CN110288731A - Unlocking method and device and electronic door lock - Google Patents
Unlocking method and device and electronic door lock Download PDFInfo
- Publication number
- CN110288731A CN110288731A CN201910510295.XA CN201910510295A CN110288731A CN 110288731 A CN110288731 A CN 110288731A CN 201910510295 A CN201910510295 A CN 201910510295A CN 110288731 A CN110288731 A CN 110288731A
- Authority
- CN
- China
- Prior art keywords
- posture feature
- unlock
- information
- unlocking
- posture
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 48
- 238000012806 monitoring device Methods 0.000 claims abstract description 41
- 238000012544 monitoring process Methods 0.000 claims abstract description 24
- 238000012545 processing Methods 0.000 claims description 18
- 230000001815 facial effect Effects 0.000 claims description 8
- 238000012795 verification Methods 0.000 abstract description 2
- 230000001960 triggered effect Effects 0.000 abstract 1
- 238000010586 diagram Methods 0.000 description 12
- 238000004891 communication Methods 0.000 description 11
- 230000006698 induction Effects 0.000 description 8
- 238000004590 computer program Methods 0.000 description 7
- 238000012986 modification Methods 0.000 description 6
- 230000004048 modification Effects 0.000 description 6
- 230000008569 process Effects 0.000 description 6
- 230000006870 function Effects 0.000 description 4
- 230000008859 change Effects 0.000 description 3
- VAYOSLLFUXYJDT-RDTXWAMCSA-N Lysergic acid diethylamide Chemical class C1=CC(C=2[C@H](N(C)C[C@@H](C=2)C(=O)N(CC)CC)C2)=C3C2=CNC3=C1 VAYOSLLFUXYJDT-RDTXWAMCSA-N 0.000 description 2
- 238000005760 Tripper reaction Methods 0.000 description 2
- 208000027418 Wounds and injury Diseases 0.000 description 2
- 230000006378 damage Effects 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 208000014674 injury Diseases 0.000 description 2
- 230000035790 physiological processes and functions Effects 0.000 description 2
- 230000001755 vocal effect Effects 0.000 description 2
- 241000406668 Loxodonta cyclotis Species 0.000 description 1
- 210000004556 brain Anatomy 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 230000005611 electricity Effects 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 239000007787 solid Substances 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
- 210000004291 uterus Anatomy 0.000 description 1
- 210000003462 vein Anatomy 0.000 description 1
- 230000002618 waking effect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00563—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys using personal physical data of the operator, e.g. finger prints, retinal images, voicepatterns
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Lock And Its Accessories (AREA)
Abstract
The invention provides an unlocking method, an unlocking device and an electronic door lock, which are used for solving the problems that the identity of a user cannot be identified and the safety of the user is influenced because an unlocking secret key is stolen in the prior art. The method is applied to an electronic door lock provided with a monitoring device, and firstly, the posture characteristics of a target user entering the monitoring range of the monitoring device are collected; then, when the attitude characteristic database is determined to contain first attitude characteristic data with the matching degree with the attitude characteristics larger than a first threshold value, the electronic door lock is awakened; the gesture feature database stores gesture feature data of legal users including first gesture feature data; further receiving a first unlocking instruction which is triggered by a target user and used for unlocking the awakened electronic door lock, wherein the first unlocking instruction carries first unlocking information; and verifying the first unlocking information, and unlocking the electronic door lock after the verification is passed.
Description
Technical field
The present invention relates to door lock control field more particularly to a kind of unlocking methods, device and electronic lock.
Background technique
With gradualling mature for technology of Internet of things, intelligent door lock is applied to more and more families, office, retail shop etc.
Place, to guarantee the safety of user.
Current intelligent door lock passes through setting unlocking code key, password, contactless card etc., when user inputs unlocking mostly
Password, or the contactless card of unlocking is attached to the induction zone on door lock, after being verified, door lock can be turned on.If password
Or the unlockings code key such as contactless card is stolen, appropriator using unlocking code key can opening door lock, lack for user identity
Verifying, safety is poor.
Summary of the invention
The present invention provides a kind of unlocking method, device and electronic lock, can not identify user in the prior art to solve
Identity, unlocking code key are stolen the problem of influencing user security.
In a first aspect, the embodiment of the invention provides a kind of unlocking method, applied to the electronic gate for being provided with monitoring device
Lock, comprising:
Acquisition enters the posture feature of the target user of the monitoring range of the monitoring device;
Determine to include the first posture for being greater than first threshold with the matching degree of the posture feature in posture feature database
When characteristic, the electronic lock is waken up;Wherein, it is stored in the posture feature database special including first posture
Levy the posture feature data of the legitimate user including data;
Receive the first unlock instruction of target user's triggering being unlocked to the electronic lock after wake-up, institute
It states and carries the first unlocking information in the first unlock instruction;
First unlocking information is verified, and opens the electronic lock after being verified.
In an optional implementation manner, the method also includes:
Determine do not include the first appearance for being greater than first threshold with the matching degree of the posture feature in posture feature database
When state characteristic, the second unlock instruction of target user's triggering being unlocked to the electronic lock is received, it is described
The second unlocking information is carried in second unlock instruction;
Second unlocking information is verified, and in the first preset duration after being verified, receives the mesh
The third unlock instruction of user's triggering being unlocked to the electronic lock is marked, carries third solution in the third unlock instruction
Lock information;Wherein, second unlocking information is different from the third unlocking information;
The third unlocking information is verified, and opens the electronic lock after being verified.
In an optional implementation manner, first unlocking information, second unlocking information or the third
Unlocking information includes any one or more in following information: unlocking pin, unlock finger print information, unlock induction card information,
Unlock voiceprint, unlock iris information, unlock venous information, unlock facial information.
In an optional implementation manner, determine do not include matching with the posture feature in posture feature database
When degree is greater than the first posture feature data of first threshold, the method also includes:
It monitors target user residence time in the monitoring range of the monitoring device and exceeds the second preset duration
When, warning message is exported, the warning message, which is used to indicate around the electronic lock, illegal user occurs.
In an optional implementation manner, the method also includes:
Determine that the matching degree of the posture feature and the first posture feature data is greater than the first threshold and is less than
It is including by the posture feature with the unmatched data of the first posture feature data when second threshold, with described first
Posture feature data are combined as the second posture feature data, are stored in the posture feature database.
Second aspect, the embodiment of the invention provides a kind of trippers, applied to the electronic gate for being provided with monitoring device
Lock, comprising:
Acquisition module, for acquiring the posture feature of the target user into the monitoring range of the monitoring device;
Processing module includes being greater than the first threshold with the matching degree of the posture feature for determining in posture feature database
When the first posture feature data of value, the electronic lock is waken up;Wherein, it is stored in the posture feature database including institute
State the posture feature data of the legitimate user including the first posture feature data;
Receive the first unlock instruction of target user's triggering being unlocked to the electronic lock after wake-up, institute
It states and carries the first unlocking information in the first unlock instruction;
First unlocking information is verified, and opens the electronic lock after being verified.
In an optional implementation manner, the processing module, is also used to:
Determine do not include the first appearance for being greater than first threshold with the matching degree of the posture feature in posture feature database
When state characteristic, the second unlock instruction of target user's triggering being unlocked to the electronic lock is received, it is described
The second unlocking information is carried in second unlock instruction;
Second unlocking information is verified, and in the first preset duration after being verified, receives the mesh
The third unlock instruction of user's triggering being unlocked to the electronic lock is marked, carries third solution in the third unlock instruction
Lock information;Wherein, second unlocking information is different from the third unlocking information;
The third unlocking information is verified, and opens the electronic lock after being verified.
In a kind of optional implementation, first unlocking information, second unlocking information or the third solution
Lock information includes any one or more in following information: unlocking pin, unlock finger print information, unlock induction card information, solution
Lock voiceprint, unlock iris information, unlock venous information, unlock facial information.
In an optional implementation manner, the processing module in determining posture feature database do not include and institute
State posture feature matching degree be greater than first threshold the first posture feature data when, be specifically used for:
It monitors target user residence time in the monitoring range of the monitoring device and exceeds the second preset duration
When, warning message is exported, the warning message, which is used to indicate around the electronic lock, illegal user occurs.
In an optional implementation manner, the processing module, is also used to:
Determine that the matching degree of the posture feature and the first posture feature data is greater than the first threshold and is less than
It is including by the posture feature with the unmatched data of the first posture feature data when second threshold, with described first
Posture feature data are combined as the second posture feature data, are stored in the posture feature database.
The third aspect, the embodiment of the invention provides a kind of electronic locks, comprising: memory, for storing program instruction;
Processor executes the above method according to the program instruction of acquisition for reading the program instruction stored in the memory.
Fourth aspect, the embodiment of the invention provides a kind of computer readable storage medium, the computer-readable storage
Media storage has computer instruction, when the computer instruction is run on computers, so that computer executes the above method.
Aforesaid way provided in an embodiment of the present invention is collecting the appearance into the target user of monitoring device monitoring range
After state feature, identity is carried out to target user based on the posture feature database for being stored with legitimate user's posture feature data and is tested
Card determines that target user is legitimate user, namely determines that in posture feature database include being greater than with the matching degree of posture feature
Door lock is just waken up after first posture feature data of first threshold, then in aforementioned first unlock instruction of target user's triggering
The first unlocking information carried carries out being verified rear opening door lock.By verifying user identity, it can guarantee the key of door lock
Even if being stolen, identity mismatch also fail to open door lock, effectively improves the safety of door lock.
Detailed description of the invention
Fig. 1 is a kind of flow diagram of unlocking method provided in an embodiment of the present invention;
Fig. 2 is a kind of structural block diagram of tripper provided in an embodiment of the present invention;
Fig. 3 is a kind of structural schematic diagram of electronic lock provided in an embodiment of the present invention;
Fig. 4 is a kind of flow diagram for updating posture feature database provided in an embodiment of the present invention.
Specific embodiment
To make the objectives, technical solutions, and advantages of the present invention clearer, below in conjunction with attached drawing to the present invention make into
It is described in detail to one step, it is clear that the described embodiments are only some of the embodiments of the present invention, rather than whole implementation
Example.Based on the embodiments of the present invention, obtained by those of ordinary skill in the art without making creative efforts
All other embodiment, shall fall within the protection scope of the present invention.
It should be noted that it is multiple involved in the present invention, refer to two or more."and/or", description association pair
The incidence relation of elephant, indicate may exist three kinds of relationships, for example, A and/or B, can indicate: individualism A, exist simultaneously A and
These three situations of B, individualism B.Character "/" typicallys represent the relationship that forward-backward correlation object is a kind of "or".Additionally, it should manage
Solution, although may describe each data using term first, second etc. in embodiments of the present invention, these data be should not necessarily be limited by
These terms.These terms are only used to for each data being distinguished from each other out.
Current intelligent door lock passes through setting unlocking code key, password, contactless card etc., when user inputs unlocking mostly
Password, or the contactless card of unlocking is attached to the induction zone on door lock, after being verified, door lock can be turned on.If password
Or the unlockings code key such as contactless card is stolen, appropriator using unlocking code key can opening door lock, lack for user identity
Verifying, safety is poor.
Based on this, the embodiment of the invention provides a kind of unlocking method, device and electronic locks, to solve the prior art
In can not identify user identity, unlocking code key stolen the problem of influencing user security.Wherein, method and apparatus are based on same
Inventive concept, since the principle that method and apparatus solve the problems, such as is similar, the implementation of method and apparatus can with cross-reference,
Overlaps will not be repeated.
To be carried out first to a kind of unlocking method disclosed in the embodiment of the present invention detailed convenient for understanding the present embodiment
It is thin to introduce.
Referring to Fig. 1, the embodiment of the invention provides a kind of unlocking method, this method is applied to be provided with the electricity of monitoring device
Cervical orifice of uterus lock, comprising:
Step S101, acquisition enter the posture feature of the target user of the monitoring range of monitoring device;
Wherein, monitoring device can be camera or laser radar etc., and posture feature includes walk posture feature, body
The features such as volume morphing feature height, fat or thin.
Step S102 determines to include be greater than first threshold with the matching degree of posture feature first in posture feature database
When posture feature data, electronic lock is waken up.
Wherein, the posture that the legitimate user including the first posture feature data is stored in posture feature database is special
Levy data, the data in posture feature database can based on user to the relevant operation instruction that electronic lock trigger be added with
Modification, can also be added and be modified by the associated application terminal of electronic lock.In view of human body attitude feature, such as walk
Posture feature can be slowly varying with the variation of human physiological functions, is determining that target user is based on posture feature database
It is no be legitimate user when, by setting first threshold carry out fuzzy matching, specifically, the first threshold can be set according to actual needs
Determine, such as expressed as a percentage 80%, is not limited herein.
Step S103 receives the first unlock instruction of target user's triggering being unlocked to the electronic lock after wake-up,
The first unlocking information is carried in first unlock instruction;Step S104 verifies the first unlocking information, and after being verified
Open electronic lock.
Above-mentioned unlocking method provided in an embodiment of the present invention, it is special based on the posture for being stored with legitimate user's posture feature data
It levies database and authentication is carried out to target user, determine that target user is legitimate user, namely determine posture feature database
In include with the matching degree of posture feature be greater than first threshold the first posture feature data after just wake up door lock, then to target
The first unlocking information carried in aforementioned first unlock instruction of user's triggering is verified, and rear opening door lock is passed through.By testing
User identity is demonstrate,proved, even if can guarantee that the key of door lock is stolen, identity mismatch also fail to open door lock, effectively improves door
The safety of lock.
Further, it is contemplated that when practical application, it is understood that there may be personal injury, the reasons such as sick cause posture feature occur compared with
Change greatly, will appear the situation of posture feature identification mistake for legitimate user.In a kind of optional embodiment,
The above method further include:
(1) determine do not include the first appearance for being greater than first threshold with the matching degree of posture feature in posture feature database
When state characteristic, the second unlock instruction of target user's triggering being unlocked to electronic lock, the second unlock instruction are received
The second unlocking information of middle carrying.
(2) the second unlocking information is verified, and in the first preset duration after being verified, receives target and uses
The third unlock instruction of family triggering being unlocked to electronic lock, third unlocking information is carried in third unlock instruction;Wherein,
Second unlocking information is different from third unlocking information.
(3) third unlocking information is verified, and opens electronic lock after being verified.
In the present embodiment, determine in posture feature database do not include being greater than first threshold with the matching degree of posture feature
When the first posture feature data, user can successively two different unlocking informations of typing, and entry time interval is not more than twice
First preset duration, verifying pass through rear opening door lock.By the way of double verification, legitimate user is in injury, the originals such as sick
When making posture feature identification mistake because causing posture feature that large change occurs, can also succeed opening door lock.Wherein,
One preset duration can be set according to practical application, such as 30s, be not limited herein.
When it is implemented, above-mentioned first unlocking information, the second unlocking information or third unlocking information include following letter
Any one or more in breath: unlocking pin, unlock finger print information, unlock induction card information, unlock voiceprint, unlock rainbow
Film information, unlock venous information (such as unlock refers to venous information), unlock facial information.
Further, in a kind of optional embodiment, do not include and posture feature when determining in posture feature database
Matching degree be greater than first threshold the first posture feature data when, the above method further include:
Monitoring objective user in the monitoring range of monitoring device residence time exceed the second preset duration when, output report
Alert information, warning message, which is used to indicate around electronic lock, there is illegal user.
Wherein, the second preset duration can be set according to practical application, such as 15 minutes, be not limited herein.Specifically
When implementation, output warning message be can be through sendings reports such as the warning device loudspeaker, the warning lamps that are arranged at electronic lock
Alert signal can also export warning message to the associated monitoring device of electronic lock, and it is mechanical, electrical that monitoring device can be such as hand
The terminal devices such as brain or plate, when monitor target user in the monitoring range of monitoring device residence time exceed second
It, can be all by the way of wireless communication based on preset communication interface/wireless communication module in electronic lock when preset duration
Such as wifi, bluetooth, ZigBee, warning message is sent to aforementioned monitoring device, to notify to control the administrator of the monitoring device
There is illegal user around aforementioned electronic door lock in member, such as owner, residential property or policeman.When it is implemented, can be according to
The push object of the customized setting warning message of actual scene, namely control the management for receiving the monitoring device of warning message
Personnel.
In the present embodiment, determine in posture feature database do not include being greater than first threshold with the matching degree of posture feature
When the first posture feature data, the case where being continued to monitor around electronic lock by aforementioned monitoring device, when monitoring target user
When residence time exceeds the second preset duration in the monitoring range of monitoring device, to administrative staff's output at monitoring device
Warning message, the case where administrative staff capable of being allowed to understand around electronic lock in time.
Further, to improve the accuracy rate identified based on posture feature database to target user's posture feature, in one kind
In optional embodiment, the above method further include:
It, will when determining that the matching degree of posture feature and the first posture feature data is greater than first threshold and is less than second threshold
Posture feature include with the first unmatched data of posture feature data, be combined as the second appearance with the first posture feature data
State characteristic is stored in posture feature database.
When it is implemented, first threshold can be set as 80%, second threshold can be set as 100%, it is assumed that posture feature database
In include with the matching degree of the posture feature of target user be 83% the first posture feature data when, then by aforementioned posture feature
In with the data of the first posture feature data unmatched 17% be stored in posture feature database, optionally with the first posture feature
Data are combined as the second posture feature data, are stored in posture feature database, improve the number in posture feature database
According to.In order to which human body attitude feature is slowly varying with the variation of human physiological functions, pass through self study update mode, Ye Jishang
The mode for increasing the posture feature data for updating legitimate user into the unmatched data of small part is stated, posture feature number is timely updated
According to library, to improve the accuracy rate identified based on posture feature database to target user's posture feature.
The corresponding above method, the embodiment of the invention provides a kind of trippers, referring to fig. 2, monitor applied to being provided with
The electronic lock of device, comprising:
Acquisition module 201, for acquiring the posture feature for entering the target user of monitoring range of monitoring device;
Processing module 202 includes being greater than the first threshold with the matching degree of posture feature for determining in posture feature database
When the first posture feature data of value, electronic lock is waken up;Wherein, it is stored in posture feature database including the first posture spy
Levy the posture feature data of the legitimate user including data;Receive solving to the electronic lock after wake-up for target user's triggering
First unlock instruction of lock carries the first unlocking information in the first unlock instruction;First unlocking information is verified, and is being tested
Card opens electronic lock after passing through.
Above-mentioned tripper provided in an embodiment of the present invention, processing module 202 are based on being stored with legitimate user's posture feature
The posture feature database of data matches the posture feature of the collected target user of acquisition module 201, determines target
User is legitimate user, namely determines to include be greater than first threshold with the matching degree of posture feature the in posture feature database
Door lock is just waken up after one posture feature data, then to the first solution carried in aforementioned first unlock instruction of target user's triggering
Lock information carries out being verified rear opening door lock.By verifying user identity, even if can guarantee that the key of door lock is stolen, body
Part mismatches and also fail to open door lock, effectively improves the safety of door lock.
In a kind of optional embodiment, processing module 202 is also used to:
Determine do not include the first posture spy for being greater than first threshold with the matching degree of posture feature in posture feature database
When levying data, the second unlock instruction of target user's triggering being unlocked to electronic lock is received, is taken in the second unlock instruction
The second unlocking information of band;
Second unlocking information is verified, and in the first preset duration after being verified, receives target user's touching
The third unlock instruction of hair being unlocked to electronic lock carries third unlocking information in third unlock instruction;Wherein, second
Unlocking information is different from third unlocking information;
Third unlocking information is verified, and opens electronic lock after being verified.
In a kind of optional embodiment, aforementioned first unlocking information, the second unlocking information or third unlocking information are equal
Including any one or more in following information: unlocking pin, unlock finger print information, unlock induction card information, unlock vocal print
Information, unlock iris information, unlock venous information, unlock facial information.
In a kind of optional embodiment, processing module 202 determines in posture feature database and does not include and posture is special
When the matching degree of sign is greater than the first posture feature data of first threshold, it is specifically used for:
Monitoring objective user in the monitoring range of monitoring device residence time exceed the second preset duration when, output report
Alert information, warning message, which is used to indicate around electronic lock, there is illegal user.
In a kind of optional embodiment, processing module 202 is also used to:
It, will when determining that the matching degree of posture feature and the first posture feature data is greater than first threshold and is less than second threshold
Posture feature include with the first unmatched data of posture feature data, be combined as the second appearance with the first posture feature data
State characteristic is stored in posture feature database;.
The corresponding above method, referring to Fig. 3, the embodiment of the invention provides a kind of electronic locks 300, comprising:
Communication interface 301, memory 302 and processor 303;
Wherein, the processor 303 is communicated by the communication interface 301 with other equipment, for example, other equipment
It can be aforementioned monitoring device, processor 303 can send warning message to monitoring device by communication interface 301;Memory
302, for storing program instruction;Processor 303, for calling the program instruction stored in the memory 302, according to acquisition
Program execute the method in above-described embodiment.
In the embodiment of the present application, processor can be general processor, digital signal processor, specific integrated circuit,
Field programmable gate array or other programmable logic device, discrete gate or transistor logic, discrete hardware components,
It may be implemented or execute disclosed each method, step and the logic diagram in the embodiment of the present application.General processor can be
Microprocessor or any conventional processor etc..The step of method in conjunction with disclosed in the embodiment of the present application, can directly embody
Execute completion for hardware processor, or in processor hardware and software module combination execute completion.
In the embodiment of the present application, memory, for storing program instruction and the i.e. legitimate user of posture feature database
Posture feature data, correct unlocking information, such as: unlocking pin, unlock finger print information, unlock induction card information, unlock sound
Line information, unlock iris information, unlock venous information, unlock facial information.In the embodiment of the present application, memory can be with right and wrong
Volatile memory, such as hard disk (hard disk drive, HDD) or solid state hard disk (solid-state drive, SSD)
Deng can also be volatile memory (volatile memory), such as random access memory (random-access
Memory, RAM).Memory, which can also be, can be used in carrying or store the desired journey with instruction or data structure form
Sequence code and can by any other medium of computer access, but not limited to this.Memory in the embodiment of the present application may be used also
To be circuit or other devices that arbitrarily can be realized store function, for storing program instruction and/or data.The application is real
Apply the specific connection medium not limited between above-mentioned communication interface, memory and processor in example, such as bus, bus can be with
It is divided into address bus, data/address bus, control bus etc..
For ease of understanding, for updating the process in attitude data library, referring to fig. 4, the embodiment of the invention provides one kind
Update the flow diagram in attitude data library.The external structure of electronic lock 300, i.e. electronic lock are also illustrated in Fig. 4
Monitoring device 401 and key cog region 402 are provided on 300, wherein monitoring device can be camera or laser radar
Deng;Key cog region 402 includes at least any two kinds in following: combination disk, fingerprint identification area, contactless card cog region, vocal print
Cog region, iris recognition area, hand vein recognition area, face face recognition area, specifically, illustrating a kind of key knowledge in Fig. 4
Other area 402, combination disk.
When there is target user in the monitoring range of the monitoring device 401 on electronic lock 300, electronic lock 300
Monitoring device 401 acquires the posture feature of target user, the processor 303 being sent in electronic lock 300,303 base of processor
The posture feature data of the legitimate user stored in posture feature database in memory 302 and the posture feature of target user
Matched, when include in posture feature database with the matching degree of the posture feature of target user be greater than first threshold (80%)
The first posture feature data, such as include with the matching degree of the posture feature of target user in posture feature database be 83%
The first posture feature data when, determine target user be legitimate user, by aforementioned posture feature with the first posture feature number
The first posture feature data are combined to generate the second posture feature data according to the data of unmatched part (17%), by the second posture
Characteristic is stored in posture feature database, to update posture feature database.
In addition, in a kind of optional embodiment, can also construct with the associated Cloud Server of electronic lock 300, in advance
First by posture feature database, that is, legitimate user posture feature data, correct unlocking information, such as: unlocking pin, unlock
Finger print information, unlock induction card information, unlock voiceprint, unlock iris information, unlock venous information, unlock facial information etc.
It is stored in the Cloud Server.Based on this, processor 303 by monitoring device 401 monitored personnel close to electronic lock 300,
Namely when in the monitoring range of entrance monitoring device 401, the posture feature of collector, before collected posture feature is passed through
It states communication interface 301 and is sent to Cloud Server, by cloud service according to the legitimate user's of posture feature database purchase therein
Posture feature data are compared, to judge whether the personnel are legitimate user, if it is, waking up the key on door lock
Cog region is identified by rear opening door lock after the corresponding key of personnel's typing (that is, aforementioned first unlocking information);If no
It is then to start the timer connected to the processor set in preset timing unit either electronic lock in processor to start to count
When, and a kind of key of reception staff's typing (that is, aforementioned second unlocking information) is identified by and is separated by the first preset duration again
After the secondary another key (that is, aforementioned third unlocking information) for receiving personnel's typing is identified by, opening door lock;But when meter
Constantly length reaches preset second level duration, does not receive the correct key of personnel's successively typing yet, and personnel are also monitoring
Device 401 stops in the range of capable of monitoring, determines that the personnel are unauthorized person, then passes through communication interface 301 to electronic gate
Lock 300 associated monitoring device output warning messages.In the present embodiment, communication interface 301 can be used communication with
Monitoring device or Cloud Server are communicated.
Further, the embodiment of the invention provides a kind of computer readable storage medium, the computer readable storage mediums
It is stored with computer instruction, when computer instruction is run on computers, so that computer executes the above method.
It should be understood by those skilled in the art that, embodiments herein can provide as method, system or computer program
Product.Therefore, complete hardware embodiment, complete software embodiment or reality combining software and hardware aspects can be used in the application
Apply the form of example.Moreover, it wherein includes the computer of computer usable program code that the application, which can be used in one or more,
The computer program implemented in usable storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) produces
The form of product.
The application be referring to according to the present processes, equipment (system) and computer program product flow chart and/or
Block diagram describes.It should be understood that each process that can be realized by computer program instructions in flowchart and/or the block diagram and/or
The combination of process and/or box in box and flowchart and/or the block diagram.It can provide these computer program instructions to arrive
General purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices processor to generate one
Machine, so that being generated by the instruction that computer or the processor of other programmable data processing devices execute for realizing flowing
The device for the function of being specified in journey figure one process or multiple processes and/or block diagrams one box or multiple boxes.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing devices with spy
Determine in the computer-readable memory that mode works, so that it includes referring to that instruction stored in the computer readable memory, which generates,
Enable the manufacture of device, the command device realize in one box of one or more flows of the flowchart and/or block diagram or
The function of being specified in multiple boxes.
These computer program instructions also can be loaded onto a computer or other programmable data processing device, so that counting
Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, thus in computer or
The instruction executed on other programmable devices is provided for realizing in one or more flows of the flowchart and/or block diagram one
The step of function of being specified in a box or multiple boxes.
Although preferred embodiments of the present invention have been described, it is created once a person skilled in the art knows basic
Property concept, then additional changes and modifications may be made to these embodiments.So it includes excellent that the following claims are intended to be interpreted as
It selects embodiment and falls into all change and modification of the scope of the invention.
Obviously, those skilled in the art can carry out various modification and variations without departing from the essence of the application to the application
Mind and range.In this way, if these modifications and variations of the application belong to the range of the claim of this application and its equivalent technologies
Within, then the application is also intended to include these modifications and variations.
Claims (12)
1. a kind of unlocking method, which is characterized in that applied to the electronic lock for being provided with monitoring device, comprising:
Acquisition enters the posture feature of the target user of the monitoring range of the monitoring device;
Determine to include the first posture feature for being greater than first threshold with the matching degree of the posture feature in posture feature database
When data, the electronic lock is waken up;Wherein, it is stored in the posture feature database including the first posture feature number
According to the posture feature data of legitimate user inside;
Receive the first unlock instruction of target user triggering being unlocked to the electronic lock after wake-up, described the
The first unlocking information is carried in one unlock instruction;
First unlocking information is verified, and opens the electronic lock after being verified.
2. the method as described in claim 1, which is characterized in that the method also includes:
Determine do not include the first posture spy for being greater than first threshold with the matching degree of the posture feature in posture feature database
When levying data, the second unlock instruction of target user triggering being unlocked to the electronic lock is received, described second
The second unlocking information is carried in unlock instruction;
Second unlocking information is verified, and in the first preset duration after being verified, receives the target and use
The third unlock instruction of family triggering being unlocked to the electronic lock carries third unlock letter in the third unlock instruction
Breath;Wherein, second unlocking information is different from the third unlocking information;
The third unlocking information is verified, and opens the electronic lock after being verified.
3. method according to claim 1 or 2, which is characterized in that first unlocking information, second unlocking information or
Third unlocking information described in person includes any one or more in following information: unlocking pin, unlock finger print information, unlock sense
Answer card information, unlock voiceprint, unlock iris information, unlock venous information, unlock facial information.
4. method according to claim 2, which is characterized in that determine in posture feature database do not include special with the posture
When the matching degree of sign is greater than the first posture feature data of first threshold, the method also includes:
It is defeated when monitoring the target user residence time is beyond the second preset duration in the monitoring range of the monitoring device
Warning message out, the warning message, which is used to indicate around the electronic lock, there is illegal user.
5. the method as described in claim 1, which is characterized in that the method also includes:
Determine that the matching degree of the posture feature and the first posture feature data is greater than the first threshold and less than second
It is including by the posture feature with the unmatched data of the first posture feature data when threshold value, with first posture
Characteristic is combined as the second posture feature data, is stored in the posture feature database.
6. a kind of tripper, which is characterized in that applied to the electronic lock for being provided with monitoring device, comprising:
Acquisition module, for acquiring the posture feature of the target user into the monitoring range of the monitoring device;
Processing module includes being greater than first threshold with the matching degree of the posture feature for determining in posture feature database
When the first posture feature data, the electronic lock is waken up;Wherein, it is stored in the posture feature database including described
The posture feature data of legitimate user including one posture feature data;
Receive the first unlock instruction of target user triggering being unlocked to the electronic lock after wake-up, described the
The first unlocking information is carried in one unlock instruction;
First unlocking information is verified, and opens the electronic lock after being verified.
7. device as claimed in claim 6, which is characterized in that the processing module is also used to:
Determine do not include the first posture spy for being greater than first threshold with the matching degree of the posture feature in posture feature database
When levying data, the second unlock instruction of target user triggering being unlocked to the electronic lock is received, described second
The second unlocking information is carried in unlock instruction;
Second unlocking information is verified, and in the first preset duration after being verified, receives the target and use
The third unlock instruction of family triggering being unlocked to the electronic lock carries third unlock letter in the third unlock instruction
Breath;Wherein, second unlocking information is different from the third unlocking information;
The third unlocking information is verified, and opens the electronic lock after being verified.
8. device as claimed in claims 6 or 7, which is characterized in that first unlocking information, second unlocking information or
Third unlocking information described in person includes any one or more in following information: unlocking pin, unlock finger print information, unlock sense
Answer card information, unlock voiceprint, unlock iris information, unlock venous information, unlock facial information.
9. device as claimed in claim 7, which is characterized in that the processing module, in determining posture feature database not
Including with the matching degree of the posture feature be greater than first threshold the first posture feature data when, be specifically used for:
It is defeated when monitoring the target user residence time is beyond the second preset duration in the monitoring range of the monitoring device
Warning message out, the warning message, which is used to indicate around the electronic lock, there is illegal user.
10. device as claimed in claim 6, which is characterized in that the processing module is also used to:
Determine that the matching degree of the posture feature and the first posture feature data is greater than the first threshold and less than second
It is including by the posture feature with the unmatched data of the first posture feature data when threshold value, with first posture
Characteristic is combined as the second posture feature data, is stored in the posture feature database.
11. a kind of electronic lock characterized by comprising
Memory and processor;
Memory, for storing program instruction;
Processor requires 1 according to the program instruction perform claim of acquisition for reading the program instruction stored in the memory
To 5 described in any item methods.
12. a kind of computer readable storage medium, which is characterized in that the computer-readable recording medium storage has computer to refer to
It enables, when the computer instruction is run on computers, so that computer perform claim requires 1 to 5 described in any item sides
Method.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910510295.XA CN110288731A (en) | 2019-06-13 | 2019-06-13 | Unlocking method and device and electronic door lock |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910510295.XA CN110288731A (en) | 2019-06-13 | 2019-06-13 | Unlocking method and device and electronic door lock |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110288731A true CN110288731A (en) | 2019-09-27 |
Family
ID=68005314
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910510295.XA Pending CN110288731A (en) | 2019-06-13 | 2019-06-13 | Unlocking method and device and electronic door lock |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110288731A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111750919A (en) * | 2020-07-02 | 2020-10-09 | 陕西师范大学 | Identity authentication method and apparatus using multi-axis sensor and accelerometer |
CN112991600A (en) * | 2021-03-26 | 2021-06-18 | 杭州海康威视数字技术股份有限公司 | Method, device, system and equipment for enabling vehicle to exit parking lot |
CN117037340A (en) * | 2023-09-06 | 2023-11-10 | 东莞市安邦德智能锁具科技有限公司 | Intelligent lock control system based on data identification |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120319814A1 (en) * | 2011-06-14 | 2012-12-20 | International Business Machines Corporation | Opening management through gait detection |
CN104270253A (en) * | 2014-10-21 | 2015-01-07 | 中国建设银行股份有限公司 | Method, devices and system for user identity authentication |
CN105155971A (en) * | 2015-08-21 | 2015-12-16 | 汪澜 | Automatic door opening system based on gait recognition |
CN105787440A (en) * | 2015-11-10 | 2016-07-20 | 深圳市商汤科技有限公司 | Security protection management method and system based on face features and gait features |
CN107134026A (en) * | 2017-04-19 | 2017-09-05 | 上海斐讯数据通信技术有限公司 | A kind of entrance guard controlling method and system |
CN109035530A (en) * | 2018-08-23 | 2018-12-18 | 广东汇泰龙科技有限公司 | A kind of method for unlocking based on cloud lock-step state identifying system, system |
US20190066415A1 (en) * | 2017-08-28 | 2019-02-28 | Timetec Holding Sdn Bhd | Mobile-based access control system |
-
2019
- 2019-06-13 CN CN201910510295.XA patent/CN110288731A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120319814A1 (en) * | 2011-06-14 | 2012-12-20 | International Business Machines Corporation | Opening management through gait detection |
CN104270253A (en) * | 2014-10-21 | 2015-01-07 | 中国建设银行股份有限公司 | Method, devices and system for user identity authentication |
CN105155971A (en) * | 2015-08-21 | 2015-12-16 | 汪澜 | Automatic door opening system based on gait recognition |
CN105787440A (en) * | 2015-11-10 | 2016-07-20 | 深圳市商汤科技有限公司 | Security protection management method and system based on face features and gait features |
CN107134026A (en) * | 2017-04-19 | 2017-09-05 | 上海斐讯数据通信技术有限公司 | A kind of entrance guard controlling method and system |
US20190066415A1 (en) * | 2017-08-28 | 2019-02-28 | Timetec Holding Sdn Bhd | Mobile-based access control system |
CN109035530A (en) * | 2018-08-23 | 2018-12-18 | 广东汇泰龙科技有限公司 | A kind of method for unlocking based on cloud lock-step state identifying system, system |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111750919A (en) * | 2020-07-02 | 2020-10-09 | 陕西师范大学 | Identity authentication method and apparatus using multi-axis sensor and accelerometer |
CN112991600A (en) * | 2021-03-26 | 2021-06-18 | 杭州海康威视数字技术股份有限公司 | Method, device, system and equipment for enabling vehicle to exit parking lot |
CN117037340A (en) * | 2023-09-06 | 2023-11-10 | 东莞市安邦德智能锁具科技有限公司 | Intelligent lock control system based on data identification |
CN117037340B (en) * | 2023-09-06 | 2024-04-12 | 东莞市安邦德智能锁具科技有限公司 | Intelligent lock control system based on data identification |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11417159B2 (en) | Methods and systems for controlling a smart lock | |
CN103324909B (en) | Facial feature detection | |
US9800570B1 (en) | Method of persistent authentication with disablement upon removal of a wearable device | |
US10868672B1 (en) | Establishing and verifying identity using biometrics while protecting user privacy | |
CN107506755A (en) | Monitoring video recognition methods and device | |
CN110288731A (en) | Unlocking method and device and electronic door lock | |
CN107408167A (en) | Perform the seamless certification of user | |
CN109948320B (en) | Block chain-based identity recognition management method, device, medium and electronic equipment | |
CN106603563A (en) | Information safety realization method and system based on biometric features identification | |
CN112328995B (en) | Social management system based on TOF image sensor verification | |
CN107195045B (en) | Gate inhibition's door bell and button system and security system | |
CN206522020U (en) | A kind of intelligent door lock and system | |
CN104346550B (en) | A kind of information processing method and a kind of electronic equipment | |
WO2020135079A1 (en) | Method and device for opening electronic gate, and server | |
CN110223430A (en) | Control method and device of electronic door lock and electronic door lock | |
CN109801409A (en) | Voice method for unlocking, electronic equipment | |
CN110120114B (en) | Human body identification method and system based on access control system and storage medium | |
CN109461241A (en) | A kind of face and fingerprint identification entrance guard system control method | |
CN106355684B (en) | Control method, the device and system of controlled plant | |
CN109461237A (en) | Intelligent door lock device and method for reminding message thereof | |
CN109522694A (en) | A kind of identification system based on computer network | |
CN112002075A (en) | Information processing method and device for improving safety of storage cabinet | |
CN110415406A (en) | A kind of double nets are mutual to monitor security intelligent door lock system for speech recognition | |
CN115661994A (en) | UWB technology-based access control method and device and terminal equipment | |
CN210442852U (en) | Fingerprint access control system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190927 |