CN115424378B - Safety protection method and device for intelligent coded lock and related equipment - Google Patents

Safety protection method and device for intelligent coded lock and related equipment Download PDF

Info

Publication number
CN115424378B
CN115424378B CN202211071019.6A CN202211071019A CN115424378B CN 115424378 B CN115424378 B CN 115424378B CN 202211071019 A CN202211071019 A CN 202211071019A CN 115424378 B CN115424378 B CN 115424378B
Authority
CN
China
Prior art keywords
password
verification
information
fingerprint information
fingerprint
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202211071019.6A
Other languages
Chinese (zh)
Other versions
CN115424378A (en
Inventor
王妙玉
王伦
吴宁泉
李昌
周亮
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Hotata Smart Home Co Ltd
Original Assignee
Guangdong Hotata Smart Home Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Hotata Smart Home Co Ltd filed Critical Guangdong Hotata Smart Home Co Ltd
Priority to CN202211071019.6A priority Critical patent/CN115424378B/en
Publication of CN115424378A publication Critical patent/CN115424378A/en
Application granted granted Critical
Publication of CN115424378B publication Critical patent/CN115424378B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00563Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys using personal physical data of the operator, e.g. finger prints, retinal images, voicepatterns
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00817Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed

Abstract

The application relates to a safety protection method and device of an intelligent coded lock and related equipment, wherein the method comprises the following steps: acquiring recorded fingerprint information, recording the fingerprint information and a first time stamp when the fingerprint information is recorded, and starting a password input module; receiving an input unlocking password through the password input module, verifying the unlocking password, and recording verification information corresponding to the unlocking password, wherein the verification information comprises a verification result and a second timestamp when the verification result is generated; judging whether the recorded verification information has an abnormal event or not, if so, determining fingerprint information corresponding to the abnormal event according to the first timestamp and the second timestamp, and triggering an abnormal response mechanism according to the fingerprint information corresponding to the abnormal event. According to the method, abnormal unlocking conditions are detected, fingerprint information of unlocking personnel is recorded and can be used for tracing, and the safety protection of the intelligent coded lock is improved.

Description

Safety protection method and device for intelligent coded lock and related equipment
Technical Field
The application relates to the technical field of door locks, in particular to a safety protection method and device of an intelligent coded lock and related equipment.
Background
The intelligent coded lock is a coded lock capable of being remotely controlled by combining network communication and sensing technologies, and is widely applied along with importance of living safety and the needs of convenient life of people.
The intelligent coded lock can remotely set an unlocking password, for example, after an administrator sets the unlocking password through a mobile phone client, the cloud server receives the set unlocking password and synchronizes the unlocking password to the intelligent coded lock, and the intelligent coded lock can be unlocked through the unlocking password. In life, an administrator can inform relevant personnel of the unlocking password, so that the relevant personnel can unlock by using the unlocking password. However, at the same time, other personnel need to be protected, abnormal unlocking conditions are detected, and corresponding personnel are tracked.
Disclosure of Invention
Therefore, an object of the present application is to provide a security protection method of an intelligent coded lock, which can detect abnormal unlocking conditions and record fingerprint information of unlocking personnel for tracing, so that security protection of the intelligent coded lock is improved.
The application provides a safety protection method of an intelligent coded lock, which comprises the following steps:
acquiring input fingerprint information, and verifying whether the fingerprint information is legal or not; if the fingerprint information is legal, recording the fingerprint information and a first time stamp when the fingerprint information is recorded and starting a password input module, and if the fingerprint information is illegal, not recording the fingerprint information and starting the password input module; the fingerprint information is used for tracing unlocking personnel; the password input module is a software function module for receiving unlocking passwords in the intelligent coded lock;
in a preset time after the password input module is started, receiving an input unlocking password through the password input module, verifying the unlocking password, and controlling the intelligent coded lock to be unlocked if the verification result is that the password is correct; if the verification result is that the password is wrong, the intelligent password lock is kept closed; when the preset time is exceeded after the password input module is started, the password input module is closed; the operation of closing the password input module is that an unlocking password is not received through the software function module;
recording verification information corresponding to an unlocking password, wherein the verification information comprises a verification result and a second timestamp when the verification result is generated;
judging whether the recorded verification information has an abnormal event or not, if so, determining fingerprint information corresponding to the abnormal event according to the first timestamp and the second timestamp, and triggering an abnormal response mechanism according to the fingerprint information corresponding to the abnormal event;
the step of judging whether the recorded verification information has an abnormal event comprises the following steps:
judging whether a plurality of verification results which are continuous in time are password errors according to the verification results in the recorded verification information and the corresponding second time stamp, and judging whether the recorded verification information has abnormal events if the number of the password errors exceeds a first preset number threshold;
counting the number of the verification information recorded in a preset time period, judging whether the number of the verification information recorded in the time period exceeds the normal verification times of the time period, and if so, judging that the recorded verification information has abnormal events; the normal verification times of different time periods of a day are obtained through big data analysis according to the verification information of the historical record;
the step of verifying whether the fingerprint information is legal includes:
analyzing the fingerprint information based on a fingerprint image quality analysis algorithm to obtain quality parameters, and verifying that the fingerprint information is legal when the quality parameters are larger than a preset quality threshold value, or else, illegal;
or detecting the temperature of a touch object on a fingerprint acquisition device of the intelligent coded lock through an infrared temperature measuring device, analyzing the fingerprint information based on a fingerprint image quality analysis algorithm to obtain a quality parameter, and verifying that the fingerprint information is legal when the temperature of the touch object is within a preset temperature threshold range and the quality parameter is greater than a preset quality threshold, or else, verifying that the fingerprint information is illegal.
The application also provides a safety device of intelligent trick lock, include:
the fingerprint acquisition module is used for acquiring the input fingerprint information and verifying whether the fingerprint information is legal or not; if the fingerprint information is legal, recording the fingerprint information and a first time stamp when the fingerprint information is recorded and starting a password input module, and if the fingerprint information is illegal, not recording the fingerprint information and starting the password input module; the fingerprint information is used for tracing unlocking personnel; the password input module is a software function module for receiving unlocking passwords in the intelligent coded lock; the step of verifying whether the fingerprint information is legal includes: analyzing the fingerprint information based on a fingerprint image quality analysis algorithm to obtain quality parameters, and verifying that the fingerprint information is legal when the quality parameters are larger than a preset quality threshold value, or else, illegal; or detecting the temperature of a touch object on a fingerprint acquisition device of the intelligent coded lock through an infrared temperature measuring device, analyzing the fingerprint information based on a fingerprint image quality analysis algorithm to obtain a quality parameter, and verifying that the fingerprint information is legal when the temperature of the touch object is within a preset temperature threshold range and the quality parameter is greater than a preset quality threshold, or else, verifying that the fingerprint information is illegal;
the password verification module is used for receiving the input unlocking password through the password input module within the preset time after the password input module is started, verifying the unlocking password, and controlling the intelligent coded lock to be unlocked if the verification result is that the password is correct; if the verification result is that the password is wrong, the intelligent password lock is kept closed; when the preset time is exceeded after the password input module is started, the password input module is closed, and the operation of closing the password input module is that an unlocking password is not received through the software function module; recording verification information corresponding to an unlocking password, wherein the verification information comprises a verification result and a second timestamp when the verification result is generated;
the abnormal response module is used for judging whether the recorded verification information has an abnormal event, if so, determining fingerprint information corresponding to the abnormal event according to the first timestamp and the second timestamp, and triggering an abnormal response mechanism according to the fingerprint information corresponding to the abnormal event; the step of judging whether the recorded verification information has an abnormal event comprises the following steps: judging whether a plurality of verification results which are continuous in time are password errors according to the verification results in the recorded verification information and the corresponding second time stamp, and judging whether the recorded verification information has abnormal events if the number of the password errors exceeds a first preset number threshold; and/or counting the number of the verification information recorded in a preset time period, judging whether the number of the verification information recorded in the time period exceeds the normal verification times of the time period, and if so, judging that the recorded verification information has abnormal events; wherein the normal verification times of different time periods of a day are obtained through big data analysis according to the verification information of the historical record.
The application also provides an intelligent coded lock, which comprises a fingerprint acquisition device, a code input device, a computer storage medium and a processor, wherein the fingerprint acquisition device, the code input device and the computer storage medium are connected with the processor; the fingerprint acquisition device is used for inputting fingerprint information, and the password input device is used for inputting an unlocking password; the computer storage medium stores a computer program which, when executed by the processor, implements the method described in any embodiment of the present application.
The present application further provides a computer readable storage medium, where the computer readable storage medium includes a stored computer program, where when the computer program runs, the apparatus where the computer readable storage medium is controlled to execute the method according to any embodiment of the present application.
According to the safety protection method and device for the intelligent coded lock, the code input module is started after the fingerprint information input by the unlocking personnel is acquired, the unlocking code input by the unlocking personnel is received, the condition of the unlocking code input by the unlocking personnel is detected, the alarm is timely given when the abnormality is detected, and meanwhile, the identity of the abnormal unlocking personnel can be traced according to the recorded fingerprint information, so that the safety protection of the intelligent coded lock is improved.
For a better understanding and implementation, the present application is described in detail below with reference to the drawings.
Drawings
FIG. 1 is a flow chart of a method for protecting security of an intelligent coded lock according to an embodiment of the present application;
FIG. 2 is a schematic diagram illustrating steps for verifying fingerprint information in a security protection method of an intelligent coded lock according to an embodiment of the present application;
FIG. 3 is a schematic diagram of a security device of an intelligent combination lock according to an embodiment of the present application;
fig. 4 is a schematic diagram of an intelligent coded lock according to an embodiment of the present application.
Detailed Description
The application provides a safety protection method of intelligent coded lock, record the fingerprint information of unblanking personnel to detect the condition of unblanking, in time report to the police when detecting the unusual, the fingerprint information of record can be used to trace back unusual unblanking personnel simultaneously.
Referring to fig. 1, a flow chart of a security protection method of an intelligent coded lock according to an embodiment of the present application includes the following steps:
s101: acquiring recorded fingerprint information, recording the fingerprint information and a first time stamp when the fingerprint information is recorded, and starting a password input module, wherein the fingerprint information is used for tracing unlocking personnel;
s102: the password input module receives the input unlocking password, the unlocking password is verified, and if the verification result is that the password is correct, the intelligent coded lock is controlled to be unlocked; if the verification result is that the password is wrong, the intelligent password lock is kept closed; recording verification information corresponding to an unlocking password, wherein the verification information comprises a verification result and a second timestamp when the verification result is generated;
s103: judging whether the recorded verification information has an abnormal event or not, if so, determining fingerprint information corresponding to the abnormal event according to the first timestamp and the second timestamp, and triggering an abnormal response mechanism according to the fingerprint information corresponding to the abnormal event.
Regarding step S101, the intelligent coded lock obtains fingerprint information recorded by an unlocking person through a fingerprint collection device, where the fingerprint collection device may be a device capable of collecting fingerprints to obtain fingerprint image data, such as an optical fingerprint collection device, a radio frequency fingerprint collection device, a thermal fingerprint collection device, a semiconductor capacitance fingerprint collection device, and a semiconductor pressure fingerprint collection device.
The fingerprint information collected by the fingerprint collecting device is the fingerprint information of the unlocking personnel, can be used for tracing the identity of the unlocking personnel to which the fingerprint information belongs, and can be fingerprint image data or characteristic data of the fingerprint image after being extracted by an algorithm.
When the fingerprint information is recorded, a first timestamp is recorded when the fingerprint information is recorded, and the first timestamp is used for marking the time of recording the fingerprint information, in this embodiment, the time when the fingerprint information is recorded, and in other embodiments, the time when the fingerprint information is verified to be legal after the fingerprint information is recorded. The recorded fingerprint information and the first timestamp when the fingerprint information is recorded can be stored in a local or cloud server. If the fingerprint information is stored in the cloud server, the intelligent coded lock binds and uploads the fingerprint information and the first timestamp to the cloud server through the communication module for storage.
After the fingerprint information and the first time stamp are recorded, a password input module is started, and the input unlocking password is received through the password input module.
The password input module is a device for inputting an unlocking password, which can be a touch screen type or key type password input device, and can also be other devices for inputting the unlocking password, in one embodiment, the password input module can also be a software function module for receiving the unlocking password in the intelligent password lock, the operation of starting the password input module is to receive the unlocking password through the corresponding software function module, and the operation of closing the password input module is to not receive the unlocking password through the corresponding software function module.
In this embodiment, need type in its fingerprint information when the personnel of unblanking unblanked, intelligent trick lock has recorded the fingerprint information that the personnel of unblanking input and the first timestamp when fingerprint information is in, when later stage detects unusual, alright trace back the personnel of unblanking that corresponds.
Referring to fig. 2, in one embodiment, after the acquiring the entered fingerprint information S1010, the method further includes:
s1011: verifying whether the fingerprint information is legal or not; if the fingerprint information is legal, executing the steps of recording the fingerprint information and a first time stamp when the fingerprint information is recorded and starting a password input module; if the fingerprint information is illegal, the fingerprint information is not recorded and the password input module is not started.
In order to ensure that the fingerprint information entered by the unlocking person is true fingerprint information of a person, rather than impersonating the fingerprint information by using a foreign object such as a silica gel fingerprint mold, the fingerprint information needs to be verified for authenticity, whether the fingerprint information is the fingerprint information entered by the finger of the true person or not is verified, and if yes, the fingerprint information is verified to be legal.
There are various ways to verify the authenticity of the fingerprint information, for example, detecting the temperature of the touching object when inputting the fingerprint information, if the touching object is a real finger, the detected temperature should be in the normal temperature range of the human body, or the collected fingerprint information may be analyzed by an algorithm to determine whether the fingerprint information is the real fingerprint information.
In one embodiment, the temperature of the touching object on the fingerprint acquisition device of the intelligent coded lock is detected through the infrared temperature measuring device, when the temperature of the touching object is within a preset temperature threshold range, for example, the normal body temperature range of a person, for example, 34-40 ℃, the person is verified to be legal, and otherwise, the person is not legal.
In another embodiment, the fingerprint information is analyzed based on a fingerprint image quality analysis algorithm to obtain a quality parameter, and when the quality parameter is greater than a preset quality threshold, the fingerprint information is verified to be legal, otherwise, the fingerprint information is not legal. In the prior art, various fingerprint image quality analysis algorithms are used for analyzing and judging the quality and the effectiveness of fingerprint images, and one or a plurality of algorithms can be selected according to conditions to perform fingerprint image quality analysis on the fingerprint information. In this embodiment, the fingerprint image quality analysis algorithm can determine whether the collected fingerprint information is the fingerprint information of the actual fingerprint of the person, and meanwhile, the recorded fingerprint information can be ensured to have higher quality through the preset quality threshold value, so that the fingerprint image quality analysis algorithm can be used for tracing the corresponding unlocking person.
Of course, in another embodiment, the two verification methods described above may also be combined: and detecting the temperature of a touch object on a fingerprint acquisition device of the intelligent coded lock through an infrared temperature measuring device, analyzing the fingerprint information based on a fingerprint image quality analysis algorithm to obtain a quality parameter, and verifying that the fingerprint information is legal when the temperature of the touch object is within a preset temperature threshold range and the quality parameter is greater than a preset quality threshold, or else, verifying that the fingerprint information is illegal.
In this embodiment, the fingerprint acquisition device and/or the infrared temperature measurement device are/is connected with a processor of the intelligent coded lock, the processor receives the fingerprint information and/or the temperature data and verifies the fingerprint information, and if the fingerprint information is verified to be legal, the step of recording the fingerprint information and a first timestamp when the fingerprint information is recorded is executed and starting a password input module; if the fingerprint information is verified to be illegal, the fingerprint information is not recorded and the password input module is not started. In an embodiment, if the fingerprint information is not legal, a prompt for re-entering the fingerprint can be sent, and the prompt can be in a mode of voice broadcasting, display screen displaying and the like.
For step S102, the unlocking password input by the unlocking personnel is received through the password input module, the unlocking password is verified, and if the verification result is that the password is correct, the unlocking of the intelligent coded lock is controlled; if the verification result is that the password is wrong, the intelligent password lock is kept closed; after each verification of the unlocking password, verification information corresponding to the unlocking password is recorded, wherein the verification information comprises a verification result and a second timestamp when the verification result is generated.
The verification of the unlocking password means that the received unlocking password is matched with an unlocking password preset by the intelligent coded lock, and if the received unlocking password is matched with the preset unlocking password, the verification result is that the password is correct; if not, the verification result is a password error.
In an alternative embodiment, the step of receiving the input unlocking password through the password input module includes:
receiving an input unlocking password through the password input module within a preset time after the password input module is started; and closing the password input module when the preset time is exceeded after the password input module is started.
The preset time is used for limiting a time interval in which an unlocking person can input an unlocking password, and can be set according to actual needs, for example, 30 seconds, 60 seconds or 2 minutes, and in one example, the unlocking password input by the unlocking person is received through the password input module within 30 seconds after the password input module is started; and closing the password input module when the time exceeds 30 seconds after the password input module is started.
After the password input module is closed, the input unlocking password is not received any more, and an unlocking person needs to input fingerprint information again through the step S101 to open the password input module again.
By limiting the time for which the password input module is kept on, the password input module is prevented from being always on or kept on for too long, so that other people can input unlocking passwords without inputting fingerprint information.
In another alternative embodiment, the step of receiving the input unlocking password through the password input module includes:
after the password input module is started, the password input module receives the input unlocking password, and when the number of times of receiving the input unlocking password reaches the preset receiving number, the password input module is closed.
The preset number of times of receiving is used for limiting the limited number of times of unlocking passwords which can be input by an unlocking person after the password input module is started, and the limited number of times of unlocking passwords can be 1 time or more than 1 time, in one example, after the password input module is started, the unlocking passwords input by the password input module are received, and when the number of times of receiving the input unlocking passwords reaches 5 times in an accumulated manner, the password input module is closed.
The password input module is prevented from being always started and receiving the unlocking password by limiting the receiving times of the unlocking password after being started, so that other people can input the unlocking password without inputting fingerprint information.
Of course, in another embodiment, the step of receiving, by the password input module, the input unlocking password may be combined with the steps of the two alternative embodiments, including:
and receiving an input unlocking password through the password input module within a preset time after the password input module is started, and closing the password input module when the number of times of receiving the input unlocking password reaches a preset receiving number or exceeds the preset time after the password input module is started.
And through the limitation of the preset time and the preset receiving times, unlocking personnel can only input the unlocking password in a limited time and a limited number of times after starting the password input module each time.
For step S103, since the complexity of the unlocking password set by the intelligent coded lock is limited, in order to prevent an illegal person from unlocking by unauthorized means, for example, after a trial and error is performed by inputting the unlocking password multiple times, the correct unlocking password may be used to successfully unlock finally.
The abnormal event refers to the recorded verification information having abnormal conditions, and is specifically judged by a preset abnormal detection method.
In an alternative embodiment, the step of determining whether the recorded verification information has an abnormal event includes:
judging whether a plurality of verification results which are continuous in time are password errors according to the verification results in the recorded verification information and the corresponding second time stamp, and judging whether the recorded verification information has abnormal events if the number of the password errors exceeds a first preset number threshold.
The several verification results which are continuous in time are all password errors, which means that the verification results of unlocking passwords which are input successively from front to back are all password errors, and the time interval is not limited, for example, the first password error and the second password error can be separated by any long time, and the two password errors can occur successively as long as the condition that the verification result is that the password is correct is not existed in the middle.
The first preset time threshold may be set according to circumstances, for example, may be set to 3 times, and then when the number of time-continuous verification results are all password errors and the number of password errors exceeds 3 times, it is determined that an abnormal event exists.
In general, the unlocking password input by the unlocking personnel for many times is wrong, so that the unlocking personnel has a larger suspicion of abnormal unlocking, whether the number of times of continuous many times of password errors exceeds a first preset number threshold value is judged, and if yes, the recorded verification information has an abnormal event. In this embodiment, when the unlocking password input by the unlocking person for several times is a password error and the number of password errors exceeds the preset number of times, no matter how long the time is between, for example, the unlocking person may try to unlock the password once at intervals, as long as the number of accumulated continuous multiple password errors exceeds the first preset number threshold, the abnormal event will be judged to exist, so that the unlocking person is effectively prevented from inputting the unlocking password for trial and error at a certain time interval and thereby bypasses the detection of the detection method based on the operation frequency judgment abnormality.
In an alternative embodiment, the step of determining whether the recorded verification information has an abnormal event includes:
acquiring a plurality of verification information which are continuous in time, and acquiring a verification information sequence; counting the number of the verification information in the verification information sequence in a preset sliding time window, judging whether the number of the verification information exceeds a second preset time threshold, and if so, judging that the recorded verification information has an abnormal event.
In general, if the unlocking personnel inputs the unlocking password too frequently, the unlocking personnel has a larger suspicion of abnormal unlocking, and if the number of the verification information in the sliding time window exceeds the second preset frequency threshold, the operation is considered to be too frequent, and if the number of the verification information exceeds the second preset frequency threshold, the recorded verification information can be judged to have an abnormal event.
The verification information sequence is formed by arranging the plurality of verification information according to the corresponding second time stamps in time sequence.
The sliding time window refers to a slidable time range, and in this embodiment, the sliding time window is within a preset time range from the time when the verification result is generated to the time before the time, for example, the sliding time window may be within the last 2 minutes when the verification result is generated after the unlocking person inputs the unlocking password.
The second preset number of times threshold may be set according to circumstances, for example, may be set to 5 times, and then, when the number of pieces of verification information in the verification information sequence in the sliding time window exceeds 5, it is determined that an abnormal event exists.
In an alternative embodiment, the step of determining whether the recorded verification information has an abnormal event includes:
counting the number of the verification information recorded in a preset time period, judging whether the number of the verification information recorded in the time period exceeds the normal verification times of the time period, and if so, judging that the recorded verification information has abnormal events; the normal verification times are obtained through big data analysis according to the verification information of the history record.
In this embodiment, the normal verification times of different time periods are obtained through big data analysis according to the verification information of the history record, specifically, the normal unlocking verification times of different time periods of different seasons, holidays and workdays are included.
The unlocking conditions are different in different seasons, holidays, workdays and different time periods of each day, for example, the time periods and times of unlocking on one of the different seasons and holidays are generally different, the time periods and times of unlocking on one of the holidays and the workdays are possibly different, rules of the unlocking on the basis of the verification information recorded in the history can be obtained through big data analysis, the normal unlocking verification times of the different time periods of the different seasons, holidays and workdays are obtained, and when the number of unlocking password verification information input by an unlocking person in the preset time period exceeds the normal verification times of the time period, abnormal events are judged.
Of course, the abnormality detection methods of any two or three of the above embodiments may be combined at the same time, and the determination may be performed at the same time. The abnormality detection methods of the three embodiments can detect abnormality for various possible abnormal unlocking situations, and can timely detect abnormal operations of unlocking by an abnormal unlocking person through blind guessing trial and error.
In this embodiment, if it is determined that the recorded verification information has an abnormal event, fingerprint information corresponding to the abnormal event is determined according to the first timestamp and the second timestamp, and an abnormal response mechanism is triggered according to the fingerprint information corresponding to the abnormal event.
The fingerprint information corresponding to the abnormal event is the fingerprint information recorded before the moment when the abnormal event is judged to exist, generally speaking, the fingerprint information corresponding to the first timestamp which is before the second timestamp of the verification information of the unlocking password when the abnormal event is judged to exist and has the time closest to the second timestamp, but in some special cases, for example, when an abnormal unlocking person performs unlocking, the recorded verification information is not judged to exist the abnormal event, and the current verification information is not caused to be judged to exist the abnormal event based on the verification information recorded before when other normal persons perform normal unlocking, so in some embodiments, the fingerprint information corresponding to the abnormal event can also be a plurality of fingerprint information recorded before the moment when the abnormal event is judged to exist, and the real abnormal unlocking person can be analyzed based on the plurality of fingerprint information.
In one embodiment, the step of determining whether the recorded verification information has an abnormal event includes:
judging whether the verification information recorded in the period has an abnormal event or not according to a preset period.
In the scene of temporary unlocking, an administrator configures a temporary unlocking password and the effective time period and the effective use times of the temporary unlocking password for the intelligent coded lock, so that temporary unlocking personnel such as a nurse, a temporary cleaning personnel or a home guest can use the temporary unlocking password to unlock in the set effective time period and the effective use times. In this embodiment, the anomaly detection is performed for a preset period of time, and the anomaly detection may not be performed for other times, where the period of time for performing the anomaly detection may be set by an administrator.
In one embodiment, the exception response mechanism includes: and pushing abnormal information to a preset alarm receiver, wherein the abnormal information comprises the fingerprint information, and the abnormal unlocking personnel can be traced through the fingerprint information.
The alarm receiver is a preset relevant person for receiving the abnormal information, such as a residence owner, a residence manager or public security bureau, a regional committee, a property, a neighbor and the like.
The pushing abnormal information may specifically be: and sending a short message to the mobile phone of the alarm receiver or sending a message to the client APP of the mobile phone of the alarm receiver or directly dialing an alarm call.
In another embodiment, the abnormal response mechanism may further include turning off the password input module, and may further send out an alarm sound through a horn of the smart combination lock to draw attention of a neighbor and frighten an abnormal unlocking person.
The abnormality detection method of the embodiment of the application can be executed by a program stored on the intelligent coded lock memory, when an abnormality event is judged to exist, the intelligent coded lock can send an instruction to a remote server through a network to enable the remote server to start an abnormality response mechanism, and the response mechanism can be directly started by the intelligent coded lock, for example, abnormal information and the like are sent through a communication module of the intelligent coded lock; or, the abnormality detection method may be executed by a program on a remote server, the intelligent trick lock performs data interaction with the remote server through network communication, the intelligent trick lock uploads the verification information to the remote server in real time, the program of the remote server determines that an abnormality event exists, and if the remote server determines that an abnormality event exists, the remote server starts an abnormality response mechanism.
Referring to fig. 3, the present application further provides a safety protection device of an intelligent coded lock, including:
the fingerprint acquisition module 201 is configured to acquire entered fingerprint information, record the fingerprint information and a first timestamp when the fingerprint information is entered, and start the password input module, where the fingerprint information is used for tracing an unlocking person;
the password verification module 202 is configured to receive the input unlocking password through the password input module, verify the unlocking password, and control the intelligent coded lock to unlock if the verification result is that the password is correct; if the verification result is that the password is wrong, the intelligent password lock is kept closed; recording verification information corresponding to an unlocking password, wherein the verification information comprises a verification result and a second timestamp when the verification result is generated;
the abnormal response module 203 is configured to determine whether the recorded verification information has an abnormal event, and if so, determine fingerprint information corresponding to the abnormal event according to the first timestamp and the second timestamp, and trigger an abnormal response mechanism according to the fingerprint information corresponding to the abnormal event.
It should be noted that, when the security protection device of the intelligent coded lock provided in the above embodiment executes the security protection method of the intelligent coded lock, only the division of the above functional modules is used for illustration, in practical application, the above functional allocation may be completed by different functional modules according to needs, that is, the internal structure of the device is divided into different functional modules, so as to complete all or part of the functions described above. In addition, the safety protection device of the intelligent coded lock provided in the above embodiment and the safety protection method of the intelligent coded lock belong to the same concept, which embody the implementation process in detail in the embodiment of the safety protection method of the intelligent coded lock, and are not described herein again.
According to the safety protection method and device for the intelligent coded lock, the coded input module is started after the fingerprint information input by the unlocking personnel is acquired, the input unlocking code is received, the condition of the unlocking code input by the unlocking personnel is detected, the alarm is timely given when the abnormality is detected, and meanwhile, the identity of the abnormal unlocking personnel can be traced according to the recorded fingerprint information, so that the safety protection of the intelligent coded lock is improved.
Referring to fig. 4, the application further discloses an intelligent coded lock 301, which comprises a fingerprint acquisition device 305, a code input device 306, a computer storage medium 303 and a processor 302, wherein the fingerprint acquisition device 305, the code input device 306 and the computer storage medium 303 are connected with the processor 302; the computer storage medium 303 stores a computer program 304, which computer program 304, when executed by the processor 302, implements the security protection method of the smart combination lock according to any one of the above embodiments. In an embodiment, the smart combination lock 301 further comprises a communication module 307, the communication module 307 is connected to the processor 302, and the smart combination lock 301 communicates with a remote server through the communication module 307.
The application also discloses a computer readable storage medium, which comprises a stored computer program, wherein the computer program is used for controlling a device where the computer readable storage medium is located to execute the method according to any one of the embodiments.
The above examples merely represent a few embodiments of the present application, which are described in more detail and are not to be construed as limiting the scope of the invention. It should be noted that modifications and improvements can be made by those skilled in the art without departing from the spirit of the present application, and the present application is intended to encompass such modifications and improvements.

Claims (8)

1. The safety protection method of the intelligent coded lock is characterized by comprising the following steps of:
acquiring input fingerprint information, and verifying whether the fingerprint information is legal or not; if the fingerprint information is legal, recording the fingerprint information and a first time stamp when the fingerprint information is recorded and starting a password input module, and if the fingerprint information is illegal, not recording the fingerprint information and starting the password input module; the fingerprint information is used for tracing unlocking personnel; the password input module is a software function module for receiving unlocking passwords in the intelligent coded lock;
in a preset time after the password input module is started, receiving an input unlocking password through the password input module, verifying the unlocking password, and controlling the intelligent coded lock to be unlocked if the verification result is that the password is correct; if the verification result is that the password is wrong, the intelligent password lock is kept closed; when the preset time is exceeded after the password input module is started, the password input module is closed; the operation of closing the password input module is that an unlocking password is not received through the software function module;
recording verification information corresponding to an unlocking password, wherein the verification information comprises a verification result and a second timestamp when the verification result is generated;
judging whether the recorded verification information has an abnormal event or not, if so, determining fingerprint information corresponding to the abnormal event according to the first timestamp and the second timestamp, and triggering an abnormal response mechanism according to the fingerprint information corresponding to the abnormal event;
the step of judging whether the recorded verification information has an abnormal event comprises the following steps:
judging whether a plurality of verification results which are continuous in time are password errors according to the verification results in the recorded verification information and the corresponding second time stamp, and judging whether the recorded verification information has abnormal events if the number of the password errors exceeds a first preset number threshold;
counting the number of the verification information recorded in a preset time period, judging whether the number of the verification information recorded in the time period exceeds the normal verification times of the time period, and if so, judging that the recorded verification information has abnormal events; the normal verification times of different time periods of a day are obtained through big data analysis according to the verification information of the historical record;
the step of verifying whether the fingerprint information is legal includes:
analyzing the fingerprint information based on a fingerprint image quality analysis algorithm to obtain quality parameters, and verifying that the fingerprint information is legal when the quality parameters are larger than a preset quality threshold value, or else, illegal;
or detecting the temperature of a touch object on a fingerprint acquisition device of the intelligent coded lock through an infrared temperature measuring device, analyzing the fingerprint information based on a fingerprint image quality analysis algorithm to obtain a quality parameter, and verifying that the fingerprint information is legal when the temperature of the touch object is within a preset temperature threshold range and the quality parameter is greater than a preset quality threshold, or else, verifying that the fingerprint information is illegal.
2. The method of claim 1, wherein the step of receiving the entered unlocking code via the code input module comprises:
after the password input module is started, the password input module receives the input unlocking password, and when the number of times of receiving the input unlocking password reaches the preset receiving number, the password input module is closed.
3. The method for protecting security of an intelligent coded lock according to claim 1, wherein the step of determining whether the recorded verification information has an abnormal event includes:
acquiring a plurality of verification information which are continuous in time, and acquiring a verification information sequence; counting the number of the verification information in the verification information sequence in a preset sliding time window, judging whether the number of the verification information exceeds a second preset time threshold, and if so, judging that the recorded verification information has an abnormal event.
4. The method for protecting the security of the intelligent coded lock according to claim 1, wherein the abnormal response mechanism comprises: pushing abnormal information to a preset alarm receiver, wherein the abnormal information comprises the fingerprint information; or closing the password input module and pushing abnormal information to a preset alarm receiver, wherein the abnormal information comprises the fingerprint information.
5. The method for protecting security of an intelligent coded lock according to any one of claims 1 to 4, wherein the step of determining whether the recorded authentication information has an abnormal event includes:
judging whether the verification information recorded in the period has an abnormal event or not according to a preset period.
6. The utility model provides a safety device of intelligent trick lock which characterized in that includes:
the fingerprint acquisition module is used for acquiring the input fingerprint information and verifying whether the fingerprint information is legal or not; if the fingerprint information is legal, recording the fingerprint information and a first time stamp when the fingerprint information is recorded and starting a password input module, and if the fingerprint information is illegal, not recording the fingerprint information and starting the password input module; the fingerprint information is used for tracing unlocking personnel; the password input module is a software function module for receiving unlocking passwords in the intelligent coded lock; the step of verifying whether the fingerprint information is legal includes: analyzing the fingerprint information based on a fingerprint image quality analysis algorithm to obtain quality parameters, and verifying that the fingerprint information is legal when the quality parameters are larger than a preset quality threshold value, or else, illegal; or detecting the temperature of a touch object on a fingerprint acquisition device of the intelligent coded lock through an infrared temperature measuring device, analyzing the fingerprint information based on a fingerprint image quality analysis algorithm to obtain a quality parameter, and verifying that the fingerprint information is legal when the temperature of the touch object is within a preset temperature threshold range and the quality parameter is greater than a preset quality threshold, or else, verifying that the fingerprint information is illegal;
the password verification module is used for receiving the input unlocking password through the password input module within the preset time after the password input module is started, verifying the unlocking password, and controlling the intelligent coded lock to be unlocked if the verification result is that the password is correct; if the verification result is that the password is wrong, the intelligent password lock is kept closed; when the preset time is exceeded after the password input module is started, the password input module is closed, and the operation of closing the password input module is that an unlocking password is not received through the software function module; recording verification information corresponding to an unlocking password, wherein the verification information comprises a verification result and a second timestamp when the verification result is generated;
the abnormal response module is used for judging whether the recorded verification information has an abnormal event, if so, determining fingerprint information corresponding to the abnormal event according to the first timestamp and the second timestamp, and triggering an abnormal response mechanism according to the fingerprint information corresponding to the abnormal event; the step of judging whether the recorded verification information has an abnormal event comprises the following steps: judging whether a plurality of verification results which are continuous in time are password errors according to the verification results in the recorded verification information and the corresponding second time stamp, and judging whether the recorded verification information has abnormal events if the number of the password errors exceeds a first preset number threshold; and/or counting the number of the verification information recorded in a preset time period, judging whether the number of the verification information recorded in the time period exceeds the normal verification times of the time period, and if so, judging that the recorded verification information has abnormal events; wherein the normal verification times of different time periods of a day are obtained through big data analysis according to the verification information of the historical record.
7. The intelligent coded lock is characterized by comprising a fingerprint acquisition device, a code input device, a computer storage medium and a processor, wherein the fingerprint acquisition device, the code input device and the computer storage medium are connected with the processor; the fingerprint acquisition device is used for inputting fingerprint information, and the password input device is used for inputting an unlocking password; the computer storage medium stores a computer program which, when executed by the processor, implements the method of any of claims 1 to 5.
8. A computer readable storage medium, characterized in that the computer readable storage medium comprises a stored computer program, wherein the computer program, when run, controls a device in which the computer readable storage medium is located to perform the method according to any one of claims 1 to 5.
CN202211071019.6A 2022-09-02 2022-09-02 Safety protection method and device for intelligent coded lock and related equipment Active CN115424378B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211071019.6A CN115424378B (en) 2022-09-02 2022-09-02 Safety protection method and device for intelligent coded lock and related equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211071019.6A CN115424378B (en) 2022-09-02 2022-09-02 Safety protection method and device for intelligent coded lock and related equipment

Publications (2)

Publication Number Publication Date
CN115424378A CN115424378A (en) 2022-12-02
CN115424378B true CN115424378B (en) 2023-12-29

Family

ID=84202143

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211071019.6A Active CN115424378B (en) 2022-09-02 2022-09-02 Safety protection method and device for intelligent coded lock and related equipment

Country Status (1)

Country Link
CN (1) CN115424378B (en)

Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2005226413A (en) * 2004-02-16 2005-08-25 Mitsubishi Electric Corp Control device for entrance and exit to/from room
CN104157049A (en) * 2014-07-23 2014-11-19 国家电网公司 Unlocking key management control device
CN104517332A (en) * 2013-09-30 2015-04-15 湖州市南浔亨力木制品厂 Entrance guard system
CN105844737A (en) * 2015-01-15 2016-08-10 珠海汇金科技股份有限公司 Camera based electronic lock system and use method
CN206470852U (en) * 2017-02-15 2017-09-05 濮阳职业技术学院 A kind of anti-theft power equipment box
CN206819436U (en) * 2017-06-19 2017-12-29 广东硕普信息科技有限公司 A kind of access control equipment
CN108596127A (en) * 2018-04-28 2018-09-28 北京旷视科技有限公司 A kind of fingerprint identification method, auth method and device and identity veritify machine
CN109493483A (en) * 2018-11-12 2019-03-19 上海庆科信息技术有限公司 Intelligent lock system and alarm method, device, equipment, computer storage medium
CN110111463A (en) * 2019-05-05 2019-08-09 胡渐佳 Touch screen intelligent door lock user password display input method
CN110164013A (en) * 2019-05-31 2019-08-23 广州软盈科技有限公司 A kind of retrospective caller management method
CN110322603A (en) * 2019-06-18 2019-10-11 广东汇泰龙科技股份有限公司 A kind of temporary password security protection method and system for intelligent door lock
CN110349311A (en) * 2019-07-08 2019-10-18 江苏橙贝科技有限公司 A kind of fingerprint lock control system and method based on block chain technology
CN112232155A (en) * 2020-09-30 2021-01-15 墨奇科技(北京)有限公司 Non-contact fingerprint identification method and device, terminal and storage medium
CN113870468A (en) * 2021-12-02 2021-12-31 云丁网络技术(北京)有限公司 Control method and system of intelligent lock
CN114926922A (en) * 2022-03-10 2022-08-19 珠海格力电器股份有限公司 Control method and control device of intelligent door lock, intelligent door lock and storage medium

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2021023164A1 (en) * 2019-08-02 2021-02-11 云丁网络技术(北京)有限公司 Intelligent lock control method and system

Patent Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2005226413A (en) * 2004-02-16 2005-08-25 Mitsubishi Electric Corp Control device for entrance and exit to/from room
CN104517332A (en) * 2013-09-30 2015-04-15 湖州市南浔亨力木制品厂 Entrance guard system
CN104157049A (en) * 2014-07-23 2014-11-19 国家电网公司 Unlocking key management control device
CN105844737A (en) * 2015-01-15 2016-08-10 珠海汇金科技股份有限公司 Camera based electronic lock system and use method
CN206470852U (en) * 2017-02-15 2017-09-05 濮阳职业技术学院 A kind of anti-theft power equipment box
CN206819436U (en) * 2017-06-19 2017-12-29 广东硕普信息科技有限公司 A kind of access control equipment
CN108596127A (en) * 2018-04-28 2018-09-28 北京旷视科技有限公司 A kind of fingerprint identification method, auth method and device and identity veritify machine
CN109493483A (en) * 2018-11-12 2019-03-19 上海庆科信息技术有限公司 Intelligent lock system and alarm method, device, equipment, computer storage medium
CN110111463A (en) * 2019-05-05 2019-08-09 胡渐佳 Touch screen intelligent door lock user password display input method
CN110164013A (en) * 2019-05-31 2019-08-23 广州软盈科技有限公司 A kind of retrospective caller management method
CN110322603A (en) * 2019-06-18 2019-10-11 广东汇泰龙科技股份有限公司 A kind of temporary password security protection method and system for intelligent door lock
CN110349311A (en) * 2019-07-08 2019-10-18 江苏橙贝科技有限公司 A kind of fingerprint lock control system and method based on block chain technology
CN112232155A (en) * 2020-09-30 2021-01-15 墨奇科技(北京)有限公司 Non-contact fingerprint identification method and device, terminal and storage medium
CN113870468A (en) * 2021-12-02 2021-12-31 云丁网络技术(北京)有限公司 Control method and system of intelligent lock
CN114926922A (en) * 2022-03-10 2022-08-19 珠海格力电器股份有限公司 Control method and control device of intelligent door lock, intelligent door lock and storage medium

Also Published As

Publication number Publication date
CN115424378A (en) 2022-12-02

Similar Documents

Publication Publication Date Title
CN104850771B (en) A kind of indentity identifying method and relevant device
CN107578519A (en) A kind of intelligent access control system and intelligent entrance guard method for unlocking
CN202280353U (en) Intelligent safety box
CN107992739A (en) User authentication method, apparatus and system
CN106453874B (en) Mobile phone control method and system
CN111691764B (en) Household intelligent door lock and control method thereof
WO2015117507A1 (en) Authentication method, collection device, authentication device and system, and cabinet and unlocking method therefor
EP2779133A2 (en) System and method of anomaly detection
CN109410407A (en) A kind of face and fingerprint recognition access control system
CN111911030A (en) Multi-person management safety box and opening method of door of safety box
CN113611032A (en) Access control management method and system based on face recognition
CN113870508A (en) Intelligent security gateway arming and disarming method combining facial recognition
CN107481362A (en) Access control system and access control method
CN103129523A (en) Automobile intelligent fingerprint lock device and automobile monitoring system thereof
CN110388138B (en) Method for automatically reminding user to replace unlocking password, door lock system and door lock
CN111698215A (en) Security prevention and control method, device and system based on biological feature recognition
CN115424378B (en) Safety protection method and device for intelligent coded lock and related equipment
CN207397360U (en) A kind of access control system for realizing people stream counting control
CN106211070A (en) The anti-theft protection method of a kind of mobile terminal and mobile terminal
CN211124241U (en) Smart mobile phone cabinet based on cloud security
US10636264B2 (en) Office building security system using fiber sensing
CA2933212A1 (en) System and method of smart incident analysis in control system using floor maps
CN105989265A (en) Early warning method and device and terminal equipment
KR101421962B1 (en) Entrance-Exit Control Device Using Image of Entry and Method for Managing the Entry
CN112669501B (en) Access control method, device and computer readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant