CN111325875A - Remote control door lock system and method - Google Patents

Remote control door lock system and method Download PDF

Info

Publication number
CN111325875A
CN111325875A CN201811522441.2A CN201811522441A CN111325875A CN 111325875 A CN111325875 A CN 111325875A CN 201811522441 A CN201811522441 A CN 201811522441A CN 111325875 A CN111325875 A CN 111325875A
Authority
CN
China
Prior art keywords
door lock
instruction
light
user
fingerprint
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811522441.2A
Other languages
Chinese (zh)
Inventor
李勇
王科涛
黄敏强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Yunhai Internet Of Things Co ltd
Original Assignee
Shenzhen Yunhai Internet Of Things Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Yunhai Internet Of Things Co ltd filed Critical Shenzhen Yunhai Internet Of Things Co ltd
Priority to CN201811522441.2A priority Critical patent/CN111325875A/en
Publication of CN111325875A publication Critical patent/CN111325875A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00563Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys using personal physical data of the operator, e.g. finger prints, retinal images, voicepatterns
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00182Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with unidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit

Abstract

The invention is suitable for the field of intelligent door locks, and relates to a method, a device, a computer readable program and a system for remotely controlling a door lock, wherein a preset control triggered by a user is monitored, and a light-on instruction is generated and sent to the door lock; the door lock is configured to receive the light-turning-on instruction, control an LED lamp of the door lock to turn on, and control a first lock tongue of the door lock to unlock by sensing an optical signal after the LED lamp is turned on by a light sensing module of the door lock, so as to generate first lock tongue opening information; receiving the first lock tongue opening information sent by the door lock, and reminding a user to input a fingerprint; the fingerprint information of a user is acquired, a second bolt opening instruction is sent to the door lock after the fingerprint information is successfully matched, the door lock receives the second bolt opening instruction, and the second bolt of the door lock is controlled to be unlocked, so that the door lock is opened. The invention can realize double control of sliding control and fingerprint remote control, realizes the unlocking of the door lock, can realize remote unlocking, and can further improve the safety protection performance of the door lock.

Description

Remote control door lock system and method
Technical Field
The invention belongs to the field of intelligent door locks, and particularly relates to a method and a device for remotely controlling a door lock, a computer readable program and a system.
Background
In daily life, the most common intelligent door locks of people are mostly applied to hotels, office buildings, communities and the like, the unlocking modes of the intelligent door locks are mostly password unlocking, fingerprint unlocking and card swiping, and along with the development of the internet of things technology, remote unlocking is gradually mature. The door lock is the first safety barrier of family, and people's attention to the security, and the security performance of door lock becomes especially important, and current ordinary intelligent door lock unblock is single, only can unblock through password input or fingerprint matching, and the security is too low.
Disclosure of Invention
In view of this, embodiments of the present invention provide a method, a system, a terminal device and a computer-readable storage medium for remotely controlling a door lock, so as to solve the problem in the prior art that a single unlocking manner is low in security performance.
A first aspect of the present application provides a method for remotely controlling a door lock, the method comprising:
monitoring that a user triggers a preset control, generating a light-on instruction and sending the light-on instruction to a door lock; the door lock is configured to receive the light-turning-on instruction, control an LED lamp of the door lock to turn on, and control a first lock tongue of the door lock to unlock by sensing an optical signal after the LED lamp is turned on by a light sensing module of the door lock, so as to generate first lock tongue opening information;
receiving the first lock tongue opening information sent by the door lock, and reminding a user to input a fingerprint;
the fingerprint information of a user is acquired, a second bolt opening instruction is sent to the door lock after the fingerprint information is successfully matched, the door lock is further configured to receive the second bolt opening instruction, and the second bolt of the door lock is controlled to be unlocked, so that the door lock is opened.
Preferably, the triggering of the preset control is triggering of the control according to a preset gesture.
Preferably, the generating of the light-on command to the door lock includes:
and generating a light-on instruction, sending the light-on instruction to the gateway, encrypting the gateway, sending the encrypted gateway to the cloud server in a wireless communication mode, and sending the encrypted gateway to the door lock in the wireless communication mode.
Preferably, the acquiring fingerprint information of the user and sending a second bolt opening instruction to the door lock after the fingerprint information is successfully matched includes:
acquiring user fingerprint information, encrypting or digitizing the user fingerprint information, and generating a processed fingerprint image;
extracting the feature points of the processed fingerprint image, and matching any combination result of the three feature points; (ii) a
Comparing the processed fingerprint image characteristic points with the pre-authorized fingerprint information characteristic points, calculating the similarity degree, and obtaining a matching result; and if the matching result is successful, sending a second bolt opening instruction to the door lock.
A second aspect of the present application provides a method of remotely controlling a door lock, characterized in that,
the terminal equipment monitors that a user triggers a preset control, generates a light-on instruction and sends the light-on instruction to the door lock, so that the light-on instruction is forwarded to the door lock;
the door lock receives the light-opening instruction, controls an LED lamp of the door lock to open, and a light induction module of the door lock senses a light signal after the LED lamp is opened, controls a first lock tongue of the door lock to unlock, generates first lock tongue opening information and sends the first lock tongue opening information to the terminal equipment;
the terminal equipment receives the first lock tongue opening information and reminds a user to input a fingerprint; the terminal equipment acquires fingerprint information of a user, sends a second bolt opening instruction to the door lock after the fingerprint information is successfully matched, and the door lock receives the second bolt opening instruction and controls the second bolt of the door lock to unlock, so that the door lock is opened.
Preferably, the triggering of the preset control is triggering of the control according to a preset gesture.
Preferably, the terminal device acquires fingerprint information of a user, and sends a second bolt opening instruction to the door lock after the fingerprint information is successfully matched, including:
acquiring user fingerprint information, encrypting or digitizing the user fingerprint information, and generating a processed fingerprint image;
extracting characteristic points of the processed fingerprint image;
comparing the feature points of the processed fingerprint image with the feature points of the pre-authorized fingerprint information, calculating the similarity, and obtaining a matching result; and if the matching result is successful, sending a second bolt opening instruction to the door lock.
A third aspect of the present invention provides a remote control door lock system, characterized in that the system comprises:
terminal equipment and a remote control door lock system, which is characterized by comprising the terminal equipment and a door lock, wherein the terminal equipment comprises,
the monitoring module is used for monitoring that a user triggers a preset control;
the sending module is used for generating a light-on instruction and sending the light-on instruction to the door lock so that the light-on instruction is forwarded to the door lock;
the reminding module is used for receiving the first lock tongue opening information and reminding a user of inputting a fingerprint; the terminal equipment acquires fingerprint information of a user, and sends a second bolt opening instruction to the door lock after the fingerprint information is successfully matched;
the door lock includes:
the control LED lamp module is used for controlling the LED lamp of the door lock to be turned on for receiving the light turning-on instruction;
the first lock tongue opening module is used for controlling the first lock tongue of the door lock to be unlocked by the light sensing module of the door lock sensing a light signal after the LED lamp is opened, generating first lock tongue opening information and sending the first lock tongue opening information to the terminal equipment;
and the second bolt opening module is used for receiving the second bolt opening instruction and controlling the second bolt of the door lock to unlock, so that the door lock is opened.
A fourth aspect of the present application provides a mobile terminal comprising a memory, a processor and a computer program stored in the memory and executable on the processor, the processor implementing the steps of the method according to the first aspect when executing the computer program.
A fifth aspect of the present application provides a computer readable storage medium having stored thereon a computer program which, when executed by a processor, performs the steps of the method of the first aspect as described above.
Compared with the prior art, the method and the device have the advantages that the preset control is triggered by a user, the light-on command is generated and sent to the door lock, the LED lamp of the door lock is controlled to be turned on, the light sensing module of the door lock senses the light signal after the LED lamp is turned on, the first lock tongue of the door lock is controlled to be unlocked, and first lock tongue opening information is generated; meanwhile, fingerprint information of a user is acquired, a second bolt opening instruction is sent to the door lock after the fingerprint information is successfully matched, the door lock receives the second bolt opening instruction, and the second bolt of the door lock is controlled to be unlocked, so that the door lock is opened. This scheme adopts two kinds of unblock modes to control the state of lock for the lock has obtained dual guard action, has improved the security performance of lock.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings needed to be used in the embodiments or the prior art descriptions will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without inventive exercise.
FIG. 1 is an interactive schematic diagram of a system for remotely controlling a door lock according to an embodiment of the present invention;
FIG. 2 is a flow chart of an implementation of a remote control door lock according to an embodiment of the present invention;
FIG. 3 is a flow chart illustrating another implementation of a remote control door lock according to an embodiment of the present invention;
FIG. 4 is a flow chart illustrating another implementation of a remote control door lock according to an embodiment of the present invention;
FIG. 5 is a flow chart illustrating another implementation of a remote control door lock according to an embodiment of the present invention;
fig. 6 is a block diagram illustrating a system for remotely controlling a door lock according to an embodiment of the present invention;
fig. 7 is a schematic diagram of a terminal device according to an embodiment of the present invention.
Detailed Description
In the following description, for purposes of explanation and not limitation, specific details are set forth, such as particular system structures, techniques, etc. in order to provide a thorough understanding of the embodiments of the invention. It will be apparent, however, to one skilled in the art that the present invention may be practiced in other embodiments that depart from these specific details. In other instances, detailed descriptions of well-known systems, devices, circuits, and methods are omitted so as not to obscure the description of the present invention with unnecessary detail.
It will be understood that the terms "comprises" and/or "comprising," when used in this specification and the appended claims, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
It is also to be understood that the terminology used in the description of the invention herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used in the specification of the present invention and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise.
It should be further understood that the term "and/or" as used in this specification and the appended claims refers to and includes any and all possible combinations of one or more of the associated listed items.
In order to explain the technical means of the present invention, the following description will be given by way of specific examples.
Fig. 1 shows an interaction diagram of a system for remotely controlling a door lock according to an embodiment of the present invention. The system for remotely controlling the door lock comprises a terminal device 101, a door lock 102 and a cloud server 103, wherein the terminal device 101 and the door lock 102 realize remote control of the door lock through the cloud server 103. The terminal device 101 is in communication connection with the cloud server, the door lock 102 is in communication connection with the cloud server 103, the cloud server 103 has a verification function on input of a user, and transmission of instructions can be achieved.
As shown in fig. 1, the terminal device 101 is a smart phone, and in other embodiments of the present invention, the terminal device may also be a desktop computer, a tablet computer, a Personal Digital Assistant (PDA), or a wearable device. The cloud server may be a redis database server for storing the uploaded fingerprint information or face information. The cloud server also stores user login information. The door lock 102 may be an intelligent lock with LED lights, and may also be connected for communication, in the embodiment shown in fig. 1, only the terminal device 101 and the door lock 102 are in an extranet environment for the security of communication.
It should be noted that, in other embodiments of the present invention, the number of cloud servers may also include different application servers, and may also share a cache server and a database server, for example, an application server, a shared cache server, and a database server. In other embodiments of the present invention, a cache server and/or a database server may not be included, and the data stored by the cache server and/or the database server may be directly stored in the application server. These are determined by the capabilities of the application server and the user requirements and may be selectively set, and fig. 1 should not be construed as a specific limitation of the present invention.
Fig. 2 is a schematic flowchart of a method for remotely controlling a door lock according to an embodiment of the present invention. The method flow includes steps S201 to S204. The method is suitable for the situation that the door lock needs to be remotely controlled in the login application process. The method comprises the following steps:
s201, monitoring that a user triggers a preset control, generating a light-on instruction and sending the light-on instruction to a door lock; the door lock is configured to receive the light-turning-on instruction, control an LED lamp of the door lock to turn on, and control a first lock tongue of the door lock to unlock by sensing an optical signal after the LED lamp is turned on by a light sensing module of the door lock, so as to generate first lock tongue opening information;
in this embodiment, the user triggers a preset control, where the preset control is a virtual button set on the terminal device at the client, or a sliding instruction preset in the client, and the sliding instruction is upward, downward, leftward or rightward sliding, or sliding in other forms or directions.
When a user triggers a preset control, a light-turning-on instruction is generated at a client and is sent to a door lock controller through a cloud server, a gateway and the like, the door lock controller in the door lock receives the light-turning-on instruction to control the opening of an LED lamp in the door lock, and a light induction module is further arranged in the door lock and controls the unlocking of a first lock tongue of the door lock by the controller after sensing an optical signal for opening the LED lamp and generates unlocking information which can correspond to the unlocking information.
The door lock communicates through RS-232-C, RS-449 and ZigBee communication protocol; the light induction module is a photoresistor, and the terminal equipment includes but is not limited to a PC, a smart phone, a tablet computer, wearable electronic equipment, an electronic book reader, an MP3(Moving Picture Experts Group Audio Layer III, Moving Picture Experts compression standard Audio Layer 3) player, an MP4(Moving Picture Experts Group Audio Layer IV, Moving Picture Experts compression standard Audio Layer 3) player, a portable computer, and the like, and is a mobile terminal equipment with a display function.
The terminal device may further include a camera, a Radio Frequency (RF) circuit, a sensor, an audio circuit, a WiFi module, a light sensing module, and the like. Such as light sensors, motion sensors, and other sensors. Specifically, the light sensor may include an ambient light sensor that may adjust the brightness of the display screen according to the brightness of ambient light, and a proximity sensor that may turn off the display screen and/or the backlight when the mobile terminal is moved to the ear. As one of the motion sensors, the gravity acceleration sensor can detect the magnitude of acceleration in each direction (generally, three axes), detect the magnitude and direction of gravity when the mobile terminal is stationary, and can be used for applications (such as horizontal and vertical screen switching, related games, magnetometer attitude calibration), vibration recognition related functions (such as pedometer and tapping) and the like for recognizing the attitude of the mobile terminal; of course, the mobile terminal may also be configured with other sensors such as a gyroscope, a barometer, a hygrometer, a thermometer, and an infrared sensor, which are not described herein again.
S202, receiving the first lock tongue opening information sent by the door lock, and reminding a user to input a fingerprint;
in the step, the user terminal equipment receives the first lock tongue opening information sent by the door lock, is connected with the cloud server and then is connected with the door lock through the gateway, and therefore receives the information sent by the door lock.
The cloud server can be configured with a storage area which can be called a message center for storing communication reminding messages of telephones, short messages, applications or systems, and connection can be maintained between the terminal device and the server to ensure the validity of the connection. The terminal equipment can acquire the communication reminding message from the server according to a preset period or preset time and display the communication reminding message for a user to view, or can acquire the communication reminding message according to the real-time acquisition operation of the user; and when the user determines that the communication reminding message needs to be replied, and dialing, short message replying or instant messaging application replying are carried out, the terminal equipment is switched to a cellular mobile network system such as a 2G/3G/4G/5G network according to the user operation to carry out corresponding feedback.
The door lock sends after first lock tongue opening information, remind the user to type in the fingerprint, can adopt different modes to remind the back in the terminal equipment customer end, be provided with the fingerprint input module on the customer end, appear the fingerprint input frame promptly on the customer end to show the characters, remind the user to type in the fingerprint that corresponds in the fingerprint input frame. The fingerprint input prompted by the fingerprint input box can be a thumb, an index finger, a middle finger, a ring finger and a little finger.
Meanwhile, the user can be reminded of entering the fingerprint, and modes such as facial recognition, voice recognition and iris recognition can be reminded.
S203, fingerprint information of a user is obtained, a second bolt opening instruction is sent to the door lock after the fingerprint information is successfully matched, the door lock is further configured to receive the second bolt opening instruction, and the second bolt of the door lock is controlled to be unlocked, so that the door lock is opened.
The method comprises the steps that terminal equipment acquires fingerprint information of a user, the fingerprint information is uploaded to a cloud server through the terminal equipment, the fingerprint information pre-stored by the user is stored in the cloud server in advance, and the user can pre-store the fingerprint information of one or more fingerprints and can also pre-store the fingerprint information of a plurality of people; in addition, when information of a plurality of users is uploaded in the cloud server, the users can also authorize the fingerprint information of partial users.
When the cloud server receives fingerprint information uploaded from the terminal equipment, the cloud server compares the uploaded fingerprint information with fingerprint information which is stored in advance and authorized through a matching comparison module, after comparison is finished, if fingerprint matching is successful, a result of successful fingerprint information matching is sent to the terminal equipment, after the terminal equipment receives the information, a second bolt opening instruction is sent to the door lock, the door lock receives the second bolt opening instruction, and a second bolt of the door lock is controlled to be unlocked, so that the door lock is opened; if the fingerprint matching is unsuccessful, the result that the fingerprint information matching is unsuccessful is sent to the terminal equipment, and after the terminal equipment receives the information, the second bolt opening instruction is not sent to the door lock, so that the door lock cannot be opened.
On the basis of the embodiment shown in fig. 2, in step 203, a step of obtaining fingerprint information of the user and sending a second bolt unlocking instruction to the door lock after the fingerprint information is successfully matched is further included, which specifically includes:
s301, acquiring user fingerprint information, encrypting or digitizing the user fingerprint information, and generating a processed fingerprint image;
s302, extracting the feature points of the processed fingerprint image, and matching any combination result of the three feature points; selecting any combination result of the three characteristic points for matching;
s303, comparing the processed fingerprint image characteristic points with the pre-authorized fingerprint information characteristic points, calculating the similarity degree, and obtaining a matching result; and if the matching result is successful, sending a second bolt opening instruction to the door lock.
In this embodiment, the fingerprint refers to the lines generated by the convex and concave unevenness on the front skin of the end of the finger of a person. The lines are regularly arranged to form different line types. The fingerprint image feature points include, but are not limited to, start points, end points, junction points, bifurcation points, etc. of fingerprints. Fingerprint identification refers to identification by comparing minutiae of different fingerprints. The fingerprints of each person are different, namely the fingerprints are obviously different among the ten fingers of the same person, so that the fingerprints can be used for identity authentication. Because the directions of each time of stamping are not completely the same, different force points can bring different degrees of deformation, and a large number of fuzzy fingerprints exist, the key of the fingerprint identification technology lies in how to correctly extract the characteristics and realize correct matching.
The method for acquiring the fingerprint information of the user mainly comprises the step of acquiring a fingerprint image by a special fingerprint acquisition instrument, wherein the signal acquisition principle currently comprises an optical type, a pressure-sensitive type, a capacitive type, an inductive type, a thermosensitive type, an ultrasonic type and the like. In addition, the fingerprint image may also be acquired by a scanner, a digital camera, or the like. At present, fingerprints are mainly acquired on a mobile phone by a capacitive principle, fingerprint images are compressed, and a large-capacity fingerprint database needs to be stored after being compressed so as to reduce storage space. The main methods include JPEG, WSQ, EZW, etc. Fingerprint image processing, including fingerprint area detection, image quality judgment, directional diagram and frequency estimation, image enhancement, fingerprint image binarization, refinement and the like. The preprocessing is to process the fingerprint image containing noise and pseudo-features by a certain algorithm, so that the structure of the lines is clear and the feature information is prominent. The method aims to improve the quality of the fingerprint image and improve the accuracy of feature extraction. Generally, the preprocessing process includes normalization, image segmentation, enhancement, binarization and refinement, but the steps of preprocessing are different according to the specific situation.
The extraction of the feature points of the processed fingerprint image is mainly performed on the fingerprint morphology of different persons, the fingerprint morphology features include a center (upper and lower) and a triangle point (left and right), and the minutiae feature points of the fingerprint include but are not limited to a starting point, an end point, a combination point and a bifurcation point of a ridge line. Feature point information (termination point and bifurcation point.) of the fingerprint is extracted from the preprocessed image, wherein the information mainly comprises parameters such as type, coordinate, direction and the like. Minutiae features in a fingerprint, typically include end points, bifurcation points, outliers, short bifurcations, rings, and the like. While the ridge endpoints and bifurcation points occur most frequently, most stably, and easily captured in the fingerprint. The two types of feature points can be used for matching the fingerprint features, and the similarity degree of the feature extraction result and the stored feature template is calculated.
Fig. 4 shows a flowchart of an implementation of another remote control door lock provided in the embodiment of the present invention, where the method is implemented by the remote control door lock system described in fig. 1, and includes steps S401 to S403. It should be noted that, where details are not described in the embodiment of the present invention, please refer to the corresponding description of the embodiment shown in fig. 2, which is not repeated herein.
S401, the terminal device monitors that a user triggers a preset control, generates a light-on instruction and sends the light-on instruction to a door lock, so that the light-on instruction is forwarded to the door lock;
s402, the door lock receives the light-turning-on instruction, controls an LED lamp of the door lock to be turned on, senses an optical signal after the LED lamp is turned on by a light sensing module of the door lock, controls a first lock tongue of the door lock to be unlocked, generates first lock tongue turning-on information, and sends the first lock tongue turning-on information to the terminal equipment;
s403, the terminal equipment receives the first lock tongue opening information and reminds a user to input a fingerprint; the terminal equipment acquires fingerprint information of a user, and sends a second bolt opening instruction to the door lock after the fingerprint information is successfully matched;
and S404, the door lock receives the second bolt opening instruction and controls the second bolt of the door lock to unlock, so that the door lock is opened.
On the basis of the embodiment shown in fig. 4, as shown in fig. 5, in step S403, the terminal device receives the first latch opening information to remind the user to enter a fingerprint; the terminal equipment acquires fingerprint information of a user, and sends a second bolt opening instruction to the door lock after the fingerprint information is successfully matched; further comprising steps 501-503. It should be noted that, where details are not described in the embodiment of the present invention, please refer to the corresponding description of the embodiment shown in fig. 3, which is not described herein again.
S501, the terminal equipment acquires user fingerprint information, encrypts or digitizes the user fingerprint information, and generates a processed fingerprint image;
s502, the terminal equipment extracts the feature points of the processed fingerprint image and matches any combination result of the three feature points; (ii) a
S503, comparing the processed fingerprint image characteristic points with the pre-authorized fingerprint information characteristic points, calculating the similarity, and obtaining a matching result; and if the matching result is successful, sending a second bolt opening instruction to the door lock.
Fig. 6 shows a block diagram of a system for remotely controlling a door lock according to an embodiment of the present invention, which corresponds to the method for remotely controlling a door lock according to the above embodiment, and only shows a part related to the embodiment of the present invention for convenience of description.
Referring to fig. 6, a remote control door lock system includes:
the system comprises a terminal device 101 and a door lock 103, wherein the terminal device 101 comprises,
the monitoring module 61 is used for monitoring that a user triggers a preset control;
the sending module 62 is configured to generate a light-on instruction and send the light-on instruction to the door lock, so that the light-on instruction is forwarded to the door lock;
the reminding module 63 is used for receiving the first lock tongue opening information and reminding a user of inputting a fingerprint; the terminal equipment acquires fingerprint information of a user, and sends a second bolt opening instruction to the door lock after the fingerprint information is successfully matched;
the door lock includes:
the control LED lamp module 64 is used for controlling the LED lamp of the door lock to be turned on for receiving the light-on instruction;
the first lock tongue opening module 65 is used for the light sensing module of the door lock to sense the light signal after the LED lamp is opened, controlling the first lock tongue of the door lock to be unlocked, generating first lock tongue opening information and sending the first lock tongue opening information to the terminal equipment;
and the second bolt opening module 66 is used for receiving the second bolt opening instruction and controlling the second bolt of the door lock to unlock, so that the door lock is opened.
Optionally, the reminding module 63 further includes:
the obtaining module 631 is configured to obtain user fingerprint information, encrypt or digitize the user fingerprint information, and generate a processed fingerprint image;
an extracting module 632, configured to extract the feature points of the processed fingerprint image by a terminal device;
a comparison module 633, configured to compare the processed fingerprint image feature points with pre-authorized fingerprint information feature points, calculate similarity, and obtain a matching result; and if the matching result is successful, sending a second bolt opening instruction to the door lock.
Fig. 7 is a schematic diagram of a terminal device according to an embodiment of the present invention. As shown in fig. 7, the terminal apparatus 101 of this embodiment includes: a processor 70, a memory 71 and a computer program 72, such as an approval push program, stored in said memory 71 and executable on said processor 70. The processor 70 implements the steps in the respective approval method embodiments, such as the steps 201 to 203 shown in fig. 2, when executing the computer program 72, and the processor 70 implements the functions of the respective modules/units in the respective apparatus embodiments when executing the computer program 72.
Illustratively, the computer program 72 may be partitioned into one or more modules/units that are stored in the memory 71 and executed by the processor 70 to implement the present invention. The one or more modules/units may be a series of computer program instruction segments capable of performing specific functions, which are used to describe the execution process of the computer program 72 in the apparatus/terminal device 101.
The terminal device 101 may be a desktop computer, a notebook, a palm computer, a cloud server, or other computing devices. The terminal device may include, but is not limited to, a processor 70, a memory 71. Those skilled in the art will appreciate that fig. 7 is merely an example of a terminal device 101 and does not constitute a limitation of terminal device 101 and may include more or fewer components than shown, or some components may be combined, or different components, e.g., the terminal device may also include input-output devices, network access devices, buses, etc.
The Processor 70 may be a Central Processing Unit (CPU), other general purpose Processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic, discrete hardware components, etc. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The storage 71 may be an internal storage unit of the terminal device 101, such as a hard disk or a memory of the terminal device 101. The memory 71 may also be an external storage device of the terminal device 101, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), and the like, which are provided on the terminal device 101. Further, the memory 71 may also include both an internal storage unit and an external storage device of the terminal device 101. The memory 71 is used for storing the computer program and other programs and data required by the terminal device. The memory 71 may also be used to temporarily store data that has been output or is to be output.
It will be apparent to those skilled in the art that, for convenience and brevity of description, only the above-mentioned division of the functional units and modules is illustrated, and in practical applications, the above-mentioned function distribution may be performed by different functional units and modules according to needs, that is, the internal structure of the apparatus is divided into different functional units or modules to perform all or part of the above-mentioned functions. Each functional unit and module in the embodiments may be integrated in one processing unit, or each unit may exist alone physically, or two or more units are integrated in one unit, and the integrated unit may be implemented in a form of hardware, or in a form of software functional unit. In addition, specific names of the functional units and modules are only for convenience of distinguishing from each other, and are not used for limiting the protection scope of the present application. The specific working processes of the units and modules in the system may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the above embodiments, the descriptions of the respective embodiments have respective emphasis, and reference may be made to the related descriptions of other embodiments for parts that are not described or illustrated in a certain embodiment.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
In the embodiments provided in the present invention, it should be understood that the disclosed apparatus/terminal device and method may be implemented in other ways. For example, the above-described embodiments of the apparatus/terminal device are merely illustrative, and for example, the division of the modules or units is only one logical division, and there may be other divisions when actually implemented, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated modules/units, if implemented in the form of software functional units and sold or used as separate products, may be stored in a computer readable storage medium. Based on such understanding, all or part of the flow of the method according to the embodiments of the present invention may also be implemented by a computer program, which may be stored in a computer-readable storage medium, and when the computer program is executed by a processor, the steps of the method embodiments may be implemented. Wherein the computer program comprises computer program code, which may be in the form of source code, object code, an executable file or some intermediate form, etc. The computer-readable medium may include: any entity or device capable of carrying the computer program code, recording medium, usb disk, removable hard disk, magnetic disk, optical disk, computer Memory, Read-Only Memory (ROM), Random Access Memory (RAM), electrical carrier wave signals, telecommunications signals, software distribution medium, and the like. It should be noted that the computer readable medium may contain content that is subject to appropriate increase or decrease as required by legislation and patent practice in jurisdictions, for example, in some jurisdictions, computer readable media does not include electrical carrier signals and telecommunications signals as is required by legislation and patent practice.
The above-mentioned embodiments are only used for illustrating the technical solutions of the present invention, and not for limiting the same; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; such modifications and substitutions do not substantially depart from the spirit and scope of the embodiments of the present invention, and are intended to be included within the scope of the present invention.

Claims (10)

1. A method for remotely controlling a door lock is characterized in that,
monitoring that a user triggers a preset control, generating a light-on instruction and sending the light-on instruction to a door lock; the door lock is configured to receive the light-turning-on instruction, control an LED lamp of the door lock to turn on, and control a first lock tongue of the door lock to unlock by sensing an optical signal after the LED lamp is turned on by a light sensing module of the door lock, so as to generate first lock tongue opening information;
receiving the first lock tongue opening information sent by the door lock, and reminding a user to input a fingerprint;
the fingerprint information of a user is acquired, a second bolt opening instruction is sent to the door lock after the fingerprint information is successfully matched, the door lock is further configured to receive the second bolt opening instruction, and the second bolt of the door lock is controlled to be unlocked, so that the door lock is opened.
2. The method of claim 1, wherein triggering the preset control is triggering the control according to a preset gesture.
3. The method of claim 1, wherein generating a light turn-on command to a door lock comprises:
and generating a light-on instruction, sending the light-on instruction to the gateway, encrypting the gateway, sending the encrypted gateway to the cloud server in a wireless communication mode, and sending the encrypted gateway to the door lock in the wireless communication mode.
4. The method of claim 1, wherein the obtaining of fingerprint information of a user and the sending of a second deadbolt unlocking command to a door lock after the fingerprint information is successfully matched comprises:
acquiring user fingerprint information, encrypting or digitizing the user fingerprint information, and generating a processed fingerprint image;
extracting the feature points of the processed fingerprint image, and matching any combination result of the three feature points;
comparing the processed fingerprint image characteristic points with the pre-authorized fingerprint information characteristic points, calculating the similarity degree, and obtaining a matching result; and if the matching result is successful, sending a second bolt opening instruction to the door lock.
5. A method for remotely controlling a door lock is characterized in that,
the terminal equipment monitors that a user triggers a preset control, generates a light-on instruction and sends the light-on instruction to the door lock, so that the light-on instruction is forwarded to the door lock;
the door lock receives the light-opening instruction, controls an LED lamp of the door lock to open, and a light induction module of the door lock senses a light signal after the LED lamp is opened, controls a first lock tongue of the door lock to unlock, generates first lock tongue opening information and sends the first lock tongue opening information to the terminal equipment;
the terminal equipment receives the first lock tongue opening information and reminds a user to input a fingerprint; the terminal equipment acquires fingerprint information of a user, and sends a second bolt opening instruction to the door lock after the fingerprint information is successfully matched;
the door lock receives the second bolt opening instruction, and controls the second bolt of the door lock to unlock, so that the door lock is opened.
6. The method of claim 5, wherein triggering the preset control is triggering the control according to a preset gesture.
7. The method of claim 6, wherein the terminal device acquires fingerprint information of a user and sends a second bolt unlocking instruction to the door lock after the fingerprint information is successfully matched, and the method comprises the following steps:
the terminal equipment acquires user fingerprint information, encrypts or digitizes the user fingerprint information, and generates a processed fingerprint image;
extracting the characteristic points of the processed fingerprint image by the terminal equipment;
comparing the feature points of the processed fingerprint image with the feature points of the pre-authorized fingerprint information, calculating the similarity, and obtaining a matching result; and if the matching result is successful, sending a second bolt opening instruction to the door lock.
8. A remote control door lock system is characterized in that the system comprises a terminal device and a door lock, wherein the terminal device comprises,
the monitoring module is used for monitoring that a user triggers a preset control;
the sending module is used for generating a light-on instruction and sending the light-on instruction to the door lock so that the light-on instruction is forwarded to the door lock;
the reminding module is used for receiving the first lock tongue opening information and reminding a user of inputting a fingerprint; the terminal equipment acquires fingerprint information of a user, and sends a second bolt opening instruction to the door lock after the fingerprint information is successfully matched;
the door lock includes:
the control LED lamp module is used for controlling the LED lamp of the door lock to be turned on for receiving the light turning-on instruction;
the first lock tongue opening module is used for controlling the first lock tongue of the door lock to be unlocked by the light sensing module of the door lock sensing a light signal after the LED lamp is opened, generating first lock tongue opening information and sending the first lock tongue opening information to the terminal equipment;
and the second bolt opening module is used for receiving the second bolt opening instruction and controlling the second bolt of the door lock to unlock, so that the door lock is opened.
9. A terminal device comprising a memory, a processor and a computer program stored in the memory and executable on the processor, characterized in that the processor implements the steps of the method according to any of claims 1 to 4 when executing the computer program.
10. A computer-readable storage medium, in which a computer program is stored which, when being executed by a processor, carries out the steps of the method according to any one of claims 1 to 4.
CN201811522441.2A 2018-12-13 2018-12-13 Remote control door lock system and method Pending CN111325875A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811522441.2A CN111325875A (en) 2018-12-13 2018-12-13 Remote control door lock system and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811522441.2A CN111325875A (en) 2018-12-13 2018-12-13 Remote control door lock system and method

Publications (1)

Publication Number Publication Date
CN111325875A true CN111325875A (en) 2020-06-23

Family

ID=71172273

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811522441.2A Pending CN111325875A (en) 2018-12-13 2018-12-13 Remote control door lock system and method

Country Status (1)

Country Link
CN (1) CN111325875A (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104821022A (en) * 2015-03-30 2015-08-05 无锡市崇安区科技创业服务中心 Fingerprint and gesture identification-based door lock control system
CN105389874A (en) * 2015-12-04 2016-03-09 佛山市汇泰龙智能科技有限公司 Control system and control method for intelligent lock
CN105427413A (en) * 2015-11-02 2016-03-23 北京奇虎科技有限公司 Intelligent unlocking method and intelligent lock
CN106437333A (en) * 2016-10-31 2017-02-22 哈尔滨朋来科技开发有限公司 Multi-anti-theft intelligent door lock
CN106815905A (en) * 2016-11-29 2017-06-09 深圳智乐信息科技有限公司 A kind of method and system based on mobile terminal checking
CN206256779U (en) * 2016-09-29 2017-06-16 广西科技大学鹿山学院 A kind of communication equipment electronic lock
CN206753255U (en) * 2017-04-12 2017-12-15 浙江工贸职业技术学院 Fingerprint mechanical one lockset
CN108537929A (en) * 2018-04-12 2018-09-14 京东方科技集团股份有限公司 Remote de-locking system and remote de-locking method
KR20180131134A (en) * 2017-05-31 2018-12-10 주식회사 아이리시스 biometic recognition safe system having IoT and its control methods

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104821022A (en) * 2015-03-30 2015-08-05 无锡市崇安区科技创业服务中心 Fingerprint and gesture identification-based door lock control system
CN105427413A (en) * 2015-11-02 2016-03-23 北京奇虎科技有限公司 Intelligent unlocking method and intelligent lock
CN105389874A (en) * 2015-12-04 2016-03-09 佛山市汇泰龙智能科技有限公司 Control system and control method for intelligent lock
CN206256779U (en) * 2016-09-29 2017-06-16 广西科技大学鹿山学院 A kind of communication equipment electronic lock
CN106437333A (en) * 2016-10-31 2017-02-22 哈尔滨朋来科技开发有限公司 Multi-anti-theft intelligent door lock
CN106815905A (en) * 2016-11-29 2017-06-09 深圳智乐信息科技有限公司 A kind of method and system based on mobile terminal checking
CN206753255U (en) * 2017-04-12 2017-12-15 浙江工贸职业技术学院 Fingerprint mechanical one lockset
KR20180131134A (en) * 2017-05-31 2018-12-10 주식회사 아이리시스 biometic recognition safe system having IoT and its control methods
CN108537929A (en) * 2018-04-12 2018-09-14 京东方科技集团股份有限公司 Remote de-locking system and remote de-locking method

Similar Documents

Publication Publication Date Title
KR102350507B1 (en) Access control method, access control device, system and storage medium
EP2879095B1 (en) Method, apparatus and terminal device for image processing
US20160364009A1 (en) Gesture recognition for wireless audio/video recording and communication devices
WO2019134246A1 (en) Facial recognition-based security monitoring method, device, and storage medium
JP5666441B2 (en) Management biometric notification system and method
CN106778141B (en) Unlocking method and device based on gesture recognition and mobile terminal
US10984082B2 (en) Electronic device and method for providing user information
CN103870738A (en) Wearable identity authentication device based on iris identification
KR20160147515A (en) Method for authenticating user and electronic device supporting the same
CN107015745B (en) Screen operation method and device, terminal equipment and computer readable storage medium
US20200267354A1 (en) Input functionality for audio/video recording and communication doorbells
CN110939328B (en) Biological identification intelligent electric lock system
CN105225304A (en) Access control device and registration system and method thereof
CN104809375A (en) Mobile terminal unlocking method and device
US10733857B1 (en) Automatic alteration of the storage duration of a video
CN104574601A (en) Intelligent door-lock system
CN110647732B (en) Voice interaction method, system, medium and device based on biological recognition characteristics
US11302130B2 (en) Smart locking system with biometrics authentication
US20200204365A1 (en) Apparatus, system and method for application-specific biometric processing in a computer system
KR20050045773A (en) Person verification and identification method and apparatus with 3d facial representation for mobile device
CN111325875A (en) Remote control door lock system and method
CN108153568B (en) Information processing method and electronic equipment
CN212809322U (en) Hand vein face multi-mode identification entrance guard attendance all-in-one
CN109426712A (en) Unlocked by fingerprint method, apparatus and electronic equipment
CN112819983A (en) Meeting place sign-in method, device, machine readable medium and equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20200623