example, it may be verified whether the transmission network is a preset communication network, whether the communication address information of the transmitting end, i.e., the door lock, is correct when the transmission network is the preset communication network, and the like.
In the embodiment of the invention, the data encryption technology is adopted when the data is transmitted between the devices, the command is converted into the ciphertext through the encryption key and the encryption function, and the plaintext is restored by using the decryption key and the function at the receiving end, so that the possibility of tampering the data in the transmission process is reduced, the safety in the command transmission process is ensured, and the safety of safety monitoring is also improved.
Example 5:
in addition to the above embodiments, in an embodiment of the present invention, the receiving the unlocking data transmitted by the door lock connected to the server includes:
and receiving unlocking data sent by a door lock connected with the server in a preset communication mode, wherein the preset communication mode comprises WiFi (Wireless-Fidelity) communication or ZigBee communication.
If ZigBee communication is adopted, the receiving unlocking data sent by the door lock connected with the server comprises the following steps:
and receiving unlocking data sent by a door lock connected with the server through the ZigBee gateway and the router.
In order to improve the flexibility of security monitoring, the embodiment of the invention provides a plurality of communication modes for data transmission between devices.
When the door lock sends the unlocking data to the server, the unlocking data can be sent to the server by adopting a preset communication mode, correspondingly, the server can receive the unlocking data sent by the door lock by adopting the preset communication mode, and certainly, the server can also receive the unlocking data without adopting the preset communication mode and is related to the connection relation between the door lock and the server during deployment.
The preset communication mode can be WiFi communication or ZigBee communication.
Because the WiFi communication is not limited by distance, the short-distance and long-distance communication is supported, and therefore if the environment where the door lock is located is wide, the WiFi communication can be adopted.
If the lock adopts the wiFi communication to send the data of unblanking to the server, if the server is located same environment with the lock, then the lock can adopt the wiFi communication directly to send the data of unblanking to the server, if the server is not located same environment with the lock, then the lock can adopt the wiFi communication, and data of unblanking is forwardded to the server through the router, and the server can be regarded as the cloud platform this moment.
ZigBee is a wireless network protocol for low-speed short-distance transmission. It is similar to bluetooth and has the characteristics of low power consumption, low cost, low speed, short distance, short time delay, high capacity and the like. Therefore, if the range of the environment where the door lock is located is not large, in order to reduce installation cost and power consumption, ZigBee communication can be adopted.
If the door lock adopts ZigBee communication to send the unlocking data to the server, if the server and the door lock are located in the same environment, the door lock can adopt ZigBee communication to forward the unlocking data to the server through a ZigBee gateway, if the server and the door lock are not located in the same environment, the door lock can adopt ZigBee communication to forward the unlocking data to the server through the ZigBee gateway and the router, at the moment, the server can be regarded as a cloud platform, as shown in figure 2, at the moment, the unlocking data can be transmitted in an encrypted mode.
The embodiment of the invention provides a plurality of communication modes for data transmission between devices, thereby improving the flexibility of safety monitoring.
Example 6:
in order to implement subsequent analysis and tracking of user requirements and improve user experience, on the basis of the above embodiments, in the embodiment of the present invention, the method further includes:
and storing the received unlocking data.
The server can preserve received unlocking data, collects mass data through preserving user unlocking data, and after screening and mining, carries out big data analysis on effective data, can carry out safety monitoring, and a series of after-sale behaviors such as market research and accurate propelling movement realize follow-up analysis and tracking to user's demand, can improve user experience better.
When the server stores the unlocking data, the unlocking data and the door lock can be correspondingly stored, and when the unlocking data is stored, the unlocking data and the door lock can be stored in a database in a data serialization mode.
The server saves the unlocking data, wherein the unlocking data can be encrypted and decrypted, so that the unlocking data can be decrypted at the time of avoiding subsequent data analysis, processing resources are wasted, and the decrypted unlocking data can be saved.
A media platform is provided for the integral home network operating system to carry out external communication, so that communication between 'internal' and 'external' is realized, and the requirements of remote control, uploading and information exchange are met.
In the whole user behavior record uploading process, the ends are tightly connected and are buckled with each other, so that the safety and the transmission efficiency are ensured.
Example 7:
on the basis of the foregoing embodiments, fig. 3 is a security monitoring system provided in an embodiment of the present invention, where the system includes a door lock 301, a server 302, and a user terminal 303; wherein,
a server 302, configured to acquire a time when a door lock 301 connected to the server 302 is opened if it is recognized that the door lock 301 is opened; judging whether the time for which the door lock 301 is opened is within a normal unlocking time period corresponding to the door lock 301 which is preserved in advance; if not, pushing prompt information that the door lock 301 is opened within an abnormal unlocking time period to a user terminal 303 corresponding to the door lock 301;
the user terminal 303 is configured to receive a prompt that the door lock 301 is opened in an abnormal unlocking time period.
The door lock 301 is specifically used for sending unlocking data if the lock core built-in circuit of the door lock is recognized to complete the unlocking action;
the server 302 is specifically configured to determine that the door lock 301 is opened if the unlocking data sent by the door lock 301 connected to the server 302 is received.
The server 302 is specifically configured to determine a time when the unlocking data is received as a time when the door lock 301 is opened.
The server 302 is specifically configured to, if the unlocking data carries the time when the door lock 301 is opened, obtain, in the unlocking data, the time when the door lock 301 is opened.
The server 302 is specifically configured to decrypt the unlocking data if the unlocking data is encrypted data, and obtain the time when the door lock 301 is opened from the decrypted unlocking data.
The server 302 is specifically configured to decrypt the unlocking data with a decryption key corresponding to the encryption key if the unlocking data is encrypted by an encryption key and/or an encryption function; and/or decrypting the unlocking data by adopting a decryption function corresponding to the encryption function.
The door lock 301 is specifically configured to send unlocking data in a preset communication mode, where the preset communication mode includes wireless fidelity WiFi communication or ZigBee communication;
the server 302 is specifically configured to receive unlocking data sent by the door lock 301 in a preset communication manner.
As shown in fig. 4, the system further includes a ZigBee gateway 404 and a router 405;
the door lock 301 is specifically configured to send unlocking data through a ZigBee gateway 404 and a router 405 if ZigBee communication is adopted;
the server 302 is specifically configured to receive unlocking data transmitted by the door lock 301 through the ZigBee gateway 404 and the router 405.
The server 302 is further configured to store the received unlocking data.
Example 8:
on the basis of the foregoing embodiments, an embodiment of the present invention further provides a server 500, as shown in fig. 5, including: the system comprises a processor 501, a communication interface 502, a memory 503 and a communication bus 504, wherein the processor 501, the communication interface 502 and the memory 503 are communicated with each other through the communication bus 504;
the memory 503 has stored therein a computer program, which, when executed by the processor 501, causes the processor 501 to perform any of the above embodiments applied to a server.
The communication bus mentioned in the above server may be a Peripheral Component Interconnect (PCI) bus, an Extended Industry Standard Architecture (EISA) bus, or the like. The communication bus may be divided into an address bus, a data bus, a control bus, etc. For ease of illustration, only one thick line is shown, but this does not mean that there is only one bus or one type of bus.
The communication interface 502 is used for communication between the above-described server and other devices.
The Memory may include a Random Access Memory (RAM) or a Non-Volatile Memory (NVM), such as at least one disk Memory. Alternatively, the memory may be at least one memory device located remotely from the processor.
The processor may be a general-purpose processor, including a central processing unit, a Network Processor (NP), and the like; but may also be a Digital instruction processor (DSP), an application specific integrated circuit, a field programmable gate array or other programmable logic device, discrete gate or transistor logic, discrete hardware components, or the like.
Example 9:
on the basis of the foregoing embodiments, the present invention further provides a computer storage readable storage medium, which stores therein a computer program executable by a server, and when the program runs on the server, the server is caused to execute any of the above embodiments applied to the server.
The computer readable storage medium may be any available medium or data storage device that can be accessed by a processor in a server, including but not limited to magnetic memory such as a floppy disk, a hard disk, magnetic tape, a magneto-optical disk (MO), etc., optical memory such as a CD, DVD, BD, HVD, etc., and semiconductor memory such as a ROM, EPROM, EEPROM, nonvolatile memory (NANDFLASH), a Solid State Disk (SSD), etc.
Fig. 6 is a schematic diagram of a security monitoring apparatus 600 according to an embodiment of the present invention, applied to a server, the apparatus including:
an obtaining module 601, configured to obtain a time when a door lock connected to the server is opened if it is recognized that the door lock is opened;
the judging module 602 is configured to judge whether the time for which the door lock is opened is within a normal unlocking time period corresponding to the door lock that is pre-stored; if not, the pushing module 603 is triggered;
the pushing module 603 is configured to push, to the user terminal corresponding to the door lock, prompt information that the door lock is opened within an abnormal unlocking time period.
The obtaining module 601 is specifically configured to determine that the door lock is opened if unlocking data sent by the door lock connected to the server is received, where the unlocking data is sent after the door lock identifies that the lock cylinder built-in circuit of the door lock completes an unlocking action.
The obtaining module 601 is specifically configured to determine a time when the unlocking data is received as a time when the door lock is opened.
If the unlocking data carries the time when the door lock is opened, the obtaining module 601 is specifically configured to obtain the time when the door lock is opened in the unlocking data.
If the unlocking data is encrypted data, the obtaining module 601 is specifically configured to decrypt the unlocking data, and obtain the time when the door lock is opened from the decrypted unlocking data.
If the unlocking data is encrypted by an encryption key and/or an encryption function, the obtaining module 601 is specifically configured to decrypt the unlocking data by using a decryption key corresponding to the encryption key; and/or decrypting the unlocking data by adopting a decryption function corresponding to the encryption function.
The obtaining module 601 is specifically configured to receive unlocking data sent by a door lock connected to the server in a preset communication mode, where the preset communication mode includes wireless fidelity WiFi communication or ZigBee communication.
If the ZigBee communication is adopted, the obtaining module 601 is specifically configured to receive unlocking data sent by a door lock connected to the server through a ZigBee gateway and a router.
The device further comprises:
a saving module 604, configured to save the received unlocking data.
When the door lock connected with the server is opened in the embodiment of the invention, if the time for opening the door lock is not within the pre-stored normal unlocking time period, the user terminal corresponding to the door lock is prompted that the door lock is opened within the abnormal unlocking time period, so that a user of the user terminal can know that unsafe unlocking behaviors exist in time, and the safety of the environment where the door lock is located is improved to a certain extent.
For the system/apparatus embodiments, since they are substantially similar to the method embodiments, the description is relatively simple, and reference may be made to some descriptions of the method embodiments for relevant points.
It is to be noted that, in this document, relational terms such as first and second, and the like are used solely to distinguish one entity or operation from another entity or operation without necessarily requiring or implying any actual such relationship or order between such entities or operations.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
While the preferred embodiments of the present application have been described, additional variations and modifications in those embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims be interpreted as including preferred embodiments and all alterations and modifications as fall within the scope of the application.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present invention without departing from the spirit and scope of the invention. Thus, if such modifications and variations of the present invention fall within the scope of the claims of the present invention and their equivalents, the present invention is also intended to include such modifications and variations.

Claims (29)

1. A security monitoring method is applied to a server, and comprises the following steps:
if the fact that the door lock connected with the server is opened is recognized, acquiring the time when the door lock is opened;
judging whether the time for opening the door lock is within a normal unlocking time period corresponding to the door lock which is preserved in advance;
if not, the prompt information that the door lock is opened within the abnormal unlocking time period is pushed to the user terminal corresponding to the door lock.
2. The method of claim 1, wherein identifying that a door lock connected to the server is opened comprises:
and if unlocking data sent by a door lock connected with the server is received, determining that the door lock is opened, wherein the unlocking data is sent after the door lock identifies that the lock core built-in circuit of the door lock completes the unlocking action.
3. The method of claim 2, wherein the obtaining the time the door lock is opened comprises:
and determining the time when the unlocking data is received as the time when the door lock is opened.
4. The method of claim 2, wherein if the unlock data carries a time a door lock was opened, the obtaining the time the door lock was opened comprises:
and acquiring the time when the door lock is opened in the unlocking data.
5. The method of claim 4, wherein if the unlocking data is encrypted data, the obtaining the time the door lock is opened in the unlocking data comprises:
and decrypting the unlocking data, and acquiring the time of the door lock being opened from the decrypted unlocking data.
6. The method of claim 5, wherein if the unlocking data is encrypted via an encryption key and/or encryption function, the decrypting the unlocking data comprises:
decrypting the unlocking data by adopting a decryption key corresponding to the encryption key; and/or
And decrypting the unlocking data by adopting a decryption function corresponding to the encryption function.
7. The method of claim 2, wherein receiving unlocking data sent by a door lock connected to the server comprises:
and receiving unlocking data sent by a door lock connected with the server in a preset communication mode, wherein the preset communication mode comprises wireless fidelity (WiFi) communication or ZigBee communication.
8. The method of claim 7, wherein if ZigBee communication is used, the receiving unlocking data transmitted by a door lock connected with the server comprises:
and receiving unlocking data sent by a door lock connected with the server through the ZigBee gateway and the router.
9. The method of any one of claims 2-8, further comprising:
and storing the received unlocking data.
10. A safety monitoring device is applied to a server, and comprises:
the acquisition module is used for acquiring the time when the door lock connected with the server is opened if the door lock connected with the server is identified to be opened;
the judging module is used for judging whether the time for opening the door lock is within the normal unlocking time period corresponding to the door lock which is stored in advance; if not, triggering a pushing module;
the pushing module is used for pushing prompt information that the door lock is opened within an abnormal unlocking time period to a user terminal corresponding to the door lock.
11. The apparatus according to claim 10, wherein the obtaining module is specifically configured to determine that the door lock is unlocked if receiving unlocking data sent by a door lock connected to the server, where the unlocking data is sent after the door lock recognizes that the lock core built-in circuit of the door lock completes an unlocking operation.
12. The apparatus of claim 11, wherein the obtaining module is specifically configured to determine a time at which the unlocking data is received as a time at which the door lock is opened.
13. The apparatus of claim 11, wherein the obtaining module is specifically configured to obtain the time at which the door lock was opened in the unlocking data if the unlocking data carries the time at which the door lock was opened.
14. The apparatus according to claim 13, wherein if the unlocking data is encrypted data, the obtaining module is specifically configured to decrypt the unlocking data, and obtain the time when the door lock is opened from the decrypted unlocking data.
15. The apparatus according to claim 14, wherein the obtaining module is configured to decrypt the unlocking data using a decryption key corresponding to the encryption key if the unlocking data is encrypted using an encryption key and/or an encryption function; and/or decrypting the unlocking data by adopting a decryption function corresponding to the encryption function.
16. The apparatus of claim 11, wherein the obtaining module is specifically configured to receive unlocking data sent by a door lock connected to the server in a preset communication manner, where the preset communication manner includes WiFi communication or ZigBee communication.
17. The device according to claim 16, wherein if ZigBee communication is used, the obtaining module is specifically configured to receive unlocking data sent by a door lock connected to the server through a ZigBee gateway and a router.
18. The apparatus of any one of claims 11-17, wherein the apparatus further comprises:
and the storage module is used for storing the received unlocking data.
19. A server, comprising: the system comprises a processor, a communication interface, a memory and a communication bus, wherein the processor, the communication interface and the memory complete mutual communication through the communication bus;
the memory has stored therein a computer program which, when executed by the processor, causes the processor to carry out the steps of the method of any one of claims 1 to 9.
20. A computer-readable storage medium, in which a computer program executable by a server is stored, which program, when run on the server, causes the server to carry out the steps of the method of any one of claims 1 to 9.
21. A safety monitoring system is characterized by comprising a door lock, a server and a user terminal; wherein,
the server is used for acquiring the time when the door lock connected with the server is opened if the door lock is identified to be opened; judging whether the time for opening the door lock is within a normal unlocking time period corresponding to the door lock which is preserved in advance; if not, pushing prompt information that the door lock is opened within an abnormal unlocking time period to a user terminal corresponding to the door lock;
and the user terminal is used for receiving prompt information that the door lock is opened within an abnormal unlocking time period.
22. The system of claim 21, wherein the door lock is specifically configured to send unlocking data if it is recognized that the lock core built-in circuit of the door lock completes the unlocking operation;
the server is specifically configured to determine that the door lock is opened if unlocking data sent by the door lock connected to the server is received.
23. The system of claim 22, wherein the server is specifically configured to determine a time at which the unlock data is received as a time at which the door lock is opened.
24. The system of claim 22, wherein the server is specifically configured to obtain the time a door lock was opened in the unlock data if the unlock data carries the time the door lock was opened.
25. The system of claim 24, wherein the server is specifically configured to decrypt the unlocking data if the unlocking data is encrypted data, and obtain the time when the door lock is opened from the decrypted unlocking data.
26. The system according to claim 25, wherein the server is specifically configured to decrypt the unlocking data using a decryption key corresponding to the encryption key if the unlocking data is encrypted by an encryption key and/or an encryption function; and/or decrypting the unlocking data by adopting a decryption function corresponding to the encryption function.
27. The system of claim 22, wherein the door lock is specifically configured to send the unlocking data in a preset communication manner, wherein the preset communication manner includes WiFi communication or ZigBee communication;
the server is specifically used for receiving unlocking data sent by the door lock in a preset communication mode.
28. The system of claim 27, further comprising a ZigBee gateway and router;
the door lock is specifically used for sending unlocking data through a ZigBee gateway and a router if ZigBee communication is adopted;
the server is specifically used for receiving unlocking data sent by the door lock through the ZigBee gateway and the router.
29. The system of any one of claims 22-28, wherein the server is further configured to store the received unlock data.
CN201811222031.6A 2018-10-19 2018-10-19 Security monitoring method, device, system, server and readable storage medium Pending CN109523661A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811222031.6A CN109523661A (en) 2018-10-19 2018-10-19 Security monitoring method, device, system, server and readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811222031.6A CN109523661A (en) 2018-10-19 2018-10-19 Security monitoring method, device, system, server and readable storage medium

Publications (1)

Publication Number Publication Date
CN109523661A true CN109523661A (en) 2019-03-26

Family

ID=65770965

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811222031.6A Pending CN109523661A (en) 2018-10-19 2018-10-19 Security monitoring method, device, system, server and readable storage medium

Country Status (1)

Country Link
CN (1) CN109523661A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110782563A (en) * 2019-11-05 2020-02-11 珠海格力电器股份有限公司 Help seeking information broadcasting method based on intelligent door lock, storage medium and intelligent door lock
CN111340986A (en) * 2020-02-28 2020-06-26 广东科徕尼智能科技有限公司 Intelligent lock abnormity alarm method, intelligent lock and storage medium
CN111899381A (en) * 2020-07-13 2020-11-06 珠海格力电器股份有限公司 Unlocking verification method and device, door lock, door lock system and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH0932377A (en) * 1995-07-15 1997-02-04 Omron Corp Locking-release device and locking-release system
WO2001001323A1 (en) * 1999-06-28 2001-01-04 Interlogix, Inc. Personal digital assistant key for an electronic lock
CN102425338A (en) * 2008-11-04 2012-04-25 邓睿 Method and device for controlling electronic lock by utilizing computer programs
CN104806085A (en) * 2015-03-20 2015-07-29 云丁网络技术(北京)有限公司 Intelligent door lock system and intelligent reminding method
WO2015187731A1 (en) * 2014-06-02 2015-12-10 Schlage Lock Company Llc System and method for signifying intent for lock operation

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH0932377A (en) * 1995-07-15 1997-02-04 Omron Corp Locking-release device and locking-release system
WO2001001323A1 (en) * 1999-06-28 2001-01-04 Interlogix, Inc. Personal digital assistant key for an electronic lock
WO2001001323A9 (en) * 1999-06-28 2002-07-25 Interlogix Inc Personal digital assistant key for an electronic lock
CN102425338A (en) * 2008-11-04 2012-04-25 邓睿 Method and device for controlling electronic lock by utilizing computer programs
WO2015187731A1 (en) * 2014-06-02 2015-12-10 Schlage Lock Company Llc System and method for signifying intent for lock operation
CN104806085A (en) * 2015-03-20 2015-07-29 云丁网络技术(北京)有限公司 Intelligent door lock system and intelligent reminding method

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
强静仁,王斌: "《智能家居基本原理及应用》", 31 May 2017, 华中科技大学出版社 *
聂晓民,林卫: "《饭店计算机管理》", 31 July 1997, 中国民航出版社 *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110782563A (en) * 2019-11-05 2020-02-11 珠海格力电器股份有限公司 Help seeking information broadcasting method based on intelligent door lock, storage medium and intelligent door lock
CN110782563B (en) * 2019-11-05 2020-09-04 珠海格力电器股份有限公司 Help seeking information broadcasting method based on intelligent door lock, storage medium and intelligent door lock
CN111340986A (en) * 2020-02-28 2020-06-26 广东科徕尼智能科技有限公司 Intelligent lock abnormity alarm method, intelligent lock and storage medium
CN111899381A (en) * 2020-07-13 2020-11-06 珠海格力电器股份有限公司 Unlocking verification method and device, door lock, door lock system and storage medium

Similar Documents

Publication Publication Date Title
CN112714193B (en) Community data processing system, method, device and equipment based on Internet of things platform
CA2769104C (en) Methods and apparatus to control access
CN105118127B (en) A kind of guest system and control method thereof
CN105099984B (en) The method and apparatus of account intercommunication between a kind of APP
EP3941014B1 (en) Digital key-based identity authentication method, terminal apparatus, and medium
CN104103111A (en) Automatic access control system based on mobile phone Bluetooth communication and implementation method thereof
CN105719374A (en) Door access control method
CN105321240A (en) Control method and device of intelligent door lock and intelligent door control system
CN109523661A (en) Security monitoring method, device, system, server and readable storage medium
CN109067881B (en) Remote authorization method, device, equipment and storage medium thereof
CN112333212B (en) Encryption management method and device for business data of power Internet of things
CN104794780A (en) Smart door, smart door control system and control method
CN108961501A (en) A kind of intelligent door lock control method, relevant device and system
WO2021120975A1 (en) Monitoring method and apparatus
CN104282061A (en) Safety intelligent lock system and unlocking and locking methods thereof
CN108547514B (en) Unlocking method and device of intelligent door lock
CN103021054A (en) Method and system for monitoring lock state in real time
CN105201290B (en) Logistic track monitoring anti-theft device
CN110727938B (en) Configuration method and device of intelligent equipment, electronic equipment and storage medium
CN113569226B (en) Parking space management system and method based on block chain
KR101795451B1 (en) Method and apparatus for controling security of target device using security tunnel
CN110708357A (en) Data management method, storage medium and system based on NB-IOT
CN115116162B (en) Digital key deleting method, device, equipment, system and storage medium
CN113676474A (en) Equipment unlocking method and device, storage medium and electronic device
CN104657365A (en) Method and system for accessing automobile data through applicable programming interface (API)

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190326

RJ01 Rejection of invention patent application after publication