CN115909555A - Unlocking method and device, electronic equipment, door lock and storage medium - Google Patents

Unlocking method and device, electronic equipment, door lock and storage medium Download PDF

Info

Publication number
CN115909555A
CN115909555A CN202211351081.0A CN202211351081A CN115909555A CN 115909555 A CN115909555 A CN 115909555A CN 202211351081 A CN202211351081 A CN 202211351081A CN 115909555 A CN115909555 A CN 115909555A
Authority
CN
China
Prior art keywords
door lock
unlocking
module
identification information
intelligent door
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211351081.0A
Other languages
Chinese (zh)
Inventor
吴从庆
唐杰
李春光
陈道远
罗贺文
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Gree Electric Appliances Inc of Zhuhai
Zhuhai Lianyun Technology Co Ltd
Original Assignee
Gree Electric Appliances Inc of Zhuhai
Zhuhai Lianyun Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Gree Electric Appliances Inc of Zhuhai, Zhuhai Lianyun Technology Co Ltd filed Critical Gree Electric Appliances Inc of Zhuhai
Priority to CN202211351081.0A priority Critical patent/CN115909555A/en
Publication of CN115909555A publication Critical patent/CN115909555A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Lock And Its Accessories (AREA)

Abstract

According to the unlocking method, the unlocking device, the electronic equipment, the door lock and the storage medium, the image information of the user in the preset range in front of the intelligent door lock is collected, the identification information is determined based on the image information, and the unlocking function module of the intelligent door lock is awakened under the condition that the similarity between the identification information and the pre-stored target identification information is larger than the similarity threshold value, so that unlocking is carried out based on the unlocking function module, and the safety of the intelligent door lock can be further improved.

Description

Unlocking method and device, electronic equipment, door lock and storage medium
Technical Field
The present application relates to the field of intelligent door locks, and in particular, to an unlocking method and apparatus, an electronic device, and a storage medium.
Background
Various intelligent door lock products are more and more popularized, and people have higher and higher requirements on the safety of the door lock. Generally, a traditional intelligent door lock has a password unlocking function, a password keyboard can be waken up only by people approaching or touching the door lock, but malicious people can unlock the door lock by directly inputting a password or violently cracking the password of the door lock, and property loss of a user can be caused.
Disclosure of Invention
In order to solve the above problems, the present application provides an unlocking method, an unlocking device, an electronic device, a door lock, and a storage medium, which can further improve the security of an intelligent door lock.
The application provides an unlocking method, which comprises the following steps:
acquiring image information of a user in a preset range in front of an intelligent door lock;
determining identification information based on the image information;
verifying the identification information;
and awakening the unlocking function module of the intelligent door lock under the condition that the identification information passes the verification so as to unlock based on the unlocking function module.
In some embodiments, the method further comprises:
detecting whether a user exists in a preset distance in front of the intelligent door lock;
and under the condition that the user exists in the preset distance in front of the intelligent door lock, awakening an image acquisition module of the intelligent door lock so as to enable the image acquisition module to acquire the image information of the user in the preset range in front of the intelligent door lock.
In some embodiments, the method further comprises:
and controlling the image acquisition module to enter a dormant state under the condition that the identification information is not verified.
In some embodiments, the method further comprises:
and after the unlocking of the unlocking functional module is successful, controlling the unlocking functional module to enter a dormant state.
In some embodiments, the method further comprises:
acquiring target identification information input by a control application program of the intelligent door lock;
and storing the target identification information.
In some embodiments, the method further comprises:
recording the log information of the intelligent door lock awakening and unlocking functional module;
and reporting the log information to the control application program.
In some embodiments, the identification information comprises: facial information and/or limb action information, the unlocking function module comprises: at least one of a number keyboard module, a fingerprint module and an NFC module.
An embodiment of the present application provides an unlocking device, including:
the acquisition module is used for acquiring the image information of the user in a preset range in front of the intelligent door lock;
a first determination module for determining identification information based on the image information;
the second determining module is used for verifying the identification information;
and the awakening module is used for awakening the unlocking function module of the intelligent door lock under the condition that the identification information is verified to pass so as to unlock based on the unlocking function module.
An embodiment of the present application provides an electronic device, which includes a memory and a processor, where the memory stores a computer program, and when the computer program is executed by the processor, the electronic device executes any one of the unlocking methods described above.
The embodiment of the application provides a door lock, includes: the electronic device described above.
Embodiments of the present application provide a computer-readable storage medium, where a computer program stored in the computer-readable storage medium can be executed by one or more processors, and can be used to implement the unlocking method described above.
According to the unlocking method, the unlocking device, the electronic equipment, the door lock and the storage medium, the image information of the user in the preset range in front of the intelligent door lock is collected, the identification information is determined based on the image information, the identification information is verified, and under the condition that the identification information is verified to pass, the unlocking is performed based on the unlocking function module, so that the safety of the intelligent door lock can be further improved.
Drawings
The present application will be described in more detail below on the basis of embodiments and with reference to the accompanying drawings.
Fig. 1 is a schematic flowchart illustrating an implementation process of an unlocking method according to an embodiment of the present application;
FIG. 2 is a schematic view of a door lock identification provided by an embodiment of the present application;
fig. 3 is a schematic implementation flowchart of another unlocking method provided in the embodiment of the present application;
fig. 4 is a schematic structural diagram of an unlocking device according to an embodiment of the present application;
fig. 5 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
In the drawings, like parts are designated with like reference numerals, and the drawings are not drawn to scale.
Detailed Description
In order to make the objectives, technical solutions and advantages of the present application clearer, the present application will be described in further detail with reference to the attached drawings, the described embodiments should not be considered as limiting the present application, and all other embodiments obtained by a person of ordinary skill in the art without creative efforts shall fall within the protection scope of the present application.
In the following description, reference is made to "some embodiments" which describe a subset of all possible embodiments, but it is understood that "some embodiments" may be the same subset or different subsets of all possible embodiments, and may be combined with each other without conflict.
The following description will be added if a similar description of "first \ second \ third" appears in the application file, and in the following description, the terms "first \ second \ third" merely distinguish similar objects and do not represent a specific ordering for the objects, and it should be understood that "first \ second \ third" may be interchanged under certain circumstances in a specific order or sequence, so that the embodiments of the application described herein can be implemented in an order other than that shown or described herein.
Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this application belongs. The terminology used herein is for the purpose of describing embodiments of the present application only and is not intended to be limiting of the application.
Based on the problems in the related art, embodiments of the present application provide an unlocking method, where the method is applied to an electronic device, such as a computer, a mobile terminal, and the like, where the mobile terminal may include a mobile phone, a tablet computer, and the like, and in some embodiments, the electronic device may be installed on the smart door lock, and the electronic device may be a controller of the door lock. The functions realized by the unlocking method provided by the embodiment of the application can be realized by calling a program code by a processor of the electronic equipment, wherein the program code can be stored in a computer storage medium.
Example one
An unlocking method is provided in an embodiment of the present application, and fig. 1 is a schematic flow chart illustrating an implementation of the unlocking method provided in the embodiment of the present application, and as shown in fig. 1, the unlocking method includes:
and S101, acquiring image information of a user in a preset range in front of the intelligent door lock.
In the embodiment of the application, the image information of the user in the preset range in front of the intelligent door lock can be acquired through the image acquisition module, and the image acquisition module can be a camera.
In the embodiment of the present application, the preset range may be configured, for example, may be within a range of 2 meters right in front of the door.
In the embodiment of the application, the image information may be a picture or video information.
Step S102, identifying information is determined based on the image information.
In the embodiment of the application, the image information can be analyzed to obtain the identification information. The identification information may be face information and/or limb movement information. The facial information may be facial expressions, facial movements, human faces, etc. The limb motion may be a gesture motion or the like.
In the embodiment of the application, the neural network model can be trained in advance to identify the identification information corresponding to the image information. The image information may be input into a trained neural network model, thereby outputting the recognition information.
Step S103, verifying the identification information.
In the embodiment of the application, the similarity between the identification information and the pre-stored target identification information can be determined for verification.
In the embodiment of the application, the similarity between the identification information and the pre-stored target identification information can be calculated based on a cosine similarity calculation formula. In the embodiment of the application, the target identification information may be regarded as information capable of triggering and awakening an unlocking function module of the intelligent door lock. The similarity is calculated by calculating the cosine values of the identification information and the pre-stored target identification information, and the greater the cosine value, the greater the similarity.
The object identification information includes: target face information and/or target limb motion information.
In the embodiment of the application, when the identification information is face information, the similarity between the face information and the target face information is calculated, and when the identification information is limb action information, the similarity between the limb action information and the target limb action information is calculated.
In the embodiment of the present application, the magnitude relationship between the similarity and the similarity threshold may be compared to determine whether the verification passes. And when the similarity is greater than the similarity threshold, the verification is passed, and when the similarity is less than the similarity threshold, the verification is not passed. In this embodiment, the similarity threshold may be configured, for example, the similarity threshold may be 0.95.
And step S104, awakening an unlocking function module of the intelligent door lock under the condition that the identification information is verified to pass so as to unlock based on the unlocking function module.
In the embodiment of the application, the unlocking function module is in a dormant state before being awakened.
In the embodiment of the application, the unlocking function module of the intelligent door lock can be awakened by supplying power to the unlocking function module.
In an embodiment of the present application, the unlocking function module includes: at least one of a number keyboard module, a fingerprint module and an NFC module.
In the embodiment of the application, after the unlocking functional module is awakened, the user can unlock the lock. For example, the user unlocks through the fingerprint module, and the user inputs a numerical password through the numerical keyboard module to unlock.
According to the unlocking method, the image information of the user in the preset range in front of the intelligent door lock is collected, the identification information is determined based on the image information, and under the condition that the similarity between the identification information and the prestored target identification information is greater than the similarity threshold value, the unlocking functional module of the intelligent door lock is awakened to unlock based on the unlocking functional module, so that malicious personnel can be prevented from unlocking by directly inputting passwords or violently cracking the door lock, and the safety of the intelligent door lock can be further improved.
In some embodiments, before step S101, the method further comprises:
step S1, detecting whether a user exists in a preset distance in front of the intelligent door lock.
In the embodiment of the application, can detect through distance sensor whether there is the user in the preceding preset distance of intelligent lock, preset distance can dispose, for example, preset distance is 3 meters before the intelligent lock.
And S2, awakening the image acquisition module of the intelligent door lock under the condition that the user exists in the preset distance in front of the intelligent door lock, so that the image acquisition module acquires the image information of the user in the preset range in front of the intelligent door lock.
In the embodiment of the application, the image acquisition module is in a dormant state under the condition that the user is not detected.
In the embodiment of the application, the power supply can be supplied to the image acquisition module so as to wake up the image acquisition module of the intelligent door lock. The image acquisition module may be a camera.
In the embodiment of the application, under the condition that the image acquisition module is awakened, the image acquisition module can acquire images.
In some embodiments, after step S103, the method further comprises:
and step S105, controlling the image acquisition module to enter a dormant state under the condition that the identification information is not verified.
In the embodiment of the application, since the similarity is smaller than the similarity threshold, the verification is not passed, and therefore, the image acquisition module is controlled to enter the sleep state. The image acquisition module can be in a dormant state by powering off the image acquisition module.
In the embodiment of the application, the image acquisition module does not acquire images in the dormant state.
In some embodiments, after step S104, the method further comprises:
and S106, after the unlocking of the unlocking functional module is successful, controlling the unlocking functional module to enter a dormant state.
In the embodiment of the application, after the unlocking function module is awakened, a user can unlock the mobile phone through one of the number keyboard module, the fingerprint module and the NFC module. After unlocking, the unlocking function module can be controlled to be in a dormant state. The safety of intelligence lock is further improved like this to when next use, still need judge whether satisfy and awaken up the unblock function module of intelligence lock, also more power saving simultaneously.
In some embodiments, before step S101, the method further comprises:
and S3, acquiring target identification information input by a control application program of the intelligent door lock.
In the embodiment of the application, a user can open a control application program (APP) of the intelligent door lock through the mobile terminal, then enter target identification information through the control APP, and then the mobile terminal inputs the target identification information to the electronic equipment, so that the target identification information entered by the control application program of the intelligent door lock of the electronic equipment is enabled.
And S4, storing the target identification information.
In the embodiment of the application, the target identification information can be stored in the electronic device, so that after the identification information is obtained, the similarity between the identification information and the target identification information can be calculated.
In some embodiments, after step S104, the method further comprises:
and step S108, recording the log information of the intelligent door lock awakening and unlocking functional module.
In this embodiment of the application, the log information may include: using identification information at the time of waking up, time at the time of waking up, and the like.
And step S109, reporting the log information to the control application program.
In the embodiment of the application, the electronic device may be in communication connection with a mobile terminal of a user, and the communication connection may be a bluetooth connection. The log information can be transmitted to the user's APP through a Bluetooth connection.
In the embodiment of the application, the APP which sends the log information to the user can enable the user to know the awakening time of the door lock of the user and the corresponding identification information through the APP.
Example two
Based on the foregoing embodiments, the embodiments of the present application further provide an unlocking method, where a user may perform face or motion recognition through a camera mounted on an intelligent door lock, wake up an unlocking function module of the intelligent door lock after the recognition is successful, and perform subsequent unlocking operation after the unlocking function module is woken up, so that malicious people can be prevented from directly inputting a password or breaking the door lock violently, thereby preventing property loss of the user, and improving security of the intelligent door lock.
Fig. 2 is a schematic diagram of door lock identification provided in this application embodiment, as shown in fig. 2, when someone stands before the door lock, the door lock camera is awakened, when detecting that the identification information is correct, it can be considered as a user, at this moment, the unlocking function module is awakened, the unlocking function module includes: a digital password module, a fingerprint module, an NFC module, etc.); if the identification password is wrong, the user can be considered as a stranger, the user cannot enter an unlocking interface, and the door lock cannot be effectively unlocked.
Fig. 3 is a schematic implementation flow diagram of another unlocking method provided in an embodiment of the present application, and as shown in fig. 3, the method includes:
and step S301, the door lock is dormant.
When no person is in front of the door lock under normal conditions, hardware including the camera and the unlocking functional module is in a dormant state.
Step S302, judge whether someone is in front of the door.
In the embodiment of the present application, step S303 is performed if a person is in front of the door, and step S301 is performed if no person is in front of the door.
Step S303, the camera wakes up to enter action/face recognition.
When a person stands in front of the camera module for a certain distance, the camera module is awakened, and the unlocking functional module is in a dormant state.
In step S304, the identification information (and the identification password) is correct.
In the embodiment of the present application, if not, step S301 is executed, and if correct, step S305 is executed.
Step S305 wakes up the unlock function.
In an embodiment of the present application, the unlocking function includes: digital password, NFC, fingerprint, etc.
And step S306, successfully unlocking.
In the embodiment of the present application, after step S306, step S301 is continuously executed to perform the next cycle.
In the embodiment of the application, the user can input the identification information for unlocking and awakening through the APP, and the data report can be carried out on the unlocking and awakening after the input at each time, so that the user can clearly know the own door lock quilt through the APP.
In the embodiment of the application, the unlocking and awakening identification mode can be determined by a human face, facial expressions, gestures or limb actions.
The unlocking method provided by the embodiment of the application can effectively prevent the phenomenon that a stranger maliciously records the door lock password to cause property loss of a user when the unlocking method is applied to a password unlocking scene.
EXAMPLE III
Based on the foregoing embodiments, an unlocking device is provided in the embodiments of the present application, where modules included in the device and units included in the modules may be implemented by a processor in a computer device; of course, the implementation can also be realized through a specific logic circuit; in the implementation process, the processor may be a Central Processing Unit (CPU), a Microprocessor Unit (MPU), a Digital Signal Processor (DSP), a Field Programmable Gate Array (FPGA), or the like.
An unlocking device is provided in the embodiment of the present application, fig. 4 is a schematic structural diagram of an unlocking device provided in the embodiment of the present application, and as shown in fig. 4, an unlocking device 400 includes:
the acquisition module 401 is used for acquiring image information of a user in a preset range in front of the intelligent door lock;
a first determining module 402 for determining identification information based on the image information;
a second determining module 403, configured to verify the identification information;
and a waking module 404, configured to wake up the unlocking function module of the smart door lock when the identification information is verified to pass, so as to unlock the smart door lock based on the unlocking function module.
In some embodiments, the unlocking device 400 is further configured to:
detecting whether a user exists in a preset distance in front of the intelligent door lock;
and under the condition that the user exists in the preset distance in front of the intelligent door lock, awakening an image acquisition module of the intelligent door lock so as to enable the image acquisition module to acquire the image information of the user in the preset range in front of the intelligent door lock.
In some embodiments, the unlocking device 400 is further configured to:
and controlling the image acquisition module to enter a dormant state under the condition that the identification information is not verified.
In some embodiments, the unlocking device 400 is further configured to:
and after the unlocking of the unlocking functional module is successful, controlling the unlocking functional module to enter a dormant state.
In some embodiments, the unlocking device 400 is further configured to:
acquiring target identification information input by a control application program of the intelligent door lock;
and storing the target identification information.
In some embodiments, the unlocking device 400 is further configured to:
recording the log information of the intelligent door lock awakening and unlocking functional module;
and reporting the log information to the control application program.
In some embodiments, the identification information comprises: facial information and/or limb action information, the unlocking function module comprises: at least one of a number keyboard module, a fingerprint module and an NFC module.
It should be noted that, in the embodiment of the present application, if the unlocking method is implemented in the form of a software functional module and is sold or used as a standalone product, the unlocking method may also be stored in a computer readable storage medium. Based on such understanding, the technical solutions of the embodiments of the present application or portions thereof that contribute to the prior art may be embodied in the form of a software product, which is stored in a storage medium and includes several instructions for enabling a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the methods described in the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read Only Memory (ROM), a magnetic disk, or an optical disk, and various media capable of storing program codes. Thus, embodiments of the present application are not limited to any specific combination of hardware and software.
Accordingly, an embodiment of the present application provides a computer-readable storage medium, on which a computer program is stored, wherein the computer program, when executed by a processor, implements the steps in the unlocking method provided in the above embodiment.
Example four
The embodiment of the application provides an electronic device; fig. 5 is a schematic structural diagram of an electronic device according to an embodiment of the present application, and as shown in fig. 5, the electronic device 700 includes: a processor 701, at least one communication bus 702, a user interface 703, at least one external communication interface 704, a memory 705. Wherein the communication bus 702 is configured to enable connective communication between these components. The user interface 703 may include a display screen, and the external communication interface 704 may include standard wired and wireless interfaces, among others. The processor 701 is configured to execute a program of the unlocking method stored in the memory to implement the steps in the unlocking method provided in the above-described embodiment.
Based on the foregoing electronic device, an embodiment of the present application further provides a door lock, where the door lock includes the electronic device.
The above description of the embodiments of the electronic device, the door lock and the storage medium is similar to the description of the embodiments of the method described above, with similar advantageous effects as the embodiments of the method. For technical details not disclosed in the embodiments of the computer device and the storage medium of the present application, reference is made to the description of the embodiments of the method of the present application for understanding.
It is to be noted here that: the above description of the storage medium and device embodiments is similar to the description of the method embodiments above, with similar advantageous effects as the method embodiments. For technical details not disclosed in the embodiments of the storage medium and apparatus of the present application, reference is made to the description of the embodiments of the method of the present application for understanding.
It should be appreciated that reference throughout this specification to "one embodiment" or "an embodiment" means that a particular feature, structure or characteristic described in connection with the embodiment is included in at least one embodiment of the present application. Thus, the appearances of the phrases "in one embodiment" or "in an embodiment" in various places throughout this specification are not necessarily all referring to the same embodiment. Furthermore, the particular features, structures, or characteristics may be combined in any suitable manner in one or more embodiments. It should be understood that, in the various embodiments of the present application, the sequence numbers of the above-mentioned processes do not mean the execution sequence, and the execution sequence of each process should be determined by its function and inherent logic, and should not constitute any limitation to the implementation process of the embodiments of the present application. The above-mentioned serial numbers of the embodiments of the present application are merely for description and do not represent the merits of the embodiments.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrases "comprising a component of' 8230; \8230;" does not exclude the presence of another like element in a process, method, article, or apparatus that comprises the element.
In the several embodiments provided in the present application, it should be understood that the disclosed apparatus and method may be implemented in other ways. The above-described device embodiments are merely illustrative, for example, the division of the unit is only one logical function division, and there may be other division ways in actual implementation, such as: multiple units or components may be combined, or may be integrated into another system, or some features may be omitted, or not implemented. In addition, the coupling, direct coupling or communication connection between the components shown or discussed may be through some interfaces, and the indirect coupling or communication connection between the devices or units may be electrical, mechanical or other forms.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units; can be located in one place or distributed on a plurality of network units; some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, all functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may be separately regarded as one unit, or two or more units may be integrated into one unit; the integrated unit can be realized in a form of hardware, or in a form of hardware plus a software functional unit.
Those of ordinary skill in the art will understand that: all or part of the steps of implementing the method embodiments may be implemented by hardware related to program instructions, and the program may be stored in a computer-readable storage medium, and when executed, executes the steps including the method embodiments; and the aforementioned storage medium includes: various media that can store program codes, such as a removable Memory device, a Read Only Memory (ROM), a magnetic disk, or an optical disk.
Alternatively, the integrated units described above in the present application may be stored in a computer-readable storage medium if they are implemented in the form of software functional modules and sold or used as independent products. Based on such understanding, the technical solutions of the embodiments of the present application may be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a controller to execute all or part of the methods described in the embodiments of the present application. And the aforementioned storage medium includes: a removable storage device, a ROM, a magnetic or optical disk, or other various media that can store program code.
The above description is only for the embodiments of the present application, but the scope of the present application is not limited thereto, and any person skilled in the art can easily conceive of changes or substitutions within the technical scope of the present application, and shall be covered by the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (11)

1. An unlocking method, comprising:
acquiring image information of a user in a preset range in front of an intelligent door lock;
determining identification information based on the image information;
verifying the identification information;
and awakening the unlocking function module of the intelligent door lock under the condition that the identification information passes the verification so as to unlock based on the unlocking function module.
2. The method of claim 1, further comprising:
detecting whether a user exists in a preset distance in front of the intelligent door lock;
and under the condition that the user exists in the preset distance in front of the intelligent door lock, awakening an image acquisition module of the intelligent door lock so as to enable the image acquisition module to acquire the image information of the user in the preset range in front of the intelligent door lock.
3. The method of claim 2, further comprising:
and under the condition that the identification information is not verified, controlling the image acquisition module to enter a dormant state.
4. The method of claim 1, further comprising:
and after the unlocking of the unlocking functional module is successful, controlling the unlocking functional module to enter a dormant state.
5. The method of claim 1, further comprising:
acquiring target identification information input by a control application program of the intelligent door lock;
and storing the target identification information.
6. The method of claim 5, further comprising:
recording the log information of the intelligent door lock awakening and unlocking functional module;
and reporting the log information to the control application program.
7. The method according to any one of claims 1 to 6, wherein the identification information comprises: facial information and/or limb action information, the unlocking function module comprises: at least one of a number keyboard module, a fingerprint module and an NFC module.
8. An unlocking device, comprising:
the acquisition module is used for acquiring the image information of the user in a preset range in front of the intelligent door lock;
a first determination module for determining identification information based on the image information;
the second determining module is used for verifying the identification information;
and the awakening module is used for awakening the unlocking function module of the intelligent door lock under the condition that the identification information is verified to pass so as to unlock the intelligent door lock based on the unlocking function module.
9. An electronic device, comprising a memory and a processor, wherein the memory stores a computer program, and the computer program, when executed by the processor, performs the unlocking method according to any one of claims 1 to 7.
10. A door lock, comprising: the electronic device of claim 9.
11. A storage medium storing a computer program executable by one or more processors and operable to implement the unlocking method of any one of claims 1 to 7.
CN202211351081.0A 2022-10-31 2022-10-31 Unlocking method and device, electronic equipment, door lock and storage medium Pending CN115909555A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211351081.0A CN115909555A (en) 2022-10-31 2022-10-31 Unlocking method and device, electronic equipment, door lock and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211351081.0A CN115909555A (en) 2022-10-31 2022-10-31 Unlocking method and device, electronic equipment, door lock and storage medium

Publications (1)

Publication Number Publication Date
CN115909555A true CN115909555A (en) 2023-04-04

Family

ID=86487526

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211351081.0A Pending CN115909555A (en) 2022-10-31 2022-10-31 Unlocking method and device, electronic equipment, door lock and storage medium

Country Status (1)

Country Link
CN (1) CN115909555A (en)

Similar Documents

Publication Publication Date Title
EP3401779B1 (en) Method and apparatus for invoking function in application
US11383676B2 (en) Vehicles, vehicle door unlocking control methods and apparatuses, and vehicle door unlocking systems
US11216546B2 (en) Method for fingerprint authentication using force value
CN104915012B (en) A kind of screen locking method and device of terminal
WO2021004499A1 (en) Face recognition method and device
JPWO2007119818A1 (en) Function unlocking system, function unlocking method, and function unlocking program
TWI515592B (en) Method and apparatus for dynamic modification of authentication requirements of a processing system
CN103514438A (en) Face judgment system and method
CN103324909A (en) Facial feature detection
WO2019101096A1 (en) Method and device for security verification and mobile terminal
JP2018515830A (en) System and apparatus for biometric authentication and authorization of a unique user
CN103631508A (en) Portable electronic device and automatic unlocking method thereof
Vamsi et al. Face recognition based door unlocking system using Raspberry Pi
TW201732679A (en) Information image display method and apparatus
CN106250747B (en) Information processing method and electronic equipment
CN102546938A (en) Cell phone capable of realizing safety protection by means of intelligently capturing human face images by aid of front-facing camera
CN113284274A (en) Trailing identification method and computer readable storage medium
CN107665297A (en) Mobile terminal and finger print safety implementation method and storage medium
TW201741927A (en) Unlocking system and method
JP6719587B2 (en) Method and device for unlocking terminal screen
US20170061408A1 (en) Security key input system and method using one-time keypad
CN210515408U (en) Access control system based on two-dimensional code recognition
Gupta et al. Smart door locking system using IoT
CN115909555A (en) Unlocking method and device, electronic equipment, door lock and storage medium
TWM600418U (en) Face recognition access control system with temperature sensing

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination