CN115482608B - Control method and system of intelligent lock - Google Patents

Control method and system of intelligent lock Download PDF

Info

Publication number
CN115482608B
CN115482608B CN202211114763.XA CN202211114763A CN115482608B CN 115482608 B CN115482608 B CN 115482608B CN 202211114763 A CN202211114763 A CN 202211114763A CN 115482608 B CN115482608 B CN 115482608B
Authority
CN
China
Prior art keywords
unlocking
verification
mode
user
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202211114763.XA
Other languages
Chinese (zh)
Other versions
CN115482608A (en
Inventor
刘楠城
陈彬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yunding Network Technology Beijing Co Ltd
Original Assignee
Yunding Network Technology Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yunding Network Technology Beijing Co Ltd filed Critical Yunding Network Technology Beijing Co Ltd
Priority to CN202211114763.XA priority Critical patent/CN115482608B/en
Publication of CN115482608A publication Critical patent/CN115482608A/en
Application granted granted Critical
Publication of CN115482608B publication Critical patent/CN115482608B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Lock And Its Accessories (AREA)
  • Telephone Function (AREA)

Abstract

The embodiment of the application provides a control method and a control system for an intelligent lock. The method comprises the following steps: acquiring verification information of at least two unlocking modes of a user; dynamically adjusting a verification frequency threshold according to the similarity between verification information of at least one unlocking mode of the at least two unlocking modes and corresponding pre-stored verification information; and judging whether the function of the user using at least one unlocking mode of the at least two unlocking modes is limited or not based on the adjusted verification frequency threshold value and the verification records of the at least two unlocking modes.

Description

Control method and system of intelligent lock
Description of the division
The application provides a divisional application aiming at China application with 2021, 12 months and 2 days, the application number 202111456245.1 and the name of an intelligent lock control method and system.
Technical Field
The application relates to the technical field of intelligent locks, in particular to a control method and a control system of an intelligent lock.
Background
With the progress and development of technology, intelligent locks have entered the public's daily life. The intelligent lock is widely applied to the fields of access control systems, household equipment, security protection and the like by the safety and convenience of the intelligent lock. How to conveniently realize the state and the safety control of the intelligent lock is attracting more and more attention.
Therefore, it is desirable to provide a control method and system for an intelligent lock with high security.
Disclosure of Invention
An aspect of the present application provides a control method for an intelligent lock. The method comprises the following steps: acquiring verification information of at least two unlocking modes of a user; dynamically adjusting a verification frequency threshold according to the similarity between verification information of at least one unlocking mode of the at least two unlocking modes and corresponding pre-stored verification information; and judging whether the function of at least one unlocking mode of at least two unlocking modes is limited or not by the user based on the adjusted verification frequency threshold and the verification records of the at least two unlocking modes.
In some embodiments, the verification record includes at least a verification error number and verification error time information of the unlocking manner in a first period of time, and the method further includes: and dynamically adjusting the verification frequency threshold based on the position information of the user and the intelligent lock.
In some embodiments, the method further comprises: and adjusting the verification frequency threshold based on at least one of the unlocking mode, the scene mode of the intelligent lock and the user information.
In some embodiments, the verification number threshold includes a first threshold, and the determining, based on the adjusted verification number threshold and the verification records of the at least two unlocking modes, whether to limit a function of the user using at least one unlocking mode of the at least two unlocking modes includes: and responding to the fact that the total verification error number of at least one unlocking mode in the at least two unlocking modes in the first time period is larger than the adjusted first threshold value, and limiting the function of the user using the at least one unlocking mode.
In some embodiments, the verification number threshold includes at least two second thresholds corresponding to the at least two unlocking modes, and the determining, based on the adjusted verification number threshold and the verification records of the at least two unlocking modes, whether to limit the user to use at least one unlocking mode of the at least two unlocking modes includes: and responding to the fact that the verification error times of one unlocking mode of the at least two unlocking modes in the first time period is larger than the corresponding adjusted second threshold value, and limiting the function of using the unlocking mode by a user.
In some embodiments, the above method further comprises: determining a target unlocking mode meeting a verification frequency threshold; determining a locking mode based on the target unlocking mode, wherein the locking mode comprises at least one of a limited duration, a limited user and a limited use unlocking mode; and based on the locking mode, limiting the function of using the corresponding unlocking mode by the corresponding user in the determined second time period.
In some embodiments, the above method further comprises: the locking mode is determined based on user information and/or a scene mode of the smart lock.
In some embodiments, the above method further comprises: and when the limiting time reaches the second time period, releasing the limiting and clearing the verification error times and the verification error time information of the corresponding unlocking mode.
In some embodiments, the above method further comprises: and adjusting the first time period based on the unlocking mode and/or the scene mode of the intelligent lock.
In some embodiments, the unlocking means comprises password unlocking, biometric unlocking, near field communication unlocking, or mechatronic key unlocking.
In some embodiments, when the unlocking mode is the biometric unlocking, the method further includes: based on the verification result of the biological identification unlocking mode, dynamically adjusting the verification error frequency threshold of the unlocking mode.
Another aspect of the present application provides a control system for an intelligent lock, the system comprising: the acquisition module is used for acquiring verification information of at least two unlocking modes of a user; the control module is used for dynamically adjusting the verification frequency threshold according to the similarity between the verification information of at least one unlocking mode of the at least two unlocking modes and the corresponding pre-stored verification information; and judging whether the user is limited to use the function of at least one unlocking mode of the at least two unlocking modes or not based on the adjusted verification frequency threshold value and the verification information of the at least two unlocking modes.
Another aspect of the present application provides a computer readable storage medium, wherein the storage medium stores computer instructions, and when the computer reads the computer instructions in the storage medium, the computer performs the smart lock control method as described above.
Another aspect of the application provides a computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the processor implements the smart lock control method as described above when executing the computer program.
Drawings
The application will be further described by way of exemplary embodiments, which will be described in detail with reference to the accompanying drawings. The embodiments are not limiting, in which like numerals represent like structures, wherein:
FIG. 1 is a schematic illustration of an application scenario of an intelligent lock control system according to some embodiments of the present application;
FIG. 2 is a schematic diagram of exemplary hardware and/or software of a smart lock control system shown in accordance with some embodiments of the present application;
FIG. 3 is a schematic diagram of exemplary hardware and/or software of a computing device shown according to some embodiments of the application;
FIG. 4 is an exemplary block diagram of an intelligent lock control system according to some embodiments of the present application;
FIG. 5 is a flow chart of a smart lock control method according to some embodiments of the application;
FIG. 6 is a flow chart of a smart lock control method according to further embodiments of the present application;
Fig. 7 is a flow chart of a method for controlling an intelligent lock according to other embodiments of the present application.
Detailed Description
In order to more clearly illustrate the technical solution of the embodiments of the present application, the drawings that are required to be used in the description of the embodiments will be briefly described below. It is apparent that the drawings in the following description are only some examples or embodiments of the present application, and it is apparent to those of ordinary skill in the art that the present application may be applied to other similar situations according to the drawings without inventive effort. Unless otherwise apparent from the context of the language or otherwise specified, like reference numerals in the figures refer to like structures or operations.
It will be appreciated that "system," "apparatus," "unit" and/or "module" as used herein is one method for distinguishing between different components, elements, parts, portions or assemblies of different levels. However, if other words can achieve the same purpose, the words can be replaced by other expressions.
As used in this specification and the claims, the terms "a," "an," "the," and/or "the" are not specific to a singular, but may include a plurality, unless the context clearly dictates otherwise. In general, the terms "comprises" and "comprising" merely indicate that the steps and elements are explicitly identified, and they do not constitute an exclusive list, as other steps or elements may be included in a method or apparatus.
A flowchart is used in the present application to describe the operations performed by a system according to embodiments of the present application. It should be appreciated that the preceding or following operations are not necessarily performed in order precisely. Rather, the steps may be processed in reverse order or simultaneously. Also, other operations may be added to or removed from these processes.
The embodiment of the application provides an unlocking mode control method of an intelligent lock, which can judge whether to limit the function of the user in using at least one unlocking mode of at least two unlocking modes in a second time period by acquiring verification information of at least two unlocking modes of the user so as to improve the use safety and reliability of the intelligent lock.
Fig. 1 is a schematic view of an application scenario of an intelligent lock control system according to some embodiments of the present application.
As shown in fig. 1, the smart lock control scenario 100 may include: server 110, network 120, smart lock 130, and terminal device 140. Network 120 is the medium used to provide communication links between server 110, smart lock 130, and terminal device 140. The network 120 may include various connection types, such as wired, wireless communication links, or fiber optic cables, among others.
The server 110 may be a server providing various services, for example, the server 110 may perform analysis and other processes on a remote control command sent by the terminal device 140 in response to receiving the remote control command, obtain a remote control request, and send the remote control request to the smart lock 130, so that a user may implement remote control on the smart lock 130. As another example, the terminal device 140 may be configured to generate a remote control instruction in response to a remote target operation input by a user, and transmit the remote control instruction to the server 110; the server 110 is configured to receive the remote control instruction, obtain an intelligent lock identifier corresponding to the remote control instruction, generate a remote control request, and send the remote control request and the intelligent lock identifier to an internet of things gateway, so that the internet of things gateway sends the remote control request to the intelligent lock 130 corresponding to the intelligent lock identifier. In some embodiments, the server 110 may perform analysis and other processes on the input information (such as input fingerprint, password, face, etc.) in response to receiving the unlocking mode input information sent by the smart lock 130, to obtain an instruction of verification error or verification success, and send the instruction to the smart lock 130 to unlock the smart lock 130.
The server 110 may be hardware or software. When the server is hardware, the server may be implemented as a distributed server cluster formed by a plurality of servers, or may be implemented as a single server. When the server is software, it may be implemented as a plurality of software or software modules (e.g., to provide distributed services), or as a single software or software module. The present invention is not particularly limited herein.
In some embodiments, server 110 may be located inside smart lock 130, with smart lock 130 and server 110 connected via an internal wired network. In some embodiments, server 110 may also be located in the cloud, connected to smart lock 130 via a wireless network. Some or all of the operations of some of the modules of smart lock 130 may be performed by server 110.
A user may interact with server 110 over network 120 using terminal device 140 to receive or send messages, etc. Various client applications, such as a remote control type application, etc., may be installed on the terminal device 140. In some embodiments, the network 120 may be any one of a wired network or a wireless network, or a combination thereof. By way of example only, the network 120 may include a cable network, a wired network, a fiber optic network, a remote communication network, an intranet, the internet, a Local Area Network (LAN), a Wide Area Network (WAN), a Wireless Local Area Network (WLAN), a Metropolitan Area Network (MAN), a Wide Area Network (WAN), a Public Switched Telephone Network (PSTN), a bluetooth network, a ZigBee network, a Near Field Communication (NFC) network, or the like, or any combination of the above.
The smart lock 130 may be used to perform the control method disclosed herein as being applied to the smart lock. The intelligent lock 130 and the server 110 can communicate directly through the network 120, and can also be connected through an internet of things gateway (not shown). For example, the intelligent lock 130 may communicate with the internet of things gateway based on Zigbee protocols, and the internet of things gateway may communicate with the server 110 based on cellular mobile network or Wi-Fi network. The smart lock 130 and the terminal device 140 may also be based on short range wireless communications including, but not limited to, bluetooth protocol communications, near Field Communications (NFC), infrared communications, etc.
The terminal device 140 may be hardware or software. When the terminal device 140 is hardware, it may be a variety of electronic devices having a display screen including, but not limited to, a smart phone 140-1, a tablet computer 140-2, a laptop computer 140-3, a desktop computer, and the like. When the terminal device 140 is software, it may be installed in the above-listed electronic device. Which may be implemented as multiple software or software modules (e.g., to provide distributed services), or as a single software or software module. The present invention is not particularly limited herein.
It should be understood that the number of terminal devices, networks and servers in fig. 1 is merely illustrative. There may be any number of terminal devices, networks, and servers, as desired for implementation. For ease of understanding, the embodiments of the present application will be mainly described by taking the application of the smart lock 130 to a door lock device as an example. It should be noted that the embodiment of the smart lock of the present application applied to the door lock device is only used as an example, and not limiting the present application, for example, the smart lock may be applied to a gate device, a traffic device, etc.
FIG. 2 is a schematic diagram of exemplary hardware and/or software of a smart lock control system according to some embodiments of the application.
As shown in fig. 2, the smart lock control system 200 may include a sensing module 210, a processing module 220, a storage module 230, a communication module 240, a power module 250, and an input/output module 260.
It should be noted that the modules, units and sub-units mentioned in the present application may be implemented in hardware, software or a combination of software and hardware. The implementation of the hardware may include implementation by using a circuit or structure formed by physical components; implementations of software may include storing the operations corresponding to the modules, units, and sub-units in a memory in the form of code for execution by appropriate hardware, such as a microprocessor. When a module, unit, or sub-unit is referred to herein as performing its operation, it can be understood that the software code comprising the function is executed or the hardware having the function is used, if not specifically stated. Meanwhile, the modules, units and sub-units mentioned herein are not limited to the structures of the corresponding hardware when corresponding to the hardware, so long as the hardware capable of realizing the functions thereof is within the protection scope of the present application. For example, different modules, units, sub-units referred to herein may correspond to the same hardware architecture. For another example, the same module, unit, or sub-unit mentioned herein may correspond to multiple independent hardware structures.
The sensing module 210 may be used to sense the state or actions performed by the smart lock and the device in which the smart lock is installed, such as an unlocked state, a locked state, and other states. In some embodiments, the sensing module 210 may include at least one of an angle sensor, a hall sensor, a gyroscope sensor, an accelerometer, a geomagnetic sensor, and the like. In some embodiments, the sensing module 210 may also include other types of sensing elements, such as infrared sensors, magnetic field sensors, contact sensors, vision sensors, pressure sensors, and the like.
The processing module 220 may be used to process information and data related to the smart lock control system 200 to perform one or more functions described herein. For example, the processing module 220 may define a function of the user using at least one of the at least two unlocking means during the second time period in response to a total number of verification errors of the at least one of the at least two unlocking means during the first time period being greater than a first threshold. For another example, the processing module 220 may generate the alarm information based on detecting that the number of verification errors of one of the at least two unlocking modes of the user within the first period of time is greater than the second threshold. By way of example only, the processing module 220 may include a Central Processing Unit (CPU), an Application Specific Integrated Circuit (ASIC), a special instruction set processor (ASIP), an image processing unit (GPU), a physical arithmetic processing unit (PPU), a Digital Signal Processor (DSP), a Field Programmable Gate Array (FPGA), a Programmable Logic Device (PLD), a controller, a microcontroller unit (MCU), a Reduced Instruction Set Computer (RISC), a microprocessor, or the like, or any combination thereof.
In some embodiments, the processing module 220 may include an input/output interface. The processing module 220 may receive information and/or data from or send information and/or data to one or more modules of the smart lock control system 200 (e.g., the sensing module 210, the storage module 230) via the input/output interface. In some embodiments, the input/output interface may be integrated into the communication module 240, and the processing module 220 may exchange information and/or data with one or more modules (e.g., the sensing module 210, the storage module 230) of the smart lock control system 200 via the communication module 240.
The processing module 220 may process data from the sensing module 210, the storage module 230, the communication module 240, the power module 250, and/or the input/output module 260. For example, the processing module 220 may determine whether to adjust the first threshold and/or the second threshold related to the number of verification errors based on the distance between the user and the smart lock acquired by the sensing module 210. For another example, the processing module 220 may process unlock instructions or operations from the input/output module 260. In some embodiments, the processing module 220 may communicate its processed data to one or more components in the smart lock control system 200 via the communication module 240 or the network 120. For example, the processing module 220 may send an instruction to the driving module 270 to define the function of the user in at least one unlocking mode for the second period of time, and the driving module 270 may control the smart lock to define the function of the user in one or more unlocking modes according to the instruction. For another example, after the processing module 220 performs the unlocking verification on the unlocking manner and obtains the instruction that the unlocking verification passes, the processing module may send an instruction to the driving module 270 to control the unlocking of the smart lock.
The storage module 230 may be used to store instructions and/or data for the various modules (e.g., the sensing module 210, the processing module 220) of the smart lock control system 200. For example, the storage module 230 may store authentication information for each unlocking mode. For another example, the storage module 230 may store an associated user of the smart lock, as well as the manner in which the user is authorized to unlock. In some embodiments, the storage module 230 may include mass storage, removable storage, volatile read-write memory, read-only memory (ROM), and the like, or any combination thereof. In some embodiments, the storage module 230 may be implemented on a cloud platform. For example only, the cloud platform may include a private cloud, a public cloud, a hybrid cloud, a community cloud, a distributed cloud, an interconnected cloud, a multi-cloud, or the like, or any combination thereof.
The communication module 240 may be used for signal transmission between the modules (e.g., the sensing module 210, the processing module 220, the storage module 230) of the smart lock control system 200. In some embodiments, the communication module 240 may also establish communication with a client (e.g., a user's terminal device, etc.) to feed back the smart lock status. For example, when the number of verification errors/total number of verification errors of one or more unlocking modes exceeds a preset threshold (e.g., a first threshold or a second threshold), the intelligent lock still receives an unlocking instruction of a corresponding user, the communication module 240 may send an information alert to the client. In some embodiments, the communication module 240 may also be used to send a prompt or alarm signal to a client (e.g., a terminal device of a property or community, etc.). For example, when the smart lock continuously enters the locking mode multiple times (e.g., multiple times during a second period of time to define a function of the same user using at least one of the at least two unlocking modes) within a certain period of time (e.g., within 1 day, within 3 hours, etc.), the communication module 240 may send an alarm signal to the smart terminal device of the property or community.
In some embodiments, the communication module 240 may be used for the exchange of information or data. In some embodiments, communication module 240 may be used for communication between internal components of smart lock 130 (e.g., sensing module 210, processing module 220, storage module 230, power module 250, input/output module 260, and/or drive module 270). In some embodiments, the communication module 240 may also be used for communication between the smart lock 130 and other components (e.g., server 110, terminal device 140) in the smart lock control scenario 100. For example, the communication module 240 may exchange information with the server 110 or the terminal device 140 through the network 120. The communication module 240 may employ wired, wireless, and hybrid wired/wireless technologies. The wireline technology may be based on one or more fiber optic cable combinations, such as metallic cables, hybrid cables, fiber optic cables, and the like. Wireless technologies may include Bluetooth (Bluetooth), wireless network (Wi-Fi), zigBee (ZigBee), near Field Communication (NFC), radio frequency identification technology (Radio Frequency Identification, RFID), cellular networks (including GSM, CDMA, 3G, 4G, 5G, etc.), cellular-based narrowband internet of things (Narrow Band Internet of Things, NBIoT), and the like. In some embodiments, other illustrated modules of the smart lock control system 200 may be distributed across multiple devices, in which case each of the other modules may each include one or more communication modules 240 for inter-module information transfer. In some embodiments, the communication module 240 may also have alert or/and alarm functionality. In some embodiments, the alert mode may include an audible alert, a light alert, a remote alert, etc., or any combination thereof. For example, when the alert mode is a remote alert, the communication module 240 may send alert information or alarm information to the associated user terminal device, and the communication module 240 may also establish communication (e.g., voice call, video call) between the smart lock and the associated user terminal device.
The power module 250 may be used to power the smart lock control system 200. The power module 250 may include a battery, a faraday capacitor, and the like. In some embodiments, a battery may be connected in parallel with the faraday capacitance and the sensor. When the battery is powered, the battery can power the faraday capacitor and the sensor. The faraday capacitor can provide power to the sensor when the battery is dead or powered down (e.g., the battery is replaced). In some embodiments, the power module 250 may provide power to other components in the smart lock control system 200 (e.g., the sensing module 210, the processing module 220, the storage module 230, the communication module 240, the input/output module 260, the drive module 270). In some embodiments, power module 250 may receive control signals from processing module 220 to control the power output of smart lock 130.
The input/output module 260 may acquire, transmit, and send signals. The input/output module 260 may be connected to or in communication with other components in the smart lock control system 200. Other components in the smart lock control system 200 may be connected or communicate through the input/output module 260. The input/output module 260 may be a wired USB interface, a serial communication interface, a parallel communication interface, or a wireless bluetooth, infrared, radio-frequency identification (RFID) device, wireless local area network authentication and privacy Infrastructure (WAPI) device, general Packet Radio Service (GPRS) device, code division multiple access (Code Division Multiple Access, CDMA) device, etc., or any combination thereof. In some embodiments, input/output module 260 may be coupled to network 120 and obtain information via network 120.
In some embodiments, the smart lock control system 200 may also include a drive module 270 (also referred to as a motor drive module) and a mechanical structure 280. In some embodiments, the drive module 270 may include one or more drive sources or components. In some embodiments, the drive force source may include a drive motor driven with electricity. The processing module 220 may control the operation of the drive module 270, with the drive module 270 acting on the mechanical structure 280 to accomplish the target operation. For example, when the smart lock 130 is applied to a door lock device, after the user identity is confirmed successfully, the driving module 270 may drive the mechanical structure 280 (e.g., a bolt) connected thereto to complete unlocking. For another example, when the total number of verification errors of at least one unlocking mode of the at least two unlocking modes of the user in the first period of time is greater than the first threshold value, the driving module 270 may drive the mechanical structure 280 connected with the first unlocking mode to control the intelligent lock to enter the locking mode.
It should be noted that the above description of the smart lock control system 200 and its modules is for convenience of description only and is not intended to limit the application to the illustrated embodiments. It will be appreciated by those skilled in the art that, given the principles of the system, various modules may be combined arbitrarily or a subsystem may be constructed in connection with other modules without departing from such principles. For example, the processing module 220 and the communication module 240 may be two modules, or may be one module having both the processing function and the communication function. For another example, each module may share one memory module, or each module may have a respective memory module. Such variations are within the scope of the application.
FIG. 3 is a schematic diagram of exemplary hardware and/or software of a computing device according to some embodiments of the application.
In some embodiments, server 110 and/or terminal device 140 may be implemented on computing device 300. For example, a processing device may be implemented on computing device 300 and perform the functions of the processing device disclosed herein. As shown in fig. 3, computing device 300 may include an internal communication bus 310, a processor 320, a read only memory 330, a random access memory 340, a communication interface 350, an input/output interface 360, a hard disk 370, and a user interface 380.
Internal communication bus 310 may enable data communication among the components in computing device 300. For example, the processor 320 may send data over the internal communication bus 310 to memory or other hardware such as the input/output ports 360. In some embodiments, internal communication bus 310 may be an Industry Standard (ISA) bus, an Extended ISA (EISA) bus, a Video Electronics Standards (VESA) bus, a peripheral component interconnect standard (PCI) bus, and so forth. In some embodiments, internal communication bus 310 may be used to connect the various modules (e.g., sensing module 210, processing module 220, storage module 230, communication module 240, input/output module 260, drive module 270) in smart lock control system 200 shown in fig. 2.
Processor 320 may execute computing instructions (program code) and perform the functions of the smart lock control method described herein. The computing instructions may include programs, objects, components, data structures, procedures, modules, and functions (which refer to particular functions described in this disclosure). For example, the processor 320 may process information obtained from the smart lock 130 (e.g., verification information of the unlocking means, etc.), and determine whether to limit the function of the user using at least one unlocking means for a second period of time based on the verification information. In some embodiments, processor 320 may include a microcontroller, a microprocessor, a Reduced Instruction Set Computer (RISC), an Application Specific Integrated Circuit (ASIC), an application specific instruction set processor (ASIP), a Central Processing Unit (CPU), a Graphics Processing Unit (GPU), a Physical Processing Unit (PPU), a microcontroller unit, a Digital Signal Processor (DSP), a Field Programmable Gate Array (FPGA), an advanced reduced instruction set computer (ARM), a programmable logic device, any circuit and processor capable of performing one or more functions, and the like, or any combination thereof. For illustration only, computing device 300 in FIG. 3 depicts one processor, but it should be noted that computing device 300 in the present application may also include multiple processors.
The memory of computing device 300 (e.g., read Only Memory (ROM) 330, random Access Memory (RAM) 340, hard disk 370, etc.) may store data/information retrieved from any other component of smart lock control scenario 100. For example, the hard disk 370 may store user information, the manner in which the smart lock is authorized to unlock by the associated user, and the like. In some embodiments, the memory of computing device 300 may be located in smart lock 130 or in server 110.
The communication interface 350 may be connected to a network for data communication. The connection may be a wired connection, a wireless connection, or a combination of both. In some embodiments, the communication interface 350 may be a standardized port, such as RS232, RS485, or the like. In some embodiments, communication interface 350 may be a specially designed port.
The input/output interface 360 may be used to input or output signals, data, or information. In some embodiments, the input/output interface 360 may enable a user to interact with the smart lock control scene 100. For example, the input/output interface 360 may include the communication module 240 to implement the communication and alarm functions of the smart lock control scenario 100. In some embodiments, the input/output interface 360 may include an input device and an output device. Exemplary input devices may include a keyboard, mouse, touch screen, microphone, and the like, or any combination thereof. Exemplary output means may include a display device, speakers, printer, projector, etc., or any combination thereof.
User interface 380 may enable interaction and exchange of information between computing device 300 and a user. In some embodiments, the user interface 380 may be used to present information, data generated by the smart lock control scene 100 to a user. For example, the user interface 380 may present the user with user confirmation results (e.g., successful identification, failed identification) of the smart lock control scenario 100. In some embodiments, user interface 380 may include a physical display, such as a speaker-bearing display, an LCD display, an LED display, an OLED display, an electronic Ink display (E-Ink), or the like.
Fig. 4 is an exemplary block diagram of an intelligent lock control system according to some embodiments of the present application.
As shown in fig. 4, an embodiment of the present application provides a system for implementing intelligent lock control, which is applied to an intelligent lock. In some embodiments, the smart lock control system 400 may include an acquisition module 410 and a control module 420.
The acquisition module 410 may be used to acquire information. In some embodiments, the obtaining module 410 may be configured to obtain authentication information of at least two unlocking modes of the user. In some embodiments, the verification information of the unlocking mode may include information such as verification record of the unlocking mode and the unlocking mode. In some embodiments, the verification record may include a number of verification errors of the unlock mode and time information of the verification errors of the unlock mode during the first time period, or the like, or any combination thereof. In some embodiments, the unlocking mode of the smart lock may include password unlocking, biometric unlocking, near field communication unlocking, and/or mechano-electronic key unlocking, etc.
In some embodiments, the acquisition module 410 may further include an unlock information acquisition unit 413, a user information acquisition unit 415, and a scene mode acquisition unit 417. The unlock information obtaining unit 413 may be configured to obtain authentication information of one or more unlock modes of the user. The user information acquiring unit 415 may be configured to acquire/determine user information corresponding to one or more unlocking modes. The scene mode acquisition unit 417 may be used to acquire a scene mode of the smart lock.
In some embodiments, the obtaining module 410 may be further configured to obtain other information for implementing the unlocking mode control of the smart lock, for example, the obtaining module 410 may be configured to obtain location information, time information, climate information, etc. of the user from the smart lock, which is not limited herein.
The control module 420 may be used to control the state of the smart lock. In some embodiments, the control module 420 may be configured to determine, based on the verification information of the at least two unlocking modes, whether to define a function of the user using at least one of the at least two unlocking modes in the second period of time. In some embodiments, the control module 420 may be configured to determine, based on the scene mode and the verification information of at least two unlocking modes of the user, whether to define a function of the user using at least one unlocking mode of the at least two unlocking modes in the second period of time. In some embodiments, the control module 420 may be configured to determine, based on the user information and the verification information of at least two unlocking modes of the user, whether to define a function of the user using at least one unlocking mode of the at least two unlocking modes in the second period of time.
In some embodiments, the control module 420 may be configured to define a function of the user using at least one of the at least two unlocking means during the second time period in response to a total number of verification errors of the at least one unlocking means during the first time period being greater than a first threshold. In some embodiments, the control module 420 may be configured to determine at least two second thresholds corresponding to at least two unlocking modes, respectively; and in response to the number of verification errors of one unlocking mode of the at least two unlocking modes in the first time period being greater than a corresponding second threshold, limiting the function of the user using the unlocking mode in the second time period.
In some embodiments, the control module 420 may be configured to, when the limited time reaches the second time period, un-limit and empty the verification error number and the verification error time information of the corresponding unlocking manner. In some embodiments, the control module 420 may be configured to adjust the first time period and/or the second time period based on the unlocking mode. In some embodiments, the control module 420 may be configured to adjust the verification error count threshold, the first time period, and/or the second time period of the unlocking means based on the scene mode of the smart lock. In some embodiments, the control module 420 may dynamically adjust the verification error count threshold for the unlocking means based on the verification result for the biometric unlocking means.
It should be noted that the above description of the smart lock control system 400 and its unit modules is for convenience of description only, and is not intended to limit the present application to the scope of the illustrated embodiments. It will be appreciated by those skilled in the art that, given the principles of the apparatus, it is possible to combine individual unit modules arbitrarily or to construct a sub-apparatus in connection with other modules without departing from such principles.
Fig. 5 is a flow chart of a smart lock control method according to some embodiments of the application.
Step 510, obtaining verification information of at least two unlocking modes of the user. In some embodiments, step 510 may be performed by server 110, smart lock 130, smart lock control system 200, computing device 300, or smart lock control system 400 (e.g., unlock information acquisition unit 413).
The unlocking means may refer to a key for unlocking the smart lock. In some embodiments, the unlocking means may include password unlocking, biometric unlocking, near field communication unlocking, and/or mechatronic key unlocking, etc. The password unlocking can refer to a mode of unlocking the intelligent lock by inputting a preset password. The biometric unlocking may refer to a manner of unlocking the smart lock through biometric information authentication, for example, fingerprint unlocking, palm print unlocking, vein unlocking, face unlocking, etc. Near Field Communication (NFC) unlocking may refer to a manner of unlocking a smart lock by a device capable of implementing near field Communication with the smart lock, for example, a smart phone with NFC functionality, an electronic card, etc. The mechanical electronic key unlocking may refer to a manner of unlocking the smart lock by a mechanical key having an authentication function, for example, a security chip is added to the mechanical key to achieve authentication. In some embodiments, the unlocking manner may further include other manners capable of unlocking the smart lock, such as mechanical key unlocking, electronic key unlocking, and the like, which are not limited herein.
In some embodiments, one smart lock may be unlocked in multiple unlocking modes, for example, a smart lock having functions of fingerprint unlocking, face unlocking, password unlocking, and the like. In some embodiments, one smart lock may be associated with multiple users. For example, when the intelligent lock is a door lock, the rights of a plurality of persons such as a homeowner, a homeowner family member and the like to unlock the intelligent lock can be authorized. In some embodiments, one smart lock may bind one or more unlocking means for each user associated. For example, if the smart lock is a door lock, the smart lock may be simultaneously unlocked by binding the biometric information, the password, the near field communication, and the mechano-electronic key, and may be unlocked by binding only the password or the biometric information to other users such as relatives of the homeowner.
In some embodiments, the verification information of the unlocking means may comprise verification records of the unlocking means and/or the unlocking means. In some embodiments, the verification record may include a number of verification errors and/or time information of the verification errors of the unlocking means during the first period of time, etc.
The first period of time may include any reasonable period of time, such as1 day, 5 days, 1 week, 1 month, etc. In some embodiments, the first time period may be a fixed value that is set in advance. In some embodiments, the first time period may be manually set by a user, e.g., manually entered by a user. In some embodiments, each unlocking means may correspond to a different first time period. In some embodiments, the first time period corresponding to the unlocking mode may be adjusted based on the unlocking mode. For example, the first time period corresponding to unlocking the biometric information may be greater than the first time period corresponding to other unlocking means. In some embodiments, the value of the first time period may be adjusted based on a scene mode of the smart lock and/or user information, etc.
The unlocking mode verification error may refer to that input information corresponding to the unlocking mode used in the process of unlocking the intelligent lock is inconsistent with corresponding prestored legal information, for example, the password is input in error during password unlocking, fingerprint authentication fails during fingerprint unlocking, identity authentication fails during mechanical electronic key unlocking, and the like.
In some embodiments, the time information of the unlocking mode verification error may include a date, a time, a corresponding time stamp, and the like corresponding to the unlocking mode verification error. A time stamp refers to a complete verifiable piece of data that can represent that the data already exists at a particular point in time, which can be used to provide an electronic proof to prove the time of generation of certain data by the user, for example, in this embodiment, the time stamp can be used to prove the time of occurrence of an unlocking-mode verification error.
In some embodiments, when the smart lock is unlocked, when the user verifies the error using one or more unlocking means, the information of the corresponding verification error may be recorded. For example, when the user uses fingerprint information to unlock, the intelligent lock matches the obtained fingerprint information of the user with legal fingerprint information prestored in the database, and when the similarity between the input fingerprint information and the nearest prestored fingerprint information is smaller than a preset value or the corresponding prestored fingerprint information cannot be matched from the database, the information such as the current fingerprint information unlocking mode of the user, the time information of the current fingerprint unlocking verification errors, the total number of verification errors accumulated by the fingerprint unlocking (for example, 1 is added on the basis of the recorded verification error number) can be recorded.
In some embodiments, the authentication information of at least two unlocking modes of the user may be obtained from the storage device (the storage module 230, the read-only memory 330 or the random access memory 340). In some embodiments, the authentication information of at least two unlocking modes of the user may be obtained from a terminal device (such as terminal device 140) or a server (such as server 110). In some embodiments, the verification information of at least two unlocking modes of the user can be obtained in response to a verification error of one of the unlocking modes of the user.
Step 520, determining whether to limit the function of the user using at least one of the at least two unlocking modes in the second time period based on the verification information of the at least two unlocking modes. In some embodiments, step 520 may be performed by server 110, smart lock 130, smart lock control system 200, computing device 300, or smart lock control system 400 (e.g., control module 420).
The function of limiting the unlocking mode used by the user means that the user cannot unlock the intelligent lock by using the corresponding unlocking mode. For example, defining a user's function of unlocking using a fingerprint, the user will not be able to unlock the smart lock by means of fingerprint authentication. In some embodiments, the user may be restricted to use the function of at least one of the at least two unlocking means during the second time period in response to the total number of verification errors of the at least one of the at least two unlocking means during the first time period being greater than a first threshold. For example only, during unlocking the smart lock by using one of the authorized unlocking modes (such as fingerprint unlocking), when the unlocking mode is verified by mistake, the smart lock 130 may obtain verification information of all authorized unlocking modes of the user in a first period from the current time to the past, and if the total number of verification errors of at least one of the unlocking modes in the first period is greater than a first threshold (such as the total number of verification errors of password unlocking and near field communication unlocking in the first period is greater than the first threshold), define the function of the user using at least one of the authorized unlocking modes (such as password unlocking and near field communication unlocking) in a second period from the current time. The total number of verification errors may refer to a sum of the number of verification errors of one or more unlocking means, for example, a sum of the number of verification errors of unlocking means a and unlocking means B in a first period of time, or a number of verification errors of unlocking means a in a first period of time, or the like.
In some embodiments, the first threshold may comprise any reasonable value, e.g., 3 times, 5 times, 10 times, etc. In some embodiments, the first threshold may be adjusted based on the unlocking mode, the scene mode of the smart lock, user information, and the like. For example, the first threshold value corresponding to the scene mode P1 may be set 5 times, the first threshold value corresponding to the scene mode P2 may be set 7 times, and so on. For another example, the first threshold corresponding to fingerprint unlocking may be set to 10 times, the first threshold corresponding to password unlocking may be set to 3 times, and so on. In some embodiments, the first threshold may be dynamically adjusted based on the verification of the biometric unlocking pattern. For example, for fingerprint unlocking, the first threshold value of fingerprint unlocking may be adaptively increased according to the similarity between the input fingerprint information of the user and the nearest pre-stored fingerprint information, when the similarity is greater than a set value. In some embodiments, the first threshold may be dynamically adjusted based on the user's location information with the smart lock. For example, when the distance between the user and the smart lock is smaller than the preset distance, or the distance between the user and the smart lock is gradually decreasing, the first threshold corresponding to the user may be increased in real time.
The second time period may reflect a duration of time that limits the user's use of the unlock mode function, e.g., limits the user's inability to unlock the smart lock using the fingerprint unlock mode within 5 minutes. In some embodiments, the values of the second time periods corresponding to each unlocking mode may be the same or different, for example, the second time periods corresponding to the password unlocking and the NFC unlocking are both 3 minutes, the second time period corresponding to the biological information unlocking is 1 minute, and so on. In some embodiments, the value of the second time period corresponding to each unlocking mode may be determined based on the security, fault tolerance, verification success rate, etc. of the unlocking modes, for example, the second time period corresponding to the unlocking of the biometric information may be smaller than the second time period corresponding to other types of unlocking modes. In some embodiments, the second time period may be adjusted based on the unlocking mode, the scene mode of the smart lock, and/or the user information. For example, the second period of time corresponding to the travel mode may be set to 3 hours, or 5 hours, or 12 hours, or 3 days, or 5 days, or the like, and the second period of time corresponding to the home mode may be set to 5 minutes, or 10 minutes, or 30 minutes, or the like. For another example, the second time period corresponding to the main user (such as the homeowner of the door lock) in the home mode may be set to 1 minute or 2 minutes, etc., and the second time period corresponding to the other authorized user may be set to 4 minutes or 7 minutes, etc.
In some embodiments, when the total number of verification errors of at least one of the at least two unlocking modes of the user in the first period of time is greater than a first threshold, a function of the user using the corresponding unlocking mode may be defined in the second period of time. For example only, when the total number of verification errors of at least one unlocking mode of the user is greater than a first threshold value from the current moment to the past first time period during unlocking of the smart lock by the user, it may be determined, based on the verification information of each unlocking mode, that the total number of verification errors is greater than the unlocking mode corresponding to the first threshold value, for example, if the total number of verification errors of the password unlocking in the first time period is greater than the first threshold value, a function of using the password unlocking by the user is defined in the second time period; if the total verification error number of the biological identification unlocking in the first time period is larger than a first threshold value, limiting the function of using the biological identification unlocking by the user in the second time period; if the sum of verification error times of the password unlocking and the near field communication unlocking in the first time period is larger than a first threshold value, limiting the function of using the password unlocking and the near field communication unlocking by a user in the second time period.
In some embodiments, when the total number of verification errors of at least one of the at least two unlocking modes of the user in the first time period is greater than the first threshold, the function of the user using part or all of the unlocking modes in the second time period may be defined. For example, if the authorized unlocking modes of the user include password unlocking, fingerprint unlocking, face unlocking and near field communication unlocking, when the total number of verification errors of the password unlocking of the user in the first period is greater than a first threshold, the function of the user using the password unlocking, the function of the fingerprint unlocking and the function of the face unlocking, or the function of the user using all the authorized unlocking modes may be limited in the second period. In some embodiments, the function of defining the user or all users to use at least one of the at least two unlocking modes in the second time period may be determined based on the verification information of the at least two unlocking modes of the user. For example only, if the smart lock associated user includes user X, user Y, and user Z, the unlocking modes of user X being authorized are password unlocking and fingerprint unlocking, the unlocking modes of user Y being authorized are password unlocking, fingerprint unlocking, and face unlocking, the unlocking modes of user Z being authorized are password unlocking, fingerprint unlocking, face unlocking, and near field communication unlocking, and when the total number of verification errors of user X's fingerprint unlocking and password unlocking in the first period is greater than the first threshold, only functions of user X using password unlocking and fingerprint unlocking, or functions of user X and user Y using password unlocking and fingerprint unlocking, or functions of user X, user Y, and user Z using all authorized unlocking modes, may be defined in the second period.
In some embodiments, whether to define a function of the user using at least one of the at least two unlocking modes in the second period of time may be determined based on a scene mode of the smart lock and authentication information of the at least two unlocking modes of the user. In some embodiments, it may be determined whether to limit a function of the user using at least one of the at least two unlocking modes in the second period of time based on the user information and authentication information of the at least two unlocking modes of the user. Regarding the content of determining whether to limit the function of the user to use the unlocking manner based on the smart lock scene mode and/or the user information, reference may be made to fig. 6 or fig. 7 and the related description thereof, and the description thereof will not be repeated here.
In some embodiments, a second threshold value may be determined that corresponds to at least two unlocking modes, respectively. The second threshold may reflect a verification error count threshold corresponding to each unlocking mode, which may be the same or different. In some embodiments, the second threshold corresponding thereto may be determined based on security, reliability, etc. of the unlocking manner, e.g., the second threshold of unlocking the biometric information may be less than the second threshold of unlocking the password. In some embodiments, the user may be restricted from using the functionality of one of the at least two unlocking means during the second time period in response to the number of verification errors of that unlocking means during the first time period being greater than a corresponding second threshold. For example, if the number of verification errors of the fingerprint unlocking of the user in the first period is greater than a second threshold (e.g. 8 times) corresponding to the fingerprint unlocking, the function of using the fingerprint unlocking by the user may be defined in the second period.
In some embodiments, when the limited time reaches the second time period, the number of verification errors and the time information of the verification errors of the corresponding unlocking mode can be released and cleared. For example, if the duration of the function of using the face to unlock is limited, and a second period of time (e.g., 3 minutes) is full from the limit start time, the limitation of the function of using the face to unlock is released, and the recorded verification error number and verification error time information of using the face to unlock the smart lock are cleared, that is, the verification error number of using the face to unlock is recorded as 0.
In some embodiments, the deactivation may be by a public key (e.g., a mechanical key) or an undefined unlocking mode. For example, when the user is restricted to unlock the smart lock by using the fingerprint unlocking method, the user may unlock the smart lock by using other authorized unlocking methods, such as face unlocking, or a public mechanical key, so as to release the restriction of the function of using the fingerprint unlocking method. In some embodiments, the definition may be released by a particular user. For example, after the associated user X defining the specific authority uses the functions of one or more unlocking modes, the definition of the user X may be released by the master user Y, for example, the user Y may release the definition of the functions of the user X using one or more unlocking modes by unlocking the smart lock, or by sending a release instruction to a server (such as the server 110). In some embodiments, the redefinition may be done remotely. For example, a master user of the smart lock may send a de-qualifying request to the smart lock 130 or the server 110 through the terminal device 140 to de-qualify a function of the corresponding user to use an unlocking mode.
In some embodiments, a prompt or alarm signal may be sent when the unlocking means verifies that the error or the number of verification errors is greater than a preset threshold (e.g., a first threshold, a second threshold, etc.). In some embodiments, a prompt or alarm signal may be sent when the smart lock enters an abnormal locking state. For example, when the smart lock continuously enters the locking mode a plurality of times within a certain period of time (e.g., within a day), that is, a plurality of times enters a state defining a function of a user using at least one unlocking mode, a prompt may be sent to the interactive interface of the terminal device 140 or the smart lock 130, or an alarm signal may be sent.
In some embodiments, the first time period and/or the second time period may be adjusted based on the unlocking manner. For example, the first period of time corresponding to the password unlock may be set to 3 days, and the second period of time may be set to 10 minutes; the first time period corresponding to the unlocking of the mechanical electronic key is set to 2 days, and the second time period is set to 6 minutes. In some embodiments, the threshold number of verification errors (e.g., the first threshold, the second threshold), the first time period, and/or the second time period of the unlocking means may be adjusted based on a scene mode of the smart lock.
In some embodiments, the threshold number of verification errors of the unlocking means, e.g. the first threshold and/or the second threshold, may be dynamically adjusted based on the verification result of the biometric unlocking means. For example only, the first threshold and/or the second threshold may be adjusted according to the similarity between the verification information corresponding to the input unlocking manner and the pre-stored verification information of the legal user, for example, the higher the similarity of the biometric result, the larger the corresponding first threshold or second threshold may be. For example, if face authentication is used for unlocking, the first threshold value or the second threshold value may be increased when the face authentication similarity is high although authentication fails. By the mode, the user with higher recognition degree can have more opportunities of trial and error, and unlocking performance is improved.
In some embodiments, the first threshold, the second threshold, the first time period, and/or the second time period may be set by the user himself or may be automatically adjusted according to the user setting. For example, the user may set the first threshold, the second threshold, the first time period, and/or the second time period to values by himself. For another example, the user may set a value range, and the smart lock may automatically adjust according to the set value range.
It should be noted that the above description of the process 500 is for purposes of illustration and description only and is not intended to limit the scope of the present application. Various modifications and changes to flow 500 may be made by those skilled in the art under the guidance of the present application. However, such modifications and variations are still within the scope of the present application.
Fig. 6 is a flow chart of a method for controlling an intelligent lock according to other embodiments of the present application.
As shown in fig. 6, in some embodiments, when the number of verification errors of at least two unlocking modes of a user is greater than a first threshold, the process 600 may determine the corresponding unlocking mode, the user information corresponding to the unlocking mode, and the scene mode of the intelligent lock, determine the locking mode according to the unlocking mode, the user information corresponding to the unlocking mode, and/or the scene mode of the intelligent lock, and lock according to the locking mode. In some embodiments, steps 625 and 627 in the dashed box may be omitted, i.e., the execution subject of the smart lock unlocking mode control method (e.g., smart lock 130 or server 110, smart lock control system 200, computing device 300, or smart lock control system 400 shown in fig. 1) may determine the locking mode of the smart lock directly based on information that the user has verified an error in at least two unlocking modes.
In step 610, verification information of at least two unlocking modes of the user is obtained, similar to step 510 in the process 500, and further details can be seen in fig. 5 and related description, which are not repeated here.
In some embodiments, step 623 may be performed in response to the total number of verification errors of the at least one unlocking means in the first period being greater than the first threshold, based on the unlocking means verification record in the verification information of the at least two unlocking means of the user, determining whether the number of verification errors in the first period is greater than the first threshold.
In step 623, an unlocking mode in which the total number of verification errors is greater than a first threshold is determined. In some embodiments, step 623 may be performed by the acquisition module 410 (e.g., the unlock information acquisition unit 413).
In some embodiments, the unlocking mode corresponding to the total number of verification errors greater than the first threshold may be determined based on the verification record of each unlocking mode. For example only, the smart lock 130 may determine that the total number of verification errors of the password unlock during the first period is greater than a first threshold, or the total number of verification errors of the biometric unlock during the first period is greater than a first threshold, or the sum of the number of verification errors of the near field communication unlock and the mechatronic key unlock during the first period is greater than a first threshold based on the number of verification errors of each unlocking mode of the user during the first period and time information of the verification errors of the unlocking mode, such as password unlock, biometric unlock, near field communication unlock, and mechatronic key unlock.
Step 625, determining the user information corresponding to the unlocking mode. In some embodiments, step 625 may be performed by the acquisition module 410 (e.g., the user information acquisition unit 415).
The user information may reflect information such as the identity of the user, unlocking rights, etc. For example, the user information may include an associated identity of the user that unlocked the smart lock with the smart lock (e.g., a master user, a family member of the master user, etc.), an authorized unlocking mode (e.g., the smart lock may be unlocked using any unlocking mode, or may be unlocked using only a partial unlocking mode), etc.
In some embodiments, user information corresponding to an unlocking manner in which the total number of verification errors is greater than a first threshold may be determined. In some embodiments, the user information may be determined by looking up matches based on input information of the user unlocking means. For example, based on the fingerprint information input by the user, the smart lock 130 may search the database for the fingerprint information of the pre-stored authorized user that matches the fingerprint information, and determine the user registration information such as the user name and the authorization authority corresponding to the pre-stored fingerprint information with the highest matching degree of the fingerprint information as the user information corresponding to the current fingerprint information unlocking. In some embodiments, the user information may be determined based on identification information corresponding to the user unlocking mode. For example, smart lock 130 may determine user information based on an identification in the mechatronic key. In some embodiments, user information may be acquired based on the camera device. For example, the smart lock 130 may acquire a user image through a built-in or external camera, and determine user information based on the user image.
Step 627, obtaining a scene mode of the intelligent lock. In some embodiments, step 627 may be performed by the acquisition module 410 (e.g., the scene mode acquisition unit 417).
The scene mode may reflect the current state of the smart lock associated user, e.g., the scene mode of the smart lock may include a weekday mode, a vacation mode, a home mode, a travel mode, and the like.
In some embodiments, the user may set a scene mode through an interactive interface of a terminal device (e.g., terminal device 140) or a smart lock (e.g., smart lock 130), for example, a travel mode or a home mode according to his/her own situation. In some embodiments, the smart lock may automatically set the scene mode. For example, the smart lock 130 may automatically switch between a weekday mode and a holiday mode based on time information. As another example, the smart lock 130 may automatically set a travel mode or a home mode according to user habits. In some embodiments, different users may correspond to different scene modes. For example, the associated user X of the smart lock is in travel mode and the associated user Y is in home mode.
It will be appreciated that the order of execution of steps 623, 625 and 627 in this embodiment is merely exemplary and is not limiting of the present application, for example, in some embodiments, step 627 may be executed first, followed by step 623, step 625, or step 623, step 625 and 627 may be executed simultaneously. In some embodiments, step 623 may be followed by only step 625 or step 627.
In step 630, a lock mode is determined. In some embodiments, step 630 may be performed by control module 420.
In some embodiments, the locking mode may be determined based on an unlocking mode in which the total number of verification errors is greater than a first threshold, user information corresponding to the unlocking mode, and a scene mode of the smart lock. In some embodiments, the locking mode may include a defined duration (e.g., a second period of time), a defined user, a defined manner of unlocking for use (e.g., fingerprint unlocking, password unlocking, face unlocking, etc.), or the like, or any combination thereof.
A defined user may refer to a user that is unable to unlock the smart lock via an identity feature and/or password for a particular period of time (e.g., a second period of time). For example, if the unlocking mode authorized by the smart lock associated user X includes fingerprint unlocking, password unlocking and mechatronic key unlocking, the smart lock cannot be unlocked by the authorized unlocking mode after the user X is limited for the second period of time.
The defined unlocking means may refer to an unlocking means for unlocking the smart lock, which is defined for use by a user, for example, a function for defining unlocking by a user using a fingerprint, or a function for defining all unlocking means by which a user is authorized.
In some embodiments, the locking patterns corresponding to different unlocking modes may be the same or different. For example, when the number of verification errors of the biometric unlocking (e.g., face unlocking) is greater than a first threshold (or a second threshold) within a first period of time, only the function of the user using the biometric unlocking may be defined; when the number of verification errors of the mechanical electronic key unlocking is greater than a first threshold (or a second threshold) in a first time period, the function of the user using all authorized unlocking modes can be limited. In some embodiments, the corresponding locking mode may be determined based on security, uniqueness, etc. of the unlocking mode, e.g., the defined time period corresponding to the biometric information unlocking mode may be shorter than the defined time period corresponding to the other category unlocking modes.
In some embodiments, the locking patterns corresponding to different associated users may be the same or different. For example, the locking mode corresponding to the associated user X of the smart lock may be: defining a function of unlocking mode that the user X uses the verification error times larger than the verification error times threshold (such as a first threshold or a second threshold) in a second time period, wherein the locking mode corresponding to the associated user Y can be: the user is defined to use all functions of the authorized unlocking means for a second period of time. In some embodiments, the locking mode may be determined based on the manner in which the user is authorized to unlock, the identity of the user's association with the smart lock. For example only, when the total number of verification errors of fingerprint unlocking and face unlocking of a master user (such as a homeowner of a door lock) of the intelligent lock in a first time period is greater than a first threshold, only functions of using the fingerprint unlocking and the face unlocking by the master user in a second time period may be limited; when the total number of verification errors of fingerprint unlocking and face unlocking of other associated users (such as family members of a homeowner) in the first time period is greater than a first threshold, the functions of other associated users in using all authorized unlocking modes can be limited.
In some embodiments, the locking patterns corresponding to the different scene patterns may be the same or different. For example, the defined duration of the workday mode may be less than the defined duration of the vacation mode, and the defined duration of the home mode may be less than the defined duration of the travel mode. For another example, the trip mode may define a function of the user to use all authorized unlocking modes, and the home mode may define a function of the user to use an unlocking mode in which the number of verification errors in the first period is greater than the first threshold (or the second threshold).
In some embodiments, different scene modes and/or user information may correspond to the same or different lock modes. For example, when a user X associated with the smart lock is in a travel mode, and the number of verification errors of the password unlock of the authorized unlock mode of the user X in a first period of time is greater than a first threshold, the function of the user X in all authorized unlock modes may be defined in a second longer period of time (e.g., 10 minutes); when all users associated with the intelligent lock are in the travel mode, and the verification error times of the password unlocking in the first time period in the authorized unlocking mode of the user X are larger than a first threshold value, the function of using all authorized unlocking modes of all associated users can be limited.
In some embodiments, the second time period (i.e., the defined duration) may be dynamically adjusted in real-time based on user information and/or scene patterns, according to a verification error condition of the smart lock. For example, when the user is restricted to use the function of at least one unlocking mode, and the first second time period T1 is up to the first time period, and the verification error number of at least one unlocking mode exceeds the first threshold again in the second first time period, the second time period T2 is prolonged, that is, the second time period T2 is longer than the first second time period T1. The accumulation circulation mechanism can terminate accumulation of the first time period and/or the second time period after zero clearing, namely the unlocking mode is verified to pass or the intelligent lock is unlocked. For another example, the value of the second time period corresponding to the main user may be unchanged, and the values of the second time periods corresponding to the other users may be accumulated by using a circulation mechanism.
In some embodiments, the scene mode may be dominant and other information may be used to assist in determining the lock mode. For example, when the second time period corresponding to the scene mode is T3, the second time period corresponding to the unlocking mode in which the total number of verification errors is greater than the first threshold is T4, and the second time period corresponding to the unlocking mode is T5, T3 of the current scene mode may be determined as the final second time period. For another example, in the trip mode, the function of limiting the user to use all types of unlocking modes is limited, when the user X uses the unlocking mode with the total number of verification errors being greater than the first threshold or the second threshold, the locking mode can be finally determined to be the function of limiting the user X to use all types of authorized unlocking modes.
In some embodiments, user information may be dominant, and other information may be auxiliary in determining the locking mode of the smart lock. In some embodiments, the locking mode of the smart lock may be determined by means of an average, or a maximum, or a minimum, or the like. For example, when the value of the second time period T in the travel mode is a1, the unlocking mode in which the total number of verification errors is greater than the first threshold is B-class, and the value of the second time period T in the B-class unlocking mode is a2, a1 is smaller than a2, a2 may be determined as the final second time period.
Step 640, locking based on the locking mode. In some embodiments, step 640 may be performed by control module 420.
In some embodiments, the functionality of the respective user to use the respective unlocking means for the determined second time period may be defined based on the step 630 determined locking modes. For example, a function of unlocking the user X using the fingerprint for the second period a2 is defined.
It should be noted that the above description of the process 600 is for purposes of illustration and description only and is not intended to limit the scope of the present application. Various modifications and changes to flow 600 may be made by those skilled in the art in light of the teachings of the present application. For example, in step 630, it may be determined that the locking mode corresponding to the current scene mode is the final locking mode based on the unlocking mode in which the total number of verification errors is greater than the first threshold and the current scene mode of the smart lock. However, such modifications and variations are still within the scope of the present application.
Fig. 7 is a flow chart of a method for controlling an intelligent lock according to other embodiments of the present application.
As shown in fig. 7, in some embodiments, the information of the verification error of each unlocking mode of the user may be based on, when the number of verification errors of one unlocking mode in the first period is greater than a second threshold, determining the user information corresponding to the unlocking mode and the scene mode of the intelligent lock, and determining the locking mode according to the unlocking mode, the user information corresponding to the unlocking mode and the scene mode of the intelligent lock. In some embodiments, steps 725 and 727 in the dashed box may be omitted, i.e., the execution subject of the smart lock unlocking mode control method (e.g., smart lock 130 or server 110, smart lock control system 200, computing device 300, or smart lock control system 400 shown in fig. 1) may determine the locking mode directly based on information that the unlocking mode verifies errors.
Step 710, obtaining verification information of the unlocking mode of the user. In some embodiments, step 710 may be performed by the acquisition module 410 (e.g., the unlock information acquisition unit 413).
In some embodiments, the verification information of the unlocking mode may be obtained in response to the unlocking mode verification error, for example, the verification error number and the verification error time information of the unlocking mode in the first period of time. In some embodiments, the authentication information of the user unlocking mode may be obtained from a storage device (storage module 230, rom 330 or ram 340), a terminal device (e.g., terminal device 140), or a server (e.g., server 110).
In some embodiments, it may be determined whether the number of verification errors of the unlocking means in the first period of time is greater than a second threshold based on the verification information of the unlocking means, and step 725 and/or step 727 is performed in response to being greater than the second threshold.
Step 725, step 727, step 730 and step 740 are similar to step 625, step 627, step 630 and step 640 of the process 600, respectively, and further details of the process 600 will be described herein.
It will be appreciated that the order of execution of steps 725 and 727 in the present embodiment is merely exemplary, and is not intended to limit the present application. In some embodiments, step 727 may be performed first followed by step 725, or step 725 and step 727 may be performed simultaneously. In some embodiments, only step 725 or step 727 may be performed, without limitation.
It should be noted that the above description of the process 700 is for purposes of illustration and description only and is not intended to limit the scope of the present application. Various modifications and changes to flow 700 may be made by those skilled in the art under the guidance of the present application. However, such modifications and variations are still within the scope of the present application.
According to the intelligent lock unlocking mode control method provided by the embodiment of the application, (1) when the current unlocking mode is verified by mistake, verification information of the unlocking mode or all unlocking modes is obtained, and the function of limiting the user to use one or more unlocking modes and/or corresponding limiting duration are determined based on the verification information, so that the flexibility of an intelligent lock locking mechanism can be improved, and the reliability and safety of the intelligent lock unlocking mode control method can be improved; (2) The locking mode of the intelligent lock is determined based on the scene mode, so that the diversity of the intelligent lock and the reliability of a locking mechanism can be improved; (3) And the locking mode is determined based on the user information, so that the flexibility and stability of the intelligent lock can be improved.
While the basic concepts have been described above, it will be apparent to those skilled in the art that the foregoing detailed disclosure is by way of example only and is not intended to be limiting. Although not explicitly described herein, various modifications, improvements and adaptations of the application may occur to one skilled in the art. Such modifications, improvements, and modifications are intended to be suggested within the present disclosure, and therefore, such modifications, improvements, and adaptations are intended to be within the spirit and scope of the exemplary embodiments of the present disclosure.
Meanwhile, the present application uses specific words to describe embodiments of the present application. Reference to "one embodiment," "an embodiment," and/or "some embodiments" means that a particular feature, structure, or characteristic is associated with at least one embodiment of the application. Thus, it is emphasized and should be appreciated that two or more references to "an embodiment" or "one embodiment" or "an alternative embodiment" in various positions are not necessarily referring to the same embodiment. Furthermore, certain features, structures, or characteristics of one or more embodiments of the application may be combined as suitable.
Furthermore, those skilled in the art will appreciate that the various aspects of the application are illustrated and described in the context of a number of patentable categories or circumstances, including any novel and useful procedures, machines, products, or materials, or any novel and useful modifications thereof. Accordingly, aspects of the application may be performed entirely by hardware, entirely by software (including firmware, resident software, micro-code, etc.) or by a combination of hardware and software. The above hardware or software may be referred to as a "data block," module, "" engine, "" unit, "" component, "or" system. Furthermore, aspects of the application may take the form of a computer product, comprising computer-readable program code, embodied in one or more computer-readable media.
The computer storage medium may contain a propagated data signal with the computer program code embodied therein, for example, on a baseband or as part of a carrier wave. The propagated signal may take on a variety of forms, including electro-magnetic, optical, etc., or any suitable combination thereof. A computer storage medium may be any computer readable medium that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code located on a computer storage medium may be propagated through any suitable medium, including radio, cable, fiber optic cable, RF, or the like, or a combination of any of the foregoing.
The computer program code necessary for operation of portions of the present application may be written in any one or more programming languages, including an object oriented programming language such as Java, scala, smalltalk, eiffel, JADE, emerald, C ++, C#, VB NET, python, and the like, a conventional programming language such as the C language, visual Basic, fortran 2003, perl, COBOL 2002, PHP, ABAP, a dynamic programming language such as Python, ruby, and Groovy, or other programming languages, and the like. The program code may execute entirely on the user's computer or as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the latter scenario, the remote computer may be connected to the user's computer through any form of network, such as a Local Area Network (LAN) or a Wide Area Network (WAN), or the connection may be made to an external computer (for example, through the Internet), or the use of services such as software as a service (SaaS) in a cloud computing environment.
Furthermore, the order in which the elements and sequences are presented, the use of numerical letters, or other designations are used in the application is not intended to limit the sequence of the processes and methods unless specifically recited in the claims. While certain presently useful inventive embodiments have been discussed in the foregoing disclosure, by way of example, it is to be understood that such details are merely illustrative and that the appended claims are not limited to the disclosed embodiments, but, on the contrary, are intended to cover all modifications and equivalent arrangements included within the spirit and scope of the embodiments of the application. For example, while the system components described above may be implemented by hardware devices, they may also be implemented solely by software solutions, such as installing the described system on an existing server or mobile device.
Similarly, it should be noted that in order to simplify the description of the present disclosure and thereby aid in understanding one or more inventive embodiments, various features are sometimes grouped together in a single embodiment, figure, or description thereof. This method of disclosure does not imply that the subject application requires more features than are set forth in the claims. Indeed, less than all of the features of a single embodiment disclosed above.
In some embodiments, numbers describing the components, number of attributes are used, it being understood that such numbers being used in the description of embodiments are modified in some examples by the modifier "about," approximately, "or" substantially. Unless otherwise indicated, "about," "approximately," or "substantially" indicate that the number allows for a 20% variation. Accordingly, in some embodiments, numerical parameters set forth in the specification and claims are approximations that may vary depending upon the desired properties sought to be obtained by the individual embodiments. In some embodiments, the numerical parameters should take into account the specified significant digits and employ a method for preserving the general number of digits. Although the numerical ranges and parameters set forth herein are approximations in some embodiments for use in determining the breadth of the range, in particular embodiments, the numerical values set forth herein are as precisely as possible.
Each patent, patent application publication, and other material, such as articles, books, applications, publications, documents, etc., cited herein is hereby incorporated by reference in its entirety. Except for the application history file that is inconsistent or conflicting with this disclosure, the file (currently or later attached to this disclosure) that limits the broadest scope of the claims of this disclosure is also excluded. It is noted that the description, definition, and/or use of the term in the appended claims controls the description, definition, and/or use of the term in this application if there is a discrepancy or conflict between the description, definition, and/or use of the term in the appended claims.
Finally, it should be understood that the embodiments described herein are merely illustrative of the principles of the embodiments of the present application. Other variations are also possible within the scope of the application. Thus, by way of example, and not limitation, alternative configurations of embodiments of the application may be considered in keeping with the teachings of the application. Accordingly, the embodiments of the present application are not limited to the embodiments explicitly described and depicted herein.

Claims (12)

1. A method for controlling an intelligent lock, the method comprising:
acquiring verification information of at least two unlocking modes of a user;
Dynamically adjusting a verification frequency threshold according to the similarity between verification information of at least one unlocking mode of the at least two unlocking modes and corresponding pre-stored verification information; the verification times threshold comprises a first threshold or at least two second thresholds corresponding to the at least two unlocking modes respectively;
judging whether the user uses the function of at least one unlocking mode of the at least two unlocking modes or not based on the adjusted verification frequency threshold value and the verification records of the at least two unlocking modes, wherein the verification records at least comprise verification error frequency and verification error time information of the unlocking modes in a first time period;
And responding to that the total verification error number of at least one unlocking mode in the at least two unlocking modes in the first time period is larger than the first threshold after adjustment, or the verification error number of at least one unlocking mode in the at least two unlocking modes in the first time period is larger than the corresponding second threshold after adjustment, limiting the function of using the corresponding unlocking mode by the corresponding user in the second time period based on a locking mode, wherein the locking mode comprises at least one of limiting duration and limiting the unlocking mode used.
2. The method according to claim 1, wherein the method further comprises:
and dynamically adjusting the verification frequency threshold based on the position information of the user and the intelligent lock.
3. The method according to claim 1, wherein the method further comprises:
And adjusting the verification frequency threshold based on at least one of the unlocking mode, the scene mode of the intelligent lock and the user information.
4. The method according to claim 1, wherein the method further comprises:
determining a target unlocking mode meeting a verification frequency threshold;
And determining a locking mode based on the target unlocking mode.
5. The method according to claim 4, wherein the method further comprises:
the locking mode is determined based on user information and/or a scene mode of the smart lock.
6. The method according to claim 1, wherein the method further comprises:
And when the limiting time reaches the second time period, releasing the limiting and clearing the verification error times and the verification error time information of the corresponding unlocking mode.
7. The method according to claim 1, wherein the method further comprises:
And adjusting the first time period based on the unlocking mode and/or the scene mode of the intelligent lock.
8. The method of claim 1, wherein the unlocking means comprises password unlocking, biometric unlocking, near field communication unlocking, or mechatronic key unlocking.
9. The method of claim 8, wherein when the unlocking means is the biometric unlocking, the method further comprises:
and dynamically adjusting the verification frequency threshold based on a verification result of the biological identification unlocking mode.
10. A control system for an intelligent lock, the system comprising:
the acquisition module is used for acquiring verification information of at least two unlocking modes of a user;
A control module for
Dynamically adjusting a verification frequency threshold according to the similarity between verification information of at least one unlocking mode of the at least two unlocking modes and corresponding pre-stored verification information; the verification times threshold comprises a first threshold or at least two second thresholds corresponding to the at least two unlocking modes respectively;
Judging whether the user uses the function of at least one unlocking mode of the at least two unlocking modes or not based on the adjusted verification frequency threshold value and the verification records of the at least two unlocking modes, wherein the verification records at least comprise verification error frequency and verification error time information of the unlocking modes in a first time period; and
And responding to that the total verification error number of at least one unlocking mode in the at least two unlocking modes in the first time period is larger than the first threshold after adjustment, or the verification error number of at least one unlocking mode in the at least two unlocking modes in the first time period is larger than the corresponding second threshold after adjustment, limiting the function of using the corresponding unlocking mode by the corresponding user in the second time period based on a locking mode, wherein the locking mode comprises at least one of limiting duration and limiting the unlocking mode used.
11. A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor implements the method of any of claims 1-9 when executing the computer program.
12. A computer readable storage medium storing computer instructions which, when read by a computer in the storage medium, perform the method of any one of claims 1-9.
CN202211114763.XA 2021-12-02 2021-12-02 Control method and system of intelligent lock Active CN115482608B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211114763.XA CN115482608B (en) 2021-12-02 2021-12-02 Control method and system of intelligent lock

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202111456245.1A CN113870468B (en) 2021-12-02 2021-12-02 Control method and system of intelligent lock
CN202211114763.XA CN115482608B (en) 2021-12-02 2021-12-02 Control method and system of intelligent lock

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
CN202111456245.1A Division CN113870468B (en) 2021-12-02 2021-12-02 Control method and system of intelligent lock

Publications (2)

Publication Number Publication Date
CN115482608A CN115482608A (en) 2022-12-16
CN115482608B true CN115482608B (en) 2024-05-28

Family

ID=78985535

Family Applications (2)

Application Number Title Priority Date Filing Date
CN202111456245.1A Active CN113870468B (en) 2021-12-02 2021-12-02 Control method and system of intelligent lock
CN202211114763.XA Active CN115482608B (en) 2021-12-02 2021-12-02 Control method and system of intelligent lock

Family Applications Before (1)

Application Number Title Priority Date Filing Date
CN202111456245.1A Active CN113870468B (en) 2021-12-02 2021-12-02 Control method and system of intelligent lock

Country Status (1)

Country Link
CN (2) CN113870468B (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114090678A (en) * 2022-01-18 2022-02-25 云丁网络技术(北京)有限公司 Database information management method and system
CN114445939A (en) * 2022-03-10 2022-05-06 珠海格力电器股份有限公司 Unlocking method and device, electronic equipment and storage medium
CN115240300A (en) * 2022-03-14 2022-10-25 云丁网络技术(北京)有限公司 Control method, system and device of intelligent security system and storage medium
CN115424378B (en) * 2022-09-02 2023-12-29 广东好太太智能家居有限公司 Safety protection method and device for intelligent coded lock and related equipment
CN116152962B (en) * 2023-01-04 2024-08-06 北京飞利信信息安全技术有限公司 Unlocking method and device of intelligent lock
CN117079377A (en) * 2023-06-07 2023-11-17 南通新旋利机械科技有限公司 Method and system for improving induction recognition rate of automatic door

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110322599A (en) * 2019-05-23 2019-10-11 深圳绿米联创科技有限公司 Door lock management method, device, electronic equipment and storage medium
CN110335377A (en) * 2019-05-24 2019-10-15 深圳绿米联创科技有限公司 Fingerprint verification method and device, electronic equipment and storage medium
CN110532416A (en) * 2019-08-30 2019-12-03 成都智元汇信息技术股份有限公司 A method of improving recognition of face efficiency and precision
CN110570549A (en) * 2019-07-26 2019-12-13 华中科技大学 Intelligent unlocking method and corresponding device
CN111260831A (en) * 2020-02-25 2020-06-09 深圳桔子智能科技发展有限公司 Intelligent door lock control device, method and system
CN112287320A (en) * 2020-11-02 2021-01-29 刘高峰 Identity verification method and device based on biological characteristics and client
CN112581656A (en) * 2020-11-27 2021-03-30 山东浪潮通软信息科技有限公司 Identity verification method, mobile phone and intelligent door lock
CN113362499A (en) * 2021-05-25 2021-09-07 广州朗国电子科技有限公司 Embedded face recognition intelligent door lock

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2013009301A1 (en) * 2011-07-12 2013-01-17 Assa Abloy Ab Event driven second factor credential authentication
CN102638343A (en) * 2012-03-06 2012-08-15 深圳市福智软件技术有限公司 Handheld device and method for unlocking by same
CN108090331A (en) * 2017-12-04 2018-05-29 珠海格力电器股份有限公司 Unlocking method and equipment
CN109461232A (en) * 2018-10-17 2019-03-12 广州慧享佳物联科技有限公司 Control method for electronic lock, computer equipment and storage medium
CN109636966B (en) * 2018-11-26 2021-02-26 深圳绿米联创科技有限公司 Door lock control method, system, device, electronic equipment and storage medium

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110322599A (en) * 2019-05-23 2019-10-11 深圳绿米联创科技有限公司 Door lock management method, device, electronic equipment and storage medium
CN110335377A (en) * 2019-05-24 2019-10-15 深圳绿米联创科技有限公司 Fingerprint verification method and device, electronic equipment and storage medium
CN110570549A (en) * 2019-07-26 2019-12-13 华中科技大学 Intelligent unlocking method and corresponding device
CN110532416A (en) * 2019-08-30 2019-12-03 成都智元汇信息技术股份有限公司 A method of improving recognition of face efficiency and precision
CN111260831A (en) * 2020-02-25 2020-06-09 深圳桔子智能科技发展有限公司 Intelligent door lock control device, method and system
CN112287320A (en) * 2020-11-02 2021-01-29 刘高峰 Identity verification method and device based on biological characteristics and client
CN112581656A (en) * 2020-11-27 2021-03-30 山东浪潮通软信息科技有限公司 Identity verification method, mobile phone and intelligent door lock
CN113362499A (en) * 2021-05-25 2021-09-07 广州朗国电子科技有限公司 Embedded face recognition intelligent door lock

Also Published As

Publication number Publication date
CN113870468A (en) 2021-12-31
CN113870468B (en) 2022-09-30
CN115482608A (en) 2022-12-16

Similar Documents

Publication Publication Date Title
CN115482608B (en) Control method and system of intelligent lock
US11417159B2 (en) Methods and systems for controlling a smart lock
US11321978B2 (en) Systems and methods for secure lock systems with redundant access control
US9852562B2 (en) Systems and methods for redundant access control systems based on mobile devices and removable wireless buttons
US10482694B2 (en) Systems and methods for redundant access control systems based on mobile devices
EP1549020B1 (en) Entry control system
EP1661298B1 (en) Remote entry system
CN108091011A (en) Method and system of the verification technique to equipment progress permission control is unified by the testimony of a witness
US10964141B2 (en) Internet-of-things (IoT) enabled lock with management platform processing
CN112913204A (en) Authentication of internet of things devices including electronic locks
WO2022002146A1 (en) Smart device control method and system
KR20120103827A (en) System and method for controlling door lock
WO2019173521A1 (en) Frictionless access control system for a building
CN109409057A (en) Security system and its control method, control device and storage medium
CN109243014A (en) Access control system and the double mirror unlocking methods of gate inhibition
WO2021233004A1 (en) Safe cabinet device, unlocking method, and unlocking system
CN111915774B (en) Remote intelligent assisted unlocking method and device
KR101226645B1 (en) Method for Managing Digital Locking Apparatus By Using Bionic Information, System And Managing Apparatus
CN108990043A (en) A kind of remote unlocking method and its intelligent door lock based on core network communications
CN116225235B (en) Data processing method, device, equipment and medium
CN114662161A (en) Electronic lock control method, system and request terminal based on block chain network
CN114090678A (en) Database information management method and system
WO2022219598A1 (en) Method for access management to a secured area
CN117131482A (en) Authentication of a person for setting at least one infusion pump
WO2017127072A1 (en) Biometric authentication to a vehicle access system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant