CN116110153A - Intelligent lock anti-theft and early warning method, intelligent lock, electronic equipment and medium - Google Patents

Intelligent lock anti-theft and early warning method, intelligent lock, electronic equipment and medium Download PDF

Info

Publication number
CN116110153A
CN116110153A CN202310005191.XA CN202310005191A CN116110153A CN 116110153 A CN116110153 A CN 116110153A CN 202310005191 A CN202310005191 A CN 202310005191A CN 116110153 A CN116110153 A CN 116110153A
Authority
CN
China
Prior art keywords
lock
intelligent lock
unlocking
information
current operator
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310005191.XA
Other languages
Chinese (zh)
Inventor
罗克清
朱永权
杜波
朱旭权
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Philisense Information Security Technology Co ltd
Original Assignee
Beijing Philisense Information Security Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Philisense Information Security Technology Co ltd filed Critical Beijing Philisense Information Security Technology Co ltd
Priority to CN202310005191.XA priority Critical patent/CN116110153A/en
Publication of CN116110153A publication Critical patent/CN116110153A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00182Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with unidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B21/00Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
    • G08B21/18Status alarms
    • G08B21/24Reminder alarms, e.g. anti-loss alarms
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00182Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with unidirectional data transmission between data carrier and locks
    • G07C2009/00238Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with unidirectional data transmission between data carrier and locks the transmittted data signal containing a code which is changed
    • G07C2009/00253Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with unidirectional data transmission between data carrier and locks the transmittted data signal containing a code which is changed dynamically, e.g. variable code - rolling code
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00182Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with unidirectional data transmission between data carrier and locks
    • G07C2009/00261Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with unidirectional data transmission between data carrier and locks the keyless data carrier having more than one function
    • G07C2009/00277Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with unidirectional data transmission between data carrier and locks the keyless data carrier having more than one function opening of different locks separately
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00896Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses
    • G07C2009/0092Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses for cargo, freight or shipping containers and applications therefore in general

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Business, Economics & Management (AREA)
  • Emergency Management (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The application relates to an intelligent lock anti-theft and early warning method, an intelligent lock, electronic equipment and a medium. And receiving an unlocking signal sent by the current operator, analyzing the unlocking signal, and determining an unlocking password corresponding to the unlocking signal. The unlocking password comprises a secret key and a random verification code which correspond to the current operator. And determining whether the secret key is consistent with a preset secret key, if not, starting a camera to acquire the information of the current operator, and sending the information of the current operator and unlocking information to maintenance personnel corresponding to the intelligent lock. If the verification codes are consistent, verifying the random verification codes. If the random verification code fails to pass verification, the secondary lock is started, unlocking information is sent to maintenance personnel corresponding to the intelligent lock, and an alarm is sent to warn the current operator and surrounding residents.

Description

Intelligent lock anti-theft and early warning method, intelligent lock, electronic equipment and medium
Technical Field
The application relates to the technical field of locks, in particular to an intelligent lock anti-theft and early warning method, an intelligent lock, electronic equipment and a medium.
Background
The lockset is used as necessary equipment for preventing burglary in various occasions, and the iteration is continuously updated along with the development of scientific technology. The lockset comprises a metal key lock, a fingerprint lock, a coded lock and the like, and the anti-theft performance is gradually improved in the updating process. The ammeter box is equipment for storing household ammeter and is also a special box for calculating electric quantity.
Some households want to interfere with the metering of actual electricity usage by destroying the equipment in the meter box. A significant loss of electricity is caused over time, affecting the rights and interests of the associated enterprise. Currently, many areas match corresponding maintenance personnel for the electricity meter box for daily maintenance. At present, locks of electric meter boxes are basically common locks, and locks with a part of electric meter boxes are intelligent locks. The opening and closing process of the intelligent lock can be controlled by a background management system. The electric meter box is provided with Bluetooth equipment for acquiring unlocking and locking information, and if the lock body is already unlocked, but the lock body is not unlocked through the background management system, the unlocking information can be sent to the background management system for processing. However, during the process that the lockset is manually damaged or abnormally opened, a theft event may occur when a maintainer finds the lockset, and the security of the ammeter box is difficult to ensure.
Disclosure of Invention
The application provides an intelligent lock anti-theft and early warning method, an intelligent lock, electronic equipment and a medium.
In a first aspect, the present application provides an anti-theft and early warning method for an intelligent lock, which is applied to the intelligent lock; the method comprises the following steps:
Receiving an unlocking signal sent by a current operator, analyzing the unlocking signal, and determining an unlocking code corresponding to the unlocking signal; the unlocking password comprises a secret key and a random verification code corresponding to the current operator;
determining whether the secret key is consistent with a preset secret key, if not, starting a camera to acquire the information of the current operator, and sending the information of the current operator and unlocking information to maintenance personnel corresponding to the intelligent lock;
if the random verification codes are consistent, verifying the random verification codes;
if the random verification code fails to pass verification, a secondary lock is started, unlocking information is sent to maintenance personnel corresponding to the intelligent lock, and an alarm is sent out to warn the current operator and surrounding residents.
The unlocking signal of the current operator can be received and analyzed, the unlocking code corresponding to the unlocking signal is obtained, and whether the key and the random verification code contained in the unlocking code are correct or not is determined. If the keys are inconsistent, the information of the current operator is sent to corresponding maintenance personnel for timely follow-up. If the keys are consistent but the random verification code verification is not passed, the fact that the current operator possibly breaks the key of the coded lock is indicated, the theft risk is high, the secondary lock can be opened, an alarm is sent, surrounding residents are warned, and the current operator is warned. Maintenance personnel can be timely reminded to maintain, and the safety of the intelligent lock is improved.
Optionally, the intelligent lock is connected with the cloud end in a network manner; the method further comprises the steps of:
receiving the real-time verification code sent by the cloud;
and if the random verification codes are consistent, verifying the random verification codes, wherein the verification codes comprise the following steps:
and if the random verification codes are consistent, matching the random verification codes with the real-time verification codes so as to carry out verification.
The intelligent lock and the cloud can be connected through a network. And under the condition that the secret key is consistent with the preset secret key, checking the random verification code by receiving the real-time verification code sent by the cloud. The real-time verification code is sent by the cloud and is not already set, so that a basis is provided for verification of the random verification code. The safety of the intelligent lock is guaranteed.
Optionally, the receiving the real-time verification code sent by the cloud includes:
when unlocking equipment of the current operator is close to the intelligent lock, generating an induction signal and sending the induction signal to the cloud;
and receiving the real-time verification code sent by the cloud according to the induction signal.
When unlocking equipment of a current operator is close to the intelligent lock, an induction signal is generated and sent to the cloud end, and the cloud end is triggered to send a real-time verification code. The safety of triggering the real-time verification code is ensured, meanwhile, the generation of the real-time verification code is triggered only when the current operator tries to unlock the coded lock, and the resource occupation caused by transmitting the real-time verification code is reduced.
Optionally, a lock body of the intelligent lock is connected with a lock body state detection loop, and the lock body state detection loop is connected with a lock body control module; when the lock body state is normal, the lock body state detection loop is closed, and a normal detection signal is sent to the lock body control module; when the lock body control module receives the normal detection signal, the intelligent lock is controlled to work normally; when the lock body state is abnormal, the lock body state detection loop sends an abnormal detection signal to the lock body control module, or the lock body state detection loop is disconnected; when the lock body control module receives the abnormality detection signal, the intelligent lock is controlled to be locked; the method further comprises the steps of:
detecting the surface of the intelligent lock through the lock body state detection loop;
when the surface of the intelligent lock is abnormal, a corresponding abnormal detection signal is generated and sent to the lock body control module, so that the lock body control module locks the intelligent lock and starts the secondary lock when the magnitude of the abnormal detection signal exceeds a preset signal threshold value;
receiving a secondary lock unlocking signal sent by the current operator;
and analyzing the secondary lock unlocking signal, and if the secondary lock unlocking password corresponding to the secondary lock unlocking signal is correct, unlocking the secondary lock and sending a restarting signal to the lock body control module so as to restart the intelligent lock, so that the current operator can normally unlock the intelligent lock.
The lock body of the intelligent lock is connected with the lock body detection loop and is used for detecting the state of the lock body and generating a corresponding detection signal. The lock body control module is connected with the lock body detection loop and is used for receiving the detection signal and performing corresponding operation. When the abnormal condition of the surface of the intelligent lock is detected and the magnitude of the abnormal detection signal exceeds the preset signal threshold value, the lock body detection loop can be disconnected and the secondary lock is started. Because the lock status detection loop continuously sends detection signals to the lock detection module, the detection is performed when the current operator tries to break the intelligent lock. And the current operator only can restart the intelligent lock after opening the secondary lock, and then the ammeter box is opened. The safety of the ammeter box is guaranteed.
Optionally, the determining whether the secret key is consistent with a preset secret key, if not, starting a camera to obtain current operator information, and sending the current operator information and unlocking information to maintenance personnel corresponding to the intelligent lock, including:
determining whether the secret key is consistent with a preset secret key, if not, starting a camera to acquire information of a current operator;
based on the cloud end, judging whether the information of the current operator is contained in a preset maintenance database;
If the intelligent lock is included, calling the identity information of the current operator in the preset maintenance database, and sending the identity information and unlocking information to maintenance personnel corresponding to the intelligent lock, so that the maintenance personnel corresponding to the intelligent lock can select whether to open the intelligent lock;
and if the information of the current operator and the unlocking information are not included, sending the information of the current operator and the unlocking information to maintenance personnel corresponding to the intelligent lock, so that the maintenance personnel corresponding to the intelligent lock can maintain in time.
When the secret key is inconsistent with the preset secret key, maintenance personnel corresponding to the intelligent lock may need other maintenance personnel to assist in maintenance, and other people may want to unlock the intelligent lock. Whether the current operator is a maintainer can be judged according to the identity information of the current operator, and if so, the maintainer corresponding to the intelligent lock can select whether to unlock or not. The safety of the ammeter box is ensured, and meanwhile, maintenance personnel can conveniently perform normal maintenance.
Optionally, the method further comprises:
when the lock body state detection loop detects that the intelligent lock surface changes, a corresponding self-detection signal is generated according to the change condition;
the self-detection signal is sent to the cloud end, so that the cloud end matches corresponding response signals according to the self-detection signal;
And receiving and analyzing the response signals, determining response operation corresponding to the response signals and feeding back to maintenance personnel corresponding to the intelligent lock.
The intelligent lock can perform self-detection according to the change of the surface, and sends a self-detection signal generated correspondingly to the cloud end, and the cloud end matches corresponding response signals. The intelligent lock performs corresponding operation according to the response signal. The intelligent lock does not need to store corresponding coping operations corresponding to different changes, and only needs to communicate with the cloud end when the surface of the intelligent lock changes. Different change conditions can be guaranteed to correspond to accurate coping operations, and safety of the ammeter box is improved.
Optionally, the method further comprises:
when the secret key is consistent with the preset secret key and the random verification code passes verification, receiving maintenance information detected by the lock body control module;
generating a maintenance record according to the maintenance information, and sending the maintenance record to the cloud;
generating a prompt to be supplemented according to the maintenance information, and sending the prompt to be supplemented to maintenance personnel corresponding to the intelligent lock, so that the maintenance personnel supplement the maintenance record and timely maintain.
When the secret key sent by the current operator is consistent with the preset secret key and the random verification code passes verification, maintenance information detected by the lock body control module can be received, and maintenance records are correspondingly generated and synchronized to the cloud. And then generating maintenance records according to the maintenance information and sending the maintenance records to corresponding maintenance personnel. The cloud can prompt maintenance personnel to maintain in time according to the maintenance record, so that the situation that the maintenance personnel cannot follow-up maintenance in time due to the fact that the prompt is not in place is avoided.
In a second aspect, the present application provides an intelligent lock comprising:
the unlocking signal analysis module is used for receiving an unlocking signal sent by a current operator, analyzing the unlocking signal and determining an unlocking code corresponding to the unlocking signal; the unlocking password comprises a secret key and a random verification code corresponding to the current operator;
the key determining module is used for determining whether the key is consistent with a preset key, and when the key is inconsistent with the preset key, starting a camera to acquire the information of the current operator, and sending the information of the current operator and unlocking information to maintenance personnel corresponding to the intelligent lock;
the random verification code verification module is used for verifying the random verification code when the random verification codes are consistent;
and the secondary lock starting module is used for opening the secondary lock and sending unlocking information to maintenance personnel corresponding to the intelligent lock when the random verification code verification fails, and sending an alarm to warn the current operator and surrounding residents.
Optionally, the intelligent lock carries out network connection with the high in the clouds, the intelligent lock still includes real-time identifying code receiving module for:
receiving the real-time verification code sent by the cloud;
the random verification code verification module is specifically used for:
And if the random verification codes are consistent, matching the random verification codes with the real-time verification codes so as to carry out verification.
Optionally, the random verification code verification module is specifically configured to:
when unlocking equipment of the current operator is close to the intelligent lock, generating an induction signal and sending the induction signal to the cloud;
and receiving the real-time verification code sent by the cloud according to the induction signal.
Optionally, a lock body of the intelligent lock is connected with a lock body state detection loop, and the lock body state detection loop is connected with a lock body control module; when the lock body state is normal, the lock body state detection loop is closed, and a normal detection signal is sent to the lock body control module; when the lock body control module receives the normal detection signal, the intelligent lock is controlled to work normally; when the lock body state is abnormal, the lock body state detection loop sends an abnormal detection signal to the lock body control module, or the lock body state detection loop is disconnected; when the lock body control module receives the abnormality detection signal, the intelligent lock is controlled to be locked; the intelligent lock further comprises an intelligent lock surface detection module for:
detecting the surface of the intelligent lock through the lock body state detection loop;
When the surface of the intelligent lock is abnormal, a corresponding abnormal detection signal is generated and sent to the lock body control module, so that the lock body control module locks the intelligent lock and starts the secondary lock when the magnitude of the abnormal detection signal exceeds a preset signal threshold value;
receiving a secondary lock unlocking signal sent by the current operator;
and analyzing the secondary lock unlocking signal, and if the secondary lock unlocking password corresponding to the secondary lock unlocking signal is correct, unlocking the secondary lock and sending a restarting signal to the lock body control module so as to restart the intelligent lock, so that the current operator can normally unlock the intelligent lock.
Optionally, the key determining module is specifically configured to:
determining whether the secret key is consistent with a preset secret key, if not, starting a camera to acquire information of a current operator;
based on the cloud end, judging whether the information of the current operator is contained in a preset maintenance database;
if the intelligent lock is included, calling the identity information of the current operator in the preset maintenance database, and sending the identity information and unlocking information to maintenance personnel corresponding to the intelligent lock, so that the maintenance personnel corresponding to the intelligent lock can select whether to open the intelligent lock;
And if the information of the current operator and the unlocking information are not included, sending the information of the current operator and the unlocking information to maintenance personnel corresponding to the intelligent lock, so that the maintenance personnel corresponding to the intelligent lock can maintain in time.
Optionally, the smart lock further includes a self-detection module configured to:
when the lock body state detection loop detects that the intelligent lock surface changes, a corresponding self-detection signal is generated according to the change condition;
the self-detection signal is sent to the cloud end, so that the cloud end matches corresponding response signals according to the self-detection signal;
and receiving and analyzing the response signals, determining response operation corresponding to the response signals and feeding back to maintenance personnel corresponding to the intelligent lock.
Optionally, the intelligent lock further comprises a maintenance record supplementing module, configured to:
when the secret key is consistent with the preset secret key and the random verification code passes verification, receiving maintenance information detected by the lock body control module;
generating a maintenance record according to the maintenance information, and sending the maintenance record to the cloud;
generating a prompt to be supplemented according to the maintenance information, and sending the prompt to be supplemented to maintenance personnel corresponding to the intelligent lock, so that the maintenance personnel supplement the maintenance record and timely maintain.
In a third aspect, the present application provides an electronic device, comprising: a memory and a processor, the memory having stored thereon a computer program capable of being loaded by the processor and performing the method of the first aspect.
In a fourth aspect, the present application provides a computer readable storage medium storing a computer program capable of being loaded by a processor and performing the method of the first aspect.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, a brief description will be given below of the drawings that are needed in the embodiments or the prior art descriptions, it being obvious that the drawings in the following description are some embodiments of the present application, and that other drawings may be obtained according to these drawings without inventive effort to a person skilled in the art.
Fig. 1 is a schematic view of an application scenario provided in an embodiment of the present application;
FIG. 2 is a flowchart of an anti-theft and early warning method for an intelligent lock according to an embodiment of the present application;
fig. 3 is a schematic structural diagram of an intelligent lock according to an embodiment of the present application;
fig. 4 is a schematic structural diagram of a data transmission device according to an embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present application more clear, the technical solutions of the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application. It will be apparent that the embodiments described are some, but not all, of the embodiments of the present application. All other embodiments, which can be made by one of ordinary skill in the art based on the embodiments herein without making any inventive effort, are intended to be within the scope of the present application.
In addition, the term "and/or" herein is merely an association relationship describing an association object, and means that three relationships may exist, for example, a and/or B may mean: a exists alone, A and B exist together, and B exists alone. In this context, unless otherwise specified, the term "/" generally indicates that the associated object is an "or" relationship.
Embodiments of the present application are described in further detail below with reference to the drawings attached hereto.
With the development of science and technology, the anti-theft requirement for locks in daily life is higher and higher. The types of locks currently existing include metal key locks, fingerprint locks, combination locks, and the like. However, most locks for electric meter boxes are mainly metal key locks, and some electric meter boxes use intelligent locks. The outside intelligent lock that sets up of this part ammeter case, inside bluetooth device that sets up. The opening and closing of the intelligent lock are controlled by a background management system, and the Bluetooth equipment is used for collecting the opening and closing information of the intelligent lock. If someone opens the intelligent lock through an abnormal mode, information in the opening process cannot be detected by the Bluetooth equipment, and when the intelligent lock is completely opened, the information can be detected and a reminder is sent to a background management system. At this time, a theft event has generally occurred, and it is difficult to secure the security of the electricity meter box.
Based on the above, the application provides an intelligent lock anti-theft and early warning method, an intelligent lock, electronic equipment and a medium.
An intelligent lock anti-theft and early warning system is established, and the intelligent lock is a part of the system. And determining a corresponding unlocking password by analyzing the unlocking signal of the current operator. The unlocking password comprises two parts, wherein one part is a fixed secret key and the other part is a random verification code. And sequentially checking whether the secret key and the random verification code are correct, if the secret key is incorrect, immediately starting the camera to acquire the information of the current operator, and sending the information of the current operator and unlocking information to maintenance personnel corresponding to the intelligent lock. If the secret key is correct but the random verification code is incorrect, the secondary lock can be immediately opened for further protection, and the current operator information and unlocking information are sent to maintenance personnel corresponding to the intelligent lock for processing and alarming. The intelligent lock is monitored in real time when the current operator tries to unlock the intelligent lock, and if abnormal unlocking is found, maintenance personnel corresponding to the intelligent lock can be immediately synchronized to carry out timely follow-up maintenance, so that the safety of the electric meter box is ensured as much as possible.
Fig. 1 is a schematic view of an application scenario provided in the present application. In the application scenario shown in fig. 1, a certain electric meter box is installed at the entrance of a certain floor, and an intelligent lock is arranged outside the electric meter box. The intelligent lock is an anti-theft device for the ammeter box, unlocking equipment corresponding to maintenance personnel of the intelligent lock can be a mobile phone carrying NFC, and in other scenes, the intelligent lock can also be an NFC card. The intelligent lock can be composed of a control module and a lock body, the lock body is arranged on the outer side of the electric meter box, the control module is arranged on the inner side of the electric meter box, and the damage probability of the control module can be reduced. The electric meter box is provided with the camera, and can be electrically connected with the intelligent lock for capturing information of a current operator. The lock body of the intelligent lock is connected with a lock body state detection loop, and the lock body state detection loop is connected with a lock body control module. And sending different signals to the lock body control module according to the state of the lock body state monitoring loop so as to control the opening and closing of the lock body of the intelligent lock. When the mobile phone carrying NFC of the current operator is close to the intelligent lock, the mobile phone is sensed, and an unlocking signal sent by unlocking equipment of the current operator is received for analysis, so that subsequent real-time detection and early warning are performed.
Reference may be made to the following examples for specific implementation.
Fig. 2 is a flowchart of an anti-theft and early warning method for an intelligent lock according to an embodiment of the present application, where the method of the present embodiment may be applied to a server in the above scenario. As shown in fig. 2, the method includes:
s201, receiving an unlocking signal sent by a current operator, analyzing the unlocking signal and determining an unlocking code corresponding to the unlocking signal; the unlocking password comprises a secret key and a random verification code which correspond to the current operator.
The intelligent lock can be a coded lock, a fingerprint lock, a voiceprint lock, an NFC induction lock and the like. The current operator may be the person who wants to unlock the smart lock at the current time. The unlocking signal may be an action, sound, signal, etc. that is sent by the current operator to unlock the smart lock to communicate a message or command. Such as a pressing action during fingerprint recognition, and a sound generated during voiceprint unlocking. When the unlocking signal is a signal sent by NFC, the action of inputting a password, and the like, the secret key and the random verification code can be two strings of different numbers, and can be used as the unlocking password together. When the unlocking signal is the fingerprint identification action, the secret key can be a pre-recorded fingerprint, and the random verification code can be a string of random numbers and can be sent to the mobile device of the current operator.
Specifically, when the front operator wants to unlock the smart lock, there may be some unlocking behavior. This action may be sent to the smart lock as an unlock signal. The intelligent lock can determine the corresponding unlocking password according to the message transmitted by the unlocking signal.
Preferably, the intelligent lock may be an NFC inductive lock, and the unlocking signal of the current operator corresponds to the NFC signal. After receiving the NFC signal, the intelligent lock can convert the signal into data, and the data string is an unlocking password and consists of a secret key and a random verification code.
S202, determining whether the secret key is consistent with a preset secret key, if not, starting a camera to acquire information of a current operator, and sending the information of the current operator and unlocking information to maintenance personnel corresponding to the intelligent lock.
The preset secret key can be a preset fixed unlocking password corresponding to the intelligent lock, each intelligent lock corresponds to a unique preset secret key, and meanwhile, the intelligent lock corresponds to a specific maintainer for maintenance. The preset secret key can be directly stored in the intelligent lock after being preset, and can be modified by corresponding maintenance personnel. The information of the current operator may include personal information of the current operator's body type, current wear, facial information, and the like. When the current operator tries to unlock the intelligent lock, the intelligent lock can detect the unlocking process of the current operator in real time, and unlocking information is generated. The unlocking information can comprise the current unlocking time of an operator, unlocking mode and the like.
Specifically, after the intelligent lock receives the secret key, the secret key can be compared with a preset secret key, and whether the secret key is identical with the data contained in the preset secret key and the arrangement sequence of the data is determined. If the key is different, the indication key is inconsistent with the preset key, the intelligent lock can open the camera at the moment, and the current operators around the intelligent lock can be subjected to snapshot. And performing image recognition after snapshot to acquire the information of the current operator. And then the information of the current operator and the unlocking information detected in real time are sent to maintenance personnel corresponding to the intelligent lock.
In some embodiments, maintenance personnel corresponding to the intelligent lock may be not fixed, and the maintenance personnel may be allocated according to actual situations.
S203, if the verification codes are consistent, verifying the random verification codes.
The random verification code can be a series of data with unfixed number sequence and unfixed number, and can be randomly combined at different times. The random verification code may be sent only to the corresponding maintenance personnel of the smart lock.
Specifically, if the secret key is consistent with the preset secret key, judging whether the random verification code exists or not, and if so, judging whether the random verification code exists or not. Correspondingly, the result of the verification may include the absence of the random passcode, the presence of the random passcode but incorrect, the presence of the random passcode and correct.
S204, if the random verification code fails to pass, starting the secondary lock and sending unlocking information to maintenance personnel corresponding to the intelligent lock, and sending out an alarm to warn the current operator and surrounding residents.
From the result of the verification in S203, it is known that the case where the verification does not pass the correspondence may be that the random verification code does not exist, the random verification code exists, but is incorrect. The secondary lock has better anti-theft effect for the intelligent lock, and the unlocking mode of the secondary lock can be any combination of two unlocking modes such as password, fingerprint, voiceprint and the like. The alarm can be a signal which can play a role in warning, such as flashing light, prompt tone and the like. Surrounding residents can be residents of floors where the electric meter boxes corresponding to the intelligent locks are located.
Specifically, if the result of verifying the random verification code is that the random verification code does not exist or the random verification code exists but is incorrect, the verification of the random verification code is not passed. At the moment, the secondary lock is opened, unlocking information is sent to maintenance personnel corresponding to the intelligent lock, and the maintenance personnel are reminded to maintain in time. Meanwhile, an alarm is sent out, surrounding residents can be reminded to check, and a certain warning effect is achieved for current operators.
The method and the device can receive and analyze the unlocking signal of the current operator, acquire the unlocking password corresponding to the unlocking signal and determine whether the key and the random verification code contained in the unlocking password are correct or not. If the keys are inconsistent, the information of the current operator is sent to corresponding maintenance personnel for timely follow-up. If the keys are consistent but the random verification code verification is not passed, the fact that the current operator possibly breaks the key of the coded lock is indicated, the theft risk is high, the secondary lock can be opened, an alarm is sent, surrounding residents are warned, and the current operator is warned. Maintenance personnel can be timely reminded to maintain, and the safety of the intelligent lock is improved.
In some embodiments, the smart lock and the cloud may be connected through a network, and the method may specifically include: receiving a real-time verification code sent by a cloud;
correspondingly, if the verification codes are consistent, verifying the random verification codes specifically can include: and if the random verification code is consistent with the real-time verification code, matching the random verification code with the real-time verification code for verification.
The cloud may be a cloud storage platform that may be used to store information related to the smart lock. Such as unlocking information, maintenance personnel information, etc. The real-time verification code can be a random verification code which is sent to the intelligent lock and maintenance personnel corresponding to the intelligent lock by the cloud when the current operator tries to unlock the intelligent lock. The real-time passcode may not contain the same number at the different times and the corresponding number combination. The random verification code sent to the intelligent lock by the cloud is stored in the intelligent lock and can be used as the real-time verification code.
Specifically, when the current operator tries to unlock the intelligent lock, the cloud can randomly combine a series of real-time verification codes to send to maintenance personnel corresponding to the intelligent lock and the intelligent lock, and the cloud can be used as a basis for verifying random verification codes in unlocking passwords. If the secret key sent by the current operator is consistent with the preset secret key in the intelligent lock, matching the random verification code sent by the current operator with the data and the arrangement mode of the data contained in the real-time verification code sent by the cloud to finish the verification process.
In other embodiments, the random authentication code and the real-time authentication code are the same when the current operator is the maintenance person to whom the smart lock corresponds.
The intelligent lock and the cloud end in the embodiment can be connected through a network. And under the condition that the secret key is consistent with the preset secret key, checking the random verification code by receiving the real-time verification code sent by the cloud. The real-time verification code is sent by the cloud and is not already set, so that a basis is provided for verification of the random verification code. The safety of the intelligent lock is guaranteed.
In some embodiments, the receiving the real-time verification code sent by the cloud may specifically include: when unlocking equipment of a current operator is close to the intelligent lock, generating an induction signal and sending the induction signal to a cloud; and receiving the real-time verification code sent by the cloud according to the induction signal.
The unlocking device of the current operator may be a key, a finger for fingerprint identification, a device for inputting a password, a mobile phone, an NFC inductive card, etc. The sensing signal can be a corresponding signal generated when the unlocking equipment is sensed, and can be used as a signal for attempting to unlock the intelligent lock and also can be used as a signal for triggering the cloud to send a real-time verification code.
Specifically, when the unlocking device of the current operator is close to the intelligent lock, the intelligent lock senses the unlocking device, communication is established, and a corresponding sensing signal is generated and sent to the cloud. The cloud trigger the sending of the real-time verification code when receiving the induction signal, and the intelligent lock receives the real-time verification code and stores verification for the subsequent random verification code.
Preferably, the unlocking device of the current operator may be a mobile phone carrying NFC. When the mobile phone is close to the intelligent lock by the current operator, the intelligent lock can sense a signal sent by NFC and establish communication with NFC. At the moment, the intelligent lock generates an induction signal and sends the induction signal to the cloud, the cloud sends a real-time verification code to the intelligent lock, and the real-time verification code is used for verifying the random verification code sent by NFC.
According to the embodiment, when unlocking equipment of a current operator is close to the intelligent lock, an induction signal is generated and sent to the cloud end, and the cloud end is triggered to send a real-time verification code. The safety of triggering the real-time verification code is ensured, meanwhile, the generation of the real-time verification code is triggered only when the current operator tries to unlock the coded lock, and the resource occupation caused by transmitting the real-time verification code is reduced.
In some embodiments, a lock body of the intelligent lock is connected with a lock body state detection loop, and the lock body state detection loop is connected with a lock body control module; when the lock body state is normal, the lock body state detection loop is closed, and a normal detection signal is sent to the lock body control module; when the lock body control module receives the normal detection signal, the intelligent lock is controlled to work normally; when the lock body state is abnormal, the lock body state detection loop sends an abnormal detection signal to the lock body control module, or the lock body state detection loop is disconnected; when the lock body control module receives the abnormality detection signal, the intelligent lock is controlled to be locked; the method specifically comprises the following steps: detecting the surface of the intelligent lock through a lock body state detection loop; when the surface of the intelligent lock is abnormal, a corresponding abnormal detection signal is generated and sent to the lock body control module, so that the lock body control module locks the intelligent lock and starts the secondary lock when the magnitude of the abnormal detection signal exceeds a preset signal threshold value; receiving a secondary lock unlocking signal sent by a current operator; and analyzing the secondary lock unlocking signal, and if the secondary lock unlocking password corresponding to the secondary lock unlocking signal is correct, unlocking the secondary lock and sending a restarting signal to the lock body control module to restart the intelligent lock so that the current operator can normally unlock the intelligent lock.
The lock body can be a structure with a locking function, and can be a single module or a combination of a plurality of modules. The lock body may be of a mechanical type or an electromagnetic induction type. The lock body state detection loop can be connected with the lock body and is used for detecting the state of the lock body. And the lock body control module is used for controlling the opening and closing of the intelligent lock. When the intelligent lock body is not touched by a person, the intelligent lock body can be regarded as normal in the state of the lock body when the intelligent lock body is in a natural state; when the lock is normally opened, the lock can be regarded as normal state. The normal detection signal may be a stable, low-energy signal continuously sent by the lock body to the lock body control module when the lock body is in a normal state. When the intelligent lock detects that the intelligent lock is damaged by human beings, such as cutting and smashing, or the intelligent lock is directly damaged to a state that the intelligent lock cannot work normally, the intelligent lock can be regarded as abnormal lock body state. When no one tries to unlock the intelligent lock, the change of the detection signal is small and basically tends to be stable; when maintenance personnel corresponding to the intelligent lock are normally opened, the detection signal may be abrupt. When someone maliciously breaks the intelligent lock, the intelligent lock cannot be opened at a moment, and meanwhile, the detection signal can be changed unstably. Therefore, whether the intelligent lock body is in a normal state or not can be determined. The abnormality detection signal may be an abrupt signal sent to the lock control module when the lock state is abnormal. The preset signal threshold may be a preset value that may be used as a security critical signal for the smart lock. When the magnitude of the abnormality detection signal exceeds the preset signal threshold, the abnormality on the surface of the current intelligent lock may affect the normal operation of the intelligent lock and the safety of the electric meter box. The secondary lock can be arranged inside the ammeter box, and can only communicate with unlocking equipment of maintainers corresponding to the cloud or intelligent lock. When the current operator wants to unlock the secondary lock, communication with the secondary lock is required, verification information can be sent to maintenance personnel corresponding to the intelligent lock, and the secondary lock can be unlocked only when the current operator is determined to be the maintenance personnel corresponding to the intelligent lock. The unlocking signal of the secondary lock can be an unlocking signal sent to the secondary lock by a maintainer corresponding to the intelligent lock.
Specifically, the condition of the smart lock surface may be detected by a lock body condition detection loop. When no one tries to open the intelligent lock, the corresponding lock body state is normal, and at the moment, the lock body state detection loop is closed, and the intelligent lock is in a normal closing state. In this state, the lock body transmits a normal detection signal to the lock body control module. When the current operator breaks the intelligent lock, the state of the lock body is abnormal, and the lock body sends an abnormality detection signal to the lock body control module. The lock body control module compares the magnitude of the abnormal detection signal with a preset signal threshold value, and locks the intelligent lock and starts the secondary lock if the magnitude of the abnormal detection signal exceeds the preset signal threshold value. When the current operator tries to unlock the intelligent lock, a message prompt can be sent to a maintainer corresponding to the intelligent lock to remind the maintainer that the secondary lock needs to be unlocked first. If the current operator is a maintainer corresponding to the intelligent lock, a secondary lock unlocking signal can be sent to the secondary lock and a secondary lock unlocking password corresponding to the secondary lock unlocking signal can be analyzed. And if the unlocking password of the secondary lock is correct, unlocking the secondary lock. And then sending a restarting signal to the lock body control module to enable the intelligent lock to recover to a normal working state. The smart lock can then be re-opened by the current operator to open the meter box following the unlocking procedure in the method described above.
It should be noted that, the intelligent lock is used for sealing the ammeter case, preliminarily guarantees the security of ammeter case. Under normal conditions, the electric meter box can be opened by opening the intelligent lock, and when the intelligent lock is manually damaged and the size of the abnormal detection signal exceeds a preset signal threshold value, the secondary lock is started. The secondary lock can be used as the most important defense line, and the electric meter box can be opened only after the secondary lock is opened first to restart the intelligent lock and then the intelligent lock is opened. Therefore, even if the current operator is a maintainer corresponding to the intelligent lock in the state that the secondary lock is started, the intelligent lock cannot be directly opened beyond the secondary lock.
In this embodiment, the lock body of the intelligent lock is connected with the lock body detection loop, and is used for detecting the state of the lock body and generating a corresponding detection signal. The lock body control module is connected with the lock body detection loop and is used for receiving the detection signal and performing corresponding operation. When the abnormal condition of the surface of the intelligent lock is detected and the magnitude of the abnormal detection signal exceeds the preset signal threshold value, the lock body detection loop can be disconnected and the secondary lock is started. Because the lock status detection loop continuously sends detection signals to the lock detection module, the detection is performed when the current operator tries to break the intelligent lock. And the current operator only can restart the intelligent lock after opening the secondary lock, and then the ammeter box is opened. The safety of the ammeter box is guaranteed.
In some embodiments, the smart lock is associated with a cloud; whether the secret key is consistent with the preset secret key or not is determined, if not, the camera is started to acquire current operator information, and the current operator information and unlocking information are sent to maintenance personnel corresponding to the intelligent lock, which specifically comprises the following steps: determining whether the secret key is consistent with a preset secret key, if not, starting a camera to acquire the information of the current operator; based on the cloud end, judging whether the information of the current operator is contained in a preset maintenance database; if the intelligent lock is included, calling the identity information of the current operator in a preset maintenance database, and sending the identity information and unlocking information to maintenance personnel corresponding to the intelligent lock, so that the maintenance personnel corresponding to the intelligent lock can select whether to open the intelligent lock; if the intelligent lock is not included, the information of the current operator and the unlocking information are sent to maintenance personnel corresponding to the intelligent lock, so that the maintenance personnel corresponding to the intelligent lock can maintain in time.
A preset maintenance database can be preset in the cloud, and the maintenance database can contain identity information of maintenance personnel. The identity information may include facial feature information, fingerprint information, contact information, etc. of the maintenance personnel.
Specifically, whether the secret key is consistent with the preset secret key is determined, and if the secret key is inconsistent with the preset secret key, the camera can be started to capture the information of the current operator. The intelligent lock can be connected to a preset maintenance database in the cloud, and whether the information of the current operator is matched with the identity information of the maintenance personnel is compared. If so, information indicating the current operator is contained in a preset maintenance database. And the information of the current operator in the preset maintenance database is called out and sent to maintenance personnel corresponding to the intelligent lock, and the maintenance personnel determines whether the current operator can replace the intelligent lock to unlock the intelligent lock. If the information of the current operator is not matched with the identity information of the maintainer, the information of the current operator is not contained in a preset maintenance database, and the electric meter box is proved to have safety risk. The information of the current operator and the unlocking information can be sent to maintenance personnel corresponding to the intelligent lock, so that the maintenance personnel can follow up maintenance in time.
In this embodiment, when the key is inconsistent with the preset key, it may be that maintenance personnel corresponding to the intelligent lock need other maintenance personnel to assist in maintenance, or other people want to unlock the lock. Whether the current operator is a maintainer can be judged according to the identity information of the current operator, and if so, the maintainer corresponding to the intelligent lock can select whether to unlock or not. The safety of the ammeter box is ensured, and meanwhile, maintenance personnel can conveniently perform normal maintenance.
In some embodiments, the above method may further comprise: when the surface of the intelligent lock changes, generating a corresponding self-detection signal according to the change condition; the self-detection signal is sent to the cloud end, so that the cloud end matches corresponding response signals according to the self-detection signal; and receiving and analyzing the response signal, and determining a response operation corresponding to the response signal so as to update the state of the lock body state detection loop.
The cloud preset maintenance database can contain corresponding coping operation information when different changes occur on the surface of the intelligent lock. The self-detection signal may be a signal generated by self-detection of the smart lock itself for detecting a change in the surface of the smart lock. The cloud end can match corresponding handling operation information according to the self-detection signal, such as sending out an alarm and sending prompt information to maintenance personnel corresponding to the intelligent lock. The coping signal may be a signal carrying coping operation information. The coping operations in the preset database can be updated.
Specifically, the inside of the intelligent lock may include a voltage detection unit for detecting the performance of each part inside the intelligent lock. When the surface of the intelligent lock changes, the internal performance may change, and the voltage at the current moment can be detected. When abnormal conditions such as collision, cutting, aging and rust occur on the surface of the intelligent lock, the voltage corresponding to the position where the abnormal condition occurs changes to a certain extent compared with the voltage in a normal working state, and then different self-detection signals are generated according to the changing conditions. The cloud can match corresponding coping operation information according to the change information of the intelligent lock surface carried in the self-detection signal, convert the coping operation information into coping signals and send the coping signals to the intelligent lock. The smart lock may analyze the specific operations involved and implement. Such as breaking the lock state detection loop.
When the lock body surface is rusted or aged, the self-detection signal may change steadily with each change. Taking rust as an example, when a certain part of the lock body is rusted, the rusting process is certainly not on the way of a kick, so that a certain time interval is also formed between the two times of expanding the rusting range. Therefore, the voltage is basically unchanged when rusting a little at a time, and the corresponding self-detection signal generates a little fluctuation. Meanwhile, before the rust range is enlarged, the voltage at the corresponding position is stable, and the corresponding self-detection signal is stable, so that the voltage is slightly different from the original voltage. It can be determined whether the change of the current intelligent lock surface is artificially damaged or naturally caused.
In this embodiment, the smart lock may perform self-detection according to the change of the surface and send the self-detection signal generated correspondingly to the cloud, where the cloud matches the corresponding response signal. The intelligent lock performs corresponding operation according to the response signal. The intelligent lock does not need to store corresponding coping operations corresponding to different changes, and only needs to communicate with the cloud end when the surface of the intelligent lock changes. Different change conditions can be guaranteed to correspond to accurate coping operations, and safety of the ammeter box is improved.
In some embodiments, the above method may further comprise: when the secret key is consistent with the preset secret key and the random verification code passes verification, the maintenance information detected by the lock body control module is received; generating maintenance records according to the maintenance information, and sending the maintenance records to the cloud; generating a prompt to be supplemented according to the maintenance information, and sending the prompt to be supplemented to maintenance personnel corresponding to the intelligent lock so as to enable the maintenance personnel to supplement the maintenance record and timely maintain.
The lock body control module can detect information such as the opening time of the intelligent lock, the opening mode of the intelligent lock, the current state of the intelligent lock body and the like, and the collection of the information can be used as maintenance information. According to the maintenance information, a maintenance record containing the maintenance information can be generated, and the maintenance record needs to be supplemented by maintenance personnel corresponding to the intelligent lock. The prompt to be supplemented can be generated according to the missing content in the maintenance record, such as the result of the maintenance, the matters needing follow-up, and the like.
Specifically, when the key sent by the current operator is consistent with the preset key and the random verification code passes verification, the lock body control module can collect information detected in the unlocking process of the current operator to generate maintenance information. And generating a corresponding maintenance record according to the maintenance information, and synchronizing to the cloud. The cloud judges which parts to be supplemented are missing in the maintenance record, and sends the parts to the intelligent lock, the intelligent lock correspondingly generates a prompt to be supplemented and sends the prompt to corresponding maintenance personnel, and meanwhile, the prompt can be carried out along with the warning sound. The corresponding maintenance personnel can complement the maintenance records according to the prompt to be supplemented.
In other embodiments, if the current operator is not the maintainer corresponding to the intelligent lock, but the intelligent lock is normally opened, an unlocking information completion prompt can be sent to the maintainer corresponding to the intelligent lock, so as to remind the maintainer that the unlocking reason, the maintenance result and other information can be supplemented.
In this embodiment, when the key sent by the current operator is consistent with the preset key and the random verification code passes verification, the maintenance information detected by the lock body control module can be received, and the maintenance record is correspondingly generated and synchronized to the cloud. And then generating maintenance records according to the maintenance information and sending the maintenance records to corresponding maintenance personnel. The cloud can prompt maintenance personnel to maintain in time according to the maintenance record, so that the situation that the maintenance personnel cannot follow-up maintenance in time due to the fact that the prompt is not in place is avoided.
Fig. 3 is a schematic structural diagram of an intelligent lock according to an embodiment of the present application, and as shown in fig. 3, an intelligent lock 300 according to the present embodiment includes: an unlocking signal analysis module 301, a secret key determination module 302, a random verification code verification module 303 and a secondary lock starting module 304.
The unlocking signal analysis module 301 is configured to receive an unlocking signal sent by a current operator, analyze the unlocking signal, and determine an unlocking code corresponding to the unlocking signal; the unlocking password comprises a secret key and a random verification code corresponding to the current operator;
The key determining module 302 is configured to determine whether the key is consistent with a preset key, and when the key is inconsistent with the preset key, open a camera to obtain information of the current operator, and send the information of the current operator and unlocking information to maintenance personnel corresponding to the intelligent lock;
a random verification code verification module 303, configured to verify the random verification code when the random verification codes are consistent;
and the secondary lock starting module 304 is used for opening the secondary lock and sending the unlocking information to maintenance personnel corresponding to the intelligent lock when the random verification code fails to pass, and sending an alarm to warn the current operator and surrounding residents.
Optionally, the smart lock is connected to the cloud end through a network, and the smart lock 300 further includes a real-time verification code receiving module 305, configured to:
receiving the real-time verification code sent by the cloud;
the random verification code verification module 303 is specifically configured to:
and if the random verification codes are consistent, matching the random verification codes with the real-time verification codes so as to carry out verification.
Optionally, the random verification code verification module 303 is specifically configured to:
when unlocking equipment of the current operator is close to the intelligent lock, generating an induction signal and sending the induction signal to the cloud;
And receiving the real-time verification code sent by the cloud according to the induction signal.
Optionally, a lock body of the intelligent lock is connected with a lock body state detection loop, and the lock body state detection loop is connected with a lock body control module; when the lock body state is normal, the lock body state detection loop is closed, and a normal detection signal is sent to the lock body control module; when the lock body control module receives the normal detection signal, the intelligent lock is controlled to work normally; when the lock body state is abnormal, the lock body state detection loop sends an abnormal detection signal to the lock body control module, or the lock body state detection loop is disconnected; when the lock body control module receives the abnormality detection signal, the intelligent lock is controlled to be locked; the smart lock 300 further includes a smart lock surface detection module 306 for:
detecting the surface of the intelligent lock through the lock body state detection loop;
when the surface of the intelligent lock is abnormal, a corresponding abnormal detection signal is generated and sent to the lock body control module, so that the lock body control module locks the intelligent lock and starts the secondary lock when the magnitude of the abnormal detection signal exceeds a preset signal threshold value;
Receiving a secondary lock unlocking signal sent by the current operator;
and analyzing the secondary lock unlocking signal, and if the secondary lock unlocking password corresponding to the secondary lock unlocking signal is correct, unlocking the secondary lock and sending a restarting signal to the lock body control module so as to restart the intelligent lock, so that the current operator can normally unlock the intelligent lock.
Optionally, the key determining module 302 is specifically configured to:
determining whether the secret key is consistent with a preset secret key, if not, starting a camera to acquire information of a current operator;
based on the cloud end, judging whether the information of the current operator is contained in a preset maintenance database;
if the intelligent lock is included, calling the identity information of the current operator in the preset maintenance database, and sending the identity information and unlocking information to maintenance personnel corresponding to the intelligent lock, so that the maintenance personnel corresponding to the intelligent lock can select whether to open the intelligent lock;
and if the information of the current operator and the unlocking information are not included, sending the information of the current operator and the unlocking information to maintenance personnel corresponding to the intelligent lock, so that the maintenance personnel corresponding to the intelligent lock can maintain in time.
Optionally, the smart lock 300 further includes a self-detection module 307 for:
when the lock body state detection loop detects that the intelligent lock surface changes, a corresponding self-detection signal is generated according to the change condition;
the self-detection signal is sent to the cloud end, so that the cloud end matches corresponding response signals according to the self-detection signal;
and receiving and analyzing the response signals, determining response operation corresponding to the response signals and feeding back to maintenance personnel corresponding to the intelligent lock.
Optionally, the smart lock 300 further includes a maintenance record supplementing module 308 for:
when the secret key is consistent with the preset secret key and the random verification code passes verification, receiving maintenance information detected by the lock body control module;
generating a maintenance record according to the maintenance information, and sending the maintenance record to the cloud;
generating a prompt to be supplemented according to the maintenance information, and sending the prompt to be supplemented to maintenance personnel corresponding to the intelligent lock, so that the maintenance personnel supplement the maintenance record and timely maintain.
The apparatus of this embodiment may be used to perform the method of any of the foregoing embodiments, and its implementation principle and technical effects are similar, and will not be described herein again.
Fig. 4 is a schematic structural diagram of an electronic device according to an embodiment of the present application, as shown in fig. 4, an electronic device 400 according to the present embodiment may include: a memory 401 and a processor 402.
The memory 401 has stored thereon a computer program that can be loaded by the processor 402 and that performs the methods of the above-described embodiments.
Wherein the processor 402 is coupled to the memory 401, e.g. via a bus.
Optionally, the electronic device 400 may also include a transceiver. It should be noted that, in practical applications, the transceiver is not limited to one, and the structure of the electronic device 400 is not limited to the embodiments of the present application.
The processor 402 may be a CPU (Central Processing Unit ), general purpose processor, DSP (Digital Signal Processor, data signal processor), ASIC (Application Specific Integrated Circuit ), FPGA (Field Programmable Gate Array, field programmable gate array) or other programmable logic device, transistor logic device, hardware components, or any combination thereof. Which may implement or perform the various exemplary logic blocks, modules, and circuits described in connection with this disclosure. Processor 402 may also be a combination that implements computing functionality, e.g., comprising one or more microprocessor combinations, a combination of a DSP and a microprocessor, etc.
A bus may include a path that communicates information between the components. The bus may be a PCI (Peripheral Component Interconnect, peripheral component interconnect standard) bus or an EISA (Extended Industry Standard Architecture ) bus, or the like. The buses may be divided into address buses, data buses, control buses, etc. For ease of illustration, the figures are shown with only one bold line, but not with only one bus or one type of bus.
Memory 401 may be, but is not limited to, a ROM (Read Only Memory) or other type of static storage device that can store static information and instructions, a RAM (Random Access Memory ) or other type of dynamic storage device that can store information and instructions, an EEPROM (Electrically Erasable Programmable Read Only Memory ), a CD-ROM (Compact Disc Read Only Memory, compact disc Read Only Memory) or other optical disk storage, optical disk storage (including compact discs, laser discs, optical discs, digital versatile discs, blu-ray discs, etc.), magnetic disk storage media or other magnetic storage devices, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer.
The memory 401 is used for storing application program codes for executing the present application and is controlled to be executed by the processor 402. The processor 402 is configured to execute the application code stored in the memory 401 to implement what is shown in the foregoing method embodiment.
Among them, electronic devices include, but are not limited to: mobile terminals such as mobile phones, notebook computers, digital broadcast receivers, PDAs (personal digital assistants), PADs (tablet computers), PMPs (portable multimedia players), in-vehicle terminals (e.g., in-vehicle navigation terminals), and the like, and stationary terminals such as digital TVs, desktop computers, and the like. But may also be a server or the like. The electronic device shown in fig. 4 is only an example and should not be construed as limiting the functionality and scope of use of the embodiments herein.
The electronic device of the present embodiment may be used to execute the method of any of the foregoing embodiments, and its implementation principle and technical effects are similar, and will not be described herein.
The present application also provides a computer-readable storage medium storing a computer program capable of being loaded by a processor and executing the method in the above embodiments.
Those of ordinary skill in the art will appreciate that: all or part of the steps for implementing the method embodiments described above may be performed by hardware associated with program instructions. The foregoing program may be stored in a computer readable storage medium. The program, when executed, performs steps including the method embodiments described above; and the aforementioned storage medium includes: various media that can store program code, such as ROM, RAM, magnetic or optical disks.

Claims (10)

1. An intelligent lock anti-theft and early warning method is characterized by being applied to an intelligent lock; the method comprises the following steps:
receiving an unlocking signal sent by a current operator, analyzing the unlocking signal, and determining an unlocking code corresponding to the unlocking signal; the unlocking password comprises a secret key and a random verification code corresponding to the current operator;
determining whether the secret key is consistent with a preset secret key, if not, starting a camera to acquire the information of the current operator, and sending the information of the current operator and unlocking information to maintenance personnel corresponding to the intelligent lock;
if the random verification codes are consistent, verifying the random verification codes;
if the random verification code fails to pass verification, a secondary lock is started, unlocking information is sent to maintenance personnel corresponding to the intelligent lock, and an alarm is sent out to warn the current operator and surrounding residents.
2. The method of claim 1, wherein the smart lock is network connected to a cloud; the method further comprises the steps of:
receiving the real-time verification code sent by the cloud;
and if the random verification codes are consistent, verifying the random verification codes, wherein the verification codes comprise the following steps:
and if the random verification codes are consistent, matching the random verification codes with the real-time verification codes so as to carry out verification.
3. The method of claim 2, wherein the receiving the real-time verification code sent by the cloud comprises:
when unlocking equipment of the current operator is close to the intelligent lock, generating an induction signal and sending the induction signal to the cloud;
and receiving the real-time verification code sent by the cloud according to the induction signal.
4. The method according to claim 2, wherein a lock body of the intelligent lock is connected with a lock body state detection loop, and the lock body state detection loop is connected with a lock body control module; when the lock body state is normal, the lock body state detection loop is closed, and a normal detection signal is sent to the lock body control module; when the lock body control module receives the normal detection signal, the intelligent lock is controlled to work normally; when the lock body state is abnormal, the lock body state detection loop sends an abnormal detection signal to the lock body control module, or the lock body state detection loop is disconnected; when the lock body control module receives the abnormality detection signal, the intelligent lock is controlled to be locked; the method further comprises the steps of:
detecting the surface of the intelligent lock through the lock body state detection loop;
When the surface of the intelligent lock is abnormal, a corresponding abnormal detection signal is generated and sent to the lock body control module, so that the lock body control module locks the intelligent lock and starts the secondary lock when the magnitude of the abnormal detection signal exceeds a preset signal threshold value;
receiving a secondary lock unlocking signal sent by the current operator;
and analyzing the secondary lock unlocking signal, and if the secondary lock unlocking password corresponding to the secondary lock unlocking signal is correct, unlocking the secondary lock and sending a restarting signal to the lock body control module so as to restart the intelligent lock, so that the current operator can normally unlock the intelligent lock.
5. The method of claim 4, wherein determining whether the secret key is consistent with a preset secret key, if not, starting a camera to obtain current operator information, and sending the current operator information and unlocking information to maintenance personnel corresponding to the intelligent lock comprises:
determining whether the secret key is consistent with a preset secret key, if not, starting a camera to acquire information of a current operator;
based on the cloud end, judging whether the information of the current operator is contained in a preset maintenance database;
If the intelligent lock is included, calling the identity information of the current operator in the preset maintenance database, and sending the identity information and unlocking information to maintenance personnel corresponding to the intelligent lock, so that the maintenance personnel corresponding to the intelligent lock can select whether to open the intelligent lock;
and if the information of the current operator and the unlocking information are not included, sending the information of the current operator and the unlocking information to maintenance personnel corresponding to the intelligent lock, so that the maintenance personnel corresponding to the intelligent lock can maintain in time.
6. The method as recited in claim 5, further comprising:
when the lock body state detection loop detects that the intelligent lock surface changes, a corresponding self-detection signal is generated according to the change condition;
the self-detection signal is sent to the cloud end, so that the cloud end matches corresponding response signals according to the self-detection signal;
and receiving and analyzing the response signals, determining response operation corresponding to the response signals and feeding back to maintenance personnel corresponding to the intelligent lock.
7. The method according to any one of claims 4-6, further comprising:
when the secret key is consistent with the preset secret key and the random verification code passes verification, receiving maintenance information detected by the lock body control module;
Generating a maintenance record according to the maintenance information, and sending the maintenance record to the cloud;
generating a prompt to be supplemented according to the maintenance information, and sending the prompt to be supplemented to maintenance personnel corresponding to the intelligent lock, so that the maintenance personnel supplement the maintenance record and timely maintain.
8. An intelligent lock, characterized by comprising:
the unlocking signal analysis module is used for receiving an unlocking signal sent by a current operator, analyzing the unlocking signal and determining an unlocking code corresponding to the unlocking signal; the unlocking password comprises a secret key and a random verification code corresponding to the current operator;
the key determining module is used for determining whether the key is consistent with a preset key, and when the key is inconsistent with the preset key, starting a camera to acquire the information of the current operator, and sending the information of the current operator and unlocking information to maintenance personnel corresponding to the intelligent lock;
the random verification code verification module is used for verifying the random verification code when the random verification codes are consistent;
and the secondary lock starting module is used for opening the secondary lock and sending unlocking information to maintenance personnel corresponding to the intelligent lock when the random verification code verification fails, and sending an alarm to warn the current operator and surrounding residents.
9. An electronic device, comprising: a memory and a processor;
the memory is used for storing program instructions;
the processor being adapted to invoke and execute program instructions in the memory to perform the method of any of claims 1-7.
10. A computer-readable storage medium, wherein the computer-readable storage medium has a computer program stored therein; the computer program, when executed by a processor, implements the method of any of claims 1-7.
CN202310005191.XA 2023-01-04 2023-01-04 Intelligent lock anti-theft and early warning method, intelligent lock, electronic equipment and medium Pending CN116110153A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310005191.XA CN116110153A (en) 2023-01-04 2023-01-04 Intelligent lock anti-theft and early warning method, intelligent lock, electronic equipment and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310005191.XA CN116110153A (en) 2023-01-04 2023-01-04 Intelligent lock anti-theft and early warning method, intelligent lock, electronic equipment and medium

Publications (1)

Publication Number Publication Date
CN116110153A true CN116110153A (en) 2023-05-12

Family

ID=86260928

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310005191.XA Pending CN116110153A (en) 2023-01-04 2023-01-04 Intelligent lock anti-theft and early warning method, intelligent lock, electronic equipment and medium

Country Status (1)

Country Link
CN (1) CN116110153A (en)

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109741500A (en) * 2018-12-29 2019-05-10 北京方正数码有限公司 A kind of setting of the temporary password of smart lock and its verification method
KR102019342B1 (en) * 2018-03-19 2019-09-06 숭실대학교산학협력단 Digital Door-lock Management server and Opening/Closing Controlling System, Method for Controlling Digital Door-lock Communicating Smartphone
CN110295791A (en) * 2019-06-25 2019-10-01 珠海格力电器股份有限公司 A kind of method and apparatus of intelligent door lock pick-proof
CN110415413A (en) * 2019-07-30 2019-11-05 国网浙江省电力有限公司庆元县供电公司 A kind of application method of smart lock in electric system O&M
CN111028392A (en) * 2019-12-23 2020-04-17 安智技术服务(深圳)有限公司 Combined password verification method, hardware terminal and password system
CN111243142A (en) * 2020-02-04 2020-06-05 浙江大华技术股份有限公司 Failure processing method and device for intelligent door lock and storage medium
CN210918548U (en) * 2019-08-12 2020-07-03 浙江因特佳智能科技有限公司 Fingerprint identification intelligence lock
CN211572984U (en) * 2019-06-13 2020-09-25 安徽安迈瑞智能科技有限公司 Thing allies oneself with intelligence lock with function is judged in advance to safety
CN112312706A (en) * 2020-11-07 2021-02-02 胡令江 Electric automation device with anti-damage automatic alarm function
CN216788140U (en) * 2021-09-04 2022-06-21 郑州鸿浩信息技术有限公司 Remove safe anti-theft system based on big dipper location

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR102019342B1 (en) * 2018-03-19 2019-09-06 숭실대학교산학협력단 Digital Door-lock Management server and Opening/Closing Controlling System, Method for Controlling Digital Door-lock Communicating Smartphone
CN109741500A (en) * 2018-12-29 2019-05-10 北京方正数码有限公司 A kind of setting of the temporary password of smart lock and its verification method
CN211572984U (en) * 2019-06-13 2020-09-25 安徽安迈瑞智能科技有限公司 Thing allies oneself with intelligence lock with function is judged in advance to safety
CN110295791A (en) * 2019-06-25 2019-10-01 珠海格力电器股份有限公司 A kind of method and apparatus of intelligent door lock pick-proof
CN110415413A (en) * 2019-07-30 2019-11-05 国网浙江省电力有限公司庆元县供电公司 A kind of application method of smart lock in electric system O&M
CN210918548U (en) * 2019-08-12 2020-07-03 浙江因特佳智能科技有限公司 Fingerprint identification intelligence lock
CN111028392A (en) * 2019-12-23 2020-04-17 安智技术服务(深圳)有限公司 Combined password verification method, hardware terminal and password system
CN111243142A (en) * 2020-02-04 2020-06-05 浙江大华技术股份有限公司 Failure processing method and device for intelligent door lock and storage medium
CN112312706A (en) * 2020-11-07 2021-02-02 胡令江 Electric automation device with anti-damage automatic alarm function
CN216788140U (en) * 2021-09-04 2022-06-21 郑州鸿浩信息技术有限公司 Remove safe anti-theft system based on big dipper location

Similar Documents

Publication Publication Date Title
CN101406350A (en) Fingerprint file cabinet system and control method thereof
EP2779133A2 (en) System and method of anomaly detection
CN113852633A (en) Method for generating implementation case for information security assessment
CN108399710A (en) A kind of fingerprint recognition alarm method, system and terminal device
CN106295276A (en) A kind of user of record inputs the method that BIOS password enters system
CN112489258A (en) Door lock alarm processing method and device, computer equipment and storage medium
CN110717770B (en) Anti-counterfeiting detection method, device, equipment and storage medium for vehicle parts
CN103116848B (en) The method of secured electronic charging, equipment and system
Bose Intelligent technologies for managing fraud and identity theft
CN116110153A (en) Intelligent lock anti-theft and early warning method, intelligent lock, electronic equipment and medium
JPH11144110A (en) Room entry/exiting management system and storage medium
CN107992733B (en) Intelligent terminal and safety unlocking method thereof
CN114677756A (en) Real-time remote monitoring intelligent early warning system for vault door
Sasi et al. Vehicle Anti-theft System Based on an Embedded Platform
KR101924190B1 (en) A Security System Base On Voice Recognition
CN113301300A (en) Building intelligent monitoring system and method based on Internet
Sri et al. Design and implementation of smart atm under idle application
CN110750783A (en) WeChat applet development and maintenance system for providing system security
Jaiganesh et al. Anti Theft Control of Automatic Teller Machine Using Wireless Sensors
CN214996794U (en) Intelligent lock anti-theft device
JP2012141989A (en) Abnormal behavior detection device, monitoring system, abnormal behavior detection method, and program
CN116163623A (en) Intelligent electronic anti-theft safe, method for keeping articles and electronic equipment
CN117058825A (en) Bank security system and method
CN114120494A (en) Security system and method based on fingerprint identification
Gurrala et al. Thumbprint-Based Financial Locker Framework using IOT

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination