CN110288731A - Unlocking method and device and electronic door lock - Google Patents

Unlocking method and device and electronic door lock Download PDF

Info

Publication number
CN110288731A
CN110288731A CN201910510295.XA CN201910510295A CN110288731A CN 110288731 A CN110288731 A CN 110288731A CN 201910510295 A CN201910510295 A CN 201910510295A CN 110288731 A CN110288731 A CN 110288731A
Authority
CN
China
Prior art keywords
posture feature
unlock
information
unlocking
posture
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910510295.XA
Other languages
Chinese (zh)
Inventor
何文豪
杨苗
李绍斌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Gree Electric Appliances Inc of Zhuhai
Zhuhai Lianyun Technology Co Ltd
Original Assignee
Gree Electric Appliances Inc of Zhuhai
Zhuhai Lianyun Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Gree Electric Appliances Inc of Zhuhai, Zhuhai Lianyun Technology Co Ltd filed Critical Gree Electric Appliances Inc of Zhuhai
Priority to CN201910510295.XA priority Critical patent/CN110288731A/en
Publication of CN110288731A publication Critical patent/CN110288731A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00563Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys using personal physical data of the operator, e.g. finger prints, retinal images, voicepatterns

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The invention provides an unlocking method, an unlocking device and an electronic door lock, which are used for solving the problems that the identity of a user cannot be identified and the safety of the user is influenced because an unlocking secret key is stolen in the prior art. The method is applied to an electronic door lock provided with a monitoring device, and firstly, the posture characteristics of a target user entering the monitoring range of the monitoring device are collected; then, when the attitude characteristic database is determined to contain first attitude characteristic data with the matching degree with the attitude characteristics larger than a first threshold value, the electronic door lock is awakened; the gesture feature database stores gesture feature data of legal users including first gesture feature data; further receiving a first unlocking instruction which is triggered by a target user and used for unlocking the awakened electronic door lock, wherein the first unlocking instruction carries first unlocking information; and verifying the first unlocking information, and unlocking the electronic door lock after the verification is passed.

Description

A kind of unlocking method, device and electronic lock
Technical field
The present invention relates to door lock control field more particularly to a kind of unlocking methods, device and electronic lock.
Background technique
With gradualling mature for technology of Internet of things, intelligent door lock is applied to more and more families, office, retail shop etc. Place, to guarantee the safety of user.
Current intelligent door lock passes through setting unlocking code key, password, contactless card etc., when user inputs unlocking mostly Password, or the contactless card of unlocking is attached to the induction zone on door lock, after being verified, door lock can be turned on.If password Or the unlockings code key such as contactless card is stolen, appropriator using unlocking code key can opening door lock, lack for user identity Verifying, safety is poor.
Summary of the invention
The present invention provides a kind of unlocking method, device and electronic lock, can not identify user in the prior art to solve Identity, unlocking code key are stolen the problem of influencing user security.
In a first aspect, the embodiment of the invention provides a kind of unlocking method, applied to the electronic gate for being provided with monitoring device Lock, comprising:
Acquisition enters the posture feature of the target user of the monitoring range of the monitoring device;
Determine to include the first posture for being greater than first threshold with the matching degree of the posture feature in posture feature database When characteristic, the electronic lock is waken up;Wherein, it is stored in the posture feature database special including first posture Levy the posture feature data of the legitimate user including data;
Receive the first unlock instruction of target user's triggering being unlocked to the electronic lock after wake-up, institute It states and carries the first unlocking information in the first unlock instruction;
First unlocking information is verified, and opens the electronic lock after being verified.
In an optional implementation manner, the method also includes:
Determine do not include the first appearance for being greater than first threshold with the matching degree of the posture feature in posture feature database When state characteristic, the second unlock instruction of target user's triggering being unlocked to the electronic lock is received, it is described The second unlocking information is carried in second unlock instruction;
Second unlocking information is verified, and in the first preset duration after being verified, receives the mesh The third unlock instruction of user's triggering being unlocked to the electronic lock is marked, carries third solution in the third unlock instruction Lock information;Wherein, second unlocking information is different from the third unlocking information;
The third unlocking information is verified, and opens the electronic lock after being verified.
In an optional implementation manner, first unlocking information, second unlocking information or the third Unlocking information includes any one or more in following information: unlocking pin, unlock finger print information, unlock induction card information, Unlock voiceprint, unlock iris information, unlock venous information, unlock facial information.
In an optional implementation manner, determine do not include matching with the posture feature in posture feature database When degree is greater than the first posture feature data of first threshold, the method also includes:
It monitors target user residence time in the monitoring range of the monitoring device and exceeds the second preset duration When, warning message is exported, the warning message, which is used to indicate around the electronic lock, illegal user occurs.
In an optional implementation manner, the method also includes:
Determine that the matching degree of the posture feature and the first posture feature data is greater than the first threshold and is less than It is including by the posture feature with the unmatched data of the first posture feature data when second threshold, with described first Posture feature data are combined as the second posture feature data, are stored in the posture feature database.
Second aspect, the embodiment of the invention provides a kind of trippers, applied to the electronic gate for being provided with monitoring device Lock, comprising:
Acquisition module, for acquiring the posture feature of the target user into the monitoring range of the monitoring device;
Processing module includes being greater than the first threshold with the matching degree of the posture feature for determining in posture feature database When the first posture feature data of value, the electronic lock is waken up;Wherein, it is stored in the posture feature database including institute State the posture feature data of the legitimate user including the first posture feature data;
Receive the first unlock instruction of target user's triggering being unlocked to the electronic lock after wake-up, institute It states and carries the first unlocking information in the first unlock instruction;
First unlocking information is verified, and opens the electronic lock after being verified.
In an optional implementation manner, the processing module, is also used to:
Determine do not include the first appearance for being greater than first threshold with the matching degree of the posture feature in posture feature database When state characteristic, the second unlock instruction of target user's triggering being unlocked to the electronic lock is received, it is described The second unlocking information is carried in second unlock instruction;
Second unlocking information is verified, and in the first preset duration after being verified, receives the mesh The third unlock instruction of user's triggering being unlocked to the electronic lock is marked, carries third solution in the third unlock instruction Lock information;Wherein, second unlocking information is different from the third unlocking information;
The third unlocking information is verified, and opens the electronic lock after being verified.
In a kind of optional implementation, first unlocking information, second unlocking information or the third solution Lock information includes any one or more in following information: unlocking pin, unlock finger print information, unlock induction card information, solution Lock voiceprint, unlock iris information, unlock venous information, unlock facial information.
In an optional implementation manner, the processing module in determining posture feature database do not include and institute State posture feature matching degree be greater than first threshold the first posture feature data when, be specifically used for:
It monitors target user residence time in the monitoring range of the monitoring device and exceeds the second preset duration When, warning message is exported, the warning message, which is used to indicate around the electronic lock, illegal user occurs.
In an optional implementation manner, the processing module, is also used to:
Determine that the matching degree of the posture feature and the first posture feature data is greater than the first threshold and is less than It is including by the posture feature with the unmatched data of the first posture feature data when second threshold, with described first Posture feature data are combined as the second posture feature data, are stored in the posture feature database.
The third aspect, the embodiment of the invention provides a kind of electronic locks, comprising: memory, for storing program instruction; Processor executes the above method according to the program instruction of acquisition for reading the program instruction stored in the memory.
Fourth aspect, the embodiment of the invention provides a kind of computer readable storage medium, the computer-readable storage Media storage has computer instruction, when the computer instruction is run on computers, so that computer executes the above method.
Aforesaid way provided in an embodiment of the present invention is collecting the appearance into the target user of monitoring device monitoring range After state feature, identity is carried out to target user based on the posture feature database for being stored with legitimate user's posture feature data and is tested Card determines that target user is legitimate user, namely determines that in posture feature database include being greater than with the matching degree of posture feature Door lock is just waken up after first posture feature data of first threshold, then in aforementioned first unlock instruction of target user's triggering The first unlocking information carried carries out being verified rear opening door lock.By verifying user identity, it can guarantee the key of door lock Even if being stolen, identity mismatch also fail to open door lock, effectively improves the safety of door lock.
Detailed description of the invention
Fig. 1 is a kind of flow diagram of unlocking method provided in an embodiment of the present invention;
Fig. 2 is a kind of structural block diagram of tripper provided in an embodiment of the present invention;
Fig. 3 is a kind of structural schematic diagram of electronic lock provided in an embodiment of the present invention;
Fig. 4 is a kind of flow diagram for updating posture feature database provided in an embodiment of the present invention.
Specific embodiment
To make the objectives, technical solutions, and advantages of the present invention clearer, below in conjunction with attached drawing to the present invention make into It is described in detail to one step, it is clear that the described embodiments are only some of the embodiments of the present invention, rather than whole implementation Example.Based on the embodiments of the present invention, obtained by those of ordinary skill in the art without making creative efforts All other embodiment, shall fall within the protection scope of the present invention.
It should be noted that it is multiple involved in the present invention, refer to two or more."and/or", description association pair The incidence relation of elephant, indicate may exist three kinds of relationships, for example, A and/or B, can indicate: individualism A, exist simultaneously A and These three situations of B, individualism B.Character "/" typicallys represent the relationship that forward-backward correlation object is a kind of "or".Additionally, it should manage Solution, although may describe each data using term first, second etc. in embodiments of the present invention, these data be should not necessarily be limited by These terms.These terms are only used to for each data being distinguished from each other out.
Current intelligent door lock passes through setting unlocking code key, password, contactless card etc., when user inputs unlocking mostly Password, or the contactless card of unlocking is attached to the induction zone on door lock, after being verified, door lock can be turned on.If password Or the unlockings code key such as contactless card is stolen, appropriator using unlocking code key can opening door lock, lack for user identity Verifying, safety is poor.
Based on this, the embodiment of the invention provides a kind of unlocking method, device and electronic locks, to solve the prior art In can not identify user identity, unlocking code key stolen the problem of influencing user security.Wherein, method and apparatus are based on same Inventive concept, since the principle that method and apparatus solve the problems, such as is similar, the implementation of method and apparatus can with cross-reference, Overlaps will not be repeated.
To be carried out first to a kind of unlocking method disclosed in the embodiment of the present invention detailed convenient for understanding the present embodiment It is thin to introduce.
Referring to Fig. 1, the embodiment of the invention provides a kind of unlocking method, this method is applied to be provided with the electricity of monitoring device Cervical orifice of uterus lock, comprising:
Step S101, acquisition enter the posture feature of the target user of the monitoring range of monitoring device;
Wherein, monitoring device can be camera or laser radar etc., and posture feature includes walk posture feature, body The features such as volume morphing feature height, fat or thin.
Step S102 determines to include be greater than first threshold with the matching degree of posture feature first in posture feature database When posture feature data, electronic lock is waken up.
Wherein, the posture that the legitimate user including the first posture feature data is stored in posture feature database is special Levy data, the data in posture feature database can based on user to the relevant operation instruction that electronic lock trigger be added with Modification, can also be added and be modified by the associated application terminal of electronic lock.In view of human body attitude feature, such as walk Posture feature can be slowly varying with the variation of human physiological functions, is determining that target user is based on posture feature database It is no be legitimate user when, by setting first threshold carry out fuzzy matching, specifically, the first threshold can be set according to actual needs Determine, such as expressed as a percentage 80%, is not limited herein.
Step S103 receives the first unlock instruction of target user's triggering being unlocked to the electronic lock after wake-up, The first unlocking information is carried in first unlock instruction;Step S104 verifies the first unlocking information, and after being verified Open electronic lock.
Above-mentioned unlocking method provided in an embodiment of the present invention, it is special based on the posture for being stored with legitimate user's posture feature data It levies database and authentication is carried out to target user, determine that target user is legitimate user, namely determine posture feature database In include with the matching degree of posture feature be greater than first threshold the first posture feature data after just wake up door lock, then to target The first unlocking information carried in aforementioned first unlock instruction of user's triggering is verified, and rear opening door lock is passed through.By testing User identity is demonstrate,proved, even if can guarantee that the key of door lock is stolen, identity mismatch also fail to open door lock, effectively improves door The safety of lock.
Further, it is contemplated that when practical application, it is understood that there may be personal injury, the reasons such as sick cause posture feature occur compared with Change greatly, will appear the situation of posture feature identification mistake for legitimate user.In a kind of optional embodiment, The above method further include:
(1) determine do not include the first appearance for being greater than first threshold with the matching degree of posture feature in posture feature database When state characteristic, the second unlock instruction of target user's triggering being unlocked to electronic lock, the second unlock instruction are received The second unlocking information of middle carrying.
(2) the second unlocking information is verified, and in the first preset duration after being verified, receives target and uses The third unlock instruction of family triggering being unlocked to electronic lock, third unlocking information is carried in third unlock instruction;Wherein, Second unlocking information is different from third unlocking information.
(3) third unlocking information is verified, and opens electronic lock after being verified.
In the present embodiment, determine in posture feature database do not include being greater than first threshold with the matching degree of posture feature When the first posture feature data, user can successively two different unlocking informations of typing, and entry time interval is not more than twice First preset duration, verifying pass through rear opening door lock.By the way of double verification, legitimate user is in injury, the originals such as sick When making posture feature identification mistake because causing posture feature that large change occurs, can also succeed opening door lock.Wherein, One preset duration can be set according to practical application, such as 30s, be not limited herein.
When it is implemented, above-mentioned first unlocking information, the second unlocking information or third unlocking information include following letter Any one or more in breath: unlocking pin, unlock finger print information, unlock induction card information, unlock voiceprint, unlock rainbow Film information, unlock venous information (such as unlock refers to venous information), unlock facial information.
Further, in a kind of optional embodiment, do not include and posture feature when determining in posture feature database Matching degree be greater than first threshold the first posture feature data when, the above method further include:
Monitoring objective user in the monitoring range of monitoring device residence time exceed the second preset duration when, output report Alert information, warning message, which is used to indicate around electronic lock, there is illegal user.
Wherein, the second preset duration can be set according to practical application, such as 15 minutes, be not limited herein.Specifically When implementation, output warning message be can be through sendings reports such as the warning device loudspeaker, the warning lamps that are arranged at electronic lock Alert signal can also export warning message to the associated monitoring device of electronic lock, and it is mechanical, electrical that monitoring device can be such as hand The terminal devices such as brain or plate, when monitor target user in the monitoring range of monitoring device residence time exceed second It, can be all by the way of wireless communication based on preset communication interface/wireless communication module in electronic lock when preset duration Such as wifi, bluetooth, ZigBee, warning message is sent to aforementioned monitoring device, to notify to control the administrator of the monitoring device There is illegal user around aforementioned electronic door lock in member, such as owner, residential property or policeman.When it is implemented, can be according to The push object of the customized setting warning message of actual scene, namely control the management for receiving the monitoring device of warning message Personnel.
In the present embodiment, determine in posture feature database do not include being greater than first threshold with the matching degree of posture feature When the first posture feature data, the case where being continued to monitor around electronic lock by aforementioned monitoring device, when monitoring target user When residence time exceeds the second preset duration in the monitoring range of monitoring device, to administrative staff's output at monitoring device Warning message, the case where administrative staff capable of being allowed to understand around electronic lock in time.
Further, to improve the accuracy rate identified based on posture feature database to target user's posture feature, in one kind In optional embodiment, the above method further include:
It, will when determining that the matching degree of posture feature and the first posture feature data is greater than first threshold and is less than second threshold Posture feature include with the first unmatched data of posture feature data, be combined as the second appearance with the first posture feature data State characteristic is stored in posture feature database.
When it is implemented, first threshold can be set as 80%, second threshold can be set as 100%, it is assumed that posture feature database In include with the matching degree of the posture feature of target user be 83% the first posture feature data when, then by aforementioned posture feature In with the data of the first posture feature data unmatched 17% be stored in posture feature database, optionally with the first posture feature Data are combined as the second posture feature data, are stored in posture feature database, improve the number in posture feature database According to.In order to which human body attitude feature is slowly varying with the variation of human physiological functions, pass through self study update mode, Ye Jishang The mode for increasing the posture feature data for updating legitimate user into the unmatched data of small part is stated, posture feature number is timely updated According to library, to improve the accuracy rate identified based on posture feature database to target user's posture feature.
The corresponding above method, the embodiment of the invention provides a kind of trippers, referring to fig. 2, monitor applied to being provided with The electronic lock of device, comprising:
Acquisition module 201, for acquiring the posture feature for entering the target user of monitoring range of monitoring device;
Processing module 202 includes being greater than the first threshold with the matching degree of posture feature for determining in posture feature database When the first posture feature data of value, electronic lock is waken up;Wherein, it is stored in posture feature database including the first posture spy Levy the posture feature data of the legitimate user including data;Receive solving to the electronic lock after wake-up for target user's triggering First unlock instruction of lock carries the first unlocking information in the first unlock instruction;First unlocking information is verified, and is being tested Card opens electronic lock after passing through.
Above-mentioned tripper provided in an embodiment of the present invention, processing module 202 are based on being stored with legitimate user's posture feature The posture feature database of data matches the posture feature of the collected target user of acquisition module 201, determines target User is legitimate user, namely determines to include be greater than first threshold with the matching degree of posture feature the in posture feature database Door lock is just waken up after one posture feature data, then to the first solution carried in aforementioned first unlock instruction of target user's triggering Lock information carries out being verified rear opening door lock.By verifying user identity, even if can guarantee that the key of door lock is stolen, body Part mismatches and also fail to open door lock, effectively improves the safety of door lock.
In a kind of optional embodiment, processing module 202 is also used to:
Determine do not include the first posture spy for being greater than first threshold with the matching degree of posture feature in posture feature database When levying data, the second unlock instruction of target user's triggering being unlocked to electronic lock is received, is taken in the second unlock instruction The second unlocking information of band;
Second unlocking information is verified, and in the first preset duration after being verified, receives target user's touching The third unlock instruction of hair being unlocked to electronic lock carries third unlocking information in third unlock instruction;Wherein, second Unlocking information is different from third unlocking information;
Third unlocking information is verified, and opens electronic lock after being verified.
In a kind of optional embodiment, aforementioned first unlocking information, the second unlocking information or third unlocking information are equal Including any one or more in following information: unlocking pin, unlock finger print information, unlock induction card information, unlock vocal print Information, unlock iris information, unlock venous information, unlock facial information.
In a kind of optional embodiment, processing module 202 determines in posture feature database and does not include and posture is special When the matching degree of sign is greater than the first posture feature data of first threshold, it is specifically used for:
Monitoring objective user in the monitoring range of monitoring device residence time exceed the second preset duration when, output report Alert information, warning message, which is used to indicate around electronic lock, there is illegal user.
In a kind of optional embodiment, processing module 202 is also used to:
It, will when determining that the matching degree of posture feature and the first posture feature data is greater than first threshold and is less than second threshold Posture feature include with the first unmatched data of posture feature data, be combined as the second appearance with the first posture feature data State characteristic is stored in posture feature database;.
The corresponding above method, referring to Fig. 3, the embodiment of the invention provides a kind of electronic locks 300, comprising:
Communication interface 301, memory 302 and processor 303;
Wherein, the processor 303 is communicated by the communication interface 301 with other equipment, for example, other equipment It can be aforementioned monitoring device, processor 303 can send warning message to monitoring device by communication interface 301;Memory 302, for storing program instruction;Processor 303, for calling the program instruction stored in the memory 302, according to acquisition Program execute the method in above-described embodiment.
In the embodiment of the present application, processor can be general processor, digital signal processor, specific integrated circuit, Field programmable gate array or other programmable logic device, discrete gate or transistor logic, discrete hardware components, It may be implemented or execute disclosed each method, step and the logic diagram in the embodiment of the present application.General processor can be Microprocessor or any conventional processor etc..The step of method in conjunction with disclosed in the embodiment of the present application, can directly embody Execute completion for hardware processor, or in processor hardware and software module combination execute completion.
In the embodiment of the present application, memory, for storing program instruction and the i.e. legitimate user of posture feature database Posture feature data, correct unlocking information, such as: unlocking pin, unlock finger print information, unlock induction card information, unlock sound Line information, unlock iris information, unlock venous information, unlock facial information.In the embodiment of the present application, memory can be with right and wrong Volatile memory, such as hard disk (hard disk drive, HDD) or solid state hard disk (solid-state drive, SSD) Deng can also be volatile memory (volatile memory), such as random access memory (random-access Memory, RAM).Memory, which can also be, can be used in carrying or store the desired journey with instruction or data structure form Sequence code and can by any other medium of computer access, but not limited to this.Memory in the embodiment of the present application may be used also To be circuit or other devices that arbitrarily can be realized store function, for storing program instruction and/or data.The application is real Apply the specific connection medium not limited between above-mentioned communication interface, memory and processor in example, such as bus, bus can be with It is divided into address bus, data/address bus, control bus etc..
For ease of understanding, for updating the process in attitude data library, referring to fig. 4, the embodiment of the invention provides one kind Update the flow diagram in attitude data library.The external structure of electronic lock 300, i.e. electronic lock are also illustrated in Fig. 4 Monitoring device 401 and key cog region 402 are provided on 300, wherein monitoring device can be camera or laser radar Deng;Key cog region 402 includes at least any two kinds in following: combination disk, fingerprint identification area, contactless card cog region, vocal print Cog region, iris recognition area, hand vein recognition area, face face recognition area, specifically, illustrating a kind of key knowledge in Fig. 4 Other area 402, combination disk.
When there is target user in the monitoring range of the monitoring device 401 on electronic lock 300, electronic lock 300 Monitoring device 401 acquires the posture feature of target user, the processor 303 being sent in electronic lock 300,303 base of processor The posture feature data of the legitimate user stored in posture feature database in memory 302 and the posture feature of target user Matched, when include in posture feature database with the matching degree of the posture feature of target user be greater than first threshold (80%) The first posture feature data, such as include with the matching degree of the posture feature of target user in posture feature database be 83% The first posture feature data when, determine target user be legitimate user, by aforementioned posture feature with the first posture feature number The first posture feature data are combined to generate the second posture feature data according to the data of unmatched part (17%), by the second posture Characteristic is stored in posture feature database, to update posture feature database.
In addition, in a kind of optional embodiment, can also construct with the associated Cloud Server of electronic lock 300, in advance First by posture feature database, that is, legitimate user posture feature data, correct unlocking information, such as: unlocking pin, unlock Finger print information, unlock induction card information, unlock voiceprint, unlock iris information, unlock venous information, unlock facial information etc. It is stored in the Cloud Server.Based on this, processor 303 by monitoring device 401 monitored personnel close to electronic lock 300, Namely when in the monitoring range of entrance monitoring device 401, the posture feature of collector, before collected posture feature is passed through It states communication interface 301 and is sent to Cloud Server, by cloud service according to the legitimate user's of posture feature database purchase therein Posture feature data are compared, to judge whether the personnel are legitimate user, if it is, waking up the key on door lock Cog region is identified by rear opening door lock after the corresponding key of personnel's typing (that is, aforementioned first unlocking information);If no It is then to start the timer connected to the processor set in preset timing unit either electronic lock in processor to start to count When, and a kind of key of reception staff's typing (that is, aforementioned second unlocking information) is identified by and is separated by the first preset duration again After the secondary another key (that is, aforementioned third unlocking information) for receiving personnel's typing is identified by, opening door lock;But when meter Constantly length reaches preset second level duration, does not receive the correct key of personnel's successively typing yet, and personnel are also monitoring Device 401 stops in the range of capable of monitoring, determines that the personnel are unauthorized person, then passes through communication interface 301 to electronic gate Lock 300 associated monitoring device output warning messages.In the present embodiment, communication interface 301 can be used communication with Monitoring device or Cloud Server are communicated.
Further, the embodiment of the invention provides a kind of computer readable storage medium, the computer readable storage mediums It is stored with computer instruction, when computer instruction is run on computers, so that computer executes the above method.
It should be understood by those skilled in the art that, embodiments herein can provide as method, system or computer program Product.Therefore, complete hardware embodiment, complete software embodiment or reality combining software and hardware aspects can be used in the application Apply the form of example.Moreover, it wherein includes the computer of computer usable program code that the application, which can be used in one or more, The computer program implemented in usable storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) produces The form of product.
The application be referring to according to the present processes, equipment (system) and computer program product flow chart and/or Block diagram describes.It should be understood that each process that can be realized by computer program instructions in flowchart and/or the block diagram and/or The combination of process and/or box in box and flowchart and/or the block diagram.It can provide these computer program instructions to arrive General purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices processor to generate one Machine, so that being generated by the instruction that computer or the processor of other programmable data processing devices execute for realizing flowing The device for the function of being specified in journey figure one process or multiple processes and/or block diagrams one box or multiple boxes.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing devices with spy Determine in the computer-readable memory that mode works, so that it includes referring to that instruction stored in the computer readable memory, which generates, Enable the manufacture of device, the command device realize in one box of one or more flows of the flowchart and/or block diagram or The function of being specified in multiple boxes.
These computer program instructions also can be loaded onto a computer or other programmable data processing device, so that counting Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, thus in computer or The instruction executed on other programmable devices is provided for realizing in one or more flows of the flowchart and/or block diagram one The step of function of being specified in a box or multiple boxes.
Although preferred embodiments of the present invention have been described, it is created once a person skilled in the art knows basic Property concept, then additional changes and modifications may be made to these embodiments.So it includes excellent that the following claims are intended to be interpreted as It selects embodiment and falls into all change and modification of the scope of the invention.
Obviously, those skilled in the art can carry out various modification and variations without departing from the essence of the application to the application Mind and range.In this way, if these modifications and variations of the application belong to the range of the claim of this application and its equivalent technologies Within, then the application is also intended to include these modifications and variations.

Claims (12)

1. a kind of unlocking method, which is characterized in that applied to the electronic lock for being provided with monitoring device, comprising:
Acquisition enters the posture feature of the target user of the monitoring range of the monitoring device;
Determine to include the first posture feature for being greater than first threshold with the matching degree of the posture feature in posture feature database When data, the electronic lock is waken up;Wherein, it is stored in the posture feature database including the first posture feature number According to the posture feature data of legitimate user inside;
Receive the first unlock instruction of target user triggering being unlocked to the electronic lock after wake-up, described the The first unlocking information is carried in one unlock instruction;
First unlocking information is verified, and opens the electronic lock after being verified.
2. the method as described in claim 1, which is characterized in that the method also includes:
Determine do not include the first posture spy for being greater than first threshold with the matching degree of the posture feature in posture feature database When levying data, the second unlock instruction of target user triggering being unlocked to the electronic lock is received, described second The second unlocking information is carried in unlock instruction;
Second unlocking information is verified, and in the first preset duration after being verified, receives the target and use The third unlock instruction of family triggering being unlocked to the electronic lock carries third unlock letter in the third unlock instruction Breath;Wherein, second unlocking information is different from the third unlocking information;
The third unlocking information is verified, and opens the electronic lock after being verified.
3. method according to claim 1 or 2, which is characterized in that first unlocking information, second unlocking information or Third unlocking information described in person includes any one or more in following information: unlocking pin, unlock finger print information, unlock sense Answer card information, unlock voiceprint, unlock iris information, unlock venous information, unlock facial information.
4. method according to claim 2, which is characterized in that determine in posture feature database do not include special with the posture When the matching degree of sign is greater than the first posture feature data of first threshold, the method also includes:
It is defeated when monitoring the target user residence time is beyond the second preset duration in the monitoring range of the monitoring device Warning message out, the warning message, which is used to indicate around the electronic lock, there is illegal user.
5. the method as described in claim 1, which is characterized in that the method also includes:
Determine that the matching degree of the posture feature and the first posture feature data is greater than the first threshold and less than second It is including by the posture feature with the unmatched data of the first posture feature data when threshold value, with first posture Characteristic is combined as the second posture feature data, is stored in the posture feature database.
6. a kind of tripper, which is characterized in that applied to the electronic lock for being provided with monitoring device, comprising:
Acquisition module, for acquiring the posture feature of the target user into the monitoring range of the monitoring device;
Processing module includes being greater than first threshold with the matching degree of the posture feature for determining in posture feature database When the first posture feature data, the electronic lock is waken up;Wherein, it is stored in the posture feature database including described The posture feature data of legitimate user including one posture feature data;
Receive the first unlock instruction of target user triggering being unlocked to the electronic lock after wake-up, described the The first unlocking information is carried in one unlock instruction;
First unlocking information is verified, and opens the electronic lock after being verified.
7. device as claimed in claim 6, which is characterized in that the processing module is also used to:
Determine do not include the first posture spy for being greater than first threshold with the matching degree of the posture feature in posture feature database When levying data, the second unlock instruction of target user triggering being unlocked to the electronic lock is received, described second The second unlocking information is carried in unlock instruction;
Second unlocking information is verified, and in the first preset duration after being verified, receives the target and use The third unlock instruction of family triggering being unlocked to the electronic lock carries third unlock letter in the third unlock instruction Breath;Wherein, second unlocking information is different from the third unlocking information;
The third unlocking information is verified, and opens the electronic lock after being verified.
8. device as claimed in claims 6 or 7, which is characterized in that first unlocking information, second unlocking information or Third unlocking information described in person includes any one or more in following information: unlocking pin, unlock finger print information, unlock sense Answer card information, unlock voiceprint, unlock iris information, unlock venous information, unlock facial information.
9. device as claimed in claim 7, which is characterized in that the processing module, in determining posture feature database not Including with the matching degree of the posture feature be greater than first threshold the first posture feature data when, be specifically used for:
It is defeated when monitoring the target user residence time is beyond the second preset duration in the monitoring range of the monitoring device Warning message out, the warning message, which is used to indicate around the electronic lock, there is illegal user.
10. device as claimed in claim 6, which is characterized in that the processing module is also used to:
Determine that the matching degree of the posture feature and the first posture feature data is greater than the first threshold and less than second It is including by the posture feature with the unmatched data of the first posture feature data when threshold value, with first posture Characteristic is combined as the second posture feature data, is stored in the posture feature database.
11. a kind of electronic lock characterized by comprising
Memory and processor;
Memory, for storing program instruction;
Processor requires 1 according to the program instruction perform claim of acquisition for reading the program instruction stored in the memory To 5 described in any item methods.
12. a kind of computer readable storage medium, which is characterized in that the computer-readable recording medium storage has computer to refer to It enables, when the computer instruction is run on computers, so that computer perform claim requires 1 to 5 described in any item sides Method.
CN201910510295.XA 2019-06-13 2019-06-13 Unlocking method and device and electronic door lock Pending CN110288731A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910510295.XA CN110288731A (en) 2019-06-13 2019-06-13 Unlocking method and device and electronic door lock

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910510295.XA CN110288731A (en) 2019-06-13 2019-06-13 Unlocking method and device and electronic door lock

Publications (1)

Publication Number Publication Date
CN110288731A true CN110288731A (en) 2019-09-27

Family

ID=68005314

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910510295.XA Pending CN110288731A (en) 2019-06-13 2019-06-13 Unlocking method and device and electronic door lock

Country Status (1)

Country Link
CN (1) CN110288731A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111750919A (en) * 2020-07-02 2020-10-09 陕西师范大学 Identity authentication method and apparatus using multi-axis sensor and accelerometer
CN112991600A (en) * 2021-03-26 2021-06-18 杭州海康威视数字技术股份有限公司 Method, device, system and equipment for enabling vehicle to exit parking lot
CN117037340A (en) * 2023-09-06 2023-11-10 东莞市安邦德智能锁具科技有限公司 Intelligent lock control system based on data identification

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120319814A1 (en) * 2011-06-14 2012-12-20 International Business Machines Corporation Opening management through gait detection
CN104270253A (en) * 2014-10-21 2015-01-07 中国建设银行股份有限公司 Method, devices and system for user identity authentication
CN105155971A (en) * 2015-08-21 2015-12-16 汪澜 Automatic door opening system based on gait recognition
CN105787440A (en) * 2015-11-10 2016-07-20 深圳市商汤科技有限公司 Security protection management method and system based on face features and gait features
CN107134026A (en) * 2017-04-19 2017-09-05 上海斐讯数据通信技术有限公司 A kind of entrance guard controlling method and system
CN109035530A (en) * 2018-08-23 2018-12-18 广东汇泰龙科技有限公司 A kind of method for unlocking based on cloud lock-step state identifying system, system
US20190066415A1 (en) * 2017-08-28 2019-02-28 Timetec Holding Sdn Bhd Mobile-based access control system

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120319814A1 (en) * 2011-06-14 2012-12-20 International Business Machines Corporation Opening management through gait detection
CN104270253A (en) * 2014-10-21 2015-01-07 中国建设银行股份有限公司 Method, devices and system for user identity authentication
CN105155971A (en) * 2015-08-21 2015-12-16 汪澜 Automatic door opening system based on gait recognition
CN105787440A (en) * 2015-11-10 2016-07-20 深圳市商汤科技有限公司 Security protection management method and system based on face features and gait features
CN107134026A (en) * 2017-04-19 2017-09-05 上海斐讯数据通信技术有限公司 A kind of entrance guard controlling method and system
US20190066415A1 (en) * 2017-08-28 2019-02-28 Timetec Holding Sdn Bhd Mobile-based access control system
CN109035530A (en) * 2018-08-23 2018-12-18 广东汇泰龙科技有限公司 A kind of method for unlocking based on cloud lock-step state identifying system, system

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111750919A (en) * 2020-07-02 2020-10-09 陕西师范大学 Identity authentication method and apparatus using multi-axis sensor and accelerometer
CN112991600A (en) * 2021-03-26 2021-06-18 杭州海康威视数字技术股份有限公司 Method, device, system and equipment for enabling vehicle to exit parking lot
CN117037340A (en) * 2023-09-06 2023-11-10 东莞市安邦德智能锁具科技有限公司 Intelligent lock control system based on data identification
CN117037340B (en) * 2023-09-06 2024-04-12 东莞市安邦德智能锁具科技有限公司 Intelligent lock control system based on data identification

Similar Documents

Publication Publication Date Title
US11417159B2 (en) Methods and systems for controlling a smart lock
CN103324909B (en) Facial feature detection
US9800570B1 (en) Method of persistent authentication with disablement upon removal of a wearable device
US10868672B1 (en) Establishing and verifying identity using biometrics while protecting user privacy
CN107506755A (en) Monitoring video recognition methods and device
CN110288731A (en) Unlocking method and device and electronic door lock
CN107408167A (en) Perform the seamless certification of user
CN109948320B (en) Block chain-based identity recognition management method, device, medium and electronic equipment
CN106603563A (en) Information safety realization method and system based on biometric features identification
CN112328995B (en) Social management system based on TOF image sensor verification
CN107195045B (en) Gate inhibition's door bell and button system and security system
CN206522020U (en) A kind of intelligent door lock and system
CN104346550B (en) A kind of information processing method and a kind of electronic equipment
WO2020135079A1 (en) Method and device for opening electronic gate, and server
CN110223430A (en) Control method and device of electronic door lock and electronic door lock
CN109801409A (en) Voice method for unlocking, electronic equipment
CN110120114B (en) Human body identification method and system based on access control system and storage medium
CN109461241A (en) A kind of face and fingerprint identification entrance guard system control method
CN106355684B (en) Control method, the device and system of controlled plant
CN109461237A (en) Intelligent door lock device and method for reminding message thereof
CN109522694A (en) A kind of identification system based on computer network
CN112002075A (en) Information processing method and device for improving safety of storage cabinet
CN110415406A (en) A kind of double nets are mutual to monitor security intelligent door lock system for speech recognition
CN115661994A (en) UWB technology-based access control method and device and terminal equipment
CN210442852U (en) Fingerprint access control system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190927