CN114673427A - Safe box control method and device and safe box system - Google Patents

Safe box control method and device and safe box system Download PDF

Info

Publication number
CN114673427A
CN114673427A CN202210468479.6A CN202210468479A CN114673427A CN 114673427 A CN114673427 A CN 114673427A CN 202210468479 A CN202210468479 A CN 202210468479A CN 114673427 A CN114673427 A CN 114673427A
Authority
CN
China
Prior art keywords
safe
verification
user
safe box
box
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210468479.6A
Other languages
Chinese (zh)
Inventor
孙英明
张升
王尹哲
叶奇青
茅冬梅
黄雯
唐毅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Agricultural Bank of China
Original Assignee
Agricultural Bank of China
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Agricultural Bank of China filed Critical Agricultural Bank of China
Priority to CN202210468479.6A priority Critical patent/CN114673427A/en
Publication of CN114673427A publication Critical patent/CN114673427A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • EFIXED CONSTRUCTIONS
    • E05LOCKS; KEYS; WINDOW OR DOOR FITTINGS; SAFES
    • E05GSAFES OR STRONG-ROOMS FOR VALUABLES; BANK PROTECTION DEVICES; SAFETY TRANSACTION PARTITIONS
    • E05G1/00Safes or strong-rooms for valuables
    • E05G1/10Safes or strong-rooms for valuables with alarm, signal or indicator

Landscapes

  • Lock And Its Accessories (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The application provides a safe box control method, a control device and a safe box system, wherein a camera on a safe box is controlled to shoot to obtain a first verification image according to triggering operation aiming at a remote verification control on the safe box, and the first verification image comprises face information of a first user; sending a first verification request carrying the first verification image to a server; after an unlocking instruction returned by the server is received, the intelligent control lock of the safe box is controlled to be unlocked; the unlocking instruction is generated after the server sends a first verification request carrying the first verification image to a terminal corresponding to a binding user of the safe box and obtains a verification passing result from the terminal. Therefore, when the first user requests to open the safe box, the binding user of the safe box can remotely verify the first user and confirm that the verification is passed, so that the safe box is opened, and the use experience of the user is greatly improved.

Description

Safe box control method and device and safe box system
Technical Field
The application relates to the field of safes, in particular to a safe control method, a safe control device and a safe system.
Background
With the increasing awareness of people about safety and protection, more and more people choose to use the safe box to store valuables, documents and the like. Most of the existing safes are placed at a set position as independent units and are in a silent closing state under general conditions, the safes can be divided into a mechanical safe and an electronic safe according to the password working principle of the safes, and the mechanical safe has the characteristics of mature technology and low price, such as a mechanical key and a mechanical password lock. The common safe box early warning working principle is analyzed, and a mechanical switch and a vibration sensor are generally used, or a password, a fingerprint verification error and the like are used for triggering a local anti-theft alarm.
However, the existing safe lacks a communication interaction function, so that the requirements of remote opening and the like cannot be met, particularly, the safe cannot be opened in a scene that articles are stored in the safe which is urgently needed and the bound user of the safe is not on site, and the user experience is greatly reduced.
Disclosure of Invention
In view of this, an object of the present application is to provide a safe control method, a control device, and a safe system, which can ensure that a user binding a safe can also control the safe to open when the user is not on site, thereby greatly improving the user experience of the user. The specific scheme is as follows:
in a first aspect, the present application provides a safe control method, including:
controlling a camera on a safe box to shoot according to a triggering operation aiming at a remote verification control on the safe box to obtain a first verification image, wherein the first verification image comprises face information of a first user;
sending a first verification request carrying the first verification image to a server;
after an unlocking instruction returned by the server is received, the intelligent control lock of the safe box is controlled to be unlocked; the unlocking instruction is generated after the server sends a first verification request carrying the first verification image to a terminal corresponding to a binding user of the safe box and obtains a verification passing result from the terminal.
Optionally, before the server obtains the verification passing result from the terminal, the server obtains a second verification image shot by the terminal for the user, and determines that the second verification image is matched with a pre-stored image of the bound user; the second verification image includes face information of a second user.
Optionally, the method further comprises:
and according to the triggering operation of the local verification control on the safe in the preset time period, determining that the NFC connection between the near field communication module of the safe and the near field communication module of the terminal is successfully established so as to control the opening of the intelligent control lock of the safe.
Optionally, the method further comprises:
controlling a camera on a safe box to shoot to obtain a third verification image according to the triggering operation of a local verification control on the safe box in a preset time period, wherein the third verification image comprises face information of a third user;
determining that the NFC connection is successfully established between the near field communication module of the safe and the near field communication module of the terminal, and determining that the third verification image is matched with an image of a bound user prestored in a data storage module of the safe so as to control the opening of an intelligent control lock of the safe; the third verification image includes face information of a third user.
Optionally, the method further comprises:
receiving a first instruction sent by a safety detection module of the safe box; the first instruction is used for indicating that the distance between a first user and the safe box is smaller than a preset distance;
and if the stay time of the first user is longer than the preset time, controlling a local alarm module of the safe box to send an alarm signal, and sending the first verification image to a data storage module of the safe box, and/or sending early warning information carrying the first verification image to the server.
Optionally, after the intelligently controlled lock of the safe box is controlled to be unlocked after the unlocking instruction returned by the server is received, the method further includes:
generating unpacking information and sending the unpacking information to the server; the unpacking information includes: the time of opening the box, the face information of the person opening the box and the time of closing the box.
In a second aspect, an embodiment of the present application further provides a safe control device, including:
the system comprises an acquisition unit, a verification unit and a verification unit, wherein the acquisition unit is used for controlling a camera on a safe box to shoot according to triggering operation aiming at a remote verification control on the safe box to obtain a first verification image, and the first verification image comprises face information of a first user;
a sending unit, configured to send a first authentication request carrying the first authentication image to a server;
the control unit is used for controlling the intelligent control lock of the safe box to be unlocked after receiving the unlocking instruction returned by the server; the unlocking instruction is generated after the server sends a first verification request carrying the first verification image to a terminal corresponding to a binding user of the safe box and obtains a verification passing result from the terminal.
In a third aspect, an embodiment of the present application further provides a safe system, including:
a controller for performing the safe control method as described above;
the safe box is used for storing articles and realizing the box opening operation through the intelligent control lock;
the remote authentication control is used for receiving triggering operation from a first user so as to perform identity authentication through the server;
the camera is used for shooting a first verification image, and the first verification image comprises face information of a first user.
Optionally, the method further comprises:
the near field communication module is used for establishing NFC connection with the near field communication module of the terminal;
and the local verification control is used for receiving triggering operation from a third user so as to carry out identity verification through the data storage module of the safe box.
Optionally, the method further comprises:
and the local alarm module is used for controlling the local alarm module of the safe box to send an alarm signal if the stay time of the first user is longer than the preset time.
The safety detection module is used for sending a first instruction to the controller; the first instruction is used for indicating that the distance between the first user and the safe box is smaller than a preset distance.
The embodiment of the application provides a safe box control method, a control device and a safe box system, wherein a camera on a safe box is controlled to shoot to obtain a first verification image according to a triggering operation aiming at a remote verification control on the safe box, and the first verification image comprises face information of a first user; sending a first verification request carrying the first verification image to a server; after an unlocking instruction returned by the server is received, the intelligent control lock of the safe box is controlled to be unlocked; the unlocking instruction is generated after the server sends a first verification request carrying the first verification image to a terminal corresponding to a binding user of the safe box and obtains a verification passing result from the terminal. Therefore, in the embodiment of the application, when the first user requests to open the safe, the binding user of the safe can remotely verify the first user and confirm that the verification is passed, so that the safe is opened. Therefore, even if the binding user of the safe box is not on the spot, the safe box can be authorized by others to open the safe box, important article files can be conveniently stored and taken, the use scene of the safe box is enlarged, and the use experience of the user is greatly improved.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
FIG. 1 illustrates a schematic diagram of a safe system provided by an embodiment of the present application;
FIG. 2 is a flow chart illustrating a method for controlling a safe provided by an embodiment of the present application;
FIG. 3 is a schematic diagram of yet another safe system provided by an embodiment of the present application;
fig. 4 is a block diagram of a safe control device according to an embodiment of the present disclosure.
Detailed Description
In order to make the aforementioned objects, features and advantages of the present application more comprehensible, embodiments accompanying the present application are described in detail below with reference to the accompanying drawings.
In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present application, but the present application may be practiced in other ways than those described herein, and it will be apparent to those of ordinary skill in the art that the present application is not limited by the specific embodiments disclosed below.
As described in the background art, the existing safe lacks a communication interaction function, so that the requirements of remote opening and the like cannot be met, and particularly, the safe cannot be opened in a scene that articles are stored in the safe which is urgently needed and the bound user of the safe is not on the spot, so that the user experience is greatly reduced.
Based on the technical problem, the embodiment of the application provides a safe box control method, which includes controlling a camera on a safe box to shoot to obtain a first verification image according to a triggering operation aiming at a remote verification control on the safe box, wherein the first verification image comprises face information of a first user; sending a first verification request carrying the first verification image to a server; after an unlocking instruction returned by the server is received, the intelligent control lock of the safe box is controlled to be unlocked; the unlocking instruction is generated after the server sends a first verification request carrying the first verification image to a terminal corresponding to a binding user of the safe box and obtains a verification passing result from the terminal. Therefore, in the embodiment of the application, when the first user requests to open the safe, the binding user of the safe can remotely verify the first user and confirm that the verification is passed, so that the safe is opened. Therefore, even if the binding user of the safe box is not on the spot, the safe box can be authorized by others to open the safe box, important article files can be conveniently stored and taken, the use scene of the safe box is enlarged, and the use experience of the user is greatly improved.
In the embodiment of the present application, referring to fig. 1, a schematic diagram of a safe system provided in the embodiment of the present application is shown. Including safe, server and terminal, can realize the interconnection through wireless mode between the three, the safe includes controller, long-range verification controlling part, camera, intelligent control lock. The safe box can be placed at a designated position to store articles, the remote verification control can provide a remote verification mode for a user to use, the server can serve as a monitoring center to monitor the environment around the safe box and the state of the safe box, and the terminal can be a terminal corresponding to a binding user of the safe box, for example, the terminal can be a mobile phone of the binding user. When the safe box is initially set, the face information of the bound user of the safe box can be collected and input, and the safe box and the server store the face information.
For convenience of understanding, a safe control method, a safe control device and a safe system provided in the embodiments of the present application are described in detail below with reference to the accompanying drawings.
Referring to fig. 2, a flowchart of a safe control method provided in an embodiment of the present application is applied to the above controller, and the method may include the following steps.
S101, controlling a camera on the safe box to shoot to obtain a first verification image according to triggering operation of a remote verification control on the safe box.
In the embodiment of the application, when the unbound user of the safe needs to open the safe, the bound user of the safe needs to verify and authorize the unbound user because the unbound user is not the bound user of the safe and does not have the right to open the safe. The safe box is provided with the remote verification control, and when the safe box is opened by the unbound user of the safe box, the remote verification control on the safe box can be triggered to complete the identity verification of the bound user of the safe box on the unbound user of the safe box.
In the embodiment of the application, the first user is an unbound user who does not have an opening right to the safe, the first user can trigger the remote verification control on the safe, and after receiving the trigger operation for the remote verification control, the controller can control the camera of the safe to shoot the surrounding environment of the safe to obtain a first verification image, wherein the first verification image comprises face information of the first user. For example, a bound user of the safe is zhang, but zhang cannot open the safe in person due to personal reasons, the article can be entrusted to lie four to open the safe to access, at this time, lie four is an unbound user of the safe, that is, a first user, lie four can trigger a remote authentication control on the safe, after a controller of the safe receives a trigger operation, a camera on the safe can shoot a first authentication image, and the first authentication image includes an authentication picture of a face image of lie four.
S102, sending a first verification request carrying the first verification image to a server.
In the embodiment of the application, the server and the safe box can communicate in a wireless mode, and after the controller controls the camera on the safe box to shoot a first verification image, a first verification request can be sent to the server, wherein the first verification request carries the first verification image and is used for requesting to verify the face information of the first user. For example, a first authentication request carrying a face image of lie four is sent to the server.
And S103, after receiving the unlocking instruction returned by the server, controlling the intelligent control lock of the safe box to be unlocked.
In the embodiment of the application, the binding user of the safe box may have a corresponding terminal device, such as a mobile phone, and the server and the terminal corresponding to the binding user of the safe box may communicate in a wireless manner, and specifically, the server may communicate with the terminal in a manner of mobile phone app, short message, wechat applet, wechat public number, and the like. The unlocking instruction is generated after the server sends a first verification request carrying the first verification image to a terminal corresponding to a binding user of the safe box and obtains a verification passing result from the terminal.
In this application embodiment, the server can send a first verification request to a terminal corresponding to a binding user of the safe, the first verification request carries a first verification image, the terminal can send a verification passing result to the server after receiving an authorization result of the binding user of the safe, and then the server generates and sends an unlocking instruction to the controller, so that the intelligent control lock of the safe is controlled to be unlocked. For example, the face image of the fourth user's article of the safe is acquired by the camera of the safe, so that the third user of the safe can view the face image of the fourth article of the safe on the mobile phone, and then the right is passed, so that the safe can be opened, and the fourth article of the safe can access the articles in the safe. Therefore, even if the binding user of the safe box is not on site, the first user can be authorized to open the safe box, important article files can be conveniently stored and taken, the use scene of the safe box is enlarged, and the use experience of the user is greatly improved.
In the embodiment of the application, the terminal corresponding to the binding user of the safe box needs to be verified by the user, so that the user is determined to be the binding user of the safe box, the terminal is prevented from being stolen by other people for authorization, and the use safety of the safe box can be improved. Before the server acquires the verification passing result from the terminal, the server acquires a second verification image shot by the terminal for a user, and determines that the second verification image is matched with a pre-stored image of a bound user; the second verification image includes face information of a second user.
Specifically, when a user holding the mobile terminal performs unpacking authorization, the terminal starts a face recognition function, photographs face images of the user and uploads the face images to the server, the server matches the face images of the user with images of bound users stored by the server, if the face images of the user are matched with the images of the bound users, authentication of the user is completed, and after the face images of the user are confirmed by the user, the safe can be opened. Meanwhile, the server carries out account book recording on the authorization time, the authorizer, the image of the person requesting to open the box, the closing time after use and the like; in addition, the authorized person can be set to be more than 1 person in the scene.
In the embodiment of the application, when the bound user of the safe box performs the box opening operation, the bound user needs to be authenticated. Referring to fig. 3, a schematic diagram of another safe system provided in the embodiment of the present application may further include a local verification control, a near field communication module, a security detection module, a local alarm module, a power supply module, a wireless communication module, and a data storage module. When the safe box is started for the first time, the controller in the safe box can collect and input the face information of the bound user of the safe box. After the safe box is started, the safety detection module starts to work normally, and the peripheral condition of the safe box can be monitored. The power module can supply power to the safe through the storage battery and also can supply power to the safe through an external power supply. The wireless communication module can realize the communication function between the safe box and the service.
Specifically, the safety detection module can be a vibration sensor, can also be an infrared sensor, also can be the camera, and when someone is close to the safe, the safety detection module can send the instruction to the controller, and the controller can control local alarm module to report an emergency and ask for help or increased vigilance, also can control the intelligence and control the lock and open.
In this application embodiment, when someone is close to the safe and passes through authentication within the preset time, then the controller can control the intelligent control lock to open. According to the triggering operation of the local verification control on the safe in the preset time period, the fact that NFC (Near Field Communication) connection is successfully established between the Near Field Communication module of the safe and the Near Field Communication module of the terminal is determined, and therefore the intelligent lock of the safe is controlled to be opened. Specifically, when a binding user of the safe needs to open the safe, within a preset retention time limit, first touching and pressing the local verification control, and then establishing the NFC connection between the terminal and the safe, the binding user of the safe can open the safe.
In the embodiment of the application, in order to avoid that the safe box is opened by embezzlement of the terminal of the binding user by other people, the major loss of the binding user is caused, the face recognition verification operation can be added, and the safety of opening the safe box is improved. Controlling a camera on a safe box to shoot to obtain a third verification image according to the triggering operation of a local verification control on the safe box in a preset time period, wherein the third verification image comprises face information of a third user; determining that the NFC connection is successfully established between the near field communication module of the safe and the near field communication module of the terminal, and determining that the third verification image is matched with an image of a bound user prestored in a data storage module of the safe so as to control the opening of an intelligent control lock of the safe; the third verification image includes face information of a third user.
Specifically, before the third user opens the safe, the camera on the safe shoots the face image of the third user, and after the controller determines that the safe is successfully connected with the terminal through NFC and determines that the face image of the third user is matched with the image of the binding user prestored in the data storage module of the safe, the third user can open the safe. The face image of the third user can be stored in a data storage module of the safe and uploaded to the server.
In the embodiment of the application, when someone approaches the safe box, the controller can control the local alarm module to alarm. Receiving a first instruction sent by a safety detection module of the safe box; the first instruction is used for indicating that the distance between a first user and the safe box is smaller than a preset distance; and if the stay time of the first user is longer than the preset time, controlling a local alarm module of the safe box to send an alarm signal, and sending the first verification image to a data storage module of the safe box and/or sending early warning information carrying the first verification image to the server.
Specifically, the camera continuously monitors people in a shooting range, when infrared or shooting detection shows that the stay time of people exceeds a preset value and people are not unpacked correctly, the controller can control the local alarm module to give an alarm in the forms of sound and light and the like, and sends an instruction to start the local storage of a shooting picture of the camera, and the controller can also send alarm information such as a monitoring screenshot to the trigger server to give an alarm, so that remote people are prompted to strengthen monitoring and respond and deal according to conditions.
In the embodiment of the application, the information of opening the safe box is recorded, the access of articles in the safe box is supervised, the safe box can be monitored in use, and the audit can be checked after the safe box is used. After the unlocking instruction returned by the server is received and the intelligent control lock of the safe box is controlled to be unlocked, box opening information can be generated and sent to the server; the unpacking information includes: the time of opening the box, the face information of the person opening the box and the time of closing the box.
In the embodiment of the application, when the binding user of the safe carries out local unpacking, the identified unpacking person, unpacking time and other information can be uploaded to the server background for recording. When the box is opened remotely, the server can perform account book recording on the authorized time, the authorized person, the image of the box opening person and the like. When the safe is normally stored and taken, the controller of the safe can upload the closing time information to the server background for recording. In addition, the terminal or the server can also verify and monitor articles stored in the safe through the camera, and the detailed condition of the articles stored at the current time is input through the terminal and uploaded to the server, so that the complete electronic record of the operation and use process of the safe is completed.
In the embodiment of the application, after the box is opened normally, articles stored and taken in the box can be monitored through the monitoring camera, and pictures shot by the camera are stored locally. When the safe box works normally, when the controller detects that the data stored in the local data storage module of the safe box is close to the upper storage limit, part of long-term video images shot by the cameras can be deleted preferentially, so that the normal storage and gear retaining functions are guaranteed. When the safe box is in a daily silent closing state, the terminal or the server can remotely call the multi-angle rotating monitoring camera on the safe box, and the multi-angle rotating monitoring camera is used for checking the internal condition of the safe box and performing inspection and spot check on the surrounding environment of the safe box.
The safe box is monitored and used based on the Internet of things, the legality verification of the identity of on-site and remote box opening operators can be realized, the off-site early warning monitoring is provided to prevent other people from maliciously damaging, the functions of remote interactive box opening, electronic record operation and the like are realized, and the mechanism for carrying out safety check and prevention on deliberate damage, conspiracy stealing and the like is provided. The application of functions such as safe box personnel authentication, electron access record, control patrol are mainly aimed at in this application embodiment, and other basic functions to current safe box are no longer repeated, if verify that select module button hides protection setting etc. to the safe box.
Based on the above control method for the safe, an embodiment of the present application further provides a control apparatus for the safe, and referring to fig. 4, the control apparatus for the safe provided in the embodiment of the present application is a block diagram, and the control apparatus may include:
the system comprises an acquisition unit 100, a processing unit and a processing unit, wherein the acquisition unit 100 is used for controlling a camera on a safe box to shoot according to a triggering operation aiming at a remote verification control on the safe box to obtain a first verification image, and the first verification image comprises face information of a first user;
a sending unit 200, configured to send a first authentication request carrying the first authentication image to a server;
the control unit 300 is configured to control the intelligent control lock of the safe to be unlocked after receiving the unlocking instruction returned by the server; the unlocking instruction is generated after the server sends a first verification request carrying the first verification image to a terminal corresponding to a binding user of the safe box and obtains a verification passing result from the terminal.
Embodiments of the present application further provide a safe system, which may include:
a controller for performing a control method of the safe;
the safe box is used for storing articles and realizing the box opening operation through the intelligent control lock;
the remote authentication control is used for receiving triggering operation from a first user so as to perform identity authentication through the server;
the camera is used for shooting a first verification image, and the first verification image comprises face information of a first user.
Optionally, the method further comprises:
the near field communication module is used for establishing NFC connection with the near field communication module of the terminal;
and the local verification control is used for receiving triggering operation from a third user so as to carry out identity verification through the data storage module of the safe box.
Optionally, the method further comprises:
and the local alarm module is used for controlling the local alarm module of the safe box to send an alarm signal if the stay time of the first user is longer than the preset time.
The safety detection module is used for sending a first instruction to the controller; the first instruction is used for indicating that the distance between the first user and the safe box is smaller than a preset distance.
The embodiment of the application provides a safe box control method, a control device and a safe box system, wherein a camera on a safe box is controlled to shoot to obtain a first verification image according to a triggering operation aiming at a remote verification control on the safe box, and the first verification image comprises face information of a first user; sending a first verification request carrying the first verification image to a server; after an unlocking instruction returned by the server is received, the intelligent control lock of the safe box is controlled to be unlocked; the unlocking instruction is generated after the server sends a first verification request carrying the first verification image to a terminal corresponding to a binding user of the safe box and obtains a verification passing result from the terminal. Therefore, in the embodiment of the application, when the first user requests to open the safe, the binding user of the safe can remotely verify the first user and confirm that the verification is passed, so that the safe is opened. Therefore, even if the binding user of the safe box is not on the spot, the safe box can be authorized by others to open the safe box, important article files can be conveniently stored and taken, the use scene of the safe box is enlarged, and the use experience of the user is greatly improved.
The embodiments in the present specification are described in a progressive manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, for the apparatus embodiment, since it is substantially similar to the method embodiment, it is relatively simple to describe, and reference may be made to some descriptions of the method embodiment for relevant points.
The foregoing is merely a preferred embodiment of the present application and, although the present application discloses the foregoing preferred embodiments, the present application is not limited thereto. Those skilled in the art can now make numerous possible variations and modifications to the disclosed embodiments, or modify equivalent embodiments, using the methods and techniques disclosed above, without departing from the scope of the claimed embodiments. Therefore, any simple modification, equivalent change and modification made to the above embodiments according to the technical essence of the present application still fall within the protection scope of the technical solution of the present application without departing from the content of the technical solution of the present application.

Claims (10)

1. A safe control method, comprising:
controlling a camera on a safe box to shoot according to a triggering operation aiming at a remote verification control on the safe box to obtain a first verification image, wherein the first verification image comprises face information of a first user;
sending a first verification request carrying the first verification image to a server;
after an unlocking instruction returned by the server is received, the intelligent control lock of the safe box is controlled to be unlocked; the unlocking instruction is generated after the server sends a first verification request carrying the first verification image to a terminal corresponding to a binding user of the safe box and obtains a verification passing result from the terminal.
2. The method according to claim 1, wherein before the server acquires the authentication passing result from the terminal, the server acquires a second authentication image taken by the terminal for the user and determines that the second authentication image matches a pre-stored image of the bound user; the second verification image includes face information of a second user.
3. The method of claim 1, further comprising:
and according to the triggering operation of the local verification control on the safe in the preset time period, determining that the NFC connection between the near field communication module of the safe and the near field communication module of the terminal is successfully established so as to control the opening of the intelligent control lock of the safe.
4. The method of claim 3, further comprising:
controlling a camera on a safe box to shoot to obtain a third verification image according to the triggering operation of a local verification control on the safe box in a preset time period, wherein the third verification image comprises face information of a third user;
determining that the NFC connection between the near field communication module of the safe and the near field communication module of the terminal is successfully established, and determining that the third verification image is matched with the image of the bound user prestored in the data storage module of the safe so as to control the opening of the intelligent control lock of the safe; the third verification image includes face information of a third user.
5. The method of claim 1, further comprising:
receiving a first instruction sent by a safety detection module of the safe box; the first instruction is used for indicating that the distance between a first user and the safe box is smaller than a preset distance;
and if the stay time of the first user is longer than the preset time, controlling a local alarm module of the safe box to send an alarm signal, and sending the first verification image to a data storage module of the safe box and/or sending early warning information carrying the first verification image to the server.
6. The method according to claim 1, wherein after the intelligently controlled lock controlling the safe is unlocked after receiving the unlocking instruction returned by the server, the method further comprises:
generating unpacking information and sending the unpacking information to the server; the unpacking information includes: the time of opening the box, the face information of the person opening the box and the time of closing the box.
7. A safe control apparatus, comprising:
the system comprises an acquisition unit, a verification unit and a verification unit, wherein the acquisition unit is used for controlling a camera on a safe box to shoot according to triggering operation aiming at a remote verification control on the safe box to obtain a first verification image, and the first verification image comprises face information of a first user;
a sending unit, configured to send a first authentication request carrying the first authentication image to a server;
the control unit is used for controlling the intelligent control lock of the safe box to be unlocked after receiving the unlocking instruction returned by the server; the unlocking instruction is generated after the server sends a first verification request carrying the first verification image to a terminal corresponding to a binding user of the safe box and obtains a verification passing result from the terminal.
8. A safe system, comprising:
a controller for performing the method of any one of claims 1-6;
the safe box is used for storing articles and realizing the box opening operation through the intelligent control lock;
the remote authentication control is used for receiving triggering operation from a first user so as to perform identity authentication through the server;
the camera is used for shooting a first verification image, and the first verification image comprises face information of a first user.
9. A safe system as defined in claim 8, further comprising:
the near field communication module is used for establishing NFC connection with the near field communication module of the terminal;
and the local verification control is used for receiving triggering operation from a third user so as to carry out identity verification through the data storage module of the safe box.
10. A safe system as defined in claim 9, further comprising:
and the local alarm module is used for controlling the local alarm module of the safe box to send an alarm signal if the stay time of the first user is longer than the preset time.
The safety detection module is used for sending a first instruction to the controller; the first instruction is used for indicating that the distance between the first user and the safe box is smaller than a preset distance.
CN202210468479.6A 2022-04-29 2022-04-29 Safe box control method and device and safe box system Pending CN114673427A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210468479.6A CN114673427A (en) 2022-04-29 2022-04-29 Safe box control method and device and safe box system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210468479.6A CN114673427A (en) 2022-04-29 2022-04-29 Safe box control method and device and safe box system

Publications (1)

Publication Number Publication Date
CN114673427A true CN114673427A (en) 2022-06-28

Family

ID=82080573

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210468479.6A Pending CN114673427A (en) 2022-04-29 2022-04-29 Safe box control method and device and safe box system

Country Status (1)

Country Link
CN (1) CN114673427A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101215948A (en) * 2008-01-18 2008-07-09 成都方程式电子有限公司 Fingerprint safe and its control method
US20150332528A1 (en) * 2013-09-29 2015-11-19 Glenn McGinnis System for Defense Weapon Control Utilizing One or a Plurality of Intelligent Weapons Control Boxes
CN105257145A (en) * 2015-09-07 2016-01-20 宁波耀龙软件科技有限公司 Remote safe box
CN210858383U (en) * 2019-06-28 2020-06-26 信利光电股份有限公司 Safe deposit box
US20220058901A1 (en) * 2019-08-02 2022-02-24 Yunding Network Technology (Beijing) Co., Ltd. Methods and systems for controlling a smart lock

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101215948A (en) * 2008-01-18 2008-07-09 成都方程式电子有限公司 Fingerprint safe and its control method
US20150332528A1 (en) * 2013-09-29 2015-11-19 Glenn McGinnis System for Defense Weapon Control Utilizing One or a Plurality of Intelligent Weapons Control Boxes
CN105257145A (en) * 2015-09-07 2016-01-20 宁波耀龙软件科技有限公司 Remote safe box
CN210858383U (en) * 2019-06-28 2020-06-26 信利光电股份有限公司 Safe deposit box
US20220058901A1 (en) * 2019-08-02 2022-02-24 Yunding Network Technology (Beijing) Co., Ltd. Methods and systems for controlling a smart lock

Similar Documents

Publication Publication Date Title
US8559914B2 (en) Interactive personal surveillance and security (IPSS) system
CN106506442A (en) A kind of smart home multi-user identification and its Rights Management System
KR101387469B1 (en) Communication function of the mobile terminal using the remote control and security systems safe
CN104766395A (en) Security control method of intelligent lock
WO2021238121A1 (en) Intelligent lock and unlocking authentication method and apparatus therefor
CN106652106A (en) Door lock control method, device and terminal
KR102008194B1 (en) System and method for checking in and out of books by facial recognition
CN106231052B (en) Electronic equipment and help calling method thereof
CN109624925B (en) Automobile control method, device, equipment and storage medium
CN102518354B (en) Weapon management system and method
CN105913513A (en) Control method and system for door lock system
KR20120074892A (en) Black box for vehicle and access certifiantion method thereof
US20030053662A1 (en) Method and apparatus for digital encoding and operator identification using stored user image
KR20070101963A (en) Vehicle security structure based on face recognition
CN114360114A (en) User authority management method and system
KR101025830B1 (en) A crime prevention system using recognition of a fingerprint
CN204703620U (en) The control system of smart lock
TW200840320A (en) Home notification service system combined with digital household control host
JP5529593B2 (en) Image monitoring device
KR20050089706A (en) Security door lock system
CN212229720U (en) Intelligent access control system based on block chain
KR100787005B1 (en) A system for controlling the exit and entry using a camera built-in no-touch type card reader
JP2007162369A (en) Security system
CN114673427A (en) Safe box control method and device and safe box system
CN110853192A (en) Unlocking and locking control method of safe intelligent lock

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination