CN111612950A - Intelligent lockset and unlocking authentication method and device thereof - Google Patents

Intelligent lockset and unlocking authentication method and device thereof Download PDF

Info

Publication number
CN111612950A
CN111612950A CN202010449869.XA CN202010449869A CN111612950A CN 111612950 A CN111612950 A CN 111612950A CN 202010449869 A CN202010449869 A CN 202010449869A CN 111612950 A CN111612950 A CN 111612950A
Authority
CN
China
Prior art keywords
unlocking
working mode
authentication
information
intelligent lock
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010449869.XA
Other languages
Chinese (zh)
Inventor
戴志美
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Goertek Techology Co Ltd
Original Assignee
Goertek Techology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Goertek Techology Co Ltd filed Critical Goertek Techology Co Ltd
Priority to CN202010449869.XA priority Critical patent/CN111612950A/en
Publication of CN111612950A publication Critical patent/CN111612950A/en
Priority to PCT/CN2020/132203 priority patent/WO2021238121A1/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00563Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys using personal physical data of the operator, e.g. finger prints, retinal images, voicepatterns

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The invention discloses an unlocking authentication method and device of an intelligent lock and the intelligent lock, wherein the method comprises the following steps: after acquiring an unlocking request, determining a current working mode; if the current working mode is a primary safe working mode, acquiring unlocking information and unlocking authorization information for authenticating the user terminal, and performing unlocking authentication according to the unlocking information and the unlocking authorization information; if the current working mode is a secondary safe working mode, acquiring unlocking information, and performing unlocking authentication according to the unlocking information; according to the unlocking authentication method and the unlocking authentication system, the unlocking authentication is carried out according to the unlocking information and the unlocking authorization information of the authentication user terminal, so that the user authorization is required for each unlocking, the safety is higher, and the method and the system are suitable for the use scene of nobody in a house for a longer time; through obtaining the request of unblanking after, confirm current operating mode, make intelligent tool to lock can accomplish the intelligence switching of general use scene and long-time unmanned use scene to improve the flexibility of using the scene, promote user experience.

Description

Intelligent lockset and unlocking authentication method and device thereof
Technical Field
The invention relates to the field of intelligent security and protection, in particular to an intelligent lockset and an unlocking authentication method and device thereof.
Background
The products of intelligent tool to lock on the market at present are quite many, have fingerprint lock and trick lock, also have the intelligent lock through voiceprint recognition or image recognition control, however these intelligent lock fingerprint lock, trick lock can be cracked through the silver powder mode, and voiceprint recognition or image recognition's intelligent lock except the consideration that exists in the aspect of the reliability, can also be cracked through the mode of duplicating, and the potential safety hazard still exists.
Therefore, how to improve the security of intelligent tool to lock, and when guaranteeing that intelligent tool to lock safe in utilization, improve the flexibility of practical scene, promote user experience, be the problem that needs to solve now urgently.
Disclosure of Invention
The invention aims to provide an intelligent lock and an unlocking authentication method and device thereof, so that the safety of the intelligent lock is improved, the use safety of the intelligent lock is ensured, the flexibility of a use scene is improved, and the user experience is improved.
In order to solve the technical problem, the invention provides an unlocking authentication method of an intelligent lock, which comprises the following steps:
after acquiring an unlocking request, determining a current working mode; wherein the operating modes include: a primary safe working mode and a secondary safe working mode;
if the current working mode is the primary safe working mode, acquiring unlocking information and unlocking authorization information for authenticating the user terminal, and performing unlocking authentication according to the unlocking information and the unlocking authorization information; the unlocking information is data for unlocking, which are acquired by unlocking acquisition equipment of the intelligent lock;
and if the current working mode is the secondary safety working mode, acquiring unlocking information, and carrying out unlocking authentication according to the unlocking information.
Optionally, when the working mode further includes a third-level safety working mode, after obtaining the unlocking request and determining the current working mode, the method further includes:
and if the current working mode is the three-level safety working mode, executing unlocking operation.
Optionally, after obtaining the unlocking request, before determining the current working mode, the method further includes:
judging whether a person stays outside the door for a preset time or not according to the infrared signal acquired by the infrared detection equipment of the intelligent lockset;
and if so, generating the unlocking request.
Optionally, when the working mode further includes a fourth-level safety working mode, after obtaining the unlocking request and determining the current working mode, the method further includes:
and if the current working mode is the four-level safe working mode, acquiring the unlocking authorization information, and carrying out unlocking authentication according to the unlocking authorization information.
Optionally, the acquiring unlocking information and unlocking authorization information for authenticating the user terminal, and performing unlocking authentication according to the unlocking information and the unlocking authorization information includes:
acquiring an unlocking voice instruction acquired by a microphone of the intelligent lock and image data acquired by a camera of the intelligent lock;
carrying out voice recognition and voiceprint recognition on the unlocking voice command, and judging whether the unlocking voice command is matched with a preset unlocking command and preset voiceprint data;
if not, the unlocking operation is not executed;
if yes, carrying out face recognition on the image data, and judging whether a face recognition result is matched;
if not, the unlocking operation is not executed;
if the authentication request is matched with the unlocking authorization request, sending an unlocking authorization request to the authentication user terminal through a wireless network, and receiving unlocking authorization information corresponding to the unlocking authorization request;
judging whether the unlocking authorization information is an unlocking instruction or not;
if the unlocking instruction is the unlocking instruction, the unlocking operation is executed;
and if the unlocking instruction is not the unlocking instruction, the unlocking operation is not executed.
Optionally, the sending an unlocking authorization request to the authenticated user terminal through the wireless network includes:
and sending the unlocking authorization request and the current image data collected by the camera of the intelligent lock to the authentication user terminal through a wireless network.
Optionally, the determining the current operating mode includes:
judging whether a short-time authorization instruction of the secondary safety working mode sent by the authentication user terminal is received within a first preset time period;
if so, determining that the current working mode is the secondary safety working mode;
if not, determining that the current working mode is the primary safe working mode.
Optionally, the determining the current operating mode includes:
judging whether the unlocking operation is executed within a second preset time period before;
if so, determining that the current working mode is the secondary safety working mode;
if not, determining that the current working mode is the primary safe working mode.
The invention also provides an unlocking authentication device of the intelligent lock, which comprises:
the determining module is used for determining the current working mode after acquiring the unlocking request; wherein the operating modes include: a primary safe working mode and a secondary safe working mode;
the first authentication module is used for acquiring unlocking information and unlocking authorization information of an authentication user terminal if the current working mode is the primary safe working mode, and carrying out unlocking authentication according to the unlocking information and the unlocking authorization information; the unlocking information is data for unlocking, which are acquired by unlocking acquisition equipment of the intelligent lock;
and the second authentication module is used for acquiring unlocking information and carrying out unlocking authentication according to the unlocking information if the current working mode is the secondary safety working mode.
The invention also provides an intelligent lockset, which comprises: unlocking the acquisition device, the memory and the processor; the unlocking acquisition equipment is used for acquiring unlocking information; the memory is used for storing a computer program, and the processor is used for realizing the steps of the unlocking authentication method of the intelligent lock according to any one of claims 1 to 8 when the computer program is executed.
The invention provides an unlocking authentication method of an intelligent lock, which comprises the following steps: after acquiring an unlocking request, determining a current working mode; wherein, the mode of operation includes: a primary safe working mode and a secondary safe working mode; if the current working mode is a primary safe working mode, acquiring unlocking information and unlocking authorization information for authenticating the user terminal, and performing unlocking authentication according to the unlocking information and the unlocking authorization information; the unlocking information is data for unlocking, which are acquired by unlocking acquisition equipment of the intelligent lock; if the current working mode is a secondary safe working mode, acquiring unlocking information, and performing unlocking authentication according to the unlocking information;
therefore, when the intelligent lockset is in a primary safe working mode, unlocking authentication is carried out according to the unlocking information and the unlocking authorization information of the authentication user terminal, so that user authorization is required for unlocking every time, the safety is higher, and the intelligent lockset is suitable for an unmanned use scene in a house for a longer time; through obtaining the request of unblanking after, confirm current operating mode, make intelligent tool to lock can accomplish the intelligence of general use scene and long-time unmanned use scene and switch to when guaranteeing intelligent tool to lock safe in utilization, improved the flexibility of using the scene, promoted user experience. In addition, the invention also provides an unlocking authentication device of the intelligent lock and the intelligent lock, and the intelligent lock also has the beneficial effects.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the provided drawings without creative efforts.
Fig. 1 is a flowchart of an unlocking authentication method for an intelligent lock according to an embodiment of the present invention;
fig. 2 is a flowchart of another unlocking authentication method for an intelligent lock according to an embodiment of the present invention;
fig. 3 is a schematic block diagram of a structure of an intelligent lock according to an embodiment of the present invention;
fig. 4 is a schematic flowchart of another unlocking authentication method for an intelligent lock according to an embodiment of the present invention;
fig. 5 is a block diagram of an unlocking authentication device of an intelligent lock according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1, fig. 1 is a flowchart illustrating an unlocking authentication method for an intelligent lock according to an embodiment of the present invention. The method can comprise the following steps:
step 101: after acquiring an unlocking request, determining a current working mode; wherein, the mode of operation includes: a primary safe operating mode and a secondary safe operating mode.
It can be understood that the working mode in this step may be a working mode in which the intelligent lock performs unlocking authentication, and the working mode in this step may include a safety working mode corresponding to different safety levels, such as a secondary safety working mode corresponding to a common safety level and a primary safety working mode corresponding to a higher safety level. In this embodiment, after acquiring the unlocking request, the processor (such as the MCU or the single chip microcomputer) in the intelligent lock determines the current operating mode, so that the processor can select the unlocking authentication mode corresponding to the security level according to the determined current operating mode to perform unlocking authentication, thereby implementing intelligent conversion of different security levels and improving the flexibility of the intelligent lock in use.
Specifically, the specific number and types of the working modes in this step can be set by a designer according to a practical scene and user requirements, for example, the working modes can include a secondary safety working mode which is applicable to a general use scene and corresponds to a common safety level which is the same as the safety level of an intelligent lockset on the market, namely, a safety working mode which uses unlocking information such as passwords, voice and/or images to carry out unlocking authentication; and the security working mode is suitable for a primary security working mode corresponding to a higher security level of an unmanned use scene for a long time at home, namely the security working mode for unlocking authentication by using unlocking information and unlocking authorization information of an authentication user terminal. The working modes can also comprise a three-level safety working mode corresponding to a lower safety level suitable for a use scene with large personnel flow (such as a family party, or people coming and going at random every day when some business meetings are operated at home, and the like), and/or a four-level safety working mode corresponding to a lower safety level suitable for a situation that the personnel flow is not large and multiple settings or leakage of unlocking information is avoided. The present embodiment does not set any limit to this.
Correspondingly, the specific mode of the processor in the intelligent lock in the step for determining the current working mode, that is, the specific conversion mode between different working modes, can be set by a designer according to a practical scene and user requirements, for example, when the different working modes of the intelligent lock are freely switched by a user through an authentication user terminal or a control device (such as a key or a touch screen) on the intelligent lock, the processor of the intelligent lock in the step can determine the obtained selected working mode as the current working mode, that is, the user can select one working mode from a plurality of different working modes as the subsequent working mode of the intelligent lock through the authentication user terminal or the control device on the intelligent lock at any time, that is, the current working mode determined in the step; when different working modes of the intelligent lock are intelligently switched by a processor of the intelligent lock, the processor in the step can determine the current working mode according to a preset intelligent switching rule; when different working modes of the intelligent lockset are switched at will by a user and intelligently switched by the processor, the processor can firstly judge whether a selected working mode is obtained or not in the step, if the selected working mode is obtained, the obtained selected working mode is determined as the current working mode, and if the selected working mode is not obtained, the current working mode is determined according to a preset intelligent switching rule. The present embodiment does not set any limit to this.
Specifically, the processor determines the specific mode of the current working mode, that is, the specific setting of the intelligent switching rule, according to the preset intelligent switching rule, and the specific setting can be set by a designer or a user according to a practical scene and user requirements, for example, the intelligent switching rule can be set by the intelligent lock to operate in a primary safety working mode by default, when the intelligent lock detects a short-time authorization instruction of a secondary safety working mode sent by the user through an authentication user terminal, the secondary safety working mode is switched to within a short time (that is, a first preset time period, for example, 10min), and then the primary safety working mode is returned; namely, the step can comprise judging whether a short-time authorization instruction of a secondary safety working mode sent by the authentication user terminal is received in a first preset time period; if so, determining that the current working mode is a secondary safety working mode; if not, determining that the current working mode is a primary safe working mode. The intelligent switching rule can also be used for the intelligent lock to work in a secondary safety working mode by default, and when the intelligent lock detects that the unlocking operation is not executed for a long time (namely a second preset time period, such as 24 hours), namely a user does not have the operation of locking and unlocking for a long time, the intelligent lock can be automatically switched to the primary safety working mode; namely, the step can comprise judging whether the unlocking operation is executed within the second preset time period before; if so, determining that the current working mode is a secondary safety working mode; if not, determining that the current working mode is a primary safe working mode. When the working mode of the intelligent lock further includes a third-level safety working mode and/or a fourth-level safety working mode, on the basis of the two intelligent switching rules, the working mode setting in a certain fixed time period (namely, a third preset time period) can be further included, namely, the time intelligent lock in the third preset time period is switched to a corresponding working mode, and the time intelligent lock outside the third preset time period is switched to the working mode according to any one of the intelligent switching rules, for example, the working mode of the intelligent lock includes a first-level safety working mode, a second-level safety working mode and a third-level safety working mode, and when the working mode corresponding to the third preset time period is the third-level safety working mode and the intelligent lock is in the second-level safety working mode by default, the processor in the step can firstly judge whether the intelligent lock is in the third preset time period or not; if so, determining that the current working mode is a three-level safety working mode, namely, the working mode corresponding to the third preset time period is the three-level safety working mode; if not, executing the step of judging whether the unlocking operation is executed within the second preset time period before the judgment. The present embodiment does not set any limit to this.
It should be noted that, this step may also include a step of acquiring, by a processor of the intelligent lock, an unlocking request. The specific mode of the intelligent lock for acquiring the unlocking request by the processor can be set by a designer according to a practical scene and user requirements, for example, the processor can generate the unlocking request after detecting that a preset key of the intelligent lock or a preset position of a touch screen is pressed or touched; the processor can also generate an unlocking request after detecting that the password input by the user is input by a key or a touch screen; when the intelligent lockset is provided with personnel detection equipment (such as infrared detection equipment, a camera and the like) for detecting people outside a door, the processor can also generate an unlocking request when detecting that people outside the door or people stay for a preset time (such as 30 s). The present embodiment does not set any limit to this.
Step 102: if the current working mode is a primary safe working mode, acquiring unlocking information and unlocking authorization information for authenticating the user terminal, and performing unlocking authentication according to the unlocking information and the unlocking authorization information; the unlocking information is data which are acquired by unlocking acquisition equipment of the intelligent lock and used for unlocking.
It can be understood that the purpose of this step may be to add the unlocking authentication of the unlocking authorization information sent by the authentication user terminal on the basis of the conventional unlocking authentication by using the unlocking information when it is determined that the current working mode is the primary safe working mode, so that the intelligent lock can be unlocked only after being authorized by the authentication user terminal every time.
The unlocking information in this step may be data for unlocking acquired by an unlocking acquisition device (such as a key, a touch screen, a camera, a microphone, a short-distance wireless receiving device, and the like) of the intelligent lock, that is, input information required for unlocking authentication of the intelligent lock in the prior art. The specific content of the unlocking information can be set by a designer according to a practical scene and user requirements, for example, the unlocking information can comprise any one or more of a password, voice and an image.
Specifically, the specific way in which the processor acquires the unlocking information from the unlocking acquisition equipment of the intelligent lock in the step can be set by a designer, and if the unlocking information comprises a password, an unlocking voice instruction and image data, the processor can receive the password acquired by a key of the intelligent lock, an IC card reader or a touch screen, the unlocking voice instruction acquired by a microphone of the intelligent lock and the image data acquired by a camera of the intelligent lock; the processor can also directly acquire the password, the unlocking voice instruction and the image data which are sent by the user terminal (such as a mobile phone) and received by the short-distance wireless receiving equipment (such as Bluetooth equipment) of the intelligent lock. The present embodiment does not set any limit to this.
It should be noted that the authenticated user terminal in this step may be a user terminal (e.g., a mobile phone) that performs pairing authentication with the intelligent lock. The unlocking authorization information in this step may be information that authenticates whether the user terminal sends the intelligent lock to allow unlocking this time, and for example, the unlocking authorization information may be an unlocking instruction or a prohibition unlocking instruction. Specifically, the specific manner in which the processor acquires the unlocking authorization information of the authenticated user terminal in this step may be set by a designer, for example, the processor may send an unlocking authorization request to the authenticated user terminal through a wireless network by using a wireless transceiver (e.g., a WIFI device); receiving unlocking authorization information returned by the authentication user terminal through the wireless network; when the intelligent lockset is provided with the camera, the processor can also utilize the wireless transceiver to send an unlocking authorization request to the authentication user terminal, and simultaneously, the camera is opened to send current image data collected by the camera to the authentication user terminal, so that a user of the authentication user terminal can check the current environment in front of a door, and whether the intelligent lockset can be authorized to be opened or not is determined according to whether a person in front of the door is a member in the house, and corresponding unlocking authorization information is returned.
Correspondingly, the specific mode of carrying out unlocking authentication by the processor according to the unlocking information and the unlocking authorization information in the step can be set by a designer, if the unlocking authentication can be carried out according to the unlocking information, after the unlocking information authentication is passed, the unlocking authentication is carried out according to the unlocking authorization information, and after the unlocking authentication of the unlocking authorization information is passed, the unlocking operation is carried out; and unlocking authentication can be simultaneously carried out on the unlocking information and the unlocking authorization information respectively, and the unlocking operation is executed after the unlocking information and the unlocking authorization information are authenticated. The present embodiment does not set any limit to this.
Correspondingly, the specific unlocking authentication process according to the unlocking information and the unlocking authorization information in the step can be set by a designer, if the unlocking authentication process is the same as or similar to the unlocking authentication process of the unlocking information in the prior art, the unlocking authentication of the unlocking information can be carried out, if the unlocking information comprises an unlocking voice command acquired by a microphone of the intelligent lock and image data acquired by a camera of the intelligent lock, the voice recognition and the voiceprint recognition can be carried out on the unlocking voice command, and whether the unlocking voice command is matched with both the preset unlocking command and the preset voiceprint data is judged; if the matching is successful, then carrying out face recognition on the image data, and judging whether the face recognition result is matching; and if the face recognition result is matching, determining that the unlocking information passes the authentication. The unlocking authentication process of the unlocking authorization information can be used for judging whether the unlocking authorization information is an unlocking instruction or not; if the unlocking authorization information is an unlocking instruction, determining that the unlocking authorization information passes authentication; and if the unlocking authorization information is not the unlocking instruction, namely the unlocking authorization information is the unlocking prohibition instruction, determining that the unlocking authorization information is not authenticated.
Step 103: and if the current working mode is the secondary safety working mode, acquiring unlocking information, and carrying out unlocking authentication according to the unlocking information.
It can be understood that, the purpose of this step may be that when it is determined that the current working mode is the secondary safety working mode, the intelligent lock performs conventional unlocking authentication by using unlocking information input by a person in front of the door or collected by the person, so as to avoid adding an authentication user terminal in a general use scenario, reduce the authorization times of the authentication user terminal, and improve user experience.
Specifically, the specific manner of acquiring the unlocking information in this step and performing unlocking authentication according to the unlocking information may be implemented in the same or similar manner as the manner of acquiring the unlocking information and performing unlocking authentication in step 102, which is not limited in this embodiment.
It should be noted that, when the working mode of the intelligent lock in this embodiment further includes the third-level safe working mode, this embodiment may further include a step of executing an unlocking operation if the current working mode is the third-level safe working mode, that is, when the current working mode is the third-level safe working mode, the processor may automatically unlock after acquiring the unlocking request, thereby avoiding frequent door opening of the user.
Correspondingly, when the working mode of the intelligent lock in the embodiment further includes a four-level safety working mode, the embodiment may further include obtaining the unlocking authorization information if the current working mode is the four-level safety working mode, and performing unlocking authentication according to the unlocking authorization information. When current mode is four-level safety mode promptly, the treater can acquire the request of unblanking at every turn after, request authentication user terminal's unblock authorization information and carry out the authentication of unblanking, when making the nobody in the user family, can directly carry out the unlocking control of intelligent tool to lock through authentication user terminal, avoid the condition that the password that other people need know intelligent tool to lock could enter the room, and unblank at every turn and controlled by authentication user terminal's user, improved the security.
In the embodiment, when the intelligent lockset is in the primary safe working mode, unlocking authentication is carried out according to the unlocking information and the unlocking authorization information of the authentication user terminal, so that user authorization is required for unlocking every time, the safety is higher, and the intelligent lockset is suitable for an unmanned use scene in a house for a longer time; through obtaining the request of unblanking after, confirm current operating mode, make intelligent tool to lock can accomplish the intelligence of general use scene and long-time unmanned use scene and switch to when guaranteeing intelligent tool to lock safe in utilization, improved the flexibility of using the scene, promoted user experience.
Referring to fig. 2, fig. 2 is a flowchart illustrating another unlocking authentication method for an intelligent lock according to an embodiment of the present invention. The method can comprise the following steps:
step 201: judging whether a person stays outside the door for a preset time or not according to an infrared signal acquired by infrared detection equipment of the intelligent lockset; if yes, go to step 202.
It is understood that the purpose of this step may be to determine whether a person stays outside the door for a preset time by using an infrared detection device (e.g., an infrared sensor) provided in the processor of the intelligent lock, that is, to determine whether a person is about to enter the room; after determining whether someone stays outside the door for a preset time, an unlocking request is automatically generated, and the process proceeds to step 202 for the next unlocking authentication process.
Specifically, in this step, the processor of the intelligent lock (for example, the MCU in fig. 3) may determine whether the duration that the distance value corresponding to the infrared signal is smaller than the preset distance value reaches the preset time, so as to determine whether someone stays outside the door for the preset time, that is, when the duration that the distance value corresponding to the infrared signal is smaller than the preset distance value reaches the preset time, it is determined that someone stays outside the door for the preset time.
Correspondingly, the process can be directly finished under the condition that no person stays outside the door for a preset time in the step.
Step 202: judging whether the current time is in a third preset time period or not; if yes, determining that the current working mode is a three-level safety working mode, and entering step 203; if not, go to step 204.
It is understood that the third preset time period in this embodiment may be a time period corresponding to a preset three-level safety operation mode, such as 8:00 to 20:00 per day. The working modes of the intelligent lock in the embodiment can comprise a primary safety working mode, a secondary safety working mode and a tertiary safety working mode. That is, as shown in fig. 4, the purpose of this step may be to determine whether the current working mode is in the third-level safety working mode through this step when the third preset time period is set; if yes, the step 203 is directly entered to execute the unlocking operation, for example, when a user wants to hold a family party on a certain day, a lot of people frequently visit, at this time, the intelligent lock 8:00 to 12:00 can be set to be a third preset time period, and any visitor can unlock in the time period; if not, step 204 is entered to determine whether the current operating mode is the primary safety operating mode or the secondary safety operating mode.
Correspondingly, the step can also include the step of judging whether a third preset time period is set before the step, if yes, the step is entered; if not, step 204 may be entered directly.
It should be noted that, this embodiment is shown by taking as an example an unlocking authentication method corresponding to different working modes that a processor of an intelligent lock of the intelligent lock is automatically and intelligently switched, and on the basis of this embodiment, an unlocking authentication process that a user can freely switch different working modes by himself through an authentication user terminal or a control device (such as a key or a touch screen) on the intelligent lock can also be added, and for example, a step of judging whether a selected working mode set by the user is stored can also be included before this step; if not, entering the step; if yes, determining the selected working mode as the current working mode, and entering a corresponding step to carry out unlocking authentication. If the selected operation mode is the third-level safety operation mode, step 203 may be entered; when the selected working mode is the primary safety working mode, the step 205 may be entered; when the selected operation mode is the secondary security operation mode, step 210 may be entered.
Step 203: and executing unlocking operation.
It can be understood that this step may be that the processor of the intelligent lock controls the mechanical lock in the intelligent lock to unlock by executing the unlocking operation.
Step 204: judging whether the unlocking operation is executed within a second preset time period before; if not, determining that the current working mode is a primary safe working mode, and entering step 205; if yes, determining that the current working mode is a secondary safety working mode, and entering step 211;
it can be understood that the purpose of this step may be to determine whether the home is in an unattended state for a longer time by determining whether the unlocking operation is performed within the previous second preset time period (e.g., 24h), so that when the unlocking operation is not performed within the previous second preset time period, that is, the home is in an unattended state for a longer time, it is determined that the current working mode is the primary safe working mode, thereby improving the safety; therefore, intelligent switching between the primary safety working mode and the secondary safety working mode is realized.
Step 205: the method comprises the steps of obtaining an unlocking voice instruction collected by a microphone of the intelligent lock and image data collected by a camera of the intelligent lock.
It can be understood that, as shown in fig. 3 and fig. 4, the intelligent lock in this embodiment may be provided with a microphone (mic) and a camera, so that when the processor (e.g., the MCU in fig. 3) determines that the current working mode is the primary safe working mode, the microphone is opened to record the unlocking voice instruction (i.e., audio data) spoken by the user, and the camera is opened to take a picture to obtain image data.
Specifically, in this embodiment, the processor controls the microphone and the camera to simultaneously acquire the unlocking voice instruction and the image data, and the unlocking voice instruction or the image data may also be acquired first, and after the acquired unlocking voice instruction or the image data passes the authentication, another type of data is acquired, which is not limited in this embodiment.
Step 206: carrying out voice recognition and voiceprint recognition on the unlocking voice command, and judging whether the unlocking voice command is matched with both a preset unlocking command and preset voiceprint data; if not, go to step 207; if yes, go to step 208.
The purpose of this step can be to perform voice recognition and voice print recognition on the unlocking voice command spoken by the user and collected by the microphone for the processor, for example, assuming that the preset unlocking command is "unlock", the processor performs voice recognition and voice print recognition on the unlocking voice command and collected by the microphone, if the unlocking voice command and the voice print recognition result are "unlock" commands and the voice print recognition result matches the pre-stored voice print data (i.e., the preset voice print data) of the user, i.e., the voice print of the unlocking voice command and the stored voice print are judged to be consistent (to be the same person), and it is determined that the unlocking voice command matches both the preset unlocking command and the preset voice print data; otherwise, determining that the unlocking voice instruction is not matched with both the preset unlocking instruction and the preset voiceprint data, directly entering step 207 to finish the process without executing the unlocking operation, and also outputting prompt information of the unlocking voice instruction matching failure through a display or a loudspeaker of the intelligent lock and entering step 207 to prompt the user to speak out a correct unlocking voice instruction again.
Step 207: the unlocking operation is not performed.
Specifically, the purpose of this step may be that the processor does not execute the unlocking operation and ends this flow when the unlocking authentication is different.
Step 208: carrying out face recognition on the image data, and judging whether a face recognition result is matched or not; if yes, go to step 209; if not, go to step 207.
The purpose of this step may be to perform face recognition on the image data acquired by the camera by the processor, and when the face data in the acquired image data is judged to be consistent with the face data of the user stored in advance (the same person), it may be determined that the face recognition result is a match, and step 209 may be performed to obtain the unlocking authorization information.
Specifically, the specific way of performing face recognition on the image data in this step may be implemented in a way the same as or similar to that of the face recognition method in the prior art, and this embodiment does not limit this.
Step 209: and sending an unlocking authorization request to the authentication user terminal through the wireless network, and receiving unlocking authorization information corresponding to the unlocking authorization request.
Specifically, as shown in fig. 4, before this step, it may further include determining whether a short-time unlocking authorization instruction sent by an authenticated user terminal (such as the mobile phone in fig. 4) is received within a first preset time period, that is, a user may send a short-time unlocking authorization instruction to the intelligent lock through the authenticated user terminal, so that the intelligent lock is authorized within the first preset time period to perform an unlocking operation when the unlocking information is authenticated.
Correspondingly, as shown in fig. 4, in this embodiment, when the processor sends an unlocking authorization request to the authenticated user terminal through the wireless network by using the wireless communication device, the camera may be opened to collect a current environment video (i.e., current image data) and send the current environment video to the authenticated user terminal, so that a user of the authenticated user terminal may check the current environment in front of the door, and determine whether to authorize to open the intelligent lock according to whether a person in front of the door is a member in the home.
Step 210: judging whether the unlocking authorization information is an unlocking instruction or not; if yes, go to step 203; if not, go to step 207.
It can be understood that, this step is through judging whether unblock authorization information is the unblock instruction, confirms whether the user authorizes intelligent tool to lock through authentication user terminal and carries out the operation of unblanking for if not pass authentication user terminal's authorization, intelligent tool to lock can not be opened by anyone, even the unblock information authentication passes unanimity, can prevent some lawbreakers from carrying out the secret hazard that unblanks and lead to after secretly shooting or recording to the user from this.
Step 211: the method comprises the steps of obtaining an unlocking voice instruction collected by a microphone of the intelligent lock and image data collected by a camera of the intelligent lock.
Step 212: carrying out voice recognition and voiceprint recognition on the unlocking voice command, and judging whether the unlocking voice command is matched with both a preset unlocking command and preset voiceprint data; if not, go to step 207; if so, step 213 is entered.
Step 213: carrying out face recognition on the image data, and judging whether a face recognition result is matched or not; if yes, go to step 203; if not, go to step 207.
Steps 211 to 213 are similar to steps 205, 206 and 208, and are not repeated herein.
It can be understood that, in this embodiment, the working modes of the intelligent lock may include a secondary safety working mode of a common safety level, a primary safety working mode of a higher safety level, and a tertiary safety working mode of a lower safety level. The common security level can be equal to the security level of the intelligent lock on the market, and the method is suitable for common scenes; the intelligent lock can be unlocked only after being authorized by the authenticated user terminal every time at a higher security level, and in the mode, anyone can not unlock the intelligent lock without authorization, so that the intelligent lock is higher in security and is more suitable for an unmanned use scene for a long time at home; the lower security level is suitable for a scene with large personnel flow (such as a family party, or a person who comes and goes in a certain business in a family at random every day, and the like), and when people frequently visit, the people only need to stay at the door for a little time. The intelligent lockset can be automatically opened, a user does not need to frequently open the door, and the intelligent lockset is more flexible to use. The embodiment not only ensures the safety, but also improves the use flexibility through the intelligent conversion of the working modes among the three safety levels.
In the embodiment of the invention, the intelligent lock can be switched to different protection levels by intelligently switching the three working modes, namely the primary safety working mode, the secondary safety working mode and the tertiary safety working mode of the intelligent lock, so that the use scene is more flexible on the basis of ensuring the use safety of the intelligent lock, and the user experience is improved.
Referring to fig. 5, fig. 5 is a block diagram of an unlocking authentication device of an intelligent lock according to an embodiment of the present invention. The apparatus may include:
the determining module 10 is configured to determine a current working mode after acquiring the unlocking request; wherein, the mode of operation includes: a primary safe working mode and a secondary safe working mode;
the first authentication module 20 is configured to, if the current operating mode is the primary safe operating mode, acquire unlocking information and unlocking authorization information for authenticating the user terminal, and perform unlocking authentication according to the unlocking information and the unlocking authorization information; the unlocking information is data for unlocking, which are acquired by unlocking acquisition equipment of the intelligent lock;
and the second authentication module 30 is configured to, if the current working mode is the secondary safe working mode, acquire unlocking information, and perform unlocking authentication according to the unlocking information.
Optionally, when the working mode further includes a third-level safety working mode, the apparatus may further include:
and the third authentication module is used for executing unlocking operation if the current working mode is a three-level safe working mode.
Optionally, the apparatus may further include:
the request generation module is used for judging whether a person stays outside the door for a preset time or not according to the infrared signal acquired by the infrared detection equipment of the intelligent lockset; and if so, generating an unlocking request.
Optionally, when the operation mode further includes a four-level safety operation mode, the apparatus may further include:
and the fourth authentication module is used for acquiring unlocking authorization information if the current working mode is a four-level safe working mode, and carrying out unlocking authentication according to the unlocking authorization information.
Optionally, the first authentication module 20 may include:
the acquisition submodule is used for acquiring an unlocking voice instruction acquired by a microphone of the intelligent lock and image data acquired by a camera of the intelligent lock;
the voice submodule is used for carrying out voice recognition and voiceprint recognition on the unlocking voice command and judging whether the unlocking voice command is matched with the preset unlocking command and the preset voiceprint data; if not, the unlocking operation is not executed;
the face sub-module is used for carrying out face recognition on the image data if the image data are matched with each other and judging whether the face recognition result is matched or not; if not, the unlocking operation is not executed;
the authorization request submodule is used for sending an unlocking authorization request to the authentication user terminal through the wireless network if the authentication user terminal is matched with the authorization request submodule and receiving unlocking authorization information corresponding to the unlocking authorization request;
the authorization judgment submodule is used for judging whether the unlocking authorization information is an unlocking instruction; if the command is not the unlocking command, the unlocking operation is not executed;
and the unlocking submodule is used for executing unlocking operation if the unlocking instruction is an unlocking instruction.
Optionally, the authorization request sub-module may include:
and the wireless request unit is used for sending an unlocking authorization request and current image data acquired by a camera of the intelligent lock to the authentication user terminal through a wireless network.
Optionally, the determining module 10 may include:
the first determining submodule is used for judging whether a short-time authorization instruction of a secondary safety working mode sent by the authentication user terminal is received in a first preset time period; if so, determining that the current working mode is a secondary safety working mode; if not, determining that the current working mode is a primary safe working mode.
Optionally, the determining module 10 may include:
the second determining submodule is used for judging whether the unlocking operation is executed within a second preset time period before; if so, determining that the current working mode is a secondary safety working mode; if not, determining that the current working mode is a primary safe working mode.
In the embodiment, when the intelligent lockset is in the primary safe working mode, the unlocking authentication is carried out according to the unlocking information and the unlocking authorization information of the authentication user terminal through the first authentication module 20, so that the user authorization is required for unlocking every time, the safety is higher, and the intelligent lockset is suitable for a long-time unmanned use scene in a house; after the unlocking request is obtained through the determining module 10, the current working mode is determined, so that the intelligent lock can complete intelligent switching between a general use scene and a long-time unmanned use scene, the use safety of the intelligent lock is guaranteed, the flexibility of the use scene is improved, and the user experience is improved.
The embodiment of the invention also provides an intelligent lockset, which comprises: unlocking the acquisition device, the memory and the processor; the unlocking acquisition equipment is used for acquiring unlocking information; the intelligent lock comprises a memory and a processor, wherein the memory is used for storing a computer program, and the processor is used for realizing the steps of the unlocking authentication method of the intelligent lock provided by any one of the above embodiments when the computer program is executed.
Specifically, the unlocking acquisition device in this embodiment may include a microphone for acquiring an unlocking voice instruction in the unlocking information and a camera for acquiring image data in the unlocking information. Optionally, the unlocking acquisition device may also include a key or a touch screen for acquiring a password in the unlocking information; the unlock acquisition device may further include a short-range wireless reception device that receives all or part of the unlock information from the user terminal.
Correspondingly, intelligent tool to lock can also include infrared check out test set in this embodiment for gather infrared signal, make the treater can generate the request of unblanking according to the infrared signal of gathering.
In addition, an embodiment of the present invention further provides a computer-readable storage medium, where a computer program is stored on the computer-readable storage medium, and when the computer program is executed by a processor, the steps of the unlocking authentication method for an intelligent lock provided in any of the above embodiments are implemented.
The embodiments are described in a progressive manner in the specification, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments are referred to each other. The device, the intelligent lock and the computer readable storage medium disclosed by the embodiment correspond to the method disclosed by the embodiment, so that the description is simple, and the relevant points can be referred to the method part for description.
The steps of a method or algorithm described in connection with the embodiments disclosed herein may be embodied directly in hardware, in a software module executed by a processor, or in a combination of the two. A software module may reside in Random Access Memory (RAM), memory, Read Only Memory (ROM), electrically programmable ROM, electrically erasable programmable ROM, registers, hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art.
The intelligent lock and the unlocking authentication method and device thereof provided by the invention are described in detail above. The principles and embodiments of the present invention are explained herein using specific examples, which are presented only to assist in understanding the method and its core concepts. It should be noted that, for those skilled in the art, it is possible to make various improvements and modifications to the present invention without departing from the principle of the present invention, and those improvements and modifications also fall within the scope of the claims of the present invention.

Claims (10)

1. An unlocking authentication method of an intelligent lock is characterized by comprising the following steps:
after acquiring an unlocking request, determining a current working mode; wherein the operating modes include: a primary safe working mode and a secondary safe working mode;
if the current working mode is the primary safe working mode, acquiring unlocking information and unlocking authorization information for authenticating the user terminal, and performing unlocking authentication according to the unlocking information and the unlocking authorization information; the unlocking information is data for unlocking, which are acquired by unlocking acquisition equipment of the intelligent lock;
and if the current working mode is the secondary safety working mode, acquiring unlocking information, and carrying out unlocking authentication according to the unlocking information.
2. The unlocking authentication method for the intelligent lock according to claim 1, wherein when the working mode further includes a three-level security working mode, after obtaining the unlocking request and determining the current working mode, the method further comprises:
and if the current working mode is the three-level safety working mode, executing unlocking operation.
3. The unlocking authentication method of the intelligent lock according to claim 2, wherein after the unlocking request is obtained, before the current working mode is determined, the method further comprises:
judging whether a person stays outside the door for a preset time or not according to the infrared signal acquired by the infrared detection equipment of the intelligent lockset;
and if so, generating the unlocking request.
4. The unlocking authentication method for the intelligent lock according to claim 1, wherein when the operation mode further includes a four-level security operation mode, after obtaining the unlocking request and determining the current operation mode, the method further comprises:
and if the current working mode is the four-level safe working mode, acquiring the unlocking authorization information, and carrying out unlocking authentication according to the unlocking authorization information.
5. The unlocking authentication method of the intelligent lock according to claim 1, wherein the acquiring unlocking information and unlocking authorization information for authenticating the user terminal, and performing unlocking authentication according to the unlocking information and the unlocking authorization information comprises:
acquiring an unlocking voice instruction acquired by a microphone of the intelligent lock and image data acquired by a camera of the intelligent lock;
carrying out voice recognition and voiceprint recognition on the unlocking voice command, and judging whether the unlocking voice command is matched with a preset unlocking command and preset voiceprint data;
if not, the unlocking operation is not executed;
if yes, carrying out face recognition on the image data, and judging whether a face recognition result is matched;
if not, the unlocking operation is not executed;
if the authentication request is matched with the unlocking authorization request, sending an unlocking authorization request to the authentication user terminal through a wireless network, and receiving unlocking authorization information corresponding to the unlocking authorization request;
judging whether the unlocking authorization information is an unlocking instruction or not;
if the unlocking instruction is the unlocking instruction, the unlocking operation is executed;
and if the unlocking instruction is not the unlocking instruction, the unlocking operation is not executed.
6. The unlocking authentication method of the intelligent lock according to claim 5, wherein the sending of the unlocking authorization request to the authentication user terminal through the wireless network comprises:
and sending the unlocking authorization request and the current image data collected by the camera of the intelligent lock to the authentication user terminal through a wireless network.
7. The unlocking authentication method of the intelligent lock according to any one of claims 1 to 6, wherein the determining the current working mode comprises:
judging whether a short-time authorization instruction of the secondary safety working mode sent by the authentication user terminal is received within a first preset time period;
if so, determining that the current working mode is the secondary safety working mode;
if not, determining that the current working mode is the primary safe working mode.
8. The unlocking authentication method of the intelligent lock according to any one of claims 1 to 6, wherein the determining the current working mode comprises:
judging whether the unlocking operation is executed within a second preset time period before;
if so, determining that the current working mode is the secondary safety working mode;
if not, determining that the current working mode is the primary safe working mode.
9. The utility model provides an authentication device that unblanks of intelligence tool to lock which characterized in that includes:
the determining module is used for determining the current working mode after acquiring the unlocking request; wherein the operating modes include: a primary safe working mode and a secondary safe working mode;
the first authentication module is used for acquiring unlocking information and unlocking authorization information of an authentication user terminal if the current working mode is the primary safe working mode, and carrying out unlocking authentication according to the unlocking information and the unlocking authorization information; the unlocking information is data for unlocking, which are acquired by unlocking acquisition equipment of the intelligent lock;
and the second authentication module is used for acquiring unlocking information and carrying out unlocking authentication according to the unlocking information if the current working mode is the secondary safety working mode.
10. An intelligent lockset, comprising: unlocking the acquisition device, the memory and the processor; the unlocking acquisition equipment is used for acquiring unlocking information; the memory is used for storing a computer program, and the processor is used for realizing the steps of the unlocking authentication method of the intelligent lock according to any one of claims 1 to 8 when the computer program is executed.
CN202010449869.XA 2020-05-25 2020-05-25 Intelligent lockset and unlocking authentication method and device thereof Pending CN111612950A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202010449869.XA CN111612950A (en) 2020-05-25 2020-05-25 Intelligent lockset and unlocking authentication method and device thereof
PCT/CN2020/132203 WO2021238121A1 (en) 2020-05-25 2020-11-27 Intelligent lock and unlocking authentication method and apparatus therefor

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010449869.XA CN111612950A (en) 2020-05-25 2020-05-25 Intelligent lockset and unlocking authentication method and device thereof

Publications (1)

Publication Number Publication Date
CN111612950A true CN111612950A (en) 2020-09-01

Family

ID=72204307

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010449869.XA Pending CN111612950A (en) 2020-05-25 2020-05-25 Intelligent lockset and unlocking authentication method and device thereof

Country Status (2)

Country Link
CN (1) CN111612950A (en)
WO (1) WO2021238121A1 (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112164174A (en) * 2020-09-17 2021-01-01 杭州海康威视系统技术有限公司 Calculation method, traffic control method, device, electronic equipment and storage medium
CN112598827A (en) * 2020-12-25 2021-04-02 北京智芯微电子科技有限公司 Intelligent lock authentication method, security chip, intelligent lock and management system thereof
CN112734999A (en) * 2021-01-21 2021-04-30 珠海格力电器股份有限公司 Data processing method, device and system, electronic equipment and storage medium
WO2021238121A1 (en) * 2020-05-25 2021-12-02 歌尔股份有限公司 Intelligent lock and unlocking authentication method and apparatus therefor
CN114694282A (en) * 2022-03-11 2022-07-01 深圳市凯迪仕智能科技有限公司 Voice interaction method based on intelligent lock and related device
WO2022141225A1 (en) * 2020-12-30 2022-07-07 SZ DJI Technology Co., Ltd. Methods, apparatus, and systems for operating device based on speech command
CN114791999A (en) * 2022-04-25 2022-07-26 云丁网络技术(北京)有限公司 Information processing method and system of intelligent terminal
CN116665352A (en) * 2023-05-30 2023-08-29 江苏日颖慧眼智能设备有限公司 Access control method and system

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115314272B (en) * 2022-07-29 2024-07-09 金邦达有限公司 Remote authorization method for intelligent door lock
CN115761952A (en) * 2022-11-10 2023-03-07 深圳市晨北科技有限公司 Unlocking frequency reminding method and device, computer equipment and medium

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102568063A (en) * 2011-12-14 2012-07-11 深圳市中联创新自控系统有限公司 Door opening method for door control system, and door control system
CN103985176A (en) * 2014-05-23 2014-08-13 四川华立德科技有限公司 Wireless visible electronic door lock
CN107170083A (en) * 2017-05-11 2017-09-15 广东汇泰龙科技有限公司 Method and system, terminal that an a kind of long-range key is unlocked
CN108550209A (en) * 2018-04-12 2018-09-18 广东汇泰龙科技有限公司 A kind of automatic door opening method and system based on infrared inductor and face lock
US10210683B1 (en) * 2017-09-12 2019-02-19 International Business Machines Corporation Physical condition based intelligent house security system
EP3447216A1 (en) * 2016-04-21 2019-02-27 Kabushiki Kaisha Tokai Rika Denki Seisakusho Key security device
CN109801408A (en) * 2018-12-06 2019-05-24 安徽凯川电力保护设备有限公司 A kind of access control management method for computer room

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4347138B2 (en) * 2004-05-28 2009-10-21 三菱電機株式会社 Access control device
CN105427413A (en) * 2015-11-02 2016-03-23 北京奇虎科技有限公司 Intelligent unlocking method and intelligent lock
CN108510627A (en) * 2018-03-27 2018-09-07 深圳市零度智控科技有限公司 Door lock method for unlocking, door lock and storage medium
US10711488B2 (en) * 2018-06-05 2020-07-14 Isac Tabib Electric door lock controller and monitoring system and method of use
CN110428530A (en) * 2019-08-12 2019-11-08 珠海格力电器股份有限公司 Control method and system of intelligent door lock and intelligent door lock
CN111612950A (en) * 2020-05-25 2020-09-01 歌尔科技有限公司 Intelligent lockset and unlocking authentication method and device thereof

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102568063A (en) * 2011-12-14 2012-07-11 深圳市中联创新自控系统有限公司 Door opening method for door control system, and door control system
CN103985176A (en) * 2014-05-23 2014-08-13 四川华立德科技有限公司 Wireless visible electronic door lock
EP3447216A1 (en) * 2016-04-21 2019-02-27 Kabushiki Kaisha Tokai Rika Denki Seisakusho Key security device
CN107170083A (en) * 2017-05-11 2017-09-15 广东汇泰龙科技有限公司 Method and system, terminal that an a kind of long-range key is unlocked
US10210683B1 (en) * 2017-09-12 2019-02-19 International Business Machines Corporation Physical condition based intelligent house security system
CN108550209A (en) * 2018-04-12 2018-09-18 广东汇泰龙科技有限公司 A kind of automatic door opening method and system based on infrared inductor and face lock
CN109801408A (en) * 2018-12-06 2019-05-24 安徽凯川电力保护设备有限公司 A kind of access control management method for computer room

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2021238121A1 (en) * 2020-05-25 2021-12-02 歌尔股份有限公司 Intelligent lock and unlocking authentication method and apparatus therefor
CN112164174A (en) * 2020-09-17 2021-01-01 杭州海康威视系统技术有限公司 Calculation method, traffic control method, device, electronic equipment and storage medium
CN112598827A (en) * 2020-12-25 2021-04-02 北京智芯微电子科技有限公司 Intelligent lock authentication method, security chip, intelligent lock and management system thereof
WO2022141225A1 (en) * 2020-12-30 2022-07-07 SZ DJI Technology Co., Ltd. Methods, apparatus, and systems for operating device based on speech command
CN112734999A (en) * 2021-01-21 2021-04-30 珠海格力电器股份有限公司 Data processing method, device and system, electronic equipment and storage medium
CN114694282A (en) * 2022-03-11 2022-07-01 深圳市凯迪仕智能科技有限公司 Voice interaction method based on intelligent lock and related device
CN114791999A (en) * 2022-04-25 2022-07-26 云丁网络技术(北京)有限公司 Information processing method and system of intelligent terminal
CN116665352A (en) * 2023-05-30 2023-08-29 江苏日颖慧眼智能设备有限公司 Access control method and system
CN116665352B (en) * 2023-05-30 2024-01-30 江苏日颖慧眼智能设备有限公司 Access control method and system

Also Published As

Publication number Publication date
WO2021238121A1 (en) 2021-12-02

Similar Documents

Publication Publication Date Title
CN111612950A (en) Intelligent lockset and unlocking authentication method and device thereof
CN104925022B (en) A kind of method, terminal, equipment and the onboard control device of vehicle remote control
CN204926231U (en) Entrance guard and access control system
CN104077516A (en) Biometric authentication method and terminal
CN107231232B (en) Identity verification method and device
CN104778390A (en) Identity authentication system and method thereof
JP2003317100A (en) Information terminal device, authentication system, and registering and authenticating method
KR101931867B1 (en) Entrance managing system using of a mobile device
CN105844737A (en) Camera based electronic lock system and use method
CN105574967A (en) Intelligent access control system and operation method thereof
CN112907788A (en) Door lock control method and device, door lock and storage medium
WO2021017567A1 (en) Door lock control system and method, display control terminal and door lock control device
JP4957016B2 (en) Information processing apparatus, key lock releasing method, and program
JP2006260461A (en) Access control system and information processing system using the same
KR102108346B1 (en) Method and apparatus for unlocking door-lock using time sliced password, and system therefor
CN111966991A (en) Equipment unlocking method, device, equipment and storage medium
CN111717740B (en) Elevator intelligent management method, system, intelligent terminal and storage medium
CN110381024B (en) User authentication method and device
CN102044099B (en) Universal identity representation and operation control system
CN215376384U (en) Door lock control terminal, door lock assembly and door lock control system
CN108876983A (en) A kind of unlocking method of safety box with function of intelligent lock
CN109493460A (en) Two dimensional code intelligent unlocking system
CN110147667A (en) Intelligent terminal user dynamic password display input method
CN210155755U (en) Mobile terminal for block chain access control system
CN113645045B (en) Security control method, device and equipment in TEE and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20200901