CN113870468B - Control method and system of intelligent lock - Google Patents

Control method and system of intelligent lock Download PDF

Info

Publication number
CN113870468B
CN113870468B CN202111456245.1A CN202111456245A CN113870468B CN 113870468 B CN113870468 B CN 113870468B CN 202111456245 A CN202111456245 A CN 202111456245A CN 113870468 B CN113870468 B CN 113870468B
Authority
CN
China
Prior art keywords
unlocking
user
verification
modes
time period
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202111456245.1A
Other languages
Chinese (zh)
Other versions
CN113870468A (en
Inventor
彭炳辉
刘楠城
陈彬
于海波
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yunding Network Technology Beijing Co Ltd
Original Assignee
Yunding Network Technology Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yunding Network Technology Beijing Co Ltd filed Critical Yunding Network Technology Beijing Co Ltd
Priority to CN202111456245.1A priority Critical patent/CN113870468B/en
Priority to CN202211114763.XA priority patent/CN115482608B/en
Publication of CN113870468A publication Critical patent/CN113870468A/en
Application granted granted Critical
Publication of CN113870468B publication Critical patent/CN113870468B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Lock And Its Accessories (AREA)
  • Telephone Function (AREA)

Abstract

The embodiment of the application provides a control method and a control system of an intelligent lock. The method comprises the following steps: acquiring verification information of at least two unlocking modes of a user, wherein the verification information of the unlocking modes at least comprises the unlocking modes and verification records of the unlocking modes, and the verification records at least comprise times of verification errors of the unlocking modes and time information of the verification errors in a first time period; and judging whether the function of using at least one unlocking mode in the at least two unlocking modes by the user is limited in the second time period or not based on the verification information of the at least two unlocking modes. The embodiment can improve the safety and reliability of the intelligent lock.

Description

Control method and system of intelligent lock
Technical Field
The application relates to the technical field of intelligent locks, in particular to a control method and a control system of an intelligent lock.
Background
With the progress and development of science and technology, the intelligent lock has entered the daily life of the public. The intelligent lock is widely applied to the fields of access control systems, household equipment, security and the like due to the safety and the convenience of the intelligent lock. How to conveniently realize the state and safety control of the intelligent lock is concerned more and more by people.
Therefore, it is desirable to provide a method and a system for controlling an intelligent lock with high security.
Disclosure of Invention
One aspect of the present application provides a control method of an intelligent lock. The method comprises the following steps: acquiring verification information of at least two unlocking modes of a user, wherein the verification information of the unlocking modes at least comprises the unlocking modes and verification records of the unlocking modes, and the verification records at least comprise verification error times and verification error time information of the unlocking modes in a first time period; and judging whether the function of using at least one unlocking mode in the at least two unlocking modes by the user is limited in the second time period or not based on the verification information of the at least two unlocking modes.
In some embodiments, the above method further comprises: acquiring a scene mode of the intelligent lock; and judging whether the function of using at least one unlocking mode of the at least two unlocking modes by the user is limited in the second time period or not based on the scene mode and the verification information of the at least two unlocking modes.
In some embodiments, the above method further comprises: determining user information of a user; and judging whether the function of using at least one unlocking mode of the at least two unlocking modes by the user is limited in the second time period or not based on the user information and the verification information of the at least two unlocking modes.
In some embodiments, the determining whether the function of using at least one of the at least two unlocking manners by the user is limited within the second time period includes: and in response to the total number of verification errors of at least one unlocking mode in the at least two unlocking modes in the first time period being greater than a first threshold value, limiting the function of using the at least one unlocking mode by the user in the second time period.
In some embodiments, the above method further comprises: determining at least two second thresholds respectively corresponding to the at least two unlocking modes; and in response to the fact that the verification error number of one of the at least two unlocking modes in the first time period is larger than a corresponding second threshold value, limiting the function of the unlocking mode used by the user in the second time period.
In some embodiments, the above method further comprises: and when the limited time reaches a second time period, the limitation is removed and the verification error times and the verification error time information of the corresponding unlocking mode are cleared.
In some embodiments, the above method further comprises: based on the unlocking manner, the first time period and/or the second time period are/is adjusted.
In some embodiments, the above method further comprises: and adjusting the verification error time threshold, the first time period or the second time period of the unlocking mode based on the scene mode of the intelligent lock.
In some embodiments, the unlocking means comprises password unlocking, biometric unlocking, near field communication unlocking, or mechatronic key unlocking.
In some embodiments, when the unlocking manner is biometric unlocking, the method further includes: and dynamically adjusting the threshold value of the verification error times of the unlocking mode based on the verification result of the biometric unlocking mode.
Another aspect of the present application provides a control system of an intelligent lock, the system including: the system comprises an acquisition module, a processing module and a processing module, wherein the acquisition module is used for acquiring verification information of at least two unlocking modes of a user, the verification information of the unlocking modes at least comprises the unlocking modes and verification records of the unlocking modes, and the verification records at least comprise verification error times and verification error time information of the unlocking modes in a first time period; and the control module is used for judging whether the function of using at least one unlocking mode in the at least two unlocking modes by the user is limited in the second time period or not based on the verification information of the at least two unlocking modes.
Another aspect of the present application provides a computer-readable storage medium, where the storage medium stores computer instructions, and when the computer reads the computer instructions in the storage medium, the computer executes the intelligent lock control method as described above.
Another aspect of the present application provides a computer device, including a memory, a processor, and a computer program stored in the memory and executable on the processor, wherein the processor implements the intelligent lock control method as described above when executing the computer program.
Drawings
The present application will be further explained by way of exemplary embodiments, which will be described in detail by way of the accompanying drawings. These embodiments are not intended to be limiting, and in these embodiments like numerals are used to indicate like structures, wherein:
FIG. 1 is a schematic diagram of an application scenario of an intelligent lock control system according to some embodiments of the present application;
FIG. 2 is a schematic diagram of exemplary hardware and/or software of an intelligent lock control system according to some embodiments of the present application;
FIG. 3 is a schematic diagram of exemplary hardware and/or software of a computing device shown in accordance with some embodiments of the present application;
FIG. 4 is an exemplary block diagram of an intelligent lock control system according to some embodiments of the present application;
FIG. 5 is a schematic flow diagram of an intelligent lock control method according to some embodiments of the present application;
FIG. 6 is a schematic flow diagram of a method of intelligent lock control according to other embodiments of the present application;
FIG. 7 is a schematic flow diagram of an intelligent lock control method according to other embodiments of the present application.
Detailed Description
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings used in the description of the embodiments will be briefly introduced below. It is obvious that the drawings in the following description are only examples or embodiments of the application, from which the application can also be applied to other similar scenarios without inventive effort for a person skilled in the art. Unless otherwise apparent from the context, or otherwise indicated, like reference numbers in the figures refer to the same structure or operation.
It should be understood that "system", "device", "unit" and/or "module" as used herein is a method for distinguishing different components, elements, parts, portions or assemblies at different levels. However, other words may be substituted by other expressions if they accomplish the same purpose.
As used in this specification and the appended claims, the terms "a," "an," "the," and/or "the" are not intended to be inclusive in the singular, but rather are intended to be inclusive in the plural, unless the context clearly dictates otherwise. In general, the terms "comprises" and "comprising" merely indicate that steps and elements are included which are explicitly identified, that the steps and elements do not form an exclusive list, and that a method or apparatus may include other steps or elements.
Flow charts are used herein to illustrate operations performed by systems according to embodiments of the present application. It should be understood that the preceding or following operations are not necessarily performed in the exact order in which they are performed. Rather, the various steps may be processed in reverse order or simultaneously. Meanwhile, other operations may be added to the processes, or a certain step or several steps of operations may be removed from the processes.
The embodiment of the application provides an unlocking mode control method of an intelligent lock, which can judge whether the function of using at least one of at least two unlocking modes by a user in a second time period is limited by acquiring verification information of at least two unlocking modes of the user, so as to improve the use safety and reliability of the intelligent lock.
FIG. 1 is a schematic diagram of an application scenario of an intelligent lock control system according to some embodiments of the present application.
As shown in fig. 1, the smart lock control scenario 100 may include: server 110, network 120, intelligent lock 130 and terminal device 140. Network 120 is used to provide a medium for communication links between server 110, smart lock 130, and end device 140. Network 120 may include various types of connections, such as wire, wireless communication links, or fiber optic cables, to name a few.
The server 110 may be a server providing various services, for example, the server 110 may respond to receiving a remote control instruction sent by the terminal device 140, analyze the remote control instruction, and perform other processing to obtain a remote control request, and send the remote control request to the intelligent lock 130, so as to enable a user to remotely control the intelligent lock 130. As another example, the terminal device 140 may be configured to generate a remote control instruction in response to a remote target operation input by a user, and transmit the remote control instruction to the server 110; the server 110 is configured to receive the remote control instruction, obtain an intelligent lock identifier corresponding to the remote control instruction, generate a remote control request, and send the remote control request and the intelligent lock identifier to the internet of things gateway, so that the internet of things gateway sends the remote control request to the intelligent lock 130 corresponding to the intelligent lock identifier. In some embodiments, the server 110 may, in response to receiving input information (such as an input fingerprint, a password, a human face, and the like) of the unlocking manner sent by the smart lock 130, analyze the input information, and perform other processing to obtain an instruction of a verification error or a verification success, and send the instruction to the smart lock 130 to unlock the smart lock 130.
The server 110 may be hardware or software. When the server is hardware, it may be implemented as a distributed server cluster composed of multiple servers, or may be implemented as a single server. When the server is software, it may be implemented as multiple pieces of software or software modules (e.g., to provide distributed services), or as a single piece of software or software module. And is not particularly limited herein.
In some embodiments, the server 110 may be located inside the smart lock 130, with the smart lock 130 and the server 110 connected via an internal wired network. In some embodiments, the server 110 may also be located in the cloud and connected to the smart lock 130 via a wireless network. Some or all of the operations of some of the modules in the smart lock 130 may be performed by the server 110.
A user may use terminal device 140 to interact with server 110 over network 120 to receive or send messages, etc. Various client applications, such as a remote control type application, etc., may be installed on the terminal device 140. In some embodiments, the network 120 may be any one of, or a combination of, a wired network or a wireless network. Merely by way of example, network 120 may include a cable network, a wired network, a fiber optic network, a remote communication network, an intranet, the internet, a Local Area Network (LAN), a Wide Area Network (WAN), a Wireless Local Area Network (WLAN), a Metropolitan Area Network (MAN), a Wide Area Network (WAN), a Public Switched Telephone Network (PSTN), a bluetooth network, a ZigBee network, a Near Field Communication (NFC) network, the like, or any combination of the above.
The smart lock 130 may be used to execute the control method disclosed herein applied to the smart lock. The intelligent lock 130 and the server 110 may communicate directly through the network 120 or may be connected through an internet of things gateway (not shown). For example, the smart lock 130 and the internet of things gateway may communicate with each other based on a Zigbee protocol, and the internet of things gateway and the server 110 may communicate with each other based on a cellular mobile network or a Wi-Fi network. The smart lock 130 and the terminal device 140 may also communicate with each other based on short-range wireless communication, including but not limited to bluetooth protocol communication, Near Field Communication (NFC), infrared communication, etc.
The terminal device 140 may be hardware or software. When the terminal device 140 is hardware, it can be any electronic device having a display screen, including but not limited to a smart phone 140-1, a tablet computer 140-2, a laptop computer 140-3, a desktop computer, etc. When the terminal device 140 is software, it can be installed in the electronic devices listed above. It may be implemented as multiple pieces of software or software modules (e.g., to provide distributed services) or as a single piece of software or software module. And is not particularly limited herein.
It should be understood that the number of terminal devices, networks, and servers in fig. 1 is merely illustrative. There may be any number of terminal devices, networks, and servers, as desired for implementation. For convenience of understanding, in the embodiment of the present application, the intelligent lock 130 is mainly used for the door lock device. It should be noted that the embodiment of the smart lock applied to the door lock device in the present application is only an example and is not a limitation of the present application, and for example, the smart lock may also be applied to a gate device, a traffic device, and the like.
FIG. 2 is a schematic diagram of exemplary hardware and/or software of an intelligent lock control system according to some embodiments of the present application.
As shown in fig. 2, the intelligent lock control system 200 may include a sensing module 210, a processing module 220, a storage module 230, a communication module 240, a power supply module 250, and an input/output module 260.
It should be noted that the modules, units and sub-units mentioned in the present application can be implemented by hardware, software or a combination of software and hardware. The hardware implementation may include a circuit or a structure formed by solid components; the implementation of software may include storing operations corresponding to modules, units, and sub-units in a memory in the form of codes and executed by appropriate hardware, such as a microprocessor. When a module, a unit or a sub-unit mentioned herein performs its operation, if not specifically stated, it may mean that software code including the function is executed or that hardware having the function is used. Meanwhile, when the modules, units and sub-units mentioned herein correspond to hardware, the structures of the corresponding hardware are not limited, and the hardware capable of realizing the functions is within the protection scope of the present application. For example, different modules, units, sub-units mentioned herein may correspond to the same hardware structure. Also for example, reference herein to the same module, unit or sub-unit may correspond to multiple separate hardware configurations.
The sensing module 210 may be used to sense the state or actions performed by the smart lock and the device installed with the smart lock, such as an unlocked state, a locked state, and other states. In some embodiments, the sensing module 210 may include at least one of an angle sensor, a hall sensor, a gyroscope sensor, an accelerometer, a geomagnetic sensor, and the like. In some embodiments, the sensing module 210 may also include other types of sensing elements, such as infrared sensors, magnetic field sensors, contact sensors, visual sensors, pressure sensors, and the like.
Processing module 220 may be used to process information and data related to intelligent lock control system 200 to perform one or more of the functions described herein. For example, the processing module 220 may limit the function of the user using at least one unlocking manner in a second time period in response to the total number of verification errors of at least one unlocking manner of the at least two unlocking manners of the user in the first time period being greater than a first threshold value. For another example, the processing module 220 may generate the alarm information based on detecting that the number of verification errors of one of the at least two unlocking manners of the user in the first time period is greater than the second threshold. By way of example only, processing module 220 may include a Central Processing Unit (CPU), an Application Specific Integrated Circuit (ASIC), an application specific instruction set processor (ASIP), an image processing unit (GPU), a physical arithmetic processing unit (PPU), a Digital Signal Processor (DSP), a Field Programmable Gate Array (FPGA), a Programmable Logic Device (PLD), a controller, a Micro Controller Unit (MCU), a Reduced Instruction Set Computer (RISC), a microprocessor, or the like, or any combination thereof.
In some embodiments, the processing module 220 may include an input/output interface. The processing module 220 may receive information and/or data from one or more modules of the intelligent lock control system 200 (e.g., the sensing module 210, the storage module 230) or transmit information and/or data to one or more modules of the intelligent lock control system 200 (e.g., the sensing module 210, the storage module 230) through the input/output interface. In some embodiments, the input/output interface may be integrated into the communication module 240, and the processing module 220 may exchange information and/or data with one or more modules (e.g., the sensing module 210, the storage module 230) of the intelligent lock control system 200 through the communication module 240.
The processing module 220 may process data from the sensing module 210, the storage module 230, the communication module 240, the power module 250, and/or the input/output module 260. For example, the processing module 220 may determine whether to adjust the first threshold and/or the second threshold associated with the number of validation errors based on the distance between the user and the smart lock obtained by the sensing module 210. As another example, the processing module 220 may process an unlock instruction or operation from the input/output module 260. In some embodiments, the processing module 220 may transmit its processed data to one or more components in the intelligent lock control system 200 via the communication module 240 or the network 120. For example, the processing module 220 may send an instruction to the driving module 270 to define the function of the user in the at least one unlocking manner during the second time period, and the driving module 270 may control the smart lock to define the function of the user in the one or more unlocking manners according to the instruction. For another example, after the processing module 220 obtains the instruction that the unlocking verification passes through the unlocking verification of the unlocking mode, the processing module 220 may send the instruction to the driving module 270 to control the intelligent lock to unlock.
The storage module 230 may be used to store instructions and/or data for the various modules (e.g., sensing module 210, processing module 220) of the intelligent lock control system 200. For example, the storage module 230 may store authentication information for each unlocking manner. As another example, the storage module 230 may store the associated user of the smart lock, as well as the manner in which the user is authorized to unlock. In some embodiments, the storage module 230 may include mass storage, removable storage, volatile read-write memory, read-only memory (ROM), the like, or any combination thereof. In some embodiments, storage module 230 may be implemented on a cloud platform. By way of example only, the cloud platform may include a private cloud, a public cloud, a hybrid cloud, a community cloud, a distributed cloud, an interconnected cloud, a multi-cloud, and the like, or any combination thereof.
The communication module 240 may be used for signal transmission between the modules (e.g., the sensing module 210, the processing module 220, the storage module 230) of the intelligent lock control system 200. In some embodiments, the communication module 240 may also establish communication with a client (e.g., a user's terminal device, etc.) to feed back the smart lock status. For example, when the number of verification errors/the total number of verification errors of one or more unlocking manners exceeds a preset threshold (e.g., a first threshold or a second threshold), and the smart lock still receives an unlocking instruction of a corresponding user, the communication module 240 may send an information alert to the client. In some embodiments, the communication module 240 may also be used to send prompts or alert signals to clients (e.g., terminal devices of a property or community, etc.). For example, when the smart lock continuously enters the locking mode for a plurality of times within a certain time (e.g., within 1 day, within 3 hours, etc.) (e.g., a plurality of times within a second time period, the function of limiting the same user to use at least one unlocking mode of at least two unlocking modes) the communication module 240 may send an alarm signal to the smart terminal device of the property or the community.
In some embodiments, the communication module 240 may be used for the exchange of information or data. In some embodiments, the communication module 240 may be used for communication between components within the smart lock 130 (e.g., the sensing module 210, the processing module 220, the storage module 230, the power module 250, the input/output module 260, and/or the drive module 270). In some embodiments, the communication module 240 may also be used for communication between the smart lock 130 and other components (e.g., the server 110, the terminal device 140) in the smart lock control scenario 100. For example, the communication module 240 may exchange information with the server 110 or the terminal device 140 through the network 120. The communication module 240 may employ wired, wireless, and hybrid wired/wireless technologies. The cabling may be based on one or more fiber optic cable combinations, such as metallic cables, hybrid cables, fiber optic cables, and the like. The wireless technologies may include Bluetooth (Bluetooth), wireless network (Wi-Fi), ZigBee (ZigBee), Near Field Communication (NFC), Radio Frequency Identification (RFID), cellular networks (including GSM, CDMA, 3G, 4G, 5G, etc.), narrowband Internet of Things over cellular (NBIoT), and so on. In some embodiments, the other illustrated modules of the intelligent lock control system 200 may be distributed over multiple devices, in which case the other modules may each include one or more communication modules 240 for inter-module information transfer. In some embodiments, the communication module 240 may also have a reminder or/and alarm function. In some embodiments, the alert means may include an audible alert, a light alert, a remote alert, etc., or any combination thereof. For example, when the alarm mode is remote alarm, the communication module 240 may send a warning message or an alarm message to the associated user terminal device, and the communication module 240 may further establish communication (e.g., voice call, video call) between the smart lock and the associated user terminal device.
The power supply module 250 may be used to supply power to the smart lock control system 200. The power supply module 250 may include a battery, a farad capacitor, and the like. In some embodiments, a battery may be connected in parallel with a farad capacitor and a sensor. The battery can power the farad capacitor and the sensor when the battery is charged. The farad capacitor may power the sensor when the battery is dead or disconnected (e.g., battery replacement). In some embodiments, power module 250 may provide power to other components (e.g., sensing module 210, processing module 220, storage module 230, communication module 240, input/output module 260, drive module 270) in intelligent lock control system 200. In some embodiments, the power module 250 may receive a control signal from the processing module 220 to control the power output of the smart lock 130.
The input/output module 260 may acquire, transmit, and send signals. The input/output module 260 may be connected to or in communication with other components in the intelligent lock control system 200. Other components in the intelligent lock control system 200 may be connected or in communication via the input/output module 260. The input/output module 260 may be a wired USB interface, a serial communication interface, a parallel communication interface, or a wireless bluetooth, infrared, Radio-Frequency Identification (RFID), Wlan Authentication and Privacy Infrastructure (wap), General Packet Radio Service (GPRS), Code Division Multiple Access (CDMA), or the like, or any combination thereof. In some embodiments, the input/output module 260 may be connected to the network 120 and obtain information via the network 120.
In some embodiments, the intelligent lock control system 200 may also include a drive module 270 (also referred to as a motor drive module) and a mechanical structure 280. In some embodiments, the drive module 270 may include one or more drive power sources or drive components. In some embodiments, the driving force source may include a driving motor driven with electric power. The processing module 220 may control the operation of the driving module 270, and the driving module 270 acts on the mechanical structure 280 to complete the target operation. For example, when the intelligent lock 130 is applied to a door lock device, after the user identification is successfully confirmed, the driving module 270 may drive the mechanical structure 280 (e.g., a bolt) connected thereto to complete unlocking. For another example, when the total number of verification errors in the first time period of at least one of the at least two unlocking manners by the user is greater than the first threshold, the driving module 270 may drive the mechanical structure 280 connected thereto to control the smart lock to enter the locking mode.
It should be noted that the above description of the intelligent lock control system 200 and its modules is merely for convenience of description, and should not limit the present application to the scope of the illustrated embodiments. It will be appreciated by those skilled in the art that, given the teachings of the present system, any combination of modules or sub-system configurations may be used to connect to other modules without departing from such teachings. For example, the processing module 220 and the communication module 240 may be two modules, or one module may have both a processing function and a communication function. For example, each module may share one memory module, and each module may have its own memory module. Such variations are within the scope of the present application.
FIG. 3 is a schematic diagram of exemplary hardware and/or software of a computing device shown in accordance with some embodiments of the present application.
In some embodiments, server 110 and/or terminal device 140 may be implemented on computing device 300. For example, the processing device may implement and perform the functions of the processing device disclosed herein on the computing device 300. As shown in fig. 3, computing device 300 may include internal communication bus 310, processor 320, read only memory 330, random access memory 340, communication interface 350, input/output interface 360, hard disk 370, and user interface 380.
Internal communication bus 310 may enable data communication among the components of computing device 300. For example, the processor 320 may send data through the internal communication bus 310 to memory or other hardware such as input/output ports 360. In some embodiments, internal communication bus 310 may be an Industry Standard (ISA) bus, an Extended ISA (EISA) bus, a Video Electronics Standard (VESA) bus, a peripheral component interconnect standard (PCI) bus, or the like. In some embodiments, the internal communication bus 310 may be used to connect various modules (e.g., the sensing module 210, the processing module 220, the storage module 230, the communication module 240, the input/output module 260, the driver module 270) in the intelligent lock control system 200 shown in FIG. 2.
Processor 320 may execute the computing instructions (program code) and perform the functions of the intelligent lock control methods described herein. The computing instructions may include programs, objects, components, data structures, procedures, modules, and functions (which refer to specific functions described herein). For example, the processor 320 may process information (e.g., authentication information of the unlocking manner, etc.) acquired from the smart lock 130 and determine whether to limit the user to use the function of the at least one unlocking manner for the second period of time according to the authentication information. In some embodiments, processor 320 may include microcontrollers, microprocessors, Reduced Instruction Set Computers (RISC), Application Specific Integrated Circuits (ASIC), application specific instruction set processors (ASIP), Central Processing Units (CPU), Graphics Processing Units (GPU), Physical Processing Units (PPU), microcontroller units, Digital Signal Processors (DSP), Field Programmable Gate Arrays (FPGA), advanced reduced instruction set computers (ARM), programmable logic devices, any circuit or processor capable of performing one or more functions, and the like, or any combination thereof. For illustration only, the computing device 300 in fig. 3 depicts only one processor, but it should be noted that the computing device 300 in the present application may also include multiple processors.
The memory (e.g., Read Only Memory (ROM) 330, Random Access Memory (RAM) 340, hard disk 370, etc.) of the computing device 300 may store data/information obtained from any other component of the smart lock control scenario 100. For example, hard disk 370 may store user information, authorized unlocking patterns of the smart lock associated with the user, and the like. In some embodiments, the memory of the computing device 300 may be located in the smart lock 130 or in the server 110.
Communication interface 350 may connect to a network for data communication. The connection may be a wired connection, a wireless connection, or a combination of both. In some embodiments, communication interface 350 may be a standardized port, such as RS232, RS485, and the like. In some embodiments, communication interface 350 may be a specially designed port.
The input/output interface 360 may be used to input or output signals, data, or information. In some embodiments, the input/output interface 360 may enable a user to interact with the intelligent lock control scenario 100. For example, the input/output interface 360 may include a communication module 240 to implement the communication and alarm functions of the intelligent lock control scenario 100. In some embodiments, input/output interface 360 may include an input device and an output device. Exemplary input devices may include a keyboard, mouse, touch screen, microphone, and the like, or any combination thereof. Exemplary output devices may include a display device, speakers, printer, projector, etc., or any combination thereof.
The user interface 380 may enable interaction and information exchange between the computing device 300 and a user. In some embodiments, the user interface 380 may be used to present information, data generated by the intelligent lock control scenario 100 to a user. For example, the user interface 380 may present the user confirmation results (e.g., successful identity confirmation, failed identity confirmation) of the smart lock control scenario 100 to the user. In some embodiments, user interface 380 may include a physical display, such as a display with speakers, an LCD display, an LED display, an OLED display, an electronic Ink display (E-Ink), or the like.
FIG. 4 is an exemplary block diagram of an intelligent lock control system according to some embodiments of the present application.
As shown in fig. 4, an embodiment of the present application provides a system for implementing intelligent lock control, which is applied to an intelligent lock. In some embodiments, the intelligent lock control system 400 may include an acquisition module 410 and a control module 420.
The acquisition module 410 may be used to acquire information. In some embodiments, the obtaining module 410 may be configured to obtain the verification information of at least two unlocking modes of the user. In some embodiments, the verification information of the unlocking manner may include information such as the unlocking manner and the unlocking manner verification record. In some embodiments, the verification record may include the number of verification errors of the unlocking pattern and time information of the unlocking pattern verification errors, and the like, or any combination thereof, within the first time period. In some embodiments, the unlocking manner of the smart lock may include password unlocking, biometric unlocking, near field communication unlocking, mechanical electronic key unlocking, and/or the like.
In some embodiments, the obtaining module 410 may further include an unlocking information obtaining unit 413, a user information obtaining unit 415, and a scene mode obtaining unit 417. The unlocking information obtaining unit 413 may be configured to obtain authentication information of one or more unlocking manners of the user. The user information obtaining unit 415 may be configured to obtain/determine user information corresponding to one or more unlocking modes. The scene mode acquisition unit 417 may be configured to acquire a scene mode of the smart lock.
In some embodiments, the obtaining module 410 may also be configured to obtain other information for implementing the control of the unlocking manner of the smart lock, for example, the obtaining module 410 may be configured to obtain location information, time information, climate information, and the like of the user from the smart lock, which is not limited herein.
The control module 420 may be used to control the state of the smart lock. In some embodiments, the control module 420 may be configured to determine whether to limit the function of the user using at least one of the at least two unlocking manners within the second time period based on the verification information of the at least two unlocking manners. In some embodiments, the control module 420 may be configured to determine whether to limit the function of the user using at least one of the at least two unlocking manners within the second time period based on the scene mode and the verification information of the at least two unlocking manners of the user. In some embodiments, the control module 420 may be configured to determine whether to limit the function of the user using at least one of the at least two unlocking manners within the second time period based on the user information and the verification information of the at least two unlocking manners of the user.
In some embodiments, the control module 420 may be configured to limit the user's use of the at least one unlocking mode for a second period of time in response to a total number of verification errors for at least one of the at least two unlocking modes being greater than a first threshold value during the first period of time. In some embodiments, the control module 420 may be configured to determine at least two second thresholds corresponding to the at least two unlocking manners, respectively; and in response to the number of verification errors of one of the at least two unlocking modes in the first time period being larger than a corresponding second threshold value, limiting the function of the unlocking mode used by the user in the second time period.
In some embodiments, the control module 420 may be configured to, when the defined time reaches the second time period, un-define and clear the number of verification errors and the time information of the verification errors of the corresponding unlocking manner. In some embodiments, the control module 420 may be configured to adjust the first time period and/or the second time period based on the unlocking manner. In some embodiments, the control module 420 may be configured to adjust the threshold number of validation errors, the first time period, and/or the second time period of the unlocking manner based on the scene mode of the smart lock. In some embodiments, the control module 420 may dynamically adjust the threshold number of authentication errors for the unlocking pattern based on the authentication result of the biometric unlocking pattern.
It should be noted that the above description of the intelligent lock control system 400 and the unit modules thereof is for convenience of description only and should not limit the present application to the scope of the illustrated embodiments. It will be appreciated by those skilled in the art that, having the benefit of this disclosure, any combination of the various unit modules or sub-assemblies may be connected to other modules without departing from the scope of this disclosure.
FIG. 5 is a schematic flow diagram of an intelligent lock control method according to some embodiments of the present application.
Step 510, obtaining verification information of at least two unlocking modes of the user. In some embodiments, step 510 may be performed by the server 110, the intelligent lock 130, the intelligent lock control system 200, the computing device 300, or the intelligent lock control system 400 (e.g., the unlocking information acquisition unit 413).
The unlocking manner may refer to a key for unlocking the smart lock. In some embodiments, the unlocking means may include password unlocking, biometric unlocking, near field communication unlocking, and/or mechatronic key unlocking, among others. Password unlocking may refer to a manner of unlocking the smart lock by inputting a preset password. The biometric unlocking may refer to a manner of unlocking the smart lock through biometric information authentication, for example, fingerprint unlocking, palm print unlocking, vein unlocking, face unlocking, and the like. Near Field Communication (NFC) unlocking may refer to a manner of unlocking a smart lock through a device capable of implementing Near Field Communication with the smart lock, for example, a smart phone, an electronic card, and the like having an NFC function. The mechanical electronic key unlocking may refer to a manner of unlocking the smart lock by a mechanical key having an identity authentication function, for example, a security chip is added to the mechanical key to realize identity authentication. In some embodiments, the unlocking manner may also include other manners capable of unlocking the smart lock, such as a mechanical key unlocking manner, an electronic key unlocking manner, and the like, which is not limited herein.
In some embodiments, one smart lock may be unlocked in multiple unlocking manners, for example, a smart lock having functions of fingerprint unlocking, face unlocking, password unlocking, and the like at the same time. In some embodiments, one smart lock may be associated with multiple users. For example, when the intelligent lock is a door lock, a plurality of persons such as a homeowner, a homeowner family member and the like can be authorized to open the intelligent lock. In some embodiments, a smart lock may bind one or more unlocking modes for each associated user. For example, if the smart lock is a door lock, the smart lock may simultaneously perform biometric unlocking, password unlocking, nfc unlocking, and mechatronic key unlocking for the homeowner, and may only perform password unlocking or biometric unlocking for other users such as relatives of the homeowner.
In some embodiments, the verification information of the unlocking manner may include the unlocking manner and/or a verification record of the unlocking manner. In some embodiments, the verification record may include a number of verification errors and/or time information of the verification errors, etc. of the unlocking manner within the first time period.
The first time period can comprise any reasonable period of time, such as 1 day, 5 days, 1 week, 1 month, and the like. In some embodiments, the first time period may be a fixed value that is set in advance. In some embodiments, the first time period may be set manually by a user, e.g., manually entered by a user. In some embodiments, each unlocking manner may correspond to a different first time period. In some embodiments, the first time period corresponding to the unlocking manner may be adjusted based on the unlocking manner. For example, the first time period corresponding to the unlocking of the biological information may be longer than the first time period corresponding to other unlocking manners. In some embodiments, the value of the first time period may be adjusted based on a scene mode of the smart lock and/or user information, etc.
The unlocking mode verification error may refer to that input information corresponding to the used unlocking mode does not conform to corresponding pre-stored legal information in the process of unlocking the intelligent lock, for example, a password input error during password unlocking, fingerprint authentication failure during fingerprint unlocking, identity authentication failure during mechanical and electronic key unlocking, and the like.
In some embodiments, the time information of the unlocking manner verification error may include a date, a time, a corresponding time stamp, and the like corresponding to the unlocking manner verification error. The time stamp is a complete verifiable data that can indicate that the data already exists at a specific time point, and can be used for providing an electronic proof to prove the generation time of some data of the user, for example, the time stamp can be used for proving the occurrence time of the verification error of the unlocking mode in the embodiment.
In some embodiments, when the user verifies an error by using one or more unlocking modes when the smart lock is opened, information of the corresponding verification error can be recorded. For example, a user uses fingerprint information to unlock, the intelligent lock matches the acquired user fingerprint information with the legal fingerprint information prestored in the database, and when the similarity between the input fingerprint information and the closest prestored fingerprint information is smaller than a preset value or the corresponding prestored fingerprint information cannot be matched from the database, information such as the current fingerprint information unlocking mode of the user, the time information of the current fingerprint unlocking verification error, the total verification error times accumulated by fingerprint unlocking (for example, 1 is added on the basis of the recorded verification error times) and the like can be recorded.
In some embodiments, the authentication information of at least two unlocking modes of the user can be obtained from the storage device (the storage module 230, the read-only memory 330 or the random access memory 340). In some embodiments, the authentication information of at least two unlocking modes of the user can be obtained from a terminal device (such as the terminal device 140) or a server (such as the server 110). In some embodiments, the verification information of at least two unlocking modes of the user can be obtained in response to the verification error of one unlocking mode of the user.
And step 520, judging whether the function of using at least one unlocking mode of the at least two unlocking modes by the user is limited in the second time period or not based on the verification information of the at least two unlocking modes. In some embodiments, step 520 may be performed by server 110, smart lock 130, smart lock control system 200, computing device 300, or smart lock control system 400 (e.g., control module 420).
The function of limiting the unlocking mode used by the user means that the user cannot unlock the intelligent lock by using the corresponding unlocking mode. For example, when the user is limited to use the function of fingerprint unlocking, the user cannot open the smart lock by means of fingerprint verification. In some embodiments, the function of the at least one unlocking manner used by the user may be defined in the second time period in response to the total number of verification errors of the at least one unlocking manner in the at least two unlocking manners being greater than the first threshold value in the first time period. By way of example only, during the process that the user opens the smart lock using one of the authorized unlocking manners (e.g., fingerprint unlocking), when the unlocking manner has a verification error, the smart lock 130 may obtain verification information of all authorized unlocking manners of the user within a first period of time from the current time, and if the total number of verification errors of at least one of the authorized unlocking manners within the first period of time is greater than a first threshold (e.g., the total number of verification errors of password unlocking and near field communication unlocking within the first period of time is greater than the first threshold), the function that the user uses at least one of the authorized unlocking manners (e.g., password unlocking and near field communication unlocking) is limited within a second period of time from the current time. The total number of verification errors may refer to a sum of the number of verification errors of one or more unlocking modes, for example, the sum of the number of verification errors of the unlocking mode a and the unlocking mode B in the first time period, or the number of verification errors of the unlocking mode a in the first time period, etc.
In some embodiments, the first threshold may comprise any reasonable value, e.g., 3 times, 5 times, 10 times, etc. In some embodiments, the first threshold may be adjusted based on unlocking patterns, scene modes of the smart lock, user information, and the like. For example, the first threshold corresponding to the scene pattern P1 may be set to 5 times, the first threshold corresponding to the scene pattern P2 may be set to 7 times, and so on. For another example, the first threshold corresponding to fingerprint unlocking may be set to 10 times, the first threshold corresponding to password unlocking may be set to 3 times, and so on. In some embodiments, the first threshold may be dynamically adjusted based on a result of the verification of the biometric unlocking pattern. For example, for fingerprint unlocking, according to the similarity between the input fingerprint information of the user and the closest pre-stored fingerprint information, when the similarity is greater than a set value, the first threshold value for fingerprint unlocking may be adaptively increased. In some embodiments, the first threshold may be dynamically adjusted based on location information of the user with the smart lock. For example, when the distance between the user and the smart lock is smaller than a preset distance, or the distance between the user and the smart lock is gradually decreasing, the first threshold corresponding to the user may be increased in real time.
The second time period may reflect a duration of time that the user is restricted from using the function of the unlocking manner, for example, the user is restricted from being able to unlock the smart lock in a fingerprint unlocking manner within 5 minutes. In some embodiments, the values of the second time periods corresponding to each unlocking manner may be the same or different, for example, the second time periods corresponding to password unlocking and NFC unlocking are both 3 minutes, and the second time period corresponding to biological information unlocking is 1 minute. In some embodiments, the value of the second time period corresponding to each unlocking manner may be determined based on the security, fault tolerance, verification success rate, and the like of the unlocking manner, for example, the second time period corresponding to the biological information unlocking may be smaller than the second time periods corresponding to other types of unlocking manners. In some embodiments, the second time period may be adjusted based on the unlocking pattern, the scene mode of the smart lock, and/or user information. For example, the second time period corresponding to the travel mode may be set to 3 hours, or 5 hours, or 12 hours, or 3 days, or 5 days, etc., and the second time period corresponding to the home mode may be set to 5 minutes, or 10 minutes, or 30 minutes, etc. For another example, the second time period corresponding to the master user (e.g., the owner of the door lock) in the home mode may be set to 1 minute or 2 minutes, and the second time period corresponding to the other authorized users may be set to 4 minutes or 7 minutes, and the like.
In some embodiments, when the total number of verification errors of at least one of the at least two unlocking manners of the user in the first time period is greater than the first threshold, the function of using the corresponding unlocking manner by the user can be limited in the second time period. For example only, in the process of unlocking the smart lock by the user, when the total number of times of verification errors of at least one unlocking mode of the user is greater than a first threshold value within a first time period from the current time to the past, it may be determined that the total number of times of verification errors is greater than an unlocking mode corresponding to the first threshold value based on the verification information of each unlocking mode, for example, if the total number of times of verification errors of the password unlocking within the first time period is greater than the first threshold value, the function of the user to unlock using the password is defined within a second time period; if the total number of verification errors of the biometric unlocking in the first time period is larger than a first threshold value, limiting the function of the biometric unlocking used by the user in the second time period; and if the sum of the verification error times of the password unlocking and the near field communication unlocking in the first time period is greater than a first threshold value, limiting the functions of the password unlocking and the near field communication unlocking used by the user in the second time period.
In some embodiments, when the total number of verification errors of at least one of the at least two unlocking manners of the user in the first time period is greater than the first threshold value, the user may be limited to use some or all functions of the unlocking manner in the second time period. For example, if the authorized unlocking modes of the user include password unlocking, fingerprint unlocking, face unlocking and near field communication unlocking, when the total number of times of verification errors of the user password unlocking in the first time period is greater than the first threshold, the functions of the user using the password unlocking, the fingerprint unlocking and the face unlocking can be limited in the second time period, or the functions of the user using the password unlocking, the fingerprint unlocking and the face unlocking can be limited, or the functions of all authorized unlocking modes can be limited. In some embodiments, it may be determined that the function of the user or all users using at least one of the at least two unlocking manners is limited within the second time period based on the verification information of the at least two unlocking manners of the user. For example only, if the associated users of the smart lock include user X, user Y, and user Z, the authorized unlocking manners of user X are password unlocking and fingerprint unlocking, the authorized unlocking manners of user Y are password unlocking, fingerprint unlocking, and face unlocking, and the authorized unlocking manners of user Z are password unlocking, fingerprint unlocking, face unlocking, and near field communication unlocking, when the total number of verification errors in the first time period of the fingerprint unlocking and password unlocking of user X is greater than the first threshold, only the function of user X using password unlocking and fingerprint unlocking may be defined in the second time period, or both the function of user X and Y using password unlocking and fingerprint unlocking may be defined, or both the function of user X, user Y, and user Z using all authorized unlocking manners may be defined.
In some embodiments, it may be determined whether to limit the function of the user using at least one of the at least two unlocking manners within the second time period based on the scene mode of the smart lock and the verification information of the at least two unlocking manners of the user. In some embodiments, it may be determined whether to limit the function of the user using at least one of the at least two unlocking manners within the second time period based on the user information and the verification information of the at least two unlocking manners of the user. For the content of determining whether to limit the function of using the unlocking manner by the user based on the smart lock scene mode and/or the user information, reference may be made to fig. 6 or fig. 7 and the related description thereof, which are not described herein again.
In some embodiments, second thresholds may be determined that correspond to the at least two unlocking approaches, respectively. The second threshold may reflect a verification error number threshold corresponding to each unlocking manner, and the verification error number thresholds of each unlocking manner may be the same or different. In some embodiments, the second threshold corresponding thereto may be determined based on security, reliability, etc. of the manner of unlocking, e.g., the second threshold for biometric information unlocking may be less than the second threshold for password unlocking. In some embodiments, the user may be limited to use the function of the unlocking mode in the second time period in response to the number of verification errors of one of the at least two unlocking modes in the first time period being greater than the corresponding second threshold. For example, if the number of verification errors of unlocking the fingerprint of the user in the first time period is greater than a corresponding second threshold (e.g., 8 times) of unlocking the fingerprint, the function of unlocking the fingerprint by the user may be limited in the second time period.
In some embodiments, when the limited time reaches the second time period, the number of verification errors and the time information of the verification errors of the corresponding unlocking manner may be de-limited and cleared. For example, if the duration of the function unlocked by the user using the face is limited, and a second time period (for example, 3 minutes) has elapsed since the start of the limitation, the limitation on the function unlocked by the user using the face is removed, and the recorded number of times of the verification error when the user uses the face to unlock and unlock the smart lock and the time information of the verification error are cleared, that is, the number of times of the verification error when the face of the user is unlocked is recorded as 0.
In some embodiments, the unlocking may be by a public key (e.g., a mechanical key) or by an undefined unlocking mechanism. For example, when the user is limited to unlock the smart lock by using the fingerprint unlocking mode, the user may use an authorized other unlocking mode, such as face unlocking, or a public mechanical key to unlock the smart lock, so as to remove the limitation on the function of using the fingerprint unlocking mode. In some embodiments, the definition may be de-defined by a particular user. For example, after defining the function of using one or more unlocking manners by the associated user X with a specific authority, the definition of the user X may be released by the primary user Y, for example, the user Y may release the definition of the function of using one or more unlocking manners by opening the smart lock or by sending a release instruction to the server (e.g., the server 110). In some embodiments, the restriction may be remotely lifted. For example, the primary user of the smart lock may send a restriction removal request to the smart lock 130 or the server 110 through the terminal device 140 to remove the restriction on the function of the corresponding user using the unlocking manner.
In some embodiments, when the unlocking mode is verified to be incorrect or the number of verification errors is greater than a preset threshold (e.g., a first threshold, a second threshold, etc.), a prompt or an alarm signal may be sent. In some embodiments, a prompt or alarm signal may be sent when the smart lock enters an abnormal locking state. For example, when the smart lock continuously enters the locking mode for a plurality of times within a certain time (e.g., within a day), that is, enters a state defining the function of the user using at least one unlocking mode for a plurality of times, a prompt may be sent to the terminal device 140 or the interactive interface of the smart lock 130, or an alarm signal may be sent.
In some embodiments, the first time period and/or the second time period may be adjusted based on the manner of unlocking. For example, a first time period corresponding to password unlocking may be set to 3 days, and a second time period may be set to 10 minutes; the first time period corresponding to the unlocking of the mechanical electronic key is set to be 2 days, and the second time period is set to be 6 minutes, and the like. In some embodiments, the threshold number of validation errors (e.g., the first threshold, the second threshold), the first time period, and/or the second time period for the unlocking mode may be adjusted based on the scene mode of the smart lock.
In some embodiments, the threshold number of authentication errors of the unlocking manner, for example, the first threshold and/or the second threshold, may be dynamically adjusted based on the authentication result of the biometric unlocking manner. For example only, the first threshold and/or the second threshold may be adjusted according to a similarity between the authentication information corresponding to the input unlocking manner and the pre-stored authentication information of the legitimate user, for example, the higher the similarity of the biometric result is, the larger the corresponding first threshold or second threshold may be. For example, if the face authentication is used for unlocking, the first threshold value or the second threshold value may be increased when the face authentication similarity is high although the authentication fails. By the method, a user with high recognition degree can have more chance of trial and error, and the unlocking performance is improved.
In some embodiments, the first threshold, the second threshold, the first time period, and/or the second time period may be set by the user at his or her discretion, or automatically adjusted according to user settings. For example, the user may set the values of the first threshold, the second threshold, the first time period, and/or the second time period by himself. In another example, the user can set a value range, and the intelligent lock can automatically adjust according to the set value range.
It should be noted that the above description related to the flow 500 is only for illustration and explanation, and does not limit the applicable scope of the present application. Various modifications and changes to flow 500 may occur to those skilled in the art upon review of the present application. However, such modifications and variations are intended to be within the scope of the present application.
FIG. 6 is a schematic flow diagram of a method of intelligent lock control according to other embodiments of the present application.
As shown in fig. 6, in some embodiments, the process 600 may determine, when the number of verification errors of at least two unlocking manners of the user is greater than a first threshold, the corresponding unlocking manner, the user information corresponding to the unlocking manner, and the scene mode of the intelligent lock, determine a locking mode according to the unlocking manner, the user information corresponding to the unlocking manner, and/or the scene mode of the intelligent lock, and lock according to the locking mode. In some embodiments, the steps 625 and 627 in the dashed box may be omitted, that is, the execution subject of the intelligent lock unlocking manner control method (for example, the intelligent lock 130 or the server 110, the intelligent lock control system 200, the computing device 300 or the intelligent lock control system 400 shown in fig. 1) may determine the locking mode of the intelligent lock directly based on the information that the user has at least two unlocking manners verification errors.
In step 610, verification information of at least two unlocking manners of the user is obtained, which is similar to step 510 in the process 500, and further contents can refer to fig. 5 and the related description thereof, which are not described herein again.
In some embodiments, it may be determined whether the number of verification errors in the first time period is greater than a first threshold based on the unlocking manner verification records in the verification information of at least two unlocking manners of the user, and step 623 may be performed in response to that the total number of verification errors in the first time period of at least one unlocking manner is greater than the first threshold.
Step 623, determining the unlocking mode with the total verification error times larger than the first threshold. In some embodiments, step 623 may be performed by the obtaining module 410 (e.g., the unlocking information obtaining unit 413).
In some embodiments, the total number of times of verification errors is greater than the unlocking mode corresponding to the first threshold value may be determined based on the verification record of each unlocking mode. For example only, the smart lock 130 may determine that the total number of authentication errors of the password unlocking in the first time period is greater than a first threshold value, or the total number of authentication errors of the biometric unlocking in the first time period is greater than a first threshold value, or the sum of the number of authentication errors of the near field communication unlocking and the electromechanical key unlocking in the first time period is greater than a first threshold value, based on the number of authentication errors of each unlocking mode of the user in the first time period and the time information of the authentication errors of the unlocking mode, such as the password unlocking, the biometric unlocking, the near field communication unlocking, and the electromechanical key unlocking.
Step 625, determining the user information corresponding to the unlocking mode. In some embodiments, step 625 may be performed by the obtaining module 410 (e.g., the user information obtaining unit 415).
The user information can reflect the identity, unlocking authority and other information of the user. For example, the user information may include the user who uses the unlocking mode to open the smart lock and the associated identity of the smart lock (e.g., the master user, the family member of the master user, etc.), an authorized unlocking mode (e.g., any unlocking mode may be used to open the smart lock, or only a partial unlocking mode may be used to open the smart lock), and the like.
In some embodiments, user information corresponding to the unlocking manner with the verification error total number larger than the first threshold value may be determined. In some embodiments, the user information may be determined by looking up a match based on the input information of the user unlock mode. For example, the smart lock 130 may search, based on the fingerprint information input by the user, the fingerprint information of the pre-stored authorized user that matches the fingerprint information from the database, and determine the user registration information, such as the user name and the authorization authority, corresponding to the pre-stored fingerprint information that matches the fingerprint information with the highest degree as the user information corresponding to the unlocking of the fingerprint information this time. In some embodiments, the user information may be determined based on identification information corresponding to the user unlocking manner. For example, the smart lock 130 may determine user information based on the identity in the mechatronic key. In some embodiments, user information may be acquired based on a camera device. For example, the smart lock 130 may obtain a user image through a camera that is built in or out, and determine user information based on the user image.
Step 627, the scene mode of the smart lock is obtained. In some embodiments, step 627 may be performed by the obtaining module 410 (e.g., the scene mode obtaining unit 417).
The scene mode may reflect the current state of the smart lock-associated user, for example, the scene mode of the smart lock may include a workday mode, a holiday mode, a home mode, a travel mode, and the like.
In some embodiments, the user may set the scene mode through an interactive interface of the terminal device (e.g., the terminal device 140) or the smart lock (e.g., the smart lock 130), for example, set the travel mode or the home mode according to the user's own situation. In some embodiments, the smart lock may automatically set the scene mode. For example, the smart lock 130 may automatically switch between a workday mode and a vacation mode based on the time information. As another example, the smart lock 130 may automatically set a travel mode or a home mode according to the user habit. In some embodiments, different users may correspond to different scene modes. For example, the associated user X of the smart lock is in a travel mode, and the associated user Y is in a home mode.
It is understood that the execution sequence of step 623, step 625 and step 627 in this embodiment is only an example, and does not limit the present application, for example, in some embodiments, step 627 may be executed first, and then step 623, step 625, or step 623, step 625 and step 627 may be executed at the same time. In some embodiments, step 623 may be followed by only performing step 625 or step 627.
In step 630, a lock mode is determined. In some embodiments, step 630 may be performed by control module 420.
In some embodiments, the locking mode may be determined based on an unlocking mode in which the total number of verification errors is greater than a first threshold, user information corresponding to the unlocking mode, and a scene mode of the smart lock. In some embodiments, the locked mode may include a defined duration (e.g., the second time period), a defined user, a defined use of an unlocking mode (e.g., fingerprint unlocking, password unlocking, face unlocking, etc.), and the like, or any combination thereof.
The defined user may refer to a user who cannot open the smart lock with the identification feature and/or the password for a certain period of time (e.g., the second period of time). For example, the authorized unlocking modes of the smart lock associated with the user X include fingerprint unlocking, password unlocking and mechanical electronic key unlocking, and the user X cannot unlock the smart lock in the authorized unlocking mode in the second time period after being limited.
The unlocking mode of limited use may refer to an unlocking mode of opening the smart lock, which is limited to be used by the user, for example, a function of limiting the unlocking mode of the user using a fingerprint, or a function of limiting the unlocking mode of all authorized unlocking modes used by the user.
In some embodiments, the locking modes corresponding to different unlocking modes may be the same or different. For example, when the number of verification errors of biometric unlocking (such as face unlocking) is greater than a first threshold (or a second threshold) within a first time period, only the user may be limited to use the biometric unlocking function; when the number of verification errors of the mechanical electronic key unlocking is greater than the first threshold (or the second threshold) within the first time period, the user may be restricted to using all functions of the authorized unlocking manner. In some embodiments, the corresponding locking mode may be determined based on the security, uniqueness, etc. of the unlocking manner, for example, the defined duration corresponding to the biometric unlocking manner may be shorter than the defined duration corresponding to the other category unlocking manners.
In some embodiments, the locking patterns corresponding to different associated users may be the same or different. For example, the locking mode corresponding to the associated user X of the smart lock may be: the function of defining the unlocking mode that the verification error times of the user X are greater than the verification error time threshold (such as the first threshold or the second threshold) in the second time period may be: and limiting the functions of all authorized unlocking modes used by the user in the second time period. In some embodiments, the locking mode may be determined based on the manner in which the user is authorized to unlock, the user's associated identity with the smart lock. For example only, when the total number of verification errors of fingerprint unlocking and face unlocking of a master user (such as a master of a door lock) of the smart lock in a first time period is greater than a first threshold, the functions of fingerprint unlocking and face unlocking used by the master user in a second time period may be limited; when the total times of the fingerprint unlocking and the face unlocking of other associated users (such as family members of a homeowner) in the verification errors in the first time period are greater than a first threshold, the functions of all authorized unlocking modes used by the other associated users can be limited.
In some embodiments, the lock modes corresponding to different scene modes may be the same or different. For example, the defined duration of the workday mode may be less than the defined duration of the vacation mode and the defined duration of the home mode may be less than the defined duration of the travel mode. For another example, the user may be limited to use all functions of authorizing the unlocking manner in the travel mode, and the user may be limited to use the functions of verifying the unlocking manner with the number of errors greater than the first threshold (or the second threshold) in the first time period in the home mode.
In some embodiments, different scene modes and/or user information may correspond to the same or different lock modes. For example, when the user X associated with the smart lock is in the travel mode, and the number of times of verification errors of the password unlocking of the authorized unlocking mode of the user X in a first time period is greater than a first threshold value, the functions of the user X using all authorized unlocking modes can be limited in a second longer time period (for example, 10 minutes); when all users associated with the intelligent lock are in a trip mode, when the number of verification errors of password unlocking in a first time period in the authorized unlocking mode of the user X is greater than a first threshold value, the functions of all authorized unlocking modes used by all associated users can be limited.
In some embodiments, the second time period (i.e., the defined duration) may be dynamically adjusted in real-time based on user information and/or a scenario mode based on a verification error condition of the smart lock. For example, when the function of limiting the use of the at least one unlocking manner by the user is reached and the first and second time periods T1 are not limited, and the number of verification errors of the at least one unlocking manner again exceeds the first threshold value in the second first time period, the second and second time periods T2 will be extended, i.e., the second and second time periods T2 are longer than the first and second time periods T1. The accumulation circulation mechanism can be used for clearing, namely the accumulation of the first time period and/or the second time period is terminated after the unlocking mode passes verification or the intelligent lock is unlocked. For another example, the value of the second time period corresponding to the primary user may not be changed, and the values of the second time periods corresponding to other users may adopt an accumulation loop mechanism.
In some embodiments, the scene mode may be dominant and other information to assist in determining the lock mode. For example, when the second time period corresponding to the scene mode is T3, the second time period corresponding to the unlocking manner in which the total number of verification errors is greater than the first threshold value is T4, and the second time period corresponding to the unlocking manner is T5, the T3 of the current scene mode may be determined as the final second time period. For another example, if the function that the user uses all types of unlocking manners is limited in the travel mode, and only the function that the user X uses the unlocking manner with the total number of times of verification errors being greater than the first threshold or the second threshold is limited when the user X has an unlocking error, it may be finally determined that the locking mode is the function that the user X uses all types of authorized unlocking manners.
In some embodiments, user information may be used as a guide, and other information may be used to assist in determining the locking mode of the smart lock. In some embodiments, the locking mode of the smart lock may be determined by an average, or a maximum, or a minimum, etc. For example, if the value of the second time period T in the travel mode is a1, the unlocking manner in which the total number of verification errors is greater than the first threshold is class B, and the value of the second time period T in the class B unlocking manner is a2, and a1 is smaller than a2, then a2 may be determined as the final second time period.
In step 640, locking is performed based on the locking mode. In some embodiments, step 640 may be performed by control module 420.
In some embodiments, the function of the corresponding unlocking manner used by the corresponding user within the determined second time period may be defined based on the determined locking mode in step 630. For example, a function that user X unlocks using a fingerprint within the second time period a2 is defined.
It should be noted that the above description related to the flow 600 is only for illustration and explanation, and does not limit the applicable scope of the present application. Various modifications and changes to flow 600 may occur to those skilled in the art, given the benefit of this disclosure. For example, in step 630, it may be determined that the locking mode corresponding to the current scene mode is the final locking mode based on the unlocking mode and the current scene mode of the smart lock, where the total number of verification errors is greater than the first threshold. However, such modifications and variations are intended to be within the scope of the present application.
FIG. 7 is a schematic flow diagram of an intelligent lock control method according to other embodiments of the present application.
As shown in fig. 7, in some embodiments, based on the information of each unlocking manner verification error of the user, when the number of verification errors of one of the unlocking manners in the first time period is greater than the second threshold, the user information corresponding to the unlocking manner and the scene mode of the smart lock are determined, and the locking mode is determined according to the unlocking manner, the user information corresponding to the unlocking manner, and the scene mode of the smart lock. In some embodiments, the steps 725 and 727 may be omitted in the dashed box, i.e., the execution subject of the intelligent lock unlocking manner control method (e.g., the intelligent lock 130 or the server 110, the intelligent lock control system 200, the computing device 300 or the intelligent lock control system 400 shown in fig. 1) may determine the locking mode directly based on the information of the unlocking manner verification error.
Step 710, obtaining the verification information of the user unlocking mode. In some embodiments, step 710 may be performed by the obtaining module 410 (e.g., the unlocking information obtaining unit 413).
In some embodiments, the verification information of the unlocking manner may be obtained in response to the unlocking manner verification error, for example, the number of verification errors and time information of the verification errors of the unlocking manner in the first time period. In some embodiments, the authentication information of the user unlocking manner may be acquired from a storage device (the storage module 230, the read only memory 330, or the random access memory 340), a terminal device (such as the terminal device 140), or a server (such as the server 110).
In some embodiments, it may be determined whether the number of verification errors of the unlocking manner in the first time period is greater than a second threshold based on the verification information of the unlocking manner, and step 725 and/or step 727 may be performed in response to being greater than the second threshold.
Step 725, step 727, step 730 and step 740 are respectively similar to step 625, step 627, step 630 and step 640 in the process 600, and more contents can be referred to the related description in the process 600, and are not described herein again.
It is understood that the execution sequence of step 725 and step 727 in this embodiment is only an example, and does not limit the present application. In some embodiments, step 727 may be performed first followed by step 725, or both step 725 and step 727 may be performed simultaneously. In some embodiments, only step 725 or step 727 may be performed, without limitation.
It should be noted that the above description related to the flow 700 is only for illustration and explanation, and does not limit the applicable scope of the present application. Various modifications and changes to flow 700 may occur to those skilled in the art upon review of the present application. However, such modifications and variations are still within the scope of the present application.
The method for controlling the unlocking mode of the intelligent lock provided by the embodiment of the application comprises the steps that (1) when the current unlocking mode is verified to be wrong, verification information of the unlocking mode or all unlocking modes is obtained, and functions and/or corresponding limited duration of one or more unlocking modes used by a limited user are determined based on the verification information, so that the flexibility of a locking mechanism of the intelligent lock can be improved, and the reliability and the safety of the method for controlling the unlocking mode of the intelligent lock are improved; (2) the locking mode of the intelligent lock is determined based on the scene mode, so that the diversity of the intelligent lock and the reliability of a locking mechanism can be improved; (3) the locking mode is determined based on the user information, so that the flexibility and the stability of the use of the intelligent lock can be improved.
Having thus described the basic concept, it will be apparent to those skilled in the art that the foregoing detailed disclosure is to be considered merely illustrative and not restrictive of the broad application. Various modifications, improvements and adaptations to the present application may occur to those skilled in the art, although not explicitly described herein. Such modifications, improvements and adaptations are proposed in the present application and thus fall within the spirit and scope of the exemplary embodiments of the present application.
Also, this application uses specific language to describe embodiments of the application. Reference throughout this specification to "one embodiment," "an embodiment," and/or "some embodiments" means that a particular feature, structure, or characteristic described in connection with at least one embodiment of the present application is included in at least one embodiment of the present application. Therefore, it is emphasized and should be appreciated that two or more references to "an embodiment" or "one embodiment" or "an alternative embodiment" in various places throughout this application are not necessarily all referring to the same embodiment. Furthermore, certain features, structures, or characteristics may be combined as suitable in one or more embodiments of the application.
Moreover, those skilled in the art will appreciate that aspects of the present application may be illustrated and described in terms of several patentable species or situations, including any new and useful combination of processes, machines, manufacture, or materials, or any new and useful improvement thereon. Accordingly, aspects of the present application may be embodied entirely in hardware, entirely in software (including firmware, resident software, micro-code, etc.) or in a combination of hardware and software. The above hardware or software may be referred to as "data block," module, "" engine, "" unit, "" component, "or" system. Furthermore, aspects of the present application may be represented as a computer product, including computer readable program code, embodied in one or more computer readable media.
The computer storage medium may comprise a propagated data signal with the computer program code embodied therewith, for example, on baseband or as part of a carrier wave. The propagated signal may take any of a variety of forms, including electromagnetic, optical, etc., or any suitable combination. A computer storage medium may be any computer-readable medium that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code located on a computer storage medium may be propagated over any suitable medium, including radio, cable, fiber optic cable, RF, or the like, or any combination of the preceding.
Computer program code required for operation of various portions of the present application may be written in any one or more programming languages, including an object oriented programming language such as Java, Scala, Smalltalk, Eiffel, JADE, Emerald, C + +, C #, VB.NET, Python, and the like, a conventional programming language such as C, Visual Basic, Fortran 2003, Perl, COBOL 2002, PHP, ABAP, a dynamic programming language such as Python, Ruby, and Groovy, or other programming languages, and the like. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the latter scenario, the remote computer may be connected to the user's computer through any network format, such as a Local Area Network (LAN) or a Wide Area Network (WAN), or the connection may be made to an external computer (for example, through the Internet), or in a cloud computing environment, or as a service, such as a software as a service (SaaS).
Additionally, the order in which elements and sequences of the processes described herein are processed, the use of alphanumeric characters, or the use of other designations, is not intended to limit the order of the processes and methods described herein, unless explicitly claimed. While various presently contemplated embodiments of the invention have been discussed in the foregoing disclosure by way of example, it is to be understood that such detail is solely for that purpose and that the appended claims are not limited to the disclosed embodiments, but, on the contrary, are intended to cover all modifications and equivalent arrangements that are within the spirit and scope of the embodiments herein. For example, although the system components described above may be implemented by hardware devices, they may also be implemented by software-only solutions, such as installing the described system on an existing server or mobile device.
Similarly, it should be noted that in the preceding description of embodiments of the application, various features are sometimes grouped together in a single embodiment, figure, or description thereof for the purpose of streamlining the disclosure aiding in the understanding of one or more of the embodiments. This method of disclosure, however, is not intended to require more features than are expressly recited in the claims. Indeed, the embodiments may be characterized as having less than all of the features of a single embodiment disclosed above.
Numerals describing the number of components, attributes, etc. are used in some embodiments, it being understood that such numerals used in the description of the embodiments are modified in some instances by the use of the modifier "about", "approximately" or "substantially". Unless otherwise indicated, "about", "approximately" or "substantially" indicates that the number allows a variation of ± 20%. Accordingly, in some embodiments, the numerical parameters used in the specification and claims are approximations that may vary depending upon the desired properties of the individual embodiments. In some embodiments, the numerical parameter should take into account the specified significant digits and employ a general digit preserving approach. Notwithstanding that the numerical ranges and parameters setting forth the broad scope of the range are approximations, in the specific examples, such numerical values are set forth as precisely as possible within the scope of the application.
Each patent, patent application publication, and other material, such as articles, books, applications, publications, documents, and the like, cited in this application is hereby incorporated by reference in its entirety. Except where the application is filed in a manner inconsistent or contrary to the present disclosure, and except where the claim is filed in its broadest scope (whether present or later appended to the application) as well. It is noted that the descriptions, definitions and/or use of terms in this application shall control if they are inconsistent or contrary to the statements and/or uses of the present application in the material attached to this application.
Finally, it should be understood that the embodiments described herein are merely illustrative of the principles of the embodiments of the present application. Other variations are also possible within the scope of the present application. Thus, by way of example, and not limitation, alternative configurations of the embodiments of the present application may be viewed as being consistent with the teachings of the present application. Accordingly, the embodiments of the present application are not limited to only those embodiments explicitly described and depicted herein.

Claims (15)

1. A control method of an intelligent lock is characterized by comprising the following steps:
acquiring verification information of at least two unlocking modes of a user, wherein the verification information of the unlocking modes at least comprises the unlocking modes and verification records of the unlocking modes, and the verification records at least comprise verification error times and verification error time information of the unlocking modes in a first time period;
judging whether the function of using at least one unlocking mode of the at least two unlocking modes by the user is limited in a corresponding second time period or not based on the verification information of the at least two unlocking modes, wherein the function comprises the following steps:
dynamically adjusting a first threshold value according to the similarity between the verification information of at least one unlocking mode of the at least two unlocking modes and corresponding pre-stored verification information;
in response to the total number of verification errors of at least one unlocking mode in the at least two unlocking modes in the first time period being larger than the first threshold value, limiting the function of the user using the at least one unlocking mode in a corresponding second time period;
the at least two unlocking modes respectively correspond to different locking modes, and the locking modes comprise a defined second time period and/or a defined user.
2. The method of claim 1, further comprising:
acquiring a scene mode of the intelligent lock;
and judging whether the function of using at least one unlocking mode of the at least two unlocking modes by the user is limited in a corresponding second time period or not based on the scene mode and the verification information of the at least two unlocking modes.
3. The method of claim 1, further comprising:
determining user information of the user;
and judging whether the function of using at least one unlocking mode of the at least two unlocking modes by the user is limited in a corresponding second time period or not based on the user information and the verification information of the at least two unlocking modes.
4. The method of claim 1, further comprising:
and when the limited time reaches the corresponding second time period, the verification error times and the verification error time information of the corresponding unlocking mode are not limited and cleared.
5. The method of claim 1, further comprising:
adjusting the first time period and/or the second time period based on the unlocking manner.
6. The method of claim 1, further comprising:
and adjusting the verification error number threshold of the unlocking mode, the first time period or the second time period based on the scene mode of the intelligent lock.
7. The method of claim 1, wherein the unlocking means comprises password unlocking, biometric unlocking, near field communication unlocking, or mechatronic key unlocking.
8. The method of claim 7, wherein when the unlocking mode is the biometric unlocking, the method further comprises:
and dynamically adjusting the verification error frequency threshold of the unlocking mode based on the verification result of the biological identification unlocking mode.
9. A control method of an intelligent lock is characterized by comprising the following steps:
acquiring verification information of at least two unlocking modes of a user, wherein the verification information of the unlocking modes at least comprises the unlocking modes and verification records of the unlocking modes, and the verification records at least comprise verification error times and verification error time information of the unlocking modes in a first time period;
judging whether a function of using at least one unlocking mode of the at least two unlocking modes by the user is limited in a corresponding second time period or not based on the verification information of the at least two unlocking modes, wherein at least two thresholds respectively corresponding to the at least two unlocking modes are determined;
dynamically adjusting a corresponding threshold value according to the similarity between the verification information of one unlocking mode of the at least two unlocking modes and corresponding pre-stored verification information;
in response to the verification error times of one of the at least two unlocking manners in the first time period being greater than the corresponding threshold value, limiting the function of the user using the unlocking manner in a corresponding second time period;
the at least two unlocking modes respectively correspond to different locking modes, and the locking modes comprise a defined second time period and/or a defined user.
10. A control system for a smart lock, the system comprising:
the system comprises an acquisition module, a processing module and a processing module, wherein the acquisition module is used for acquiring verification information of at least two unlocking modes of a user, the verification information of the unlocking modes at least comprises the unlocking modes and verification records of the unlocking modes, and the verification records at least comprise verification error times and verification error time information of the unlocking modes in a first time period;
the control module is used for judging whether the function of using at least one unlocking mode in the at least two unlocking modes by the user is limited in a corresponding second time period or not based on the verification information of the at least two unlocking modes, and comprises the following steps:
dynamically adjusting a first threshold value according to the similarity between the verification information of at least one unlocking mode of the at least two unlocking modes and corresponding pre-stored verification information;
in response to the total number of verification errors of at least one unlocking mode in the at least two unlocking modes in the first time period being larger than the first threshold value, limiting the function of the user using the at least one unlocking mode in a corresponding second time period;
the at least two unlocking modes respectively correspond to different locking modes, and the locking modes comprise a defined second time period and/or a defined user.
11. The system of claim 10,
the acquisition module is further used for acquiring a scene mode of the intelligent lock;
the control module is further configured to determine whether to limit a function of the user using at least one of the at least two unlocking manners within a corresponding second time period based on the scene mode and the verification information of the at least two unlocking manners.
12. The system of claim 10,
the acquisition module is further used for determining the user information of the user;
the control module is further configured to determine whether to limit a function of the user using at least one of the at least two unlocking manners within a corresponding second time period based on the user information and the verification information of the at least two unlocking manners.
13. A control system for a smart lock, the system comprising:
the system comprises an acquisition module, a verification module and a verification module, wherein the acquisition module is used for acquiring verification information of at least two unlocking modes of a user, the verification information of the unlocking modes at least comprises the unlocking modes and verification records of the unlocking modes, and the verification records at least comprise verification error times and verification error time information of the unlocking modes in a first time period;
the control module is used for judging whether a function of using at least one unlocking mode of the at least two unlocking modes by the user is limited in a corresponding second time period or not based on the verification information of the at least two unlocking modes, wherein at least two threshold values respectively corresponding to the at least two unlocking modes are determined;
dynamically adjusting a corresponding threshold value according to the similarity between the verification information of one of the at least two unlocking modes and the corresponding pre-stored verification information;
in response to the verification error times of one of the at least two unlocking modes in the first time period being larger than the corresponding threshold value, limiting the function of the unlocking mode used by the user in a corresponding second time period;
the at least two unlocking modes respectively correspond to different locking modes, and the locking modes comprise a defined second time period and/or a defined user.
14. A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the processor implements the method according to any of claims 1-9 when executing the computer program.
15. A computer-readable storage medium storing computer instructions which, when read by a computer, cause the computer to perform the method of any one of claims 1-9.
CN202111456245.1A 2021-12-02 2021-12-02 Control method and system of intelligent lock Active CN113870468B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202111456245.1A CN113870468B (en) 2021-12-02 2021-12-02 Control method and system of intelligent lock
CN202211114763.XA CN115482608B (en) 2021-12-02 2021-12-02 Control method and system of intelligent lock

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111456245.1A CN113870468B (en) 2021-12-02 2021-12-02 Control method and system of intelligent lock

Related Child Applications (1)

Application Number Title Priority Date Filing Date
CN202211114763.XA Division CN115482608B (en) 2021-12-02 2021-12-02 Control method and system of intelligent lock

Publications (2)

Publication Number Publication Date
CN113870468A CN113870468A (en) 2021-12-31
CN113870468B true CN113870468B (en) 2022-09-30

Family

ID=78985535

Family Applications (2)

Application Number Title Priority Date Filing Date
CN202111456245.1A Active CN113870468B (en) 2021-12-02 2021-12-02 Control method and system of intelligent lock
CN202211114763.XA Active CN115482608B (en) 2021-12-02 2021-12-02 Control method and system of intelligent lock

Family Applications After (1)

Application Number Title Priority Date Filing Date
CN202211114763.XA Active CN115482608B (en) 2021-12-02 2021-12-02 Control method and system of intelligent lock

Country Status (1)

Country Link
CN (2) CN113870468B (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114360114B (en) * 2022-03-14 2022-07-29 云丁网络技术(北京)有限公司 User authority management method and system
CN114090678A (en) * 2022-01-18 2022-02-25 云丁网络技术(北京)有限公司 Database information management method and system
CN114445939A (en) * 2022-03-10 2022-05-06 珠海格力电器股份有限公司 Unlocking method and device, electronic equipment and storage medium
CN115424378B (en) * 2022-09-02 2023-12-29 广东好太太智能家居有限公司 Safety protection method and device for intelligent coded lock and related equipment
CN116152962A (en) * 2023-01-04 2023-05-23 北京飞利信信息安全技术有限公司 Unlocking method and device of intelligent lock
CN117079377A (en) * 2023-06-07 2023-11-17 南通新旋利机械科技有限公司 Method and system for improving induction recognition rate of automatic door

Family Cites Families (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2732579B1 (en) * 2011-07-12 2020-06-24 Assa Abloy Ab Event driven second factor credential authentication
CN102638343A (en) * 2012-03-06 2012-08-15 深圳市福智软件技术有限公司 Handheld device and method for unlocking by same
CN108090331A (en) * 2017-12-04 2018-05-29 珠海格力电器股份有限公司 A kind of unlocking method and equipment
CN109461232A (en) * 2018-10-17 2019-03-12 广州慧享佳物联科技有限公司 Control method for electronic lock, computer equipment and storage medium
CN109636966B (en) * 2018-11-26 2021-02-26 深圳绿米联创科技有限公司 Door lock control method, system, device, electronic equipment and storage medium
CN110322599B (en) * 2019-05-23 2021-10-26 深圳绿米联创科技有限公司 Door lock management method and device, electronic equipment and storage medium
CN110335377B (en) * 2019-05-24 2022-05-13 深圳绿米联创科技有限公司 Fingerprint verification method and device, electronic equipment and storage medium
CN110570549B (en) * 2019-07-26 2021-07-06 华中科技大学 Intelligent unlocking method and corresponding device
CN110532416A (en) * 2019-08-30 2019-12-03 成都智元汇信息技术股份有限公司 A method of improving recognition of face efficiency and precision
CN111260831A (en) * 2020-02-25 2020-06-09 深圳桔子智能科技发展有限公司 Intelligent door lock control device, method and system
CN112287320A (en) * 2020-11-02 2021-01-29 刘高峰 Identity verification method and device based on biological characteristics and client
CN112581656A (en) * 2020-11-27 2021-03-30 山东浪潮通软信息科技有限公司 Identity verification method, mobile phone and intelligent door lock
CN113362499A (en) * 2021-05-25 2021-09-07 广州朗国电子科技有限公司 Embedded face recognition intelligent door lock

Also Published As

Publication number Publication date
CN115482608B (en) 2024-05-28
CN115482608A (en) 2022-12-16
CN113870468A (en) 2021-12-31

Similar Documents

Publication Publication Date Title
CN113870468B (en) Control method and system of intelligent lock
US11403902B2 (en) Access management system
US9805534B2 (en) Increased security electronic lock
US10246055B2 (en) Method for authorizing a driver to activate at least one system of a vehicle, based on a biometric authentication process
US20180108192A1 (en) Access management system
AU2004301168B2 (en) Remote entry system
CN108091011A (en) Method and system of the verification technique to equipment progress permission control is unified by the testimony of a witness
CN109389709B (en) Unlocking control system and unlocking control method
KR101218297B1 (en) System and Method for Controlling Door Lock
EP3503608B1 (en) Authentication system and authentication device
CN107644157A (en) Portable electron device and its operating method
JP2009181561A (en) Security management system using biometric authentication
CN114120487B (en) Automobile digital key management method, system, equipment and storage medium
WO2019173521A1 (en) Frictionless access control system for a building
CN109243014A (en) Access control system and the double mirror unlocking methods of gate inhibition
JP7057944B2 (en) Authentication system and authentication method
CN117081750A (en) Method and system for the controlled release of at least one function of a device in terms of time
KR20090041619A (en) Entrance and exit control system
CN109057558A (en) A kind of back locking structure door lock control system and its working method
CN110415406A (en) A kind of double nets are mutual to monitor security intelligent door lock system for speech recognition
CN111915774B (en) Remote intelligent assisted unlocking method and device
KR101226645B1 (en) Method for Managing Digital Locking Apparatus By Using Bionic Information, System And Managing Apparatus
CN114090678A (en) Database information management method and system
CN117688542B (en) Security management system based on fingerprint call data
US20240005712A1 (en) Controlling access based on a machine-learning model

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP01 Change in the name or title of a patent holder

Address after: 100094 room 1101, 11 / F, building 1, zone 2, 81 Beiqing Road, Haidian District, Beijing

Patentee after: Yunding Network Technology (Beijing) Co.,Ltd.

Address before: 100094 room 1101, 11 / F, building 1, zone 2, 81 Beiqing Road, Haidian District, Beijing

Patentee before: YUN DING NETWORK TECHNOLOGY (BEIJING) Co.,Ltd.

CP01 Change in the name or title of a patent holder