CN115862196A - Identity verification method and device based on intelligent lock and intelligent lock - Google Patents

Identity verification method and device based on intelligent lock and intelligent lock Download PDF

Info

Publication number
CN115862196A
CN115862196A CN202211480882.7A CN202211480882A CN115862196A CN 115862196 A CN115862196 A CN 115862196A CN 202211480882 A CN202211480882 A CN 202211480882A CN 115862196 A CN115862196 A CN 115862196A
Authority
CN
China
Prior art keywords
biological information
acquisition module
intelligent lock
information acquisition
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211480882.7A
Other languages
Chinese (zh)
Inventor
俞长龙
祝志凌
董启广
叶飞
邓业豪
张纪伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Dessmann China Machinery and Electronic Co Ltd
Original Assignee
Dessmann China Machinery and Electronic Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Dessmann China Machinery and Electronic Co Ltd filed Critical Dessmann China Machinery and Electronic Co Ltd
Priority to CN202211480882.7A priority Critical patent/CN115862196A/en
Publication of CN115862196A publication Critical patent/CN115862196A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Collating Specific Patterns (AREA)

Abstract

The invention discloses an identity verification method and device based on an intelligent lock and the intelligent lock, which are applied to an intelligent lock end, wherein the intelligent lock end is integrated with a biological information acquisition module; the method comprises the following steps: when the unlocking information input function is started, responding to the receiving operation of the biological information acquired by the biological information acquisition module; and when receiving the biological information, responding to information input operation and sending the biological information to a verification platform, so that the verification platform verifies the identity of the person corresponding to the received biological information according to data in an authorized abnormal person information base. Through the intelligent lock end integrated with the biological information acquisition module, when the unlocking information input function is monitored to be started, the identity of the current registered person can be verified through the verification platform in combination with the biological information acquired by the biological information acquisition module, and timely and accurate verification of the identity of the living person is realized.

Description

Identity verification method and device based on intelligent lock and intelligent lock
Technical Field
The invention relates to the technical field of intelligent lock control, in particular to an identity verification method and device based on an intelligent lock and the intelligent lock.
Background
In the related art, it is usually confirmed whether the registered person is the principal through a verification method of people and card integration, but it cannot be determined whether the registered person is the key monitoring object of security and protection departments, so an identity verification method is urgently needed to be provided to quickly and accurately verify the identity of the registered person.
Disclosure of Invention
Therefore, the invention aims to overcome the defect that the existing identity verification mode of the checked-in personnel is inaccurate, and provides an identity verification method and device based on an intelligent lock and the intelligent lock.
According to a first aspect, the embodiment of the invention discloses an identity verification method based on an intelligent lock, which is applied to an intelligent lock end, wherein the intelligent lock end is integrated with a biological information acquisition module; the method comprises the following steps: when the unlocking information input function is started, responding to the receiving operation of the biological information acquired by the biological information acquisition module; and when the biological information is received, responding to information input operation and sending the biological information to a verification platform, so that the verification platform verifies the identity of the person corresponding to the received biological information according to the data in the authorized abnormal person information base.
Optionally, the biological information acquisition module comprises a human face information acquisition module; the method further comprises the following steps: when an unlocking request is detected, acquiring a face image acquired by the face information acquisition module and responding to unlocking operation based on the face image; determining whether the facial expression in the facial image belongs to an abnormal expression, wherein the abnormal expression represents an expression under a dangerous condition; and when the facial expression belongs to the abnormal expression, sending the acquired image to a pre-designated associated terminal.
Optionally, the method further comprises: when the facial expression belongs to the abnormal expression, controlling the facial information acquisition module to continue responding to the image acquisition operation; and sending the collected image containing the face to the verification platform.
Optionally, the method further comprises: and responding to abnormal alarm operation when the personnel identity corresponding to the biological information is confirmed to be abnormal after verification.
Optionally, the biological information collecting module further comprises: fingerprint information acquisition module.
According to a second aspect, the embodiment of the invention also discloses an identity verification device based on the intelligent lock, which is applied to the intelligent lock end, wherein the intelligent lock end is integrated with a biological information acquisition module; the device comprises: the receiving module is used for responding to the receiving operation of the biological information acquired by the biological information acquisition module when the unlocking information input function is started; and the first sending module is used for responding to information input operation and sending the biological information to the verification platform when the biological information is received, so that the verification platform verifies the identity of the person corresponding to the received biological information according to the data in the authorized abnormal person information base.
Optionally, the biological information acquisition module comprises a human face information acquisition module; the device further comprises: the acquisition module is used for acquiring the face image acquired by the face information acquisition module and responding to unlocking operation based on the face image when an unlocking request is detected; the determining module is used for determining whether the facial expression in the facial image belongs to an abnormal expression, and the abnormal expression represents an expression under a dangerous condition; and the second sending module is used for sending the acquired image to a pre-specified associated terminal when the facial expression belongs to the abnormal expression.
According to a third aspect, an embodiment of the present invention further discloses an intelligent lock, including: a biological information acquisition module; a main control module, connected to the biological information collection module, for executing the steps of the intelligent lock-based identity verification method according to the first aspect or any optional implementation manner of the first aspect.
According to a fourth aspect, an embodiment of the present invention further discloses an electronic device, including: at least one processor; and a memory communicatively coupled to the at least one processor; wherein the memory stores instructions executable by the at least one processor to cause the at least one processor to perform the steps of the smart lock-based identity verification method according to the first aspect or any one of the optional embodiments of the first aspect.
According to a fifth aspect, the present invention further discloses a computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, implements the steps of the intelligent lock-based identity verification method according to the first aspect or any optional embodiment of the first aspect.
The technical scheme of the invention has the following advantages:
the invention provides an identity verification method/device based on an intelligent lock, which is applied to an intelligent lock end integrated with a biological information acquisition module. Through the intelligent lock end integrated with the biological information acquisition module, when the unlocking information input function is monitored to be started, the identity of the current registered person can be verified through the verification platform in combination with the biological information acquired by the biological information acquisition module, and timely and accurate verification of the identity of the living person is realized.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and other drawings can be obtained by those skilled in the art without creative efforts.
FIG. 1 is a flowchart illustrating a specific example of an identity verification method based on an intelligent lock according to an embodiment of the present invention;
FIG. 2 is a diagram illustrating an example of an identity verification method based on an intelligent lock according to an embodiment of the present invention;
FIG. 3 is a schematic block diagram of a specific example of an identity verification apparatus based on an intelligent lock according to an embodiment of the present invention;
fig. 4 is a diagram of a specific example of an electronic device in an embodiment of the present invention.
Detailed Description
The technical solutions of the present invention will be described clearly and completely with reference to the accompanying drawings, and it should be understood that the described embodiments are some, but not all embodiments of the present invention. All other embodiments, which can be obtained by a person skilled in the art without making any creative effort based on the embodiments in the present invention, belong to the protection scope of the present invention.
In the description of the present invention, it should be noted that the terms "center", "upper", "lower", "left", "right", "vertical", "horizontal", "inner", "outer", etc., indicate orientations or positional relationships based on the orientations or positional relationships shown in the drawings, and are only for convenience of description and simplicity of description, but do not indicate or imply that the device or element being referred to must have a particular orientation, be constructed and operated in a particular orientation, and thus, should not be construed as limiting the present invention. Furthermore, the terms "first," "second," and "third" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance.
In the description of the present invention, it should be noted that, unless otherwise explicitly specified or limited, the terms "mounted," "connected," and "connected" are to be construed broadly, e.g., as meaning either a fixed connection, a removable connection, or an integral connection; can be mechanically or electrically connected; the two elements may be directly connected or indirectly connected through an intermediate medium, or may be communicated with each other inside the two elements, or may be wirelessly connected or wired connected. The specific meanings of the above terms in the present invention can be understood in a specific case to those of ordinary skill in the art.
Furthermore, the technical features involved in the different embodiments of the present invention described below may be combined with each other as long as they do not conflict with each other.
With the popularization of the intelligent door lock and the recognition of the masses, the intelligent door lock is installed and used in more and more occasions, such as families, schools, hotels, apartments, hospitals, enterprises, renting rooms, public renting rooms and the like. The current common intelligent lock with biological identification generally comprises face identification, iris identification, finger vein identification, fingerprint identification and the like. Through the identification of the collected biological characteristics, whether the unlocking authority exists is judged.
For social groups, the intelligent lock is mainly applied to occasions such as families, hotels, apartments, rental houses and public rental houses. Except for a household lock and a rental house, the premise of living in other occasions is that people and certificates are integrated and the living is allowed by comparing personal information. However, the key monitoring objects of the security system are generally people with high alertness, and the self check-in information cannot be revealed at will, so that the people usually only choose to check in a home or a common rental house to avoid monitoring of the security system. Therefore, based on the above technical problems, the embodiment of the application provides an identity verification method based on an intelligent lock to cover all the application scenarios, and verification can be quickly and accurately completed without selecting people and certificates in one in the using process.
The embodiment of the invention discloses an identity verification method based on an intelligent lock, which is applied to an intelligent lock end, wherein the intelligent lock end is integrated with a biological information acquisition module, and the biological information acquisition module can comprise but is not limited to a face image acquisition module, a fingerprint information acquisition module and the like; the intelligence lock in this application embodiment still includes: the intelligent identification module: the system comprises a face recognition module, an iris recognition module, a finger vein recognition module, a fingerprint recognition module, a password recognition module, an RFID radio frequency card detection module and the like, and is mainly responsible for comparing whether biological information or password information and other non-biological information are matched and informing a main control module of whether the matching is successful or not, wherein the main control module judges to execute related actions through an internal algorithm; the function monitoring module: the intelligent door lock is in charge of all monitoring systems, such as battery power monitoring, lock picking monitoring, door lock trial opening monitoring, key insertion monitoring, door lock re-striking monitoring, door lock switch state monitoring, insurance state monitoring and the like, and the safety of the intelligent door lock is ensured; an output display module: the voice module is responsible for voice interaction of users, such as biological information comparison input prompt, various alarm voice prompts and the like, and is controlled by the main control module; the display module is responsible for the visual interaction of the user, and can be an indicator light or a display screen; a power supply system module: the energy source of the whole intelligent lock is provided, the normal work of each module of the intelligent lock is ensured, the power supply module mainly comprises an input and an output, the output is mainly responsible for the module and the system working voltage, the input is mainly used for a power supply system charging module, and the energy supplement is ensured; a motor driving module: the door opening and closing device is responsible for the action of the driving motor, and the driving motor is driven to open the door after the verification is successful, or the driving motor is driven to close the door after the door is closed; switch door button module: the lock is mainly responsible for unlocking or locking and other related operations (also can be used for detecting the state of opening and closing a door), and sends an instruction to a main control module of the lock after being triggered to execute actions such as motor driving and the like; meanwhile, the operation of the key realizes triggering the function setting of the lock, such as opening a setting mode, adding a user, setting a door lock mode, volume adjustment, torque adjustment, network configuration and the like; a wireless networking module: the field of intelligent door locks commonly used in a wireless mode comprises WiFi, bluetooth, zigBee, NFC, NB-IoT, lora and the like, the networking is stable, and the intelligent door locks are mainly responsible for interacting with the cloud and uploading or issuing some data; the information such as door opening information, configuration information or user door opening and the like can be wirelessly uploaded to a cloud server and pushed to a user platform or an APP for display through processing; an authorization module: mainly authorizes access to a security network and obtains a database for verification, and concretely refers to FIG. 2; as shown in fig. 1, the method comprises the steps of:
step 101, when the unlocking information input function is started, responding to the receiving operation of the biological information acquired by the biological information acquisition module;
illustratively, when the user who lives in uses the intelligent lock needs to complete unlocking information input firstly, when the unlocking information input function of the intelligent lock is monitored to be started, the intelligent lock can carry out input operation prompting through the output display module, so that the user carries out input operation of unlocking information according to the prompting, the biological information acquisition module is triggered to carry out corresponding biological information acquisition operation, and the biological information acquisition module sends acquired biological information to the main control module.
And 102, when receiving the biological information, responding to information input operation and sending the biological information to a verification platform, so that the verification platform verifies the identity of the person corresponding to the received biological information according to data in an authorized abnormal person information base.
Illustratively, when the main control module receives the input biological information, normal unlocking information input operation is carried out according to a preset information input flow, and the biological information is sent to the verification platform, the verification platform is integrated with an authorized abnormal personnel information base in advance, so that the verification platform compares the received biological information with data in the abnormal personnel information base, whether the personnel identity corresponding to the received biological information is abnormal or not is determined according to a comparison result, and when the comparison is successful, abnormal warning information is sent to a security department, and meanwhile, due to the fact that the intelligent door lock normally carries out unlocking information input operation, no prompt is generated for corresponding personnel, namely, the whole identity verification process is silent compared through a background, and a user does not feel any feeling.
Through the butt joint with a security system, the identity of a person is recognized under the condition that residents are not infected, the acquired biological information is compared with a security system database in an online mode, and when the physical sign of the person is successfully matched with or highly similar to the physical sign of a special or abnormal person in the database, a message notification is sent out to inform the matching result, so that the security personnel can rapidly investigate and screen information. The security system can be energized by combining the existing door lock function, and key monitoring objects can be quickly screened and positioned.
The identity verification method based on the intelligent lock is applied to an intelligent lock end integrated with a biological information acquisition module, when an unlocking information input function is started, the receiving operation of the biological information acquired by the biological information acquisition module is responded, when the biological information is received, the information input operation is responded, and the biological information is sent to a verification platform, so that the verification platform verifies the identity of a person corresponding to the received biological information according to data in an authorized abnormal person information base. Through the intelligent lock end integrated with the biological information acquisition module, when the unlocking information input function is monitored to be started, the identity of the current registered person can be verified through the verification platform in combination with the biological information acquired by the biological information acquisition module, and timely and accurate verification of the identity of the living person is realized.
As an optional implementation manner of the present invention, the biological information acquisition module includes a face information acquisition module (such as an IR camera module), the face information acquisition module of the embodiment of the present application may adopt a 3D living body face recognition technology, so as to effectively ensure user information input and unlocking security, perform further living body detection on a face in the face recognition process, determine whether an object to be recognized is a real person, and effectively stop attacks of non-living body biological dummy persons, such as photos, videos, masks, and the like, which are closer to the real person; the method further comprises the following steps:
when an unlocking request is detected, acquiring a face image acquired by the face information acquisition module and responding to unlocking operation based on the face image;
illustratively, when a user needs to carry out unlocking operation, an unlocking request is generated by triggering the touch unlocking function interaction module, when the unlocking request is detected, the face image acquisition module is used for carrying out face image acquisition, and the acquired face image is compared with the unlocking information which is input in advance successfully to carry out unlocking operation.
Determining whether the facial expression in the facial image belongs to an abnormal expression, wherein the abnormal expression represents an expression under a dangerous condition;
illustratively, while a normal unlocking verification operation process is performed, the main control module identifies the acquired face image according to a pre-integrated face expression identification algorithm, and determines whether the face image contains abnormal expressions representing dangerous conditions, such as eyes closing or a mouth growing up. The embodiment of the application does not limit the recognition algorithm of the facial expression and the type of the abnormal expression, and a person skilled in the art can determine the recognition algorithm according to actual needs.
And when the facial expression belongs to the abnormal expression, sending the acquired image to a pre-designated associated terminal. Illustratively, when the facial expression in the acquired image is determined to belong to the abnormal expression, the acquired image is sent to a pre-designated associated terminal, and the associated terminal can be a designated friend terminal which is set at the APP terminal of the mobile phone in advance to carry out safety reminding.
As an optional embodiment of the present invention, the method further comprises: when the facial expression belongs to the abnormal expression, controlling the facial information acquisition module to continue responding to the image acquisition operation; and sending the collected image containing the face to the verification platform.
Illustratively, in order to further ensure the safety of the resident, when the facial expression is determined to belong to the abnormal expression, the facial information acquisition module is controlled to continue responding to the image acquisition operation and send the acquired image containing the face to the verification platform for the identity verification of the abnormal person. The face information acquisition module is controlled to continue image acquisition operation, so that facial images of other people existing in the current environment of the resident can be acquired conveniently, the images containing the faces are sent to the verification platform, interference of sending useless images to the verification process is avoided, and meanwhile whether abnormal people exist around the resident can be determined timely through the verification platform, so that safety intervention can be conducted timely. In the embodiment of the application, the face image acquisition module can stop working at the moment when the face image acquisition module acquires clear face images of surrounding personnel or receives an acquisition stop instruction sent by the verification platform and the like.
According to the identity verification method based on the intelligent lock, when a resident is dangerous and threatened, in the face brushing unlocking process, the lock can be normally opened, abnormal personnel cannot be disturbed, but the door lock can send the acquired image to the mobile phone app of the appointed relatives and friends and inform the relatives and friends in time; meanwhile, the face information acquisition module continuously acquires and rapidly sends the acquired face information to the main control module, so that the verification platform can compare the acquired face information with the abnormal face database to check whether key objects of interest (special people) exist, and if the face information is successfully matched with the special people in the abnormal face database, a warning is sent to inform security personnel to rapidly lock a checking range.
As an optional embodiment of the present invention, the method further comprises: and responding to abnormal alarm operation when the personnel identity corresponding to the biological information is confirmed to be abnormal after verification.
Exemplarily, when the person identity corresponding to the acquired biological information is determined to be an abnormal person after verification by the verification platform, the warning information may be directly sent to the security system through the verification platform, or the warning information may be sent to the security system through the mobile phone terminal APP, where the warning information may include, but is not limited to, location information, person information, and the like.
The identity verification method based on the intelligent lock mainly utilizes the biological information acquisition function of the intelligent lock to compare the acquired biological information with the abnormal face database, quickly screens whether the resident is a key monitoring object, enables public security and quickly positions the track of the key detection object under the condition that the resident is not sensed.
The embodiment of the invention also discloses an identity verification device based on the intelligent lock, which is applied to the intelligent lock end, wherein the intelligent lock end is integrated with a biological information acquisition module; as shown in fig. 3, the apparatus includes:
the receiving module 301 is configured to respond to a receiving operation of the biological information acquired by the biological information acquisition module when the unlocking information entry function is enabled;
the first sending module 302 is configured to, when receiving the biological information, respond to an information entry operation and send the biological information to the verification platform, so that the verification platform verifies the identity of the person corresponding to the received biological information according to data in the authorized abnormal person information base.
The identity verification device based on the intelligent lock is applied to an intelligent lock end integrated with a biological information acquisition module, when an unlocking information input function is started, the receiving operation of the biological information acquired by the biological information acquisition module is responded, when the biological information is received, the information input operation is responded, and the biological information is sent to a verification platform, so that the verification platform verifies the identity of a person corresponding to the received biological information according to data in an authorized abnormal person information base. Through the intelligent lock end integrated with the biological information acquisition module, when the unlocking information input function is monitored to be started, the identity verification of the current registered person can be carried out by combining the biological information acquired by the biological information acquisition module through the verification platform, and the timely and accurate verification of the identity of the checked person is realized.
As an optional embodiment of the present invention, the biological information collection module comprises a face information collection module; the device further comprises: the acquisition module is used for acquiring the face image acquired by the face information acquisition module and responding to unlocking operation based on the face image when an unlocking request is detected; the determining module is used for determining whether the facial expression in the facial image belongs to an abnormal expression, and the abnormal expression represents an expression under a dangerous condition; and the second sending module is used for sending the acquired image to a pre-specified associated terminal when the facial expression belongs to the abnormal expression.
As an optional embodiment of the present invention, the apparatus further comprises: the acquisition module is used for controlling the face information acquisition module to continue responding to image acquisition operation when the face expression belongs to abnormal expression; and the third sending module is used for sending the acquired image containing the face to the verification platform.
As an optional embodiment of the present invention, the apparatus further comprises: and the alarm module is used for responding to abnormal alarm operation when the personnel identity corresponding to the biological information is confirmed to be abnormal after verification.
As an optional embodiment of the present invention, the biological information collecting module further includes: fingerprint information acquisition module.
The embodiment of the invention also provides an intelligent lock, which comprises: a biological information acquisition module; and the main control module is connected with the biological information acquisition module and is used for executing the steps of the intelligent lock-based identity verification method in the embodiment. For a description of a specific implementation method, reference is made to the above embodiments, which are not described herein again.
An embodiment of the present invention further provides an electronic device, as shown in fig. 4, the electronic device may include a processor 401 and a memory 402, where the processor 401 and the memory 402 may be connected by a bus or in another manner, and fig. 4 takes the connection by the bus as an example.
Processor 401 may be a Central Processing Unit (CPU). The Processor 401 may also be other general purpose processors, digital Signal Processors (DSPs), application Specific Integrated Circuits (ASICs), field Programmable Gate Arrays (FPGAs) or other Programmable logic devices, discrete Gate or transistor logic devices, discrete hardware components, or combinations thereof.
The memory 402, which is a non-transitory computer readable storage medium, may be used to store non-transitory software programs, non-transitory computer executable programs, and modules, such as program instructions/modules corresponding to the smart lock-based identity verification method in the embodiments of the present invention. The processor 401 executes various functional applications and data processing of the processor by running non-transitory software programs, instructions and modules stored in the memory 402, that is, the smart lock-based identity verification method in the above method embodiment is implemented.
The memory 402 may include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required for at least one function; the storage data area may store data created by the processor 401, and the like. Further, the memory 402 may include high speed random access memory, and may also include non-transitory memory, such as at least one magnetic disk storage device, flash memory device, or other non-transitory solid state storage device. In some embodiments, memory 402 may optionally include memory located remotely from processor 401, which may be connected to processor 401 via a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The one or more modules are stored in the memory 402 and, when executed by the processor 401, perform a smart lock based identity verification method as in the embodiment shown in fig. 1.
The details of the electronic device may be understood with reference to the corresponding description and effects in the embodiment shown in fig. 1, and are not described herein again.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by a computer program, which can be stored in a computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. The storage medium may be a magnetic Disk, an optical Disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a Flash Memory (Flash Memory), a Hard Disk (Hard Disk Drive, abbreviated as HDD), a Solid State Drive (SSD), or the like; the storage medium may also comprise a combination of memories of the kind described above.
Although the embodiments of the present invention have been described in conjunction with the accompanying drawings, those skilled in the art may make various modifications and variations without departing from the spirit and scope of the invention, and such modifications and variations fall within the scope defined by the appended claims.

Claims (10)

1. An identity verification method based on an intelligent lock is characterized in that the method is applied to an intelligent lock end, and a biological information acquisition module is integrated with the intelligent lock end; the method comprises the following steps:
when the unlocking information input function is started, responding to the receiving operation of the biological information acquired by the biological information acquisition module;
and when receiving the biological information, responding to information input operation and sending the biological information to a verification platform, so that the verification platform verifies the identity of the person corresponding to the received biological information according to data in an authorized abnormal person information base.
2. The method of claim 1, wherein the biological information acquisition module comprises a face information acquisition module; the method further comprises the following steps:
when an unlocking request is detected, acquiring a face image acquired by the face information acquisition module and responding to unlocking operation based on the face image;
determining whether the facial expression in the facial image belongs to an abnormal expression, wherein the abnormal expression represents an expression under a dangerous condition;
and when the facial expression belongs to the abnormal expression, sending the acquired image to a pre-designated associated terminal.
3. The method of claim 2, further comprising:
when the facial expression belongs to the abnormal expression, controlling the facial information acquisition module to continue responding to the image acquisition operation;
and sending the collected image containing the face to the verification platform.
4. The method according to claim 1 or 3, characterized in that the method further comprises:
and responding to abnormal alarm operation when the personnel identity corresponding to the biological information is confirmed to be abnormal after verification.
5. The method of claim 1, wherein the biological information collection module further comprises: fingerprint information acquisition module.
6. An identity verification device based on an intelligent lock is characterized by being applied to an intelligent lock end, wherein a biological information acquisition module is integrated with the intelligent lock end; the device comprises:
the receiving module is used for responding to the receiving operation of the biological information acquired by the biological information acquisition module when the unlocking information input function is started;
and the first sending module is used for responding to information input operation and sending the biological information to the verification platform when the biological information is received, so that the verification platform verifies the identity of the person corresponding to the received biological information according to the data in the authorized abnormal person information base.
7. The apparatus of claim 6, wherein the biological information acquisition module comprises a face information acquisition module; the device further comprises:
the acquisition module is used for acquiring the face image acquired by the face information acquisition module and responding to unlocking operation based on the face image when an unlocking request is detected;
the determining module is used for determining whether the facial expression in the facial image belongs to an abnormal expression, and the abnormal expression represents an expression under a dangerous condition;
and the second sending module is used for sending the acquired image to a pre-specified associated terminal when the facial expression belongs to the abnormal expression.
8. An intelligent lock, comprising:
a biological information acquisition module;
a main control module connected with the biological information collection module for executing the steps of the intelligent lock-based identity verification method according to any one of claims 1 to 5.
9. An electronic device, comprising: at least one processor; and a memory communicatively coupled to the at least one processor; wherein the memory stores instructions executable by the at least one processor to cause the at least one processor to perform the steps of the smart lock-based identity verification method of any of claims 1-5.
10. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the smart lock-based identity verification method according to any one of claims 1 to 5.
CN202211480882.7A 2022-11-23 2022-11-23 Identity verification method and device based on intelligent lock and intelligent lock Pending CN115862196A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211480882.7A CN115862196A (en) 2022-11-23 2022-11-23 Identity verification method and device based on intelligent lock and intelligent lock

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211480882.7A CN115862196A (en) 2022-11-23 2022-11-23 Identity verification method and device based on intelligent lock and intelligent lock

Publications (1)

Publication Number Publication Date
CN115862196A true CN115862196A (en) 2023-03-28

Family

ID=85665733

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211480882.7A Pending CN115862196A (en) 2022-11-23 2022-11-23 Identity verification method and device based on intelligent lock and intelligent lock

Country Status (1)

Country Link
CN (1) CN115862196A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117690179A (en) * 2024-01-31 2024-03-12 全民认证科技(杭州)有限公司 Identity verification method and system based on face information

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117690179A (en) * 2024-01-31 2024-03-12 全民认证科技(杭州)有限公司 Identity verification method and system based on face information
CN117690179B (en) * 2024-01-31 2024-04-26 全民认证科技(杭州)有限公司 Identity verification method and system based on face information

Similar Documents

Publication Publication Date Title
US11196966B2 (en) Identifying and locating objects by associating video data of the objects with signals identifying wireless devices belonging to the objects
US10228695B2 (en) Drone control device
US11373495B2 (en) Supervising property access with portable camera
CN107578519A (en) A kind of intelligent access control system and intelligent entrance guard method for unlocking
US11854357B2 (en) Object tracking using disparate monitoring systems
US11380150B2 (en) User detection
US11539922B2 (en) Point-to-point visual communications in a security monitoring system
CN110211267A (en) Indoor openings control method, the configuration method of permission, device and storage medium
CN103871139A (en) School access control management method and embedded mainboard
CN113284274A (en) Trailing identification method and computer readable storage medium
CN108986281A (en) Kinsfolk's intelligent identification system based on recognition of face
CN115862196A (en) Identity verification method and device based on intelligent lock and intelligent lock
US20210248221A1 (en) Security control method and system
Uddin et al. Smart home security using facial authentication and mobile application
CN109712355A (en) Building safety monitoring method, smart machine and door lock
CN110886571A (en) Intelligent safety door
Ramakrishna et al. Smart Home Security System Using IoT
CN117152871A (en) Control method, system, electronic equipment and medium for combination of lamplight and access control
CN116912041A (en) Entrance management method based on network house-making and civil-hosting
CN118097824A (en) Door lock control method and device, intelligent door lock, electronic equipment and storage medium
TW202346695A (en) Electronic lock with facial authentication features
CN117743631A (en) Control method and device of intelligent doorbell, intelligent doorbell and storage medium
CN116665347A (en) Intelligent door lock control method, intelligent door lock control device, computer equipment and storage medium
CN117746544A (en) Access control method, device, equipment and storage medium
CN117238059A (en) Temporary access method, electronic device, temporary access system, and readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination