CN112349009A - User identity identification method, device, equipment and computer readable storage medium - Google Patents
User identity identification method, device, equipment and computer readable storage medium Download PDFInfo
- Publication number
- CN112349009A CN112349009A CN202011142761.2A CN202011142761A CN112349009A CN 112349009 A CN112349009 A CN 112349009A CN 202011142761 A CN202011142761 A CN 202011142761A CN 112349009 A CN112349009 A CN 112349009A
- Authority
- CN
- China
- Prior art keywords
- user
- identity
- identity information
- intelligent door
- matching
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 49
- 230000006399 behavior Effects 0.000 claims description 52
- 238000012216 screening Methods 0.000 claims description 6
- 238000013475 authorization Methods 0.000 claims description 3
- 230000001960 triggered effect Effects 0.000 claims description 3
- 238000011022 operating instruction Methods 0.000 claims description 2
- 230000001133 acceleration Effects 0.000 description 14
- 238000004891 communication Methods 0.000 description 7
- 230000008569 process Effects 0.000 description 6
- 230000006870 function Effects 0.000 description 5
- 230000009471 action Effects 0.000 description 3
- 230000006855 networking Effects 0.000 description 3
- 238000012935 Averaging Methods 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 2
- 230000005484 gravity Effects 0.000 description 2
- 238000007670 refining Methods 0.000 description 2
- 238000012795 verification Methods 0.000 description 2
- 230000002159 abnormal effect Effects 0.000 description 1
- 238000013459 approach Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000010079 rubber tapping Methods 0.000 description 1
- XLYOFNOQVPJJNP-UHFFFAOYSA-N water Substances O XLYOFNOQVPJJNP-UHFFFAOYSA-N 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/22—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
- G07C9/25—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition
- G07C9/257—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition electronically
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/27—Individual registration on entry or exit involving the use of a pass with central registration
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Human Computer Interaction (AREA)
- Lock And Its Accessories (AREA)
Abstract
The invention discloses a user identity identification method, which comprises the following steps: when a user identity recognition request is received, acquiring first identity information of a current user touching the intelligent door lock and second identity information corresponding to a target terminal connected with the intelligent door lock; and obtaining an identity recognition result according to the first identity information and the second identity information, and determining the user identity of the current user. The invention also discloses a user identity recognition device, equipment and a computer readable storage medium. According to the intelligent door handle lock, the data generated when the user opens the intelligent door handle lock and the data sent when the mobile terminal carried by the user is connected with the intelligent door handle lock are obtained, so that the user is identified, an additional structure is not required to be added to the door lock, the miniaturization of the intelligent door handle lock is realized, and the popularization of the intelligent door handle lock is facilitated.
Description
Technical Field
The invention relates to the field of smart home, in particular to a user identity identification method, device, equipment and computer readable storage medium.
Background
With the rapid development of scientific technology, smart homes using the internet of things as technical support are also increasingly seen in the lives of people, for example, smart doorbells which can be bound with mobile phones, smart door locks with fingerprint identification and the like.
However, the existing intelligent door lock capable of identifying people usually adopts a password unlocking or fingerprint unlocking mode to identify people opening the door, and such a method for identifying people requires that the door lock has a structure for inputting a password and a structure for identifying a fingerprint, which is not beneficial to miniaturization of the intelligent door lock, increases the hardware cost of the intelligent door lock, and is not beneficial to popularization of the intelligent door lock.
Disclosure of Invention
The invention mainly aims to provide a user identity identification method, a user identity identification device, user identity identification equipment and a computer readable storage medium, and aims to solve the technical problem that in the prior art, identification of door opening personnel of an intelligent door lock is limited by hardware cost and cannot be popularized in a wider range.
In addition, in order to achieve the above object, the present invention further provides a user identification method, including the steps of:
when a user identity recognition request is received, acquiring first identity information of a current user touching the intelligent door lock and second identity information corresponding to a target terminal connected with the intelligent door lock;
and obtaining an identity recognition result according to the first identity information and the second identity information, and determining the user identity of the current user.
Optionally, the step of acquiring, when a user identification request is received, first identity information of a current user touching the intelligent door lock and second identity information corresponding to a target terminal connected to the intelligent door lock includes:
when a user identity recognition request is received, acquiring target behavior data generated by a current user touching the intelligent door lock, and determining first identity information of the current user according to the target behavior data;
and acquiring target historical data generated by touching a target terminal connected with the intelligent door lock, and determining second identity information according to the target historical data.
Optionally, the step of determining the first identity information of the current user according to the target behavior data includes:
acquiring a personnel behavior database stored in the intelligent door lock, and matching the target behavior data with personnel behavior data in the personnel behavior database to obtain a matching degree corresponding to each personnel behavior data;
screening out a first matching degree with the largest value in the matching degrees, if the first matching degree is larger than or equal to a first preset threshold value, determining a first person corresponding to the first matching degree, and taking the first person as first identity information of the current user.
Optionally, the step of determining second identity information according to the target history data includes:
acquiring a historical database stored in the target terminal, and matching the target historical data with the personnel historical data in the historical database to obtain a matching value corresponding to each personnel historical data;
screening out a first matching value with the largest value in the matching values, if the first matching value is larger than or equal to a second preset threshold value, determining a second person corresponding to the first matching value, and using the second person as the second identity information.
Optionally, the step of obtaining an identity recognition result according to the first identity information and the second identity information, and determining the user identity of the current user includes:
if the first identity recognition result is different from the second identity recognition result, comparing the first matching degree with the first matching value;
if the first matching degree is larger than the first matching value, taking the first identity recognition result as the user identity of the current user;
and if the first matching degree is smaller than or equal to the first matching value, taking the second identity recognition result as the user identity of the current user.
Optionally, after the step of obtaining an identity recognition result according to the first identity information and the second identity information and determining the user identity of the current user, the method includes:
and when the intelligent door handle lock is unlocked, adjusting the operating parameters of the intelligent household equipment related to the intelligent door handle lock according to the user identity of the current user.
Optionally, after the steps of acquiring first identity information of a current user touching the intelligent door lock and connecting second identity information corresponding to a target terminal of the intelligent door lock when a user identity recognition request is received, the method includes:
if the first matching degree is smaller than a first preset threshold value and the first matching value is smaller than a second preset threshold value, determining that the user identity of the current user is an authorized visitor;
when the intelligent door is unlocked and an authorization instruction is received, the operating parameters of the intelligent household equipment associated with the intelligent door handle lock are adjusted according to the operating instruction triggered by the authorized visitor.
In addition, to achieve the above object, the present invention also provides a user identification apparatus, including:
the identity information acquisition module is used for acquiring first identity information of a current user touching the intelligent door lock and second identity information corresponding to a target terminal connected with the intelligent door lock when a user identity identification request is received;
and the user identity determining module is used for obtaining an identity recognition result according to the first identity information and the second identity information and determining the user identity of the current user.
In addition, to achieve the above object, the present invention also provides a user identification apparatus, including: the system comprises a memory, a processor and a user identification program stored on the memory and capable of running on the processor, wherein the user identification program realizes the steps of the user identification method when being executed by the processor.
In addition, to achieve the above object, the present invention further provides a computer readable storage medium, having a user identification program stored thereon, where the user identification program, when executed by a processor, implements the steps of the user identification method as described above.
The embodiment of the invention provides a user identity identification method, a user identity identification device, user identity identification equipment and a computer readable storage medium. In the embodiment of the invention, when the user identification program receives the user identification request, the first identity information of the current user touching the intelligent door lock is acquired, and second identity information corresponding to a target terminal connected with the intelligent door lock, and determining the user identity of the current user according to the first identity information and the second identity information, it can be understood that when the user touches the intelligent door lock, the intelligent door lock can acquire the behavior data of the user, the target terminal carried by the user can be connected with the intelligent door lock and send the history data to the intelligent door lock, and the user identification program can determine the identity of the user according to the behavior data and the historical data, under the condition that a structure for inputting a password and a structure for identifying a fingerprint do not need to be added to the intelligent door lock, the target user is identified, and the intelligent door lock is miniaturized and popularized.
Drawings
Fig. 1 is a schematic hardware structure diagram of an embodiment of a user identification device according to an embodiment of the present invention;
fig. 2 is a flowchart illustrating a user identification method according to a first embodiment of the present invention.
The implementation, functional features and advantages of the objects of the present invention will be further explained with reference to the accompanying drawings.
Detailed Description
It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
In the following description, suffixes such as "module", "component", or "unit" used to denote elements are used only for facilitating the explanation of the present invention, and have no specific meaning in itself. Thus, "module", "component" or "unit" may be used mixedly.
The user identification terminal (called terminal, equipment or terminal equipment) in the embodiment of the invention can be a PC (personal computer), and can also be a mobile terminal equipment with a display function, such as a smart phone, a tablet computer, a portable computer and the like.
As shown in fig. 1, the terminal may include: a processor 1001, such as a CPU, a network interface 1004, a user interface 1003, a memory 1005, a communication bus 1002. Wherein a communication bus 1002 is used to enable connective communication between these components. The user interface 1003 may include a Display screen (Display), an input unit such as a Keyboard (Keyboard), and the optional user interface 1003 may also include a standard wired interface, a wireless interface. The network interface 1004 may optionally include a standard wired interface, a wireless interface (e.g., WI-FI interface). The memory 1005 may be a high-speed RAM memory or a non-volatile memory (e.g., a magnetic disk memory). The memory 1005 may alternatively be a storage device separate from the processor 1001.
Optionally, the terminal may further include a camera, a Radio Frequency (RF) circuit, a sensor, an audio circuit, a WiFi module, and the like. Such as light sensors, motion sensors, and other sensors. Specifically, the light sensor may include an ambient light sensor that may adjust the brightness of the display screen according to the brightness of ambient light, and a proximity sensor that may turn off the display screen and/or the backlight when the mobile terminal is moved to the ear. As one of the motion sensors, the gravity acceleration sensor can detect the magnitude of acceleration in each direction (generally, three axes), detect the magnitude and direction of gravity when the mobile terminal is stationary, and can be used for applications (such as horizontal and vertical screen switching, related games, magnetometer attitude calibration), vibration recognition related functions (such as pedometer and tapping) and the like for recognizing the attitude of the mobile terminal; of course, the mobile terminal may also be configured with other sensors such as a gyroscope, a barometer, a hygrometer, a thermometer, and an infrared sensor, which are not described herein again.
Those skilled in the art will appreciate that the terminal structure shown in fig. 1 is not intended to be limiting and may include more or fewer components than those shown, or some components may be combined, or a different arrangement of components.
As shown in fig. 1, a memory 1005, which is a kind of computer-readable storage medium, may include therein an operating system, a network communication module, a user interface module, and a user identification program.
In the terminal shown in fig. 1, the network interface 1004 is mainly used for connecting to a backend server and performing data communication with the backend server; the user interface 1003 is mainly used for connecting a client (user side) and performing data communication with the client; and the processor 1001 may be configured to invoke a user identification program stored in the memory 1005, which when executed by the processor implements the operations of the user identification method provided by the embodiments described below.
Based on the hardware structure of the equipment, the embodiment of the user identity identification method is provided.
Referring to fig. 2, in a first embodiment of the user identification method of the present invention, the user identification method includes:
step S10, when a user identification request is received, acquiring first identity information of a current user touching the intelligent door lock and second identity information corresponding to a target terminal connected with the intelligent door lock.
The user identification method in this embodiment is applied to an intelligent doorknob lock, electronic components such as a temperature sensor, a pressure sensor, an acceleration sensor and the like are integrated in the intelligent doorknob lock, the user identification device may further include a gateway device, such as a router, for receiving a networking request of a trusted device (which has been successfully connected to the gateway device through a secret key before), and the networking device is generally a mobile phone that people can carry around, so as to determine that there may be a family member about to open the intelligent doorknob lock.
In this embodiment, the user identification request is a request for identifying the user identity generated when a user (i.e. the current user in this embodiment) rotates the smart door handle lock and a target terminal carried by the user establishes a connection with the smart door handle lock, where the connection established between the target terminal and the smart door handle lock may be a bluetooth connection, if the smart door handle lock only receives a device connection request, there may be a person (a resident not corresponding to the smart door handle lock) passing by the smart door handle lock, and therefore, it is also necessary to determine whether there is a family member who wants to open the smart door handle lock by detecting whether there is a phenomenon of rotating the smart door handle lock, and the smart door handle lock may obtain the user historical usage data of the mobile phone end by establishing a wireless connection with the mobile phone, where the user historical usage data includes user historical palm temperature data and user historical pressure data (pressure generated by holding the mobile phone), the historical data represent the personal use habits of the mobile phone user, which is also the reason for acquiring the historical use data of the user from the mobile phone end in the embodiment, and when the user rotates the smart door handle lock, the smart door handle lock acquires the behavior data of the user through various sensors integrated inside, wherein the behavior data of the user comprises a palm temperature value, a pressure value generated when the user rotates the smart door handle lock, and an acceleration value generated when the target user rotates the smart door handle lock.
It is known that when the mobile phone sends a wireless connection request to the smart door handle lock, it can be determined whether the mobile phone sending the wireless connection request is a device held by a family member by means of key verification, or alternatively, it can be determined whether the mobile phone is a device held by a family member by setting a gateway device such as a router and establishing a communication connection between the smart door handle lock and the router, so that when the router receives a networking request, it can be verified whether the mobile phone is a device held by a family member by means of a key.
It is known that the historical data is divided into two types, one is a pressure value, the other is a temperature value, it is known that the mobile phone held by a family member may be used by other people, but most of the time, the mobile phone is still used by the holder, therefore, the historical data in the mobile phone is considered to be generated by the mobile phone holder in the process of using the mobile phone, it can be understood that even the holder of the mobile phone generates historical data without reference value in the process of using the mobile phone, for example, in one scene, when the holder of the mobile phone holds the mobile phone with force to prevent the mobile phone from falling off, the pressure value generated by holding the mobile phone is obviously higher than the pressure generated by holding the mobile phone under normal conditions, for example, in another scene, the holder of the mobile phone holds a common cup of water and then holds the mobile phone again, the temperature of the palm of the holder detected by the mobile phone is higher.
Step S20, obtaining an identity recognition result according to the first identity information and the second identity information, and determining the user identity of the current user.
Therefore, a specific application scenario is provided in this embodiment, when a target user carries a mobile phone to rotate an intelligent door handle lock, the intelligent door handle lock first receives a bluetooth connection request of the mobile phone, and then after the bluetooth verification is passed, historical data in the mobile phone is acquired through bluetooth connection, and the target user is determined to be a first family member by comparing the historical data of each family member using the mobile phone in a preset personnel database; when a target user rotates an intelligent door handle lock, the intelligent door lock acquires behavior data of the target user, the intelligent door handle lock compares the acquired behavior data of the target user with various behavior data pre-stored in a database to determine that the target user is a family member, a user identity identification program judges that the target user is the family member, and the user identity identification program determines that the target user is the family member if the first identity identification result is different from the second identity identification result, the user identity identification program further determines the final user identity identification result according to the weights of two identification methods (reflecting the identification accuracy of the two identification methods), so that the phenomenon of false identification possibly exists in the identification method by a mobile phone, for example, a plurality of people enter the door simultaneously, the intelligent door handle lock receives Bluetooth connection requests of a plurality of mobile phones, and the intelligent door handle lock identifies according to the mobile phone which sends Bluetooth connection first, the holder of the first mobile phone sending the Bluetooth connection is not necessarily the person rotating the smart door handle lock, so compared with the identification through user behavior data, the accuracy is low through the identification of historical data, and when the two identification results are different, the user identification program can use the second identification result as the final result of the family member identification of the target user.
Specifically, the step S10 is a step of refining, including:
step a1, when a user identification request is received, acquiring target behavior data generated by a current user touching the intelligent door lock, and determining first identity information of the current user according to the target behavior data.
Step a2, acquiring target history data generated by touching a target terminal connected with the intelligent door lock, and determining second identity information according to the target history data.
It should be noted that the target behavior data in this embodiment refers to the pressure generated when the target user rotates the smart door handle lock and holds the door handle lock, the acceleration generated when the target user rotates the door handle, the palm temperature detected when the target user holds the door handle, and so on, and it can be understood that the smart door handle lock stores the user behavior data of all family members acquired in advance in the preset user behavior database, or each family member can also adjust its corresponding user behavior data in the program corresponding to the smart door handle lock, and it can be understood that there is no way to acquire the behavior data of all family members in advance when the smart door handle lock is just installed and used, in this case, the family members can manually input their behavior data through the program corresponding to the smart door handle lock, and of course, when the family members use the smart door handle lock for the first time, the grip strength and the acceleration which can be generated when the door handle lock is rotated by a family member may not be clear, under the condition, the family member can try to rotate the intelligent door handle lock according to the use habit of the family member, and the behavior data such as the grip strength, the acceleration and the like generated when the intelligent door handle lock is rotated by the family member can be obtained through a program corresponding to the intelligent door handle lock, so that the grip strength and the acceleration which can be generated when the door handle lock is rotated by the family member can be determined, reference is provided for manually input behavior data, after the user uses the intelligent door handle lock for a certain time or the use times, the intelligent door handle lock can determine which family member the user opens the intelligent door handle lock is through the user behavior data which is obtained in the past, specifically, each family member determines which the user is the family member through the behavior data which is preset and stored in the database, and then when the target user rotates the intelligent door handle lock again, the intelligent door handle lock compares the obtained behavior data of the target user with the behavior data which, thereby determining the family membership of the target user (i.e., the first identity information in this embodiment).
It can be understood that, after the user identification program obtains the historical data in the mobile phone, the historical data is also removed to remove abnormal data generated in the scene, when the historical data is partially removed, the user identification program queries a preset family member database, the database contains the pressure and palm temperature values of each family member holding the mobile phone, the average value or regression function is carried out on a plurality of pressure values and temperature values in the historical data, the obtained regression function is a fixed value, the pressure and palm temperature values of each family member holding the mobile phone in the preset personnel database are compared with the average value or regression function obtained through the historical data respectively, and the family member of the target user is determined according to the comparison result, for example, the average pressure of holding the mobile phone in the history data is 20N (mechanical unit, cow), the average temperature of the palm is 36.8 ℃, and the family member database most corresponding to the history data is the family member number one, so that the family member number one is the user identification result of the target user.
Specifically, the step a1 is detailed as follows:
and b1, acquiring a personnel behavior database stored in the intelligent door lock, and matching the target behavior data with the personnel behavior data in the personnel behavior database to obtain the matching degree corresponding to each personnel behavior data.
Step b2, screening out a first matching degree with the largest value in the matching degrees, if the first matching degree is greater than or equal to a first preset threshold value, determining a first person corresponding to the first matching degree, and taking the first person as the first identity information of the current user.
It can be known that the personnel behavior database contains data generated by each family member using the smart door handle lock, wherein the target behavior data includes pressure generated when the user holds the smart door handle lock, acceleration value generated when the smart door handle lock is rotated and palm temperature when the smart door handle lock is held, each family member has a pressure value, an acceleration value and a palm temperature value corresponding thereto, when the target user rotates the smart door handle lock, the smart door handle lock acquires behavior data of the user through a built-in sensor, the behavior data includes pressure, acceleration and palm temperature generated when the target user holds the smart door handle lock for multiple times, further, an average pressure value, an average acceleration and an average palm temperature value can be obtained by averaging the data, the average pressure value is compared with a target pressure value corresponding to each family member, the average acceleration value is compared with a target acceleration value corresponding to each family member, and the average palm temperature value is compared with the target temperature value to obtain a matching degree.
Specifically, the step a2 is detailed as follows:
and c1, acquiring a historical database stored in the target terminal, and matching the target historical data with the personnel historical data in the historical database to obtain a matching value corresponding to each personnel historical data.
And c2, screening out a first matching value with the largest value in the matching values, if the first matching value is greater than or equal to a second preset threshold value, determining a second person corresponding to the first matching value, and taking the second person as the second identity information.
It can be known that the preset historical database contains usage data of the mobile phone, where the usage data of the mobile phone includes pressure generated when a user holds the mobile phone and palm temperature when the user holds the mobile phone, and each family member has a corresponding pressure value and palm temperature value, when a target user carries the mobile phone and approaches the smart door handle lock, the smart door handle lock obtains the historical data in the mobile phone through wireless connection, and the historical data includes pressure generated when the target user holds the mobile phone for multiple times and palm temperature, and further, by averaging the data, an average pressure value and an average palm temperature value can be obtained, the average pressure value is compared with a target pressure value corresponding to each family member, and the average palm temperature value is compared with a target temperature value to obtain a matching value, where the matching value in this embodiment refers to that the pressure value and the temperature value corresponding to each family member in the preset personnel database are compared with the historical pressure value and the temperature value in the historical data The similarity between the value and the historical palm temperature value is not much, so the matching degree in this embodiment is mainly related to the similarity between the target pressure value and the historical pressure value, as shown in table 1, the pressure values corresponding to the four family members are respectively compared with the historical pressure value, the palm temperature value is respectively compared with the historical palm temperature value, and the calculation principle of the matching value is that the smaller the difference is, the larger the matching degree is, for example, the historical pressure value is 15, and the matching value of the second family member is the highest.
Family member number one | Family member II | Family member No. three | Family member of four | |
Target pressure value | 20 | 18 | 25 | 10 |
Target palm temperature | 36.5 | 36.8 | 36.7 | 36.6 |
TABLE 1
Specifically, the step S20 is a step of refining, including:
step d1, if the first identification result is different from the second identification result, comparing the first matching degree with the first matching value.
And d2, if the first matching degree is greater than the first matching value, taking the first identity recognition result as the user identity of the current user.
And d3, if the first matching degree is less than or equal to the first matching value, taking the second identity recognition result as the user identity of the current user.
It can be known that, comparing the target pressure value and the target palm temperature value of the target person in the preset person database with the historical pressure value and the historical palm temperature value in the historical data to obtain a matching value, and comparing the matching degree obtained by comparing the user behavior data with the historical behavior data to obtain a matching degree, wherein the matching degree and the matching value are the same and are both probability values, so that the matching degree and the matching value have comparability, the matching value in this embodiment refers to the probability that the mobile phone belongs to a certain family member, and the matching degree refers to the maximum probability that the user behavior data belongs to a certain classification result, when the first identity recognition result is different from the second identity recognition result, the user identity recognition program compares the matching value with the matching degree, and if the comparison result is that the matching value is greater than the matching degree, the user identity recognition program takes the first identity recognition result as the family member identity of the target user, and if the comparison result is that the matching value is less than or equal to the matching degree, the user identity identification program takes the second identity identification result as the family member identity of the target user.
In this embodiment, when the user identification program receives the user identification request, the first identity information of the current user touching the smart door lock is obtained, and second identity information corresponding to a target terminal connected with the intelligent door lock, and determining the user identity of the current user according to the first identity information and the second identity information, it can be understood that when the user touches the intelligent door lock, the intelligent door lock can acquire the behavior data of the user, the target terminal carried by the user can be connected with the intelligent door lock and send the history data to the intelligent door lock, and the user identification program can determine the identity of the user according to the behavior data and the historical data, under the condition that a structure for inputting a password and a structure for identifying a fingerprint do not need to be added to the intelligent door lock, the target user is identified, and the intelligent door lock is miniaturized and popularized.
Further, on the basis of the above embodiment of the present invention, a second embodiment of the user identification method of the present invention is provided.
This embodiment is a step after step S20 in the first embodiment, and the present embodiment is different from the above-described embodiments of the present invention in that:
and e1, when the intelligent door handle lock is unlocked, adjusting the operation parameters of the intelligent household equipment related to the intelligent door handle lock according to the user identity of the current user.
Therefore, in this embodiment, when the smart door handle lock is opened, the user identification program may further adjust the operating parameters of the smart home devices corresponding to the smart door handle lock according to the identity of the identified family member, for example, when the family member opens the smart door handle lock in a room belonging to the user, the user identification program may adjust the operating parameters of the smart home devices such as the air conditioner temperature in the room of the family member, the opening and closing of the curtain, and the opening of the television, where the smart home devices in this embodiment include all smart home appliances that may be connected to the internet of things.
Specifically, steps subsequent to step S10 include:
step f1, if the first matching degree is smaller than a first preset threshold value and the first matching value is smaller than a second preset threshold value, determining that the user identity of the current user is an authorized visitor.
And f2, when the intelligent door handle lock is unlocked and an authorization instruction is received, adjusting the operation parameters of the intelligent household equipment related to the intelligent door handle lock according to the operation instruction triggered by the authorized visitor.
Therefore, when the first matching degree is smaller than the first preset threshold value and the first matching value is smaller than the second preset threshold value, the fact that the user who opens the smart door handle lock is not a family member but a visitor is indicated, in this case, the visitor is authorized to open the smart door handle lock, after the visitor opens the smart door handle lock, the smart home devices in the room cannot automatically adjust the operation parameters, and after the visitor is authorized, the visitor can manually adjust the operation parameters of the smart home devices.
In the embodiment, accurate identification and humanized adjustment of family members are realized by confirming the adjustment of the running state of the intelligent household equipment after the target user.
In addition, the embodiment of the invention also provides a computer readable storage medium.
The computer readable storage medium stores a user identification program, and the user identification program, when executed by the processor, implements operations in the user identification method provided by the above embodiments.
The method executed by each program module can refer to each embodiment of the method of the present invention, and is not described herein again.
It is noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity/action/object from another entity/action/object without necessarily requiring or implying any actual such relationship or order between such entities/actions/objects; the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or system that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or system. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or system that comprises the element.
For the apparatus embodiment, since it is substantially similar to the method embodiment, it is described relatively simply, and reference may be made to some descriptions of the method embodiment for relevant points. The above-described apparatus embodiments are merely illustrative, in that elements described as separate components may or may not be physically separate. Some or all of the modules can be selected according to actual needs to achieve the purpose of the scheme of the invention. One of ordinary skill in the art can understand and implement it without inventive effort.
The above-mentioned serial numbers of the embodiments of the present invention are merely for description and do not represent the merits of the embodiments.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solution of the present invention may be substantially or partially embodied in the form of a software product, which is stored in a storage medium (e.g., ROM/RAM, magnetic disk, optical disk) as described above and includes instructions for enabling a terminal device (e.g., a mobile phone, a computer, a server, an air conditioner, or a network device) to execute the method for identifying a user identity according to the embodiments of the present invention.
The above description is only a preferred embodiment of the present invention, and not intended to limit the scope of the present invention, and all modifications of equivalent structures and equivalent processes, which are made by using the contents of the present specification and the accompanying drawings, or directly or indirectly applied to other related technical fields, are included in the scope of the present invention.
Claims (10)
1. A user identification method is characterized in that the user identification method is applied to an intelligent door lock, and comprises the following steps:
when a user identity recognition request is received, acquiring first identity information of a current user touching the intelligent door lock and second identity information corresponding to a target terminal connected with the intelligent door lock;
and obtaining an identity recognition result according to the first identity information and the second identity information, and determining the user identity of the current user.
2. The method for identifying the user identity as claimed in claim 1, wherein the step of acquiring first identity information of a current user touching the intelligent door lock and second identity information corresponding to a target terminal connected to the intelligent door lock when receiving the user identity identification request comprises:
when a user identity recognition request is received, acquiring target behavior data generated by a current user touching the intelligent door lock, and determining first identity information of the current user according to the target behavior data;
and acquiring target historical data generated by touching a target terminal connected with the intelligent door lock, and determining second identity information according to the target historical data.
3. The method as claimed in claim 2, wherein the step of determining the first identity information of the current user according to the target behavior data comprises:
acquiring a personnel behavior database stored in the intelligent door lock, and matching the target behavior data with personnel behavior data in the personnel behavior database to obtain a matching degree corresponding to each personnel behavior data;
screening out a first matching degree with the largest value in the matching degrees, if the first matching degree is larger than or equal to a first preset threshold value, determining a first person corresponding to the first matching degree, and taking the first person as first identity information of the current user.
4. The method of claim 2, wherein the step of determining second identity information based on the target history data comprises:
acquiring a historical database stored in the target terminal, and matching the target historical data with the personnel historical data in the historical database to obtain a matching value corresponding to each personnel historical data;
screening out a first matching value with the largest value in the matching values, if the first matching value is larger than or equal to a second preset threshold value, determining a second person corresponding to the first matching value, and using the second person as the second identity information.
5. The method according to any one of claims 1 to 4, wherein the step of obtaining an identification result according to the first identity information and the second identity information, and determining the user identity of the current user comprises:
if the first identity recognition result is different from the second identity recognition result, comparing the first matching degree with the first matching value;
if the first matching degree is larger than the first matching value, taking the first identity recognition result as the user identity of the current user;
and if the first matching degree is smaller than or equal to the first matching value, taking the second identity recognition result as the user identity of the current user.
6. The method as claimed in claim 1, wherein the step of obtaining the identification result according to the first identity information and the second identity information and determining the user identity of the current user comprises:
and when the intelligent door handle lock is unlocked, adjusting the operating parameters of the intelligent household equipment related to the intelligent door handle lock according to the user identity of the current user.
7. The method for identifying a user according to any one of claims 2 to 4, wherein after the step of obtaining first identity information of a current user touching the intelligent door lock and second identity information corresponding to a target terminal connected to the intelligent door lock when the user identification request is received, the method comprises:
if the first matching degree is smaller than a first preset threshold value and the first matching value is smaller than a second preset threshold value, determining that the user identity of the current user is an authorized visitor;
when the intelligent door is unlocked and an authorization instruction is received, the operating parameters of the intelligent household equipment associated with the intelligent door handle lock are adjusted according to the operating instruction triggered by the authorized visitor.
8. A user identification apparatus, comprising:
the identity information acquisition module is used for acquiring first identity information of a current user touching the intelligent door lock and second identity information corresponding to a target terminal connected with the intelligent door lock when a user identity identification request is received;
and the user identity determining module is used for obtaining an identity recognition result according to the first identity information and the second identity information and determining the user identity of the current user.
9. A user identification device, characterized in that the user identification device comprises: memory, a processor and a user identification program stored on the memory and executable on the processor, the user identification program when executed by the processor implementing the steps of the user identification method according to any of claims 1 to 7.
10. A computer-readable storage medium, having a user identification program stored thereon, which, when executed by a processor, implements the steps of the user identification method according to any one of claims 1 to 7.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011142761.2A CN112349009A (en) | 2020-10-22 | 2020-10-22 | User identity identification method, device, equipment and computer readable storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011142761.2A CN112349009A (en) | 2020-10-22 | 2020-10-22 | User identity identification method, device, equipment and computer readable storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN112349009A true CN112349009A (en) | 2021-02-09 |
Family
ID=74359873
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011142761.2A Pending CN112349009A (en) | 2020-10-22 | 2020-10-22 | User identity identification method, device, equipment and computer readable storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112349009A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113963472A (en) * | 2021-09-23 | 2022-01-21 | 宁波市杭州湾大桥发展有限公司 | Intelligent entrance guard method and system for cross-sea bridge, storage medium and intelligent terminal |
CN114821859A (en) * | 2022-03-15 | 2022-07-29 | 杭州遁甲科技有限公司 | Intelligent equipment control method and device |
CN116229619A (en) * | 2023-05-09 | 2023-06-06 | 合肥坤语智能科技有限公司 | Intelligent door lock based on intelligent door magnetic induction system |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106600762A (en) * | 2016-11-18 | 2017-04-26 | 乐视控股(北京)有限公司 | Method and system for controlling vehicle door |
CN107575137A (en) * | 2017-10-12 | 2018-01-12 | 山东建筑大学 | The intelligent anti-theft door for needing cell phone software checking with fingerprint and iris recognition |
CN109598823A (en) * | 2017-09-30 | 2019-04-09 | 宁波方太厨具有限公司 | Identity recognition device and personal identification method based on multisensor |
CN110415415A (en) * | 2019-08-02 | 2019-11-05 | 深圳大学 | A kind of auth method for access control system |
CN111540105A (en) * | 2020-04-09 | 2020-08-14 | 北京捷通华声科技股份有限公司 | Method, system, equipment and storage medium for controlling access control |
-
2020
- 2020-10-22 CN CN202011142761.2A patent/CN112349009A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106600762A (en) * | 2016-11-18 | 2017-04-26 | 乐视控股(北京)有限公司 | Method and system for controlling vehicle door |
CN109598823A (en) * | 2017-09-30 | 2019-04-09 | 宁波方太厨具有限公司 | Identity recognition device and personal identification method based on multisensor |
CN107575137A (en) * | 2017-10-12 | 2018-01-12 | 山东建筑大学 | The intelligent anti-theft door for needing cell phone software checking with fingerprint and iris recognition |
CN110415415A (en) * | 2019-08-02 | 2019-11-05 | 深圳大学 | A kind of auth method for access control system |
CN111540105A (en) * | 2020-04-09 | 2020-08-14 | 北京捷通华声科技股份有限公司 | Method, system, equipment and storage medium for controlling access control |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113963472A (en) * | 2021-09-23 | 2022-01-21 | 宁波市杭州湾大桥发展有限公司 | Intelligent entrance guard method and system for cross-sea bridge, storage medium and intelligent terminal |
CN113963472B (en) * | 2021-09-23 | 2023-12-26 | 宁波市杭州湾大桥发展有限公司 | Cross-sea bridge intelligent access control method, system, storage medium and intelligent terminal |
CN114821859A (en) * | 2022-03-15 | 2022-07-29 | 杭州遁甲科技有限公司 | Intelligent equipment control method and device |
CN114821859B (en) * | 2022-03-15 | 2024-01-12 | 杭州遁甲科技有限公司 | Intelligent equipment control method and device |
CN116229619A (en) * | 2023-05-09 | 2023-06-06 | 合肥坤语智能科技有限公司 | Intelligent door lock based on intelligent door magnetic induction system |
CN116229619B (en) * | 2023-05-09 | 2023-08-15 | 合肥坤语智能科技有限公司 | Intelligent door lock based on intelligent door magnetic induction system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10854028B2 (en) | Authentication for keyless building entry | |
US11210884B2 (en) | Electronic device operation using remote user biometrics | |
US9344436B1 (en) | Proximity-based and user-based access control using wearable devices | |
CN112349009A (en) | User identity identification method, device, equipment and computer readable storage medium | |
JP6053998B2 (en) | Authority management method, apparatus, system, and recording medium | |
US20210076212A1 (en) | Recognizing users with mobile application access patterns learned from dynamic data | |
US9183683B2 (en) | Method and system for access to secure resources | |
KR101814719B1 (en) | System and method for remote controlling digital door-lock using smartphone | |
CN107231607B (en) | Unlocking method and device of Bluetooth intelligent lock and computer readable storage medium | |
EP3580911A1 (en) | Method and apparatus for authenticating users in internet of things environment | |
US20190381971A1 (en) | Internet of vehicles system performing connection authentication through a public network and connection method | |
US20120117633A1 (en) | Enhanced Security For Pervasive Devices Using A Weighting System | |
US20150206366A1 (en) | Electronic Device Operation Using Remote User Biometrics | |
US9071440B2 (en) | Method and system of authenticating the identity of a user of a public computer terminal | |
US20190373318A1 (en) | Method and device for adjusting an intelligent system, and a computer readable storage medium | |
EP3896938B1 (en) | Systems and methods for access control using multi-factor validation | |
KR20180048133A (en) | Method and apparatus for controlling a door opening using a portable terminal | |
CN110546638A (en) | Improvements in biometric authentication | |
CN111783058A (en) | Biological feature recognition device and biological feature recognition method | |
WO2020162550A1 (en) | Electronic unlocking management system and program | |
CN112600743A (en) | Method, device and system for acquiring device control authority and storage medium | |
US20180053361A1 (en) | Restricting access to a building | |
US11695762B2 (en) | Heterogeneous device authentication system and heterogeneous device authentication method thereof | |
CN112204933B (en) | Electronic device for authenticating user and operating method thereof | |
TWI715391B (en) | Security system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |