CN110930574A - Access control method and system and intelligent device - Google Patents

Access control method and system and intelligent device Download PDF

Info

Publication number
CN110930574A
CN110930574A CN201911170136.6A CN201911170136A CN110930574A CN 110930574 A CN110930574 A CN 110930574A CN 201911170136 A CN201911170136 A CN 201911170136A CN 110930574 A CN110930574 A CN 110930574A
Authority
CN
China
Prior art keywords
intelligent
screen
unlocking
lock
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911170136.6A
Other languages
Chinese (zh)
Inventor
姚琪
黄彬
刘靖峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Shenmu Information Technology Co Ltd
Original Assignee
Shenzhen Shenmu Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Shenmu Information Technology Co Ltd filed Critical Shenzhen Shenmu Information Technology Co Ltd
Priority to CN201911170136.6A priority Critical patent/CN110930574A/en
Publication of CN110930574A publication Critical patent/CN110930574A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Signal Processing (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The invention provides an access control method, which is applied to an access control system, wherein the access control system comprises an intelligent screen and an intelligent lock, the intelligent screen and the intelligent lock are communicated through Bluetooth, and the method comprises the following steps: the intelligent screen receives the identity authentication information, performs identity authentication according to the identity authentication information, and generates an unlocking instruction after the identity authentication is successful; after the authentication is successful, the intelligent screen wakes up the intelligent lock and establishes connection; the intelligent screen sends the instruction of unblanking to the intelligent lock for the intelligent lock unblanks according to the instruction of unblanking. Through the separation of intelligent screen and intelligent lock to through the bluetooth communication of low-power consumption, further make the intelligent lock be in the state of treating awakening up under the condition of not unblanking, greatly improved the duration of intelligent lock. In addition, the invention also provides an access control system and intelligent equipment.

Description

Access control method and system and intelligent device
Technical Field
The invention relates to the field of intelligent home furnishing, in particular to an access control method and system and intelligent equipment.
Background
Along with the development of the technology, the intelligent home is heated more, the intelligent home can be controlled through remote control, a high-efficiency and convenient home environment is provided for a resident, particularly an intelligent door lock, and the door opening work is enabled to be faster through various identification methods and remote control.
However, in the existing intelligent lock, the cruising ability of the intelligent lock is insufficient due to the communication control problem between the screen and the lock.
Disclosure of Invention
In view of the foregoing, it is desirable to provide an access control method and system, and an intelligent device.
In a first aspect, an embodiment of the present invention provides an access control method, which is applied to an access control system, where the access control system includes an intelligent screen and an intelligent lock, and the intelligent screen and the intelligent lock communicate with each other through bluetooth, and the method includes the following steps:
the intelligent screen receives the identity authentication information, performs identity authentication according to the identity authentication information, and generates an unlocking instruction after the identity authentication is successful;
after the authentication is successful, the intelligent screen wakes up the intelligent lock and establishes connection;
the intelligent screen sends the instruction of unblanking to the intelligent lock for the intelligent lock unblanks according to the instruction of unblanking.
In one embodiment, after the authentication is successful, the smart screen wakes up the smart lock and establishes a connection, including:
the intelligent screen sends Bluetooth broadcast after the identity authentication is successful, and wakes up the intelligent lock in the low power consumption mode;
the intelligent screen is connected with the intelligent lock through the low-power Bluetooth after the intelligent lock is awakened.
In one embodiment, the unlocking instruction is an unlocking ciphertext, and the generating of the unlocking instruction includes:
the intelligent screen generates an unlocking plaintext according to unlocking information, wherein the unlocking information comprises random information, an unlocking request and equipment information;
the intelligent screen generates a corresponding unlocking ciphertext according to the unlocking plaintext by using a preset secret key;
the intelligence screen sends the instruction of unblanking to the intelligence lock for the intelligence lock unblanks according to the instruction of unblanking, include:
the intelligent screen sends the ciphertext of unblanking to the intelligent lock through the bluetooth for the key that uses after the intelligence lock received the ciphertext of unblanking and predetermine the key that the key matches carries out the deciphering and unblanks after confirming the information after the deciphering is effective.
In one embodiment, the smart screen receives authentication information and performs authentication according to the authentication information, including:
the method comprises the steps that an intelligent screen obtains a video stream with a target face and extracts the target face in the video stream;
the intelligent screen sequentially performs living body detection and face matching according to the target face;
and after the living body detection and the face matching are successful, the intelligent screen finishes the identity verification and judges that the identity verification is successful.
In one embodiment, the access control system further includes a mobile terminal, and the access control method further includes:
and after unlocking is completed, the intelligent screen sends the target face information and the current unlocking time to the mobile terminal.
In one embodiment, the access control system further includes a server and a mobile terminal, and the access control method further includes:
when the living body detection or face matching is failed according to the extracted target face, the intelligent screen uploads the record of the living body detection or face matching failure to the server and counts and accumulates failure times;
and if the intelligent screen detects that the failure times exceed the preset times within the preset time, generating an abnormal event and pushing the abnormal event to the mobile terminal.
In one embodiment, the access control system further includes a community property platform, and the access control method further includes:
when the intelligent screen fails in vivo detection or face matching according to the extracted target face, accumulating failure times of the in vivo detection or the face matching;
and if the intelligent screen detects that the failure times exceed the preset alarm times, sending alarm information to the community property platform in real time.
In one embodiment, the smart screen receives authentication information and performs authentication according to the authentication information, including:
the intelligent screen acquires video stream and extracts all faces in the video stream;
the intelligent screen sequentially performs living body detection and face matching on each face in all the faces;
if the intelligent screen detects that any one of the faces is subjected to living body detection and face matching in sequence, ending the identity verification and judging that the identity verification is successful;
and if the intelligent screen detects that all the faces in all the faces fail to carry out living body detection and face matching in sequence, ending the authentication, judging that the authentication fails, and recording all the faces at present.
In a second aspect, an embodiment of the present invention provides an access control system, where the system includes:
the intelligent screen is used for receiving the identity authentication information, performing identity authentication according to the identity authentication information, generating an unlocking instruction after the identity authentication is successful, awakening the intelligent lock and establishing connection after the identity authentication is successful, and sending the unlocking instruction to the intelligent lock;
and the intelligent lock is used for receiving the unlocking instruction sent by the intelligent screen and unlocking according to the unlocking instruction.
In a third aspect, an embodiment of the present invention provides an intelligent device, including an intelligent screen and an intelligent lock, where the intelligent device is applied to an access control system, and the intelligent screen is used to execute the following steps:
the intelligent screen receives the identity authentication information, performs identity authentication according to the identity authentication information, and generates an unlocking instruction after the identity authentication is successful;
after the authentication is successful, the intelligent screen wakes up the intelligent lock and establishes connection;
the intelligent screen sends the instruction of unblanking to the intelligent lock for the intelligent lock unblanks according to the instruction of unblanking.
Through the access control method and system and the intelligent device, the intelligent screen is separated from the intelligent lock, and the intelligent lock is further enabled to be in a state to be awakened under the condition that the intelligent lock is not unlocked through low-power-consumption Bluetooth communication, so that the cruising ability of the intelligent door lock is greatly improved.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
Wherein:
FIG. 1 is a flow chart of a method of access control in one embodiment;
FIG. 2 is a flowchart of a method for access control in one embodiment;
FIG. 3 is a flowchart of a method for access control in one embodiment;
FIG. 4 is a flowchart of a method for access control in one embodiment;
FIG. 5 is a flowchart of a method for access control in one embodiment;
FIG. 6 is a flowchart of a method for access control in one embodiment;
FIG. 7 is a flowchart of a method of access control in one embodiment;
FIG. 8 is a schematic structural diagram of an access control system according to an embodiment;
fig. 9 is a schematic structural diagram of an access control system in one embodiment.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
As shown in fig. 1, an access control method is provided, which specifically includes the following steps:
and 102, receiving the identity authentication information by the intelligent screen, performing identity authentication according to the identity authentication information, and generating an unlocking instruction after the identity authentication is successful.
The identity authentication information is information for authorizing the identity through the entrance guard, and includes any one or more of face information, fingerprint information and iris information of the user. The access control method is based on a structure with separated screen locks, the intelligent screen is powered by a direct-current power supply, the intelligent lock is powered by a battery, and the screen locks are communicated through Bluetooth with a lower function. The smart screen can adopt an android operating system and can also adopt other operating systems. The intelligent screen verifies according to the authentication information after receiving the authentication information of the user, and an unlocking instruction can be generated according to a specific mode after the verification is passed, wherein the unlocking instruction is an instruction which is used for being sent to the intelligent lock and can be used for completing unlocking according to the unlocking instruction and contains specific information.
And 104, awakening the intelligent lock and establishing connection after the intelligent screen successfully authenticates the identity.
The intelligent lock is in a standby state when not being unlocked, the standby state can enable the power consumption to be lowest, and when the intelligent screen is successfully authenticated, the intelligent screen means that the intelligent lock needs to be unlocked at the moment, so that the intelligent screen awakens the standby intelligent lock at the moment and establishes Bluetooth connection with the intelligent lock after awakening.
And 106, the intelligent screen sends an unlocking instruction to the intelligent lock, so that the intelligent lock is unlocked according to the unlocking instruction.
Wherein, establish the bluetooth and be connected the back at the smart screen with the intelligent lock, the smart screen just can send the instruction of unblanking to the intelligent lock through the bluetooth, and the intelligent lock is unblanked according to this instruction of unblanking completion. The intelligent lock is in the in-process of unblanking according to the instruction of unblanking, need extract the specific information in the instruction of unblanking, adopts and draws with the corresponding mode of intelligent screen generation instruction of unblanking.
Through above-mentioned access control method, through the separation of intelligent screen and intelligent lock to through the bluetooth communication of low-power consumption, further make the intelligent lock be in the state of treating awakening up under the condition of not unblanking, greatly improved the duration of intelligent lock.
As shown in fig. 2, in an embodiment, after the authentication is successful, the smart screen wakes up the smart lock and establishes a connection, including:
step 202, the smart screen sends a bluetooth broadcast after the identity authentication is successful, and wakes up the smart lock in the low power consumption mode.
The bluetooth broadcast is a broadcast message based on bluetooth. According to a Bluetooth communication protocol, the intelligent lock in the low power consumption mode can capture a Bluetooth-based broadcast message sent by the intelligent screen, so that the intelligent lock is awakened, and the state is updated to a normal working mode.
And step 204, the intelligent screen establishes a low-power-consumption Bluetooth connection with the intelligent lock after awakening the intelligent lock.
The intelligent lock completes pairing according to data information in the captured Bluetooth-based broadcast message, and therefore the intelligent screen is connected with the intelligent lock through the low-power-consumption Bluetooth. Bluetooth Low Energy (or Bluetooth LE, BLE, old trademark Bluetooth Smart) is a personal area network technology designed and sold by Bluetooth alliance, and is intended for emerging applications in the fields of medical care, exercise and fitness, beacons, security, home entertainment, and the like. Bluetooth low energy is intended to significantly reduce power consumption and cost while maintaining equivalent communication range compared to classical bluetooth.
The intelligent lock is awaken up by sending Bluetooth broadcast by the intelligent screen, the intelligent lock only needs to capture broadcast messages in a standby state without consuming redundant energy consumption, and the intelligent lock is paired according to data information in the broadcast messages after receiving the broadcast messages, so that the intelligent screen and the intelligent lock are connected through low-power Bluetooth with low power consumption, the intelligent lock works with low power consumption in the whole process, and the cruising ability of the intelligent lock is greatly improved.
As shown in fig. 3, in an embodiment, the generating the unlocking instruction, where the unlocking instruction is an unlocking ciphertext, includes:
and 302, generating an unlocking plaintext by the intelligent screen according to unlocking information, wherein the unlocking information comprises random information, an unlocking request and equipment information.
The unlocking plaintext is a data packet formed by mixing unlocking information, the unlocking information comprises an unlocking request and equipment information, the unlocking information can further comprise random information, the random information is used for increasing the complexity of the unlocking plaintext, and the equipment information is equipment information of the intelligent screen. The unlocking ciphertext refers to the encrypted ciphertext containing the unlocking information and is generated through the unlocking plaintext.
And 304, the smart screen generates a corresponding unlocking ciphertext according to the unlocking plaintext by using the preset secret key.
The key is a parameter that is input in an algorithm for converting plaintext into ciphertext or converting ciphertext into plaintext, and the preset key is a key set at the time of factory shipment. After the unlocking plaintext is generated, the intelligent screen generates a corresponding unlocking ciphertext by using a preset secret key and a specific encryption algorithm according to the unlocking plaintext, wherein the specific algorithm can be an AES128 algorithm or other encryption algorithms.
The intelligence screen sends the instruction of unblanking to the intelligence lock for the intelligence lock unblanks according to the instruction of unblanking, include:
and step 306, the intelligent screen sends an unlocking ciphertext to the intelligent lock through the Bluetooth, so that the intelligent lock receives the unlocking ciphertext, decrypts the unlocking ciphertext by using a key matched with a preset key, and unlocks after confirming that the decrypted information is valid.
After Bluetooth communication is established between the intelligent screen and the intelligent lock, the intelligent screen sends the generated unlocking ciphertext to the intelligent lock through Bluetooth, and the intelligent lock is provided with a key matched with a preset key. There are two categories in key encryption, namely asymmetric encryption: the encryption and decryption adopt two keys corresponding to each other, namely a public key and a private key, and the other one is symmetric encryption: the encryption and decryption both adopt private keys, and the same two encryption modes can also be adopted in the invention. If the asymmetric encryption is adopted, the intelligent screen encrypts an unlocking plaintext by using a public key to generate an unlocking ciphertext, and the intelligent lock decrypts the unlocking ciphertext by using a corresponding private key; similarly, if symmetric encryption is adopted, the intelligent screen encrypts the unlocking plaintext by using the private key to generate an unlocking ciphertext, and the intelligent lock decrypts the unlocking ciphertext by using the same private key.
The intelligent lock acquires unlocking information after decryption is completed, whether unlocking requests and equipment information in the unlocking information are valid or not is judged, and if yes, unlocking is carried out. The equipment information mainly refers to MAC address information of the intelligent screen, the MAC address information corresponding to the intelligent screen is prestored in the intelligent lock, and if the MAC address information obtained through decryption and the prestored mismatching description are not unlocking ciphertexts sent by the corresponding intelligent screen, unlocking is not carried out.
Through encrypting the unlocking information sent by the intelligent screen, the use safety is improved.
As shown in fig. 4, in an embodiment, the receiving, by the smart screen, the authentication information and performing authentication according to the authentication information includes:
step 402, the smart screen acquires a video stream with a target face and extracts the target face from the video stream.
In this embodiment, the face information is used as the authentication information. When the face information is obtained, a video stream is shot through a camera device on an intelligent screen, the face information in the video stream is further extracted from the video stream, and the face information is extracted from the video stream, and 5 points of landmark (eyes, a nose and a mouth corner) of a face are detected from a frame image of the video stream by adopting a CNN (neural network).
And step 404, the intelligent screen sequentially performs living body detection and face matching according to the target face.
After the face information in the video stream is acquired, the acquired face information needs to be detected, wherein the detection includes living body detection and face detection. The live body detection is to detect whether or not a human face appearing in a video stream is a real person, not a photograph, a video, or the like. The living body detection also adopts a CNN neural network, the extracted human face is sent into the CNN neural network to obtain a living body confidence coefficient, and if the confidence coefficient exceeds 0.5, the living body is considered as the living body. And if the living body detection is successful, carrying out face matching, wherein the face matching also adopts a CNN neural network, matching the extracted face with the pre-stored faces in a face library, obtaining the similarity between the extracted face and each face in the face library through comparison, and if a face with the score corresponding to the similarity exceeding 0.9 exists, successfully matching.
In one embodiment, the face library may be a local face library, and the faces in the local face library may be directly entered through an intelligent screen or may be entered through an APP on a mobile terminal and uploaded to the local face library. In one embodiment, the face library may also be a cloud face library or a local face library and a cloud face library exist at the same time.
And step 406, after the living body detection and the face matching are successful, the intelligent screen finishes the identity verification and judges that the identity verification is successful.
And after the extracted face detection is successful, the intelligent screen judges that the face detection is a normal unlocking request at the moment, so that the follow-up unlocking instruction generation step is carried out.
Through face extraction, the identity is verified in all-round three processes of live body detection and face matching, and the accuracy and the safety of an unlocking result are fully guaranteed.
In one embodiment, the access control system further includes a mobile terminal, and the access control method further includes: and after unlocking is completed, the intelligent screen sends the target face information and the current unlocking time to the mobile terminal.
Wherein, accomplish every time and unblank the back, the intelligence screen all can take notes current person's of unblanking information and the time of unblanking to with these information through APP corresponding server real-time APP on the mobile terminal on send the APP on the mobile terminal, and then the propelling movement gives the target user.
Through interaction of the intelligent screen and the mobile terminal, a security system is realized, each unlocking behavior is recorded and pushed to the user in real time, the management function is realized, and the safety is also improved.
As shown in fig. 5, in an embodiment, the access control system further includes a server and a mobile terminal, and the access control method further includes:
step 502, when the smart screen fails to perform living body detection or face matching according to the extracted target face, uploading a living body detection or face matching failure record to a server and timing and accumulating failure times.
The failure record comprises the failure type of detection, face information and current detection time information. The current number of failures is accumulated while uploading the failure records to the server.
And step 504, if the smart screen detects that the failure times exceed the preset times within the preset time, generating an abnormal event and pushing the abnormal event to the mobile terminal.
The preset times are failure limit times preset in the intelligent screen, specifically include living body detection failure times and face matching failure times, and the living body detection and the face matching are independent and have a sequence, so that the failure times only occur in practice, for example, when the living body detection fails for multiple times and reaches the preset times, the process is directly ended, and the face matching process is not performed any more; and if the living body detection is successful after multiple failures (the number of times does not exceed the preset number), the counting is returned to zero, and the face matching is carried out and the counting is carried out again. In addition, the number of statistical failures is within a preset time range, such as 1 minute, 30 seconds, etc.; and if the preset time is exceeded but the failure times are not preset times, the timer is counted again and counted. In one embodiment, all the failure times of continuous detection of the same face information are counted, and if all the failure times exceed the maximum limit, the counting is not counted again.
If the failure times counted in the preset time reach the preset times, generating an abnormal event and pushing the abnormal event to the mobile terminal, and locking the screen for a preset stop time, wherein the preset stop time can be 1 minute, 30 seconds and the like.
By counting the failure times, generating the abnormal event according to the failure times and feeding the abnormal event back to the mobile terminal, the user can know the current relevant condition of the current front door in real time, so that the processing is convenient in time, and the safety is improved.
As shown in fig. 6, in an embodiment, the access control system further includes a community property platform, and the access control method further includes:
step 602, when the smart screen fails to perform living body detection or face matching according to the extracted target face, accumulating failure times of the living body detection or the face matching.
The failure times in this embodiment may be the living body detection failure times or the face matching failure times, or may be the sum of the two failure times.
And step 604, if the failure times detected by the intelligent screen exceed the preset alarm times, sending alarm information to the community property platform in real time.
In this embodiment, the time range may not be considered in the failure times counting, all failure records of a certain face on the time axis are counted, and when the total number of the failure times reaches the preset alarm times, the face is sent to the community property platform, so that the community property records the face. In another embodiment, the time range may also be considered, a preset alarm time is set, and after the preset alarm time exceeds a second preset alarm time, alarm information is sent to the property of the cell in real time, so that the property of the cell can eliminate danger in time. The alarm information includes detected face information and time information corresponding to the number of failures.
By recording failure times and sending alarm information to the community property platform, the security system is perfected, and living safety is fully guaranteed.
As shown in fig. 7, in an embodiment, the receiving, by the smart screen, the authentication information and performing authentication according to the authentication information includes:
step 702, the smart screen acquires a video stream and extracts all faces in the video stream.
Wherein all faces are all different faces that are indicated to be present in all frame images in the video stream. The viewing range of the video stream is adjustable according to the setting condition of the setting device.
And step 704, the intelligent screen sequentially performs living body detection and face matching on each face in all the faces.
After all the faces are obtained, living body detection and face matching are respectively carried out on each face, and the living body detection and the face matching are sequentially carried out according to a random sequence.
And step 706, if the intelligent screen detects that any one of the faces is subjected to living body detection and face matching successfully in sequence, ending the identity verification and judging that the identity verification is successful.
When the detection is carried out in sequence according to the random sequence, if a certain face is detected and the living body detection and the face matching are successful, the identity authentication is judged to be successful.
Step 708, if the intelligent screen detects that all the faces fail to be subjected to living body detection and face matching in sequence, ending the identity verification and judging that the identity verification fails, and recording all the faces currently.
And finally, if no face detection succeeds, the authentication is judged to fail, and the fact that someone takes a photo or a video to steal at the moment is indicated.
Through detecting all people's faces in the video stream, convenience of customers takes the people of all the other people's faces that are not in the storehouse to get into, only need detect all people's faces have the detection success just to judge authentication success, secondly when wanting to utilize the photo or the video of people's face in the storehouse to other people to open the door, photo and video must not detect successfully, consequently other true people that have taken place in this video stream have been recorded simultaneously, so that target user knows who is utilizing photo or video to steal the action, the security has been improved.
As shown in fig. 8, the present invention also provides an access control system, which includes:
and the intelligent screen is used for receiving the identity authentication information, performing identity authentication according to the identity authentication information, generating an unlocking instruction after the identity authentication is successful, awakening the intelligent lock and establishing connection after the identity authentication is successful, and sending the unlocking instruction to the intelligent lock.
And the intelligent lock is used for receiving the unlocking instruction sent by the intelligent screen and unlocking according to the unlocking instruction.
As shown in fig. 9, in one embodiment, the system further comprises:
and the mobile terminal is used for receiving the abnormal event sent by the server.
And the server is used for forwarding the abnormal events sent by the intelligent screen and recording failure records uploaded by the intelligent screen in the detection process.
Referring again to fig. 9, in one embodiment, the system further comprises:
and the community property platform is used for receiving the alarm information sent by the intelligent screen.
The invention also provides an intelligent device, which comprises an intelligent screen and an intelligent lock, wherein the intelligent device is applied to an access control system, and the intelligent screen is used for executing the following steps:
the intelligent screen receives the identity authentication information, performs identity authentication according to the identity authentication information, and generates an unlocking instruction after the identity authentication is successful;
after the authentication is successful, the intelligent screen wakes up the intelligent lock and establishes connection;
the intelligent screen sends the instruction of unblanking to the intelligent lock for the intelligent lock unblanks according to the instruction of unblanking.
In one embodiment, after the authentication is successful, the smart screen wakes up the smart lock and establishes a connection, including:
the intelligent screen sends Bluetooth broadcast after the identity authentication is successful, and wakes up the intelligent lock in the low power consumption mode;
the intelligent screen is connected with the intelligent lock through the low-power Bluetooth after the intelligent lock is awakened.
In one embodiment, the unlocking instruction is an unlocking ciphertext, and the generating of the unlocking instruction includes:
the intelligent screen generates an unlocking plaintext according to unlocking information, wherein the unlocking information comprises random information, an unlocking request and equipment information;
the intelligent screen generates a corresponding unlocking ciphertext according to the unlocking plaintext by using a preset secret key;
the intelligence screen sends the instruction of unblanking to the intelligence lock for the intelligence lock unblanks according to the instruction of unblanking, include:
the intelligent screen sends the ciphertext of unblanking to the intelligent lock through the bluetooth for the key that uses after the intelligence lock received the ciphertext of unblanking and predetermine the key that the key matches carries out the deciphering and unblanks after confirming the information after the deciphering is effective.
In one embodiment, the smart screen receives authentication information and performs authentication according to the authentication information, including:
the method comprises the steps that an intelligent screen obtains a video stream with a target face and extracts the target face in the video stream;
the intelligent screen sequentially performs living body detection and face matching according to the target face;
and after the living body detection and the face matching are successful, the intelligent screen finishes the identity verification and judges that the identity verification is successful.
In one embodiment, the access control system further comprises a mobile terminal, and the smart screen is further configured to perform the following steps:
and after unlocking is completed, the intelligent screen sends the target face information and the current unlocking time to the mobile terminal.
In one embodiment, the access control system further comprises a server and a mobile terminal, and the smart screen is further used for executing the following steps:
when the living body detection or face matching is failed according to the extracted target face, the intelligent screen uploads the record of the living body detection or face matching failure to the server and counts and accumulates failure times;
and if the intelligent screen detects that the failure times exceed the preset times within the preset time, generating an abnormal event and pushing the abnormal event to the mobile terminal.
In one embodiment, the access control system further comprises a community property platform, and the smart screen is further configured to perform the following steps:
when the intelligent screen fails in vivo detection or face matching according to the extracted target face, accumulating failure times of the in vivo detection or the face matching;
and if the intelligent screen detects that the failure times exceed the preset alarm times, sending alarm information to the community property platform in real time.
In one embodiment, the smart screen receives authentication information and performs authentication according to the authentication information, including:
the intelligent screen acquires video stream and extracts all faces in the video stream;
the intelligent screen sequentially performs living body detection and face matching on each face in all the faces;
if the intelligent screen detects that any one of the faces is subjected to living body detection and face matching in sequence, ending the identity verification and judging that the identity verification is successful;
and if the intelligent screen detects that all the faces in all the faces fail to carry out living body detection and face matching in sequence, ending the authentication, judging that the authentication fails, and recording all the faces at present.
The technical features of the above embodiments can be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the above embodiments are not described, but should be considered as the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above-mentioned embodiments only express several embodiments of the present application, and the description thereof is more specific and detailed, but not construed as limiting the scope of the present application. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the concept of the present application, which falls within the scope of protection of the present application. Therefore, the protection scope of the present patent shall be subject to the appended claims. Please enter the implementation content part.

Claims (10)

1. The access control method is applied to an access control system, the access control system comprises an intelligent screen and an intelligent lock, and the intelligent screen and the intelligent lock are communicated through Bluetooth, and the access control method is characterized by comprising the following steps:
the intelligent screen receives identity authentication information, performs identity authentication according to the identity authentication information, and generates an unlocking instruction after the identity authentication is successful;
after the identity authentication is successful, the intelligent screen wakes up the intelligent lock and establishes connection;
and the intelligent screen sends the unlocking instruction to the intelligent lock, so that the intelligent lock is unlocked according to the unlocking instruction.
2. The method of claim 1, wherein the smart screen awakens the smart lock and establishes a connection after the authentication is successful, comprising:
the intelligent screen sends Bluetooth broadcast after the identity authentication is successful, and wakes up the intelligent lock in a low power consumption mode;
the intelligent screen is awaken up the intelligent lock and then establishes Bluetooth low energy connection with the intelligent lock.
3. The method of claim 1, wherein the unlocking instruction is an unlocking ciphertext, and the generating the unlocking instruction comprises:
the intelligent screen generates an unlocking plaintext according to unlocking information, wherein the unlocking information comprises random information, an unlocking request and equipment information;
the intelligent screen generates the corresponding unlocking ciphertext according to the unlocking plaintext by using a preset secret key;
the intelligence screen to the intelligence lock sends the instruction of unblanking for the intelligence lock is unblanked according to the instruction of unblanking, includes:
the intelligent screen sends the unlocking ciphertext to the intelligent lock through Bluetooth, so that the intelligent lock receives the unlocking ciphertext, decrypts the unlocking ciphertext by using the key matched with the preset key, and unlocks after confirming that the decrypted information is valid.
4. The method of claim 1, wherein the smart screen receives authentication information and performs authentication according to the authentication information, and the method comprises:
the intelligent screen acquires a video stream with a target face and extracts the target face in the video stream;
the intelligent screen sequentially performs living body detection and face matching according to the target face;
and after the living body detection and the face matching are successful, the intelligent screen finishes the identity verification and judges that the identity verification is successful.
5. The method of claim 4, wherein the access control system further comprises a mobile terminal, and wherein the method further comprises:
and the intelligent screen sends the target face information and the current unlocking time to the mobile terminal after unlocking is finished.
6. The method of claim 4, wherein the access control system further comprises a server and a mobile terminal, and wherein the method further comprises:
when the living body detection or the face matching is failed according to the extracted target face, the intelligent screen uploads the living body detection or the face matching failure record to the server and counts and accumulates failure times;
and if the intelligent screen detects that the failure times exceed the preset times within the preset time, generating an abnormal event and pushing the abnormal event to the mobile terminal.
7. The method of claim 4, wherein the access control system further comprises a community property platform, wherein the method further comprises:
when the intelligent screen fails in vivo detection or face matching according to the extracted target face, accumulating the failure times of the in vivo detection or the face matching;
and if the intelligent screen detects that the failure times exceed the preset alarm times, sending alarm information to the community property platform in real time.
8. The method of claim 1, wherein the smart screen receives authentication information and performs authentication according to the authentication information, and the method comprises:
the intelligent screen acquires video stream and extracts all faces in the video stream;
the intelligent screen sequentially performs the living body detection and the face matching on each face in all the faces;
if the intelligent screen detects that any one of the faces is subjected to the living body detection and the face matching in sequence, ending the identity verification and judging that the identity verification is successful;
and if the intelligent screen detects that all the faces in all the faces fail to carry out the living body detection and the face matching in sequence, ending the identity verification, judging that the identity verification fails, and recording all the faces at present.
9. An access control system, the system comprising:
the intelligent screen is used for receiving identity authentication information, performing identity authentication according to the identity authentication information, generating an unlocking instruction after the identity authentication is successful, awakening the intelligent lock and establishing connection after the identity authentication is successful, and sending the unlocking instruction to the intelligent lock;
and the intelligent lock is used for receiving the unlocking instruction sent by the intelligent screen and unlocking according to the unlocking instruction.
10. A smart device comprising a smart screen and a smart lock, the smart device being applied to an access control system, wherein the smart screen is configured to perform the steps of any one of the methods according to claims 1 to 8.
CN201911170136.6A 2019-11-26 2019-11-26 Access control method and system and intelligent device Pending CN110930574A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911170136.6A CN110930574A (en) 2019-11-26 2019-11-26 Access control method and system and intelligent device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911170136.6A CN110930574A (en) 2019-11-26 2019-11-26 Access control method and system and intelligent device

Publications (1)

Publication Number Publication Date
CN110930574A true CN110930574A (en) 2020-03-27

Family

ID=69851112

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911170136.6A Pending CN110930574A (en) 2019-11-26 2019-11-26 Access control method and system and intelligent device

Country Status (1)

Country Link
CN (1) CN110930574A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112734993A (en) * 2020-12-29 2021-04-30 宁波友好智能安防科技有限公司 Communication system and method of anti-theft lock
CN112835303A (en) * 2020-12-31 2021-05-25 重庆民意家具制造有限公司 Integrated intelligent apartment bed monitoring system and device thereof
CN113112650A (en) * 2021-04-14 2021-07-13 深圳市康凯铭科技有限公司 Bluetooth intelligent lock system and use method thereof
CN116152962A (en) * 2023-01-04 2023-05-23 北京飞利信信息安全技术有限公司 Unlocking method and device of intelligent lock
CN116665352A (en) * 2023-05-30 2023-08-29 江苏日颖慧眼智能设备有限公司 Access control method and system

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090097720A1 (en) * 2001-03-14 2009-04-16 Paladin Electronic Services, Inc. Biometric identification method
CN106056728A (en) * 2016-07-29 2016-10-26 福州米立科技有限公司 Split type Bluetooth lock access device
CN107180467A (en) * 2017-05-11 2017-09-19 广东汇泰龙科技有限公司 A kind of network cloud lock management method and its system
CN108684029A (en) * 2018-08-23 2018-10-19 维沃移动通信有限公司 A kind of Bluetooth pairing connection method and system, bluetooth equipment and terminal
CN109788330A (en) * 2018-12-25 2019-05-21 深圳康佳电子科技有限公司 TV bluetooth standby wakeup processing method, TV and remote controler
CN109903433A (en) * 2019-01-31 2019-06-18 武汉天喻聚联网络有限公司 A kind of access control system and access control method based on recognition of face

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090097720A1 (en) * 2001-03-14 2009-04-16 Paladin Electronic Services, Inc. Biometric identification method
CN106056728A (en) * 2016-07-29 2016-10-26 福州米立科技有限公司 Split type Bluetooth lock access device
CN107180467A (en) * 2017-05-11 2017-09-19 广东汇泰龙科技有限公司 A kind of network cloud lock management method and its system
CN108684029A (en) * 2018-08-23 2018-10-19 维沃移动通信有限公司 A kind of Bluetooth pairing connection method and system, bluetooth equipment and terminal
CN109788330A (en) * 2018-12-25 2019-05-21 深圳康佳电子科技有限公司 TV bluetooth standby wakeup processing method, TV and remote controler
CN109903433A (en) * 2019-01-31 2019-06-18 武汉天喻聚联网络有限公司 A kind of access control system and access control method based on recognition of face

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112734993A (en) * 2020-12-29 2021-04-30 宁波友好智能安防科技有限公司 Communication system and method of anti-theft lock
CN112835303A (en) * 2020-12-31 2021-05-25 重庆民意家具制造有限公司 Integrated intelligent apartment bed monitoring system and device thereof
CN113112650A (en) * 2021-04-14 2021-07-13 深圳市康凯铭科技有限公司 Bluetooth intelligent lock system and use method thereof
CN116152962A (en) * 2023-01-04 2023-05-23 北京飞利信信息安全技术有限公司 Unlocking method and device of intelligent lock
CN116152962B (en) * 2023-01-04 2024-08-06 北京飞利信信息安全技术有限公司 Unlocking method and device of intelligent lock
CN116665352A (en) * 2023-05-30 2023-08-29 江苏日颖慧眼智能设备有限公司 Access control method and system
CN116665352B (en) * 2023-05-30 2024-01-30 江苏日颖慧眼智能设备有限公司 Access control method and system

Similar Documents

Publication Publication Date Title
CN110930574A (en) Access control method and system and intelligent device
US8955069B1 (en) Event-based biometric authentication using mobile device
CN109903433B (en) Access control system and access control method based on face recognition
CN109905235B (en) Intelligent lock unlocking method, intelligent lock, terminal, server and system
CN105118127B (en) A kind of guest system and control method thereof
CN105069876B (en) Intelligent access control method and system
CN101098232B (en) Dynamic password and multiple biological characteristics combined identification authenticating method
WO2017177435A1 (en) Identity authentication method, terminal and server
CN106780901A (en) A kind of intelligent door lock system and its application based on mobile phone MAC Address
CN105227316A (en) Based on mobile Internet account login system and the method for facial image authentication
CN101847279A (en) Network human face recognition system with intelligent management system and recognition method thereof
CN109064603A (en) A kind of method and access control system for opening gate inhibition
CN108712389A (en) A kind of intelligent lock system
TW201545125A (en) Access control apparatus and register system and register method thereof
KR100965428B1 (en) The system and operating method using two different positioned intelligent cameras for automatic verification of authenticated person's entrance
CN108322507B (en) Method and system for executing security operation by using security device
CN108337235B (en) Method and system for executing security operation by using security device
WO2018014322A1 (en) Residential intelligent door lock system and control method thereof
KR101577036B1 (en) Access authentication system and method based ip camera
CN110322600B (en) Control method of electronic lock and electronic lock
CN114013306B (en) Control method and device for vehicle charging port cover, charging pile and storage medium
CN108650219B (en) User identity identification method, related device, equipment and system
CN105913513A (en) Control method and system for door lock system
CN112328989A (en) Network identity authentication method, system and storage medium based on biological characteristics
CN107911211B (en) Two-dimensional code authentication system based on quantum communication network

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20200327