CN115424378B - Safety protection method and device for intelligent coded lock and related equipment - Google Patents
Safety protection method and device for intelligent coded lock and related equipment Download PDFInfo
- Publication number
- CN115424378B CN115424378B CN202211071019.6A CN202211071019A CN115424378B CN 115424378 B CN115424378 B CN 115424378B CN 202211071019 A CN202211071019 A CN 202211071019A CN 115424378 B CN115424378 B CN 115424378B
- Authority
- CN
- China
- Prior art keywords
- password
- verification
- information
- fingerprint information
- fingerprint
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 31
- 238000012795 verification Methods 0.000 claims abstract description 162
- 230000002159 abnormal effect Effects 0.000 claims abstract description 100
- 230000004044 response Effects 0.000 claims abstract description 17
- 230000007246 mechanism Effects 0.000 claims abstract description 14
- 238000004458 analytical method Methods 0.000 claims description 14
- 238000004590 computer program Methods 0.000 claims description 10
- 238000007405 data analysis Methods 0.000 claims description 7
- 230000005856 abnormality Effects 0.000 description 13
- 238000001514 detection method Methods 0.000 description 10
- 230000006870 function Effects 0.000 description 8
- 238000004891 communication Methods 0.000 description 7
- 238000010586 diagram Methods 0.000 description 3
- VYPSYNLAJGMNEJ-UHFFFAOYSA-N Silicium dioxide Chemical compound O=[Si]=O VYPSYNLAJGMNEJ-UHFFFAOYSA-N 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 239000004065 semiconductor Substances 0.000 description 2
- 230000036760 body temperature Effects 0.000 description 1
- 238000009529 body temperature measurement Methods 0.000 description 1
- 238000004140 cleaning Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000008569 process Effects 0.000 description 1
- 239000000741 silica gel Substances 0.000 description 1
- 229910002027 silica gel Inorganic materials 0.000 description 1
- 230000001960 triggered effect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00563—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys using personal physical data of the operator, e.g. finger prints, retinal images, voicepatterns
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00571—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00817—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed
Abstract
The application relates to a safety protection method and device of an intelligent coded lock and related equipment, wherein the method comprises the following steps: acquiring recorded fingerprint information, recording the fingerprint information and a first time stamp when the fingerprint information is recorded, and starting a password input module; receiving an input unlocking password through the password input module, verifying the unlocking password, and recording verification information corresponding to the unlocking password, wherein the verification information comprises a verification result and a second timestamp when the verification result is generated; judging whether the recorded verification information has an abnormal event or not, if so, determining fingerprint information corresponding to the abnormal event according to the first timestamp and the second timestamp, and triggering an abnormal response mechanism according to the fingerprint information corresponding to the abnormal event. According to the method, abnormal unlocking conditions are detected, fingerprint information of unlocking personnel is recorded and can be used for tracing, and the safety protection of the intelligent coded lock is improved.
Description
Technical Field
The application relates to the technical field of door locks, in particular to a safety protection method and device of an intelligent coded lock and related equipment.
Background
The intelligent coded lock is a coded lock capable of being remotely controlled by combining network communication and sensing technologies, and is widely applied along with importance of living safety and the needs of convenient life of people.
The intelligent coded lock can remotely set an unlocking password, for example, after an administrator sets the unlocking password through a mobile phone client, the cloud server receives the set unlocking password and synchronizes the unlocking password to the intelligent coded lock, and the intelligent coded lock can be unlocked through the unlocking password. In life, an administrator can inform relevant personnel of the unlocking password, so that the relevant personnel can unlock by using the unlocking password. However, at the same time, other personnel need to be protected, abnormal unlocking conditions are detected, and corresponding personnel are tracked.
Disclosure of Invention
Therefore, an object of the present application is to provide a security protection method of an intelligent coded lock, which can detect abnormal unlocking conditions and record fingerprint information of unlocking personnel for tracing, so that security protection of the intelligent coded lock is improved.
The application provides a safety protection method of an intelligent coded lock, which comprises the following steps:
acquiring input fingerprint information, and verifying whether the fingerprint information is legal or not; if the fingerprint information is legal, recording the fingerprint information and a first time stamp when the fingerprint information is recorded and starting a password input module, and if the fingerprint information is illegal, not recording the fingerprint information and starting the password input module; the fingerprint information is used for tracing unlocking personnel; the password input module is a software function module for receiving unlocking passwords in the intelligent coded lock;
in a preset time after the password input module is started, receiving an input unlocking password through the password input module, verifying the unlocking password, and controlling the intelligent coded lock to be unlocked if the verification result is that the password is correct; if the verification result is that the password is wrong, the intelligent password lock is kept closed; when the preset time is exceeded after the password input module is started, the password input module is closed; the operation of closing the password input module is that an unlocking password is not received through the software function module;
recording verification information corresponding to an unlocking password, wherein the verification information comprises a verification result and a second timestamp when the verification result is generated;
judging whether the recorded verification information has an abnormal event or not, if so, determining fingerprint information corresponding to the abnormal event according to the first timestamp and the second timestamp, and triggering an abnormal response mechanism according to the fingerprint information corresponding to the abnormal event;
the step of judging whether the recorded verification information has an abnormal event comprises the following steps:
judging whether a plurality of verification results which are continuous in time are password errors according to the verification results in the recorded verification information and the corresponding second time stamp, and judging whether the recorded verification information has abnormal events if the number of the password errors exceeds a first preset number threshold;
counting the number of the verification information recorded in a preset time period, judging whether the number of the verification information recorded in the time period exceeds the normal verification times of the time period, and if so, judging that the recorded verification information has abnormal events; the normal verification times of different time periods of a day are obtained through big data analysis according to the verification information of the historical record;
the step of verifying whether the fingerprint information is legal includes:
analyzing the fingerprint information based on a fingerprint image quality analysis algorithm to obtain quality parameters, and verifying that the fingerprint information is legal when the quality parameters are larger than a preset quality threshold value, or else, illegal;
or detecting the temperature of a touch object on a fingerprint acquisition device of the intelligent coded lock through an infrared temperature measuring device, analyzing the fingerprint information based on a fingerprint image quality analysis algorithm to obtain a quality parameter, and verifying that the fingerprint information is legal when the temperature of the touch object is within a preset temperature threshold range and the quality parameter is greater than a preset quality threshold, or else, verifying that the fingerprint information is illegal.
The application also provides a safety device of intelligent trick lock, include:
the fingerprint acquisition module is used for acquiring the input fingerprint information and verifying whether the fingerprint information is legal or not; if the fingerprint information is legal, recording the fingerprint information and a first time stamp when the fingerprint information is recorded and starting a password input module, and if the fingerprint information is illegal, not recording the fingerprint information and starting the password input module; the fingerprint information is used for tracing unlocking personnel; the password input module is a software function module for receiving unlocking passwords in the intelligent coded lock; the step of verifying whether the fingerprint information is legal includes: analyzing the fingerprint information based on a fingerprint image quality analysis algorithm to obtain quality parameters, and verifying that the fingerprint information is legal when the quality parameters are larger than a preset quality threshold value, or else, illegal; or detecting the temperature of a touch object on a fingerprint acquisition device of the intelligent coded lock through an infrared temperature measuring device, analyzing the fingerprint information based on a fingerprint image quality analysis algorithm to obtain a quality parameter, and verifying that the fingerprint information is legal when the temperature of the touch object is within a preset temperature threshold range and the quality parameter is greater than a preset quality threshold, or else, verifying that the fingerprint information is illegal;
the password verification module is used for receiving the input unlocking password through the password input module within the preset time after the password input module is started, verifying the unlocking password, and controlling the intelligent coded lock to be unlocked if the verification result is that the password is correct; if the verification result is that the password is wrong, the intelligent password lock is kept closed; when the preset time is exceeded after the password input module is started, the password input module is closed, and the operation of closing the password input module is that an unlocking password is not received through the software function module; recording verification information corresponding to an unlocking password, wherein the verification information comprises a verification result and a second timestamp when the verification result is generated;
the abnormal response module is used for judging whether the recorded verification information has an abnormal event, if so, determining fingerprint information corresponding to the abnormal event according to the first timestamp and the second timestamp, and triggering an abnormal response mechanism according to the fingerprint information corresponding to the abnormal event; the step of judging whether the recorded verification information has an abnormal event comprises the following steps: judging whether a plurality of verification results which are continuous in time are password errors according to the verification results in the recorded verification information and the corresponding second time stamp, and judging whether the recorded verification information has abnormal events if the number of the password errors exceeds a first preset number threshold; and/or counting the number of the verification information recorded in a preset time period, judging whether the number of the verification information recorded in the time period exceeds the normal verification times of the time period, and if so, judging that the recorded verification information has abnormal events; wherein the normal verification times of different time periods of a day are obtained through big data analysis according to the verification information of the historical record.
The application also provides an intelligent coded lock, which comprises a fingerprint acquisition device, a code input device, a computer storage medium and a processor, wherein the fingerprint acquisition device, the code input device and the computer storage medium are connected with the processor; the fingerprint acquisition device is used for inputting fingerprint information, and the password input device is used for inputting an unlocking password; the computer storage medium stores a computer program which, when executed by the processor, implements the method described in any embodiment of the present application.
The present application further provides a computer readable storage medium, where the computer readable storage medium includes a stored computer program, where when the computer program runs, the apparatus where the computer readable storage medium is controlled to execute the method according to any embodiment of the present application.
According to the safety protection method and device for the intelligent coded lock, the code input module is started after the fingerprint information input by the unlocking personnel is acquired, the unlocking code input by the unlocking personnel is received, the condition of the unlocking code input by the unlocking personnel is detected, the alarm is timely given when the abnormality is detected, and meanwhile, the identity of the abnormal unlocking personnel can be traced according to the recorded fingerprint information, so that the safety protection of the intelligent coded lock is improved.
For a better understanding and implementation, the present application is described in detail below with reference to the drawings.
Drawings
FIG. 1 is a flow chart of a method for protecting security of an intelligent coded lock according to an embodiment of the present application;
FIG. 2 is a schematic diagram illustrating steps for verifying fingerprint information in a security protection method of an intelligent coded lock according to an embodiment of the present application;
FIG. 3 is a schematic diagram of a security device of an intelligent combination lock according to an embodiment of the present application;
fig. 4 is a schematic diagram of an intelligent coded lock according to an embodiment of the present application.
Detailed Description
The application provides a safety protection method of intelligent coded lock, record the fingerprint information of unblanking personnel to detect the condition of unblanking, in time report to the police when detecting the unusual, the fingerprint information of record can be used to trace back unusual unblanking personnel simultaneously.
Referring to fig. 1, a flow chart of a security protection method of an intelligent coded lock according to an embodiment of the present application includes the following steps:
s101: acquiring recorded fingerprint information, recording the fingerprint information and a first time stamp when the fingerprint information is recorded, and starting a password input module, wherein the fingerprint information is used for tracing unlocking personnel;
s102: the password input module receives the input unlocking password, the unlocking password is verified, and if the verification result is that the password is correct, the intelligent coded lock is controlled to be unlocked; if the verification result is that the password is wrong, the intelligent password lock is kept closed; recording verification information corresponding to an unlocking password, wherein the verification information comprises a verification result and a second timestamp when the verification result is generated;
s103: judging whether the recorded verification information has an abnormal event or not, if so, determining fingerprint information corresponding to the abnormal event according to the first timestamp and the second timestamp, and triggering an abnormal response mechanism according to the fingerprint information corresponding to the abnormal event.
Regarding step S101, the intelligent coded lock obtains fingerprint information recorded by an unlocking person through a fingerprint collection device, where the fingerprint collection device may be a device capable of collecting fingerprints to obtain fingerprint image data, such as an optical fingerprint collection device, a radio frequency fingerprint collection device, a thermal fingerprint collection device, a semiconductor capacitance fingerprint collection device, and a semiconductor pressure fingerprint collection device.
The fingerprint information collected by the fingerprint collecting device is the fingerprint information of the unlocking personnel, can be used for tracing the identity of the unlocking personnel to which the fingerprint information belongs, and can be fingerprint image data or characteristic data of the fingerprint image after being extracted by an algorithm.
When the fingerprint information is recorded, a first timestamp is recorded when the fingerprint information is recorded, and the first timestamp is used for marking the time of recording the fingerprint information, in this embodiment, the time when the fingerprint information is recorded, and in other embodiments, the time when the fingerprint information is verified to be legal after the fingerprint information is recorded. The recorded fingerprint information and the first timestamp when the fingerprint information is recorded can be stored in a local or cloud server. If the fingerprint information is stored in the cloud server, the intelligent coded lock binds and uploads the fingerprint information and the first timestamp to the cloud server through the communication module for storage.
After the fingerprint information and the first time stamp are recorded, a password input module is started, and the input unlocking password is received through the password input module.
The password input module is a device for inputting an unlocking password, which can be a touch screen type or key type password input device, and can also be other devices for inputting the unlocking password, in one embodiment, the password input module can also be a software function module for receiving the unlocking password in the intelligent password lock, the operation of starting the password input module is to receive the unlocking password through the corresponding software function module, and the operation of closing the password input module is to not receive the unlocking password through the corresponding software function module.
In this embodiment, need type in its fingerprint information when the personnel of unblanking unblanked, intelligent trick lock has recorded the fingerprint information that the personnel of unblanking input and the first timestamp when fingerprint information is in, when later stage detects unusual, alright trace back the personnel of unblanking that corresponds.
Referring to fig. 2, in one embodiment, after the acquiring the entered fingerprint information S1010, the method further includes:
s1011: verifying whether the fingerprint information is legal or not; if the fingerprint information is legal, executing the steps of recording the fingerprint information and a first time stamp when the fingerprint information is recorded and starting a password input module; if the fingerprint information is illegal, the fingerprint information is not recorded and the password input module is not started.
In order to ensure that the fingerprint information entered by the unlocking person is true fingerprint information of a person, rather than impersonating the fingerprint information by using a foreign object such as a silica gel fingerprint mold, the fingerprint information needs to be verified for authenticity, whether the fingerprint information is the fingerprint information entered by the finger of the true person or not is verified, and if yes, the fingerprint information is verified to be legal.
There are various ways to verify the authenticity of the fingerprint information, for example, detecting the temperature of the touching object when inputting the fingerprint information, if the touching object is a real finger, the detected temperature should be in the normal temperature range of the human body, or the collected fingerprint information may be analyzed by an algorithm to determine whether the fingerprint information is the real fingerprint information.
In one embodiment, the temperature of the touching object on the fingerprint acquisition device of the intelligent coded lock is detected through the infrared temperature measuring device, when the temperature of the touching object is within a preset temperature threshold range, for example, the normal body temperature range of a person, for example, 34-40 ℃, the person is verified to be legal, and otherwise, the person is not legal.
In another embodiment, the fingerprint information is analyzed based on a fingerprint image quality analysis algorithm to obtain a quality parameter, and when the quality parameter is greater than a preset quality threshold, the fingerprint information is verified to be legal, otherwise, the fingerprint information is not legal. In the prior art, various fingerprint image quality analysis algorithms are used for analyzing and judging the quality and the effectiveness of fingerprint images, and one or a plurality of algorithms can be selected according to conditions to perform fingerprint image quality analysis on the fingerprint information. In this embodiment, the fingerprint image quality analysis algorithm can determine whether the collected fingerprint information is the fingerprint information of the actual fingerprint of the person, and meanwhile, the recorded fingerprint information can be ensured to have higher quality through the preset quality threshold value, so that the fingerprint image quality analysis algorithm can be used for tracing the corresponding unlocking person.
Of course, in another embodiment, the two verification methods described above may also be combined: and detecting the temperature of a touch object on a fingerprint acquisition device of the intelligent coded lock through an infrared temperature measuring device, analyzing the fingerprint information based on a fingerprint image quality analysis algorithm to obtain a quality parameter, and verifying that the fingerprint information is legal when the temperature of the touch object is within a preset temperature threshold range and the quality parameter is greater than a preset quality threshold, or else, verifying that the fingerprint information is illegal.
In this embodiment, the fingerprint acquisition device and/or the infrared temperature measurement device are/is connected with a processor of the intelligent coded lock, the processor receives the fingerprint information and/or the temperature data and verifies the fingerprint information, and if the fingerprint information is verified to be legal, the step of recording the fingerprint information and a first timestamp when the fingerprint information is recorded is executed and starting a password input module; if the fingerprint information is verified to be illegal, the fingerprint information is not recorded and the password input module is not started. In an embodiment, if the fingerprint information is not legal, a prompt for re-entering the fingerprint can be sent, and the prompt can be in a mode of voice broadcasting, display screen displaying and the like.
For step S102, the unlocking password input by the unlocking personnel is received through the password input module, the unlocking password is verified, and if the verification result is that the password is correct, the unlocking of the intelligent coded lock is controlled; if the verification result is that the password is wrong, the intelligent password lock is kept closed; after each verification of the unlocking password, verification information corresponding to the unlocking password is recorded, wherein the verification information comprises a verification result and a second timestamp when the verification result is generated.
The verification of the unlocking password means that the received unlocking password is matched with an unlocking password preset by the intelligent coded lock, and if the received unlocking password is matched with the preset unlocking password, the verification result is that the password is correct; if not, the verification result is a password error.
In an alternative embodiment, the step of receiving the input unlocking password through the password input module includes:
receiving an input unlocking password through the password input module within a preset time after the password input module is started; and closing the password input module when the preset time is exceeded after the password input module is started.
The preset time is used for limiting a time interval in which an unlocking person can input an unlocking password, and can be set according to actual needs, for example, 30 seconds, 60 seconds or 2 minutes, and in one example, the unlocking password input by the unlocking person is received through the password input module within 30 seconds after the password input module is started; and closing the password input module when the time exceeds 30 seconds after the password input module is started.
After the password input module is closed, the input unlocking password is not received any more, and an unlocking person needs to input fingerprint information again through the step S101 to open the password input module again.
By limiting the time for which the password input module is kept on, the password input module is prevented from being always on or kept on for too long, so that other people can input unlocking passwords without inputting fingerprint information.
In another alternative embodiment, the step of receiving the input unlocking password through the password input module includes:
after the password input module is started, the password input module receives the input unlocking password, and when the number of times of receiving the input unlocking password reaches the preset receiving number, the password input module is closed.
The preset number of times of receiving is used for limiting the limited number of times of unlocking passwords which can be input by an unlocking person after the password input module is started, and the limited number of times of unlocking passwords can be 1 time or more than 1 time, in one example, after the password input module is started, the unlocking passwords input by the password input module are received, and when the number of times of receiving the input unlocking passwords reaches 5 times in an accumulated manner, the password input module is closed.
The password input module is prevented from being always started and receiving the unlocking password by limiting the receiving times of the unlocking password after being started, so that other people can input the unlocking password without inputting fingerprint information.
Of course, in another embodiment, the step of receiving, by the password input module, the input unlocking password may be combined with the steps of the two alternative embodiments, including:
and receiving an input unlocking password through the password input module within a preset time after the password input module is started, and closing the password input module when the number of times of receiving the input unlocking password reaches a preset receiving number or exceeds the preset time after the password input module is started.
And through the limitation of the preset time and the preset receiving times, unlocking personnel can only input the unlocking password in a limited time and a limited number of times after starting the password input module each time.
For step S103, since the complexity of the unlocking password set by the intelligent coded lock is limited, in order to prevent an illegal person from unlocking by unauthorized means, for example, after a trial and error is performed by inputting the unlocking password multiple times, the correct unlocking password may be used to successfully unlock finally.
The abnormal event refers to the recorded verification information having abnormal conditions, and is specifically judged by a preset abnormal detection method.
In an alternative embodiment, the step of determining whether the recorded verification information has an abnormal event includes:
judging whether a plurality of verification results which are continuous in time are password errors according to the verification results in the recorded verification information and the corresponding second time stamp, and judging whether the recorded verification information has abnormal events if the number of the password errors exceeds a first preset number threshold.
The several verification results which are continuous in time are all password errors, which means that the verification results of unlocking passwords which are input successively from front to back are all password errors, and the time interval is not limited, for example, the first password error and the second password error can be separated by any long time, and the two password errors can occur successively as long as the condition that the verification result is that the password is correct is not existed in the middle.
The first preset time threshold may be set according to circumstances, for example, may be set to 3 times, and then when the number of time-continuous verification results are all password errors and the number of password errors exceeds 3 times, it is determined that an abnormal event exists.
In general, the unlocking password input by the unlocking personnel for many times is wrong, so that the unlocking personnel has a larger suspicion of abnormal unlocking, whether the number of times of continuous many times of password errors exceeds a first preset number threshold value is judged, and if yes, the recorded verification information has an abnormal event. In this embodiment, when the unlocking password input by the unlocking person for several times is a password error and the number of password errors exceeds the preset number of times, no matter how long the time is between, for example, the unlocking person may try to unlock the password once at intervals, as long as the number of accumulated continuous multiple password errors exceeds the first preset number threshold, the abnormal event will be judged to exist, so that the unlocking person is effectively prevented from inputting the unlocking password for trial and error at a certain time interval and thereby bypasses the detection of the detection method based on the operation frequency judgment abnormality.
In an alternative embodiment, the step of determining whether the recorded verification information has an abnormal event includes:
acquiring a plurality of verification information which are continuous in time, and acquiring a verification information sequence; counting the number of the verification information in the verification information sequence in a preset sliding time window, judging whether the number of the verification information exceeds a second preset time threshold, and if so, judging that the recorded verification information has an abnormal event.
In general, if the unlocking personnel inputs the unlocking password too frequently, the unlocking personnel has a larger suspicion of abnormal unlocking, and if the number of the verification information in the sliding time window exceeds the second preset frequency threshold, the operation is considered to be too frequent, and if the number of the verification information exceeds the second preset frequency threshold, the recorded verification information can be judged to have an abnormal event.
The verification information sequence is formed by arranging the plurality of verification information according to the corresponding second time stamps in time sequence.
The sliding time window refers to a slidable time range, and in this embodiment, the sliding time window is within a preset time range from the time when the verification result is generated to the time before the time, for example, the sliding time window may be within the last 2 minutes when the verification result is generated after the unlocking person inputs the unlocking password.
The second preset number of times threshold may be set according to circumstances, for example, may be set to 5 times, and then, when the number of pieces of verification information in the verification information sequence in the sliding time window exceeds 5, it is determined that an abnormal event exists.
In an alternative embodiment, the step of determining whether the recorded verification information has an abnormal event includes:
counting the number of the verification information recorded in a preset time period, judging whether the number of the verification information recorded in the time period exceeds the normal verification times of the time period, and if so, judging that the recorded verification information has abnormal events; the normal verification times are obtained through big data analysis according to the verification information of the history record.
In this embodiment, the normal verification times of different time periods are obtained through big data analysis according to the verification information of the history record, specifically, the normal unlocking verification times of different time periods of different seasons, holidays and workdays are included.
The unlocking conditions are different in different seasons, holidays, workdays and different time periods of each day, for example, the time periods and times of unlocking on one of the different seasons and holidays are generally different, the time periods and times of unlocking on one of the holidays and the workdays are possibly different, rules of the unlocking on the basis of the verification information recorded in the history can be obtained through big data analysis, the normal unlocking verification times of the different time periods of the different seasons, holidays and workdays are obtained, and when the number of unlocking password verification information input by an unlocking person in the preset time period exceeds the normal verification times of the time period, abnormal events are judged.
Of course, the abnormality detection methods of any two or three of the above embodiments may be combined at the same time, and the determination may be performed at the same time. The abnormality detection methods of the three embodiments can detect abnormality for various possible abnormal unlocking situations, and can timely detect abnormal operations of unlocking by an abnormal unlocking person through blind guessing trial and error.
In this embodiment, if it is determined that the recorded verification information has an abnormal event, fingerprint information corresponding to the abnormal event is determined according to the first timestamp and the second timestamp, and an abnormal response mechanism is triggered according to the fingerprint information corresponding to the abnormal event.
The fingerprint information corresponding to the abnormal event is the fingerprint information recorded before the moment when the abnormal event is judged to exist, generally speaking, the fingerprint information corresponding to the first timestamp which is before the second timestamp of the verification information of the unlocking password when the abnormal event is judged to exist and has the time closest to the second timestamp, but in some special cases, for example, when an abnormal unlocking person performs unlocking, the recorded verification information is not judged to exist the abnormal event, and the current verification information is not caused to be judged to exist the abnormal event based on the verification information recorded before when other normal persons perform normal unlocking, so in some embodiments, the fingerprint information corresponding to the abnormal event can also be a plurality of fingerprint information recorded before the moment when the abnormal event is judged to exist, and the real abnormal unlocking person can be analyzed based on the plurality of fingerprint information.
In one embodiment, the step of determining whether the recorded verification information has an abnormal event includes:
judging whether the verification information recorded in the period has an abnormal event or not according to a preset period.
In the scene of temporary unlocking, an administrator configures a temporary unlocking password and the effective time period and the effective use times of the temporary unlocking password for the intelligent coded lock, so that temporary unlocking personnel such as a nurse, a temporary cleaning personnel or a home guest can use the temporary unlocking password to unlock in the set effective time period and the effective use times. In this embodiment, the anomaly detection is performed for a preset period of time, and the anomaly detection may not be performed for other times, where the period of time for performing the anomaly detection may be set by an administrator.
In one embodiment, the exception response mechanism includes: and pushing abnormal information to a preset alarm receiver, wherein the abnormal information comprises the fingerprint information, and the abnormal unlocking personnel can be traced through the fingerprint information.
The alarm receiver is a preset relevant person for receiving the abnormal information, such as a residence owner, a residence manager or public security bureau, a regional committee, a property, a neighbor and the like.
The pushing abnormal information may specifically be: and sending a short message to the mobile phone of the alarm receiver or sending a message to the client APP of the mobile phone of the alarm receiver or directly dialing an alarm call.
In another embodiment, the abnormal response mechanism may further include turning off the password input module, and may further send out an alarm sound through a horn of the smart combination lock to draw attention of a neighbor and frighten an abnormal unlocking person.
The abnormality detection method of the embodiment of the application can be executed by a program stored on the intelligent coded lock memory, when an abnormality event is judged to exist, the intelligent coded lock can send an instruction to a remote server through a network to enable the remote server to start an abnormality response mechanism, and the response mechanism can be directly started by the intelligent coded lock, for example, abnormal information and the like are sent through a communication module of the intelligent coded lock; or, the abnormality detection method may be executed by a program on a remote server, the intelligent trick lock performs data interaction with the remote server through network communication, the intelligent trick lock uploads the verification information to the remote server in real time, the program of the remote server determines that an abnormality event exists, and if the remote server determines that an abnormality event exists, the remote server starts an abnormality response mechanism.
Referring to fig. 3, the present application further provides a safety protection device of an intelligent coded lock, including:
the fingerprint acquisition module 201 is configured to acquire entered fingerprint information, record the fingerprint information and a first timestamp when the fingerprint information is entered, and start the password input module, where the fingerprint information is used for tracing an unlocking person;
the password verification module 202 is configured to receive the input unlocking password through the password input module, verify the unlocking password, and control the intelligent coded lock to unlock if the verification result is that the password is correct; if the verification result is that the password is wrong, the intelligent password lock is kept closed; recording verification information corresponding to an unlocking password, wherein the verification information comprises a verification result and a second timestamp when the verification result is generated;
the abnormal response module 203 is configured to determine whether the recorded verification information has an abnormal event, and if so, determine fingerprint information corresponding to the abnormal event according to the first timestamp and the second timestamp, and trigger an abnormal response mechanism according to the fingerprint information corresponding to the abnormal event.
It should be noted that, when the security protection device of the intelligent coded lock provided in the above embodiment executes the security protection method of the intelligent coded lock, only the division of the above functional modules is used for illustration, in practical application, the above functional allocation may be completed by different functional modules according to needs, that is, the internal structure of the device is divided into different functional modules, so as to complete all or part of the functions described above. In addition, the safety protection device of the intelligent coded lock provided in the above embodiment and the safety protection method of the intelligent coded lock belong to the same concept, which embody the implementation process in detail in the embodiment of the safety protection method of the intelligent coded lock, and are not described herein again.
According to the safety protection method and device for the intelligent coded lock, the coded input module is started after the fingerprint information input by the unlocking personnel is acquired, the input unlocking code is received, the condition of the unlocking code input by the unlocking personnel is detected, the alarm is timely given when the abnormality is detected, and meanwhile, the identity of the abnormal unlocking personnel can be traced according to the recorded fingerprint information, so that the safety protection of the intelligent coded lock is improved.
Referring to fig. 4, the application further discloses an intelligent coded lock 301, which comprises a fingerprint acquisition device 305, a code input device 306, a computer storage medium 303 and a processor 302, wherein the fingerprint acquisition device 305, the code input device 306 and the computer storage medium 303 are connected with the processor 302; the computer storage medium 303 stores a computer program 304, which computer program 304, when executed by the processor 302, implements the security protection method of the smart combination lock according to any one of the above embodiments. In an embodiment, the smart combination lock 301 further comprises a communication module 307, the communication module 307 is connected to the processor 302, and the smart combination lock 301 communicates with a remote server through the communication module 307.
The application also discloses a computer readable storage medium, which comprises a stored computer program, wherein the computer program is used for controlling a device where the computer readable storage medium is located to execute the method according to any one of the embodiments.
The above examples merely represent a few embodiments of the present application, which are described in more detail and are not to be construed as limiting the scope of the invention. It should be noted that modifications and improvements can be made by those skilled in the art without departing from the spirit of the present application, and the present application is intended to encompass such modifications and improvements.
Claims (8)
1. The safety protection method of the intelligent coded lock is characterized by comprising the following steps of:
acquiring input fingerprint information, and verifying whether the fingerprint information is legal or not; if the fingerprint information is legal, recording the fingerprint information and a first time stamp when the fingerprint information is recorded and starting a password input module, and if the fingerprint information is illegal, not recording the fingerprint information and starting the password input module; the fingerprint information is used for tracing unlocking personnel; the password input module is a software function module for receiving unlocking passwords in the intelligent coded lock;
in a preset time after the password input module is started, receiving an input unlocking password through the password input module, verifying the unlocking password, and controlling the intelligent coded lock to be unlocked if the verification result is that the password is correct; if the verification result is that the password is wrong, the intelligent password lock is kept closed; when the preset time is exceeded after the password input module is started, the password input module is closed; the operation of closing the password input module is that an unlocking password is not received through the software function module;
recording verification information corresponding to an unlocking password, wherein the verification information comprises a verification result and a second timestamp when the verification result is generated;
judging whether the recorded verification information has an abnormal event or not, if so, determining fingerprint information corresponding to the abnormal event according to the first timestamp and the second timestamp, and triggering an abnormal response mechanism according to the fingerprint information corresponding to the abnormal event;
the step of judging whether the recorded verification information has an abnormal event comprises the following steps:
judging whether a plurality of verification results which are continuous in time are password errors according to the verification results in the recorded verification information and the corresponding second time stamp, and judging whether the recorded verification information has abnormal events if the number of the password errors exceeds a first preset number threshold;
counting the number of the verification information recorded in a preset time period, judging whether the number of the verification information recorded in the time period exceeds the normal verification times of the time period, and if so, judging that the recorded verification information has abnormal events; the normal verification times of different time periods of a day are obtained through big data analysis according to the verification information of the historical record;
the step of verifying whether the fingerprint information is legal includes:
analyzing the fingerprint information based on a fingerprint image quality analysis algorithm to obtain quality parameters, and verifying that the fingerprint information is legal when the quality parameters are larger than a preset quality threshold value, or else, illegal;
or detecting the temperature of a touch object on a fingerprint acquisition device of the intelligent coded lock through an infrared temperature measuring device, analyzing the fingerprint information based on a fingerprint image quality analysis algorithm to obtain a quality parameter, and verifying that the fingerprint information is legal when the temperature of the touch object is within a preset temperature threshold range and the quality parameter is greater than a preset quality threshold, or else, verifying that the fingerprint information is illegal.
2. The method of claim 1, wherein the step of receiving the entered unlocking code via the code input module comprises:
after the password input module is started, the password input module receives the input unlocking password, and when the number of times of receiving the input unlocking password reaches the preset receiving number, the password input module is closed.
3. The method for protecting security of an intelligent coded lock according to claim 1, wherein the step of determining whether the recorded verification information has an abnormal event includes:
acquiring a plurality of verification information which are continuous in time, and acquiring a verification information sequence; counting the number of the verification information in the verification information sequence in a preset sliding time window, judging whether the number of the verification information exceeds a second preset time threshold, and if so, judging that the recorded verification information has an abnormal event.
4. The method for protecting the security of the intelligent coded lock according to claim 1, wherein the abnormal response mechanism comprises: pushing abnormal information to a preset alarm receiver, wherein the abnormal information comprises the fingerprint information; or closing the password input module and pushing abnormal information to a preset alarm receiver, wherein the abnormal information comprises the fingerprint information.
5. The method for protecting security of an intelligent coded lock according to any one of claims 1 to 4, wherein the step of determining whether the recorded authentication information has an abnormal event includes:
judging whether the verification information recorded in the period has an abnormal event or not according to a preset period.
6. The utility model provides a safety device of intelligent trick lock which characterized in that includes:
the fingerprint acquisition module is used for acquiring the input fingerprint information and verifying whether the fingerprint information is legal or not; if the fingerprint information is legal, recording the fingerprint information and a first time stamp when the fingerprint information is recorded and starting a password input module, and if the fingerprint information is illegal, not recording the fingerprint information and starting the password input module; the fingerprint information is used for tracing unlocking personnel; the password input module is a software function module for receiving unlocking passwords in the intelligent coded lock; the step of verifying whether the fingerprint information is legal includes: analyzing the fingerprint information based on a fingerprint image quality analysis algorithm to obtain quality parameters, and verifying that the fingerprint information is legal when the quality parameters are larger than a preset quality threshold value, or else, illegal; or detecting the temperature of a touch object on a fingerprint acquisition device of the intelligent coded lock through an infrared temperature measuring device, analyzing the fingerprint information based on a fingerprint image quality analysis algorithm to obtain a quality parameter, and verifying that the fingerprint information is legal when the temperature of the touch object is within a preset temperature threshold range and the quality parameter is greater than a preset quality threshold, or else, verifying that the fingerprint information is illegal;
the password verification module is used for receiving the input unlocking password through the password input module within the preset time after the password input module is started, verifying the unlocking password, and controlling the intelligent coded lock to be unlocked if the verification result is that the password is correct; if the verification result is that the password is wrong, the intelligent password lock is kept closed; when the preset time is exceeded after the password input module is started, the password input module is closed, and the operation of closing the password input module is that an unlocking password is not received through the software function module; recording verification information corresponding to an unlocking password, wherein the verification information comprises a verification result and a second timestamp when the verification result is generated;
the abnormal response module is used for judging whether the recorded verification information has an abnormal event, if so, determining fingerprint information corresponding to the abnormal event according to the first timestamp and the second timestamp, and triggering an abnormal response mechanism according to the fingerprint information corresponding to the abnormal event; the step of judging whether the recorded verification information has an abnormal event comprises the following steps: judging whether a plurality of verification results which are continuous in time are password errors according to the verification results in the recorded verification information and the corresponding second time stamp, and judging whether the recorded verification information has abnormal events if the number of the password errors exceeds a first preset number threshold; and/or counting the number of the verification information recorded in a preset time period, judging whether the number of the verification information recorded in the time period exceeds the normal verification times of the time period, and if so, judging that the recorded verification information has abnormal events; wherein the normal verification times of different time periods of a day are obtained through big data analysis according to the verification information of the historical record.
7. The intelligent coded lock is characterized by comprising a fingerprint acquisition device, a code input device, a computer storage medium and a processor, wherein the fingerprint acquisition device, the code input device and the computer storage medium are connected with the processor; the fingerprint acquisition device is used for inputting fingerprint information, and the password input device is used for inputting an unlocking password; the computer storage medium stores a computer program which, when executed by the processor, implements the method of any of claims 1 to 5.
8. A computer readable storage medium, characterized in that the computer readable storage medium comprises a stored computer program, wherein the computer program, when run, controls a device in which the computer readable storage medium is located to perform the method according to any one of claims 1 to 5.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202211071019.6A CN115424378B (en) | 2022-09-02 | 2022-09-02 | Safety protection method and device for intelligent coded lock and related equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202211071019.6A CN115424378B (en) | 2022-09-02 | 2022-09-02 | Safety protection method and device for intelligent coded lock and related equipment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN115424378A CN115424378A (en) | 2022-12-02 |
CN115424378B true CN115424378B (en) | 2023-12-29 |
Family
ID=84202143
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202211071019.6A Active CN115424378B (en) | 2022-09-02 | 2022-09-02 | Safety protection method and device for intelligent coded lock and related equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN115424378B (en) |
Citations (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2005226413A (en) * | 2004-02-16 | 2005-08-25 | Mitsubishi Electric Corp | Control device for entrance and exit to/from room |
CN104157049A (en) * | 2014-07-23 | 2014-11-19 | 国家电网公司 | Unlocking key management control device |
CN104517332A (en) * | 2013-09-30 | 2015-04-15 | 湖州市南浔亨力木制品厂 | Entrance guard system |
CN105844737A (en) * | 2015-01-15 | 2016-08-10 | 珠海汇金科技股份有限公司 | Camera based electronic lock system and use method |
CN206470852U (en) * | 2017-02-15 | 2017-09-05 | 濮阳职业技术学院 | A kind of anti-theft power equipment box |
CN206819436U (en) * | 2017-06-19 | 2017-12-29 | 广东硕普信息科技有限公司 | A kind of access control equipment |
CN108596127A (en) * | 2018-04-28 | 2018-09-28 | 北京旷视科技有限公司 | A kind of fingerprint identification method, auth method and device and identity veritify machine |
CN109493483A (en) * | 2018-11-12 | 2019-03-19 | 上海庆科信息技术有限公司 | Intelligent lock system and alarm method, device, equipment, computer storage medium |
CN110111463A (en) * | 2019-05-05 | 2019-08-09 | 胡渐佳 | Touch screen intelligent door lock user password display input method |
CN110164013A (en) * | 2019-05-31 | 2019-08-23 | 广州软盈科技有限公司 | A kind of retrospective caller management method |
CN110322603A (en) * | 2019-06-18 | 2019-10-11 | 广东汇泰龙科技股份有限公司 | A kind of temporary password security protection method and system for intelligent door lock |
CN110349311A (en) * | 2019-07-08 | 2019-10-18 | 江苏橙贝科技有限公司 | A kind of fingerprint lock control system and method based on block chain technology |
CN112232155A (en) * | 2020-09-30 | 2021-01-15 | 墨奇科技(北京)有限公司 | Non-contact fingerprint identification method and device, terminal and storage medium |
CN113870468A (en) * | 2021-12-02 | 2021-12-31 | 云丁网络技术(北京)有限公司 | Control method and system of intelligent lock |
CN114926922A (en) * | 2022-03-10 | 2022-08-19 | 珠海格力电器股份有限公司 | Control method and control device of intelligent door lock, intelligent door lock and storage medium |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2021023164A1 (en) * | 2019-08-02 | 2021-02-11 | 云丁网络技术(北京)有限公司 | Intelligent lock control method and system |
-
2022
- 2022-09-02 CN CN202211071019.6A patent/CN115424378B/en active Active
Patent Citations (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2005226413A (en) * | 2004-02-16 | 2005-08-25 | Mitsubishi Electric Corp | Control device for entrance and exit to/from room |
CN104517332A (en) * | 2013-09-30 | 2015-04-15 | 湖州市南浔亨力木制品厂 | Entrance guard system |
CN104157049A (en) * | 2014-07-23 | 2014-11-19 | 国家电网公司 | Unlocking key management control device |
CN105844737A (en) * | 2015-01-15 | 2016-08-10 | 珠海汇金科技股份有限公司 | Camera based electronic lock system and use method |
CN206470852U (en) * | 2017-02-15 | 2017-09-05 | 濮阳职业技术学院 | A kind of anti-theft power equipment box |
CN206819436U (en) * | 2017-06-19 | 2017-12-29 | 广东硕普信息科技有限公司 | A kind of access control equipment |
CN108596127A (en) * | 2018-04-28 | 2018-09-28 | 北京旷视科技有限公司 | A kind of fingerprint identification method, auth method and device and identity veritify machine |
CN109493483A (en) * | 2018-11-12 | 2019-03-19 | 上海庆科信息技术有限公司 | Intelligent lock system and alarm method, device, equipment, computer storage medium |
CN110111463A (en) * | 2019-05-05 | 2019-08-09 | 胡渐佳 | Touch screen intelligent door lock user password display input method |
CN110164013A (en) * | 2019-05-31 | 2019-08-23 | 广州软盈科技有限公司 | A kind of retrospective caller management method |
CN110322603A (en) * | 2019-06-18 | 2019-10-11 | 广东汇泰龙科技股份有限公司 | A kind of temporary password security protection method and system for intelligent door lock |
CN110349311A (en) * | 2019-07-08 | 2019-10-18 | 江苏橙贝科技有限公司 | A kind of fingerprint lock control system and method based on block chain technology |
CN112232155A (en) * | 2020-09-30 | 2021-01-15 | 墨奇科技(北京)有限公司 | Non-contact fingerprint identification method and device, terminal and storage medium |
CN113870468A (en) * | 2021-12-02 | 2021-12-31 | 云丁网络技术(北京)有限公司 | Control method and system of intelligent lock |
CN114926922A (en) * | 2022-03-10 | 2022-08-19 | 珠海格力电器股份有限公司 | Control method and control device of intelligent door lock, intelligent door lock and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN115424378A (en) | 2022-12-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104850771B (en) | A kind of indentity identifying method and relevant device | |
CN107578519A (en) | A kind of intelligent access control system and intelligent entrance guard method for unlocking | |
CN202280353U (en) | Intelligent safety box | |
CN107992739A (en) | User authentication method, apparatus and system | |
CN106453874B (en) | Mobile phone control method and system | |
CN111691764B (en) | Household intelligent door lock and control method thereof | |
WO2015117507A1 (en) | Authentication method, collection device, authentication device and system, and cabinet and unlocking method therefor | |
EP2779133A2 (en) | System and method of anomaly detection | |
CN109410407A (en) | A kind of face and fingerprint recognition access control system | |
CN111911030A (en) | Multi-person management safety box and opening method of door of safety box | |
CN113611032A (en) | Access control management method and system based on face recognition | |
CN113870508A (en) | Intelligent security gateway arming and disarming method combining facial recognition | |
CN107481362A (en) | Access control system and access control method | |
CN103129523A (en) | Automobile intelligent fingerprint lock device and automobile monitoring system thereof | |
CN110388138B (en) | Method for automatically reminding user to replace unlocking password, door lock system and door lock | |
CN111698215A (en) | Security prevention and control method, device and system based on biological feature recognition | |
CN115424378B (en) | Safety protection method and device for intelligent coded lock and related equipment | |
CN207397360U (en) | A kind of access control system for realizing people stream counting control | |
CN106211070A (en) | The anti-theft protection method of a kind of mobile terminal and mobile terminal | |
CN211124241U (en) | Smart mobile phone cabinet based on cloud security | |
US10636264B2 (en) | Office building security system using fiber sensing | |
CA2933212A1 (en) | System and method of smart incident analysis in control system using floor maps | |
CN105989265A (en) | Early warning method and device and terminal equipment | |
KR101421962B1 (en) | Entrance-Exit Control Device Using Image of Entry and Method for Managing the Entry | |
CN112669501B (en) | Access control method, device and computer readable storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |