CN116631102A - Control method and device of intelligent lock, intelligent lock and storage medium - Google Patents

Control method and device of intelligent lock, intelligent lock and storage medium Download PDF

Info

Publication number
CN116631102A
CN116631102A CN202310659886.XA CN202310659886A CN116631102A CN 116631102 A CN116631102 A CN 116631102A CN 202310659886 A CN202310659886 A CN 202310659886A CN 116631102 A CN116631102 A CN 116631102A
Authority
CN
China
Prior art keywords
voice information
preset
information
voice
voiceprint
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310659886.XA
Other languages
Chinese (zh)
Inventor
王妙玉
邱其状
周亮
吴宁泉
欧宝星
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Hotata Technology Group Co Ltd
Original Assignee
Guangdong Hotata Technology Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Hotata Technology Group Co Ltd filed Critical Guangdong Hotata Technology Group Co Ltd
Priority to CN202310659886.XA priority Critical patent/CN116631102A/en
Publication of CN116631102A publication Critical patent/CN116631102A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00563Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys using personal physical data of the operator, e.g. finger prints, retinal images, voicepatterns
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B21/00Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
    • G08B21/18Status alarms
    • G08B21/24Reminder alarms, e.g. anti-loss alarms
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS OR SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING; SPEECH OR AUDIO CODING OR DECODING
    • G10L17/00Speaker identification or verification
    • G10L17/22Interactive procedures; Man-machine interfaces
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02PCLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
    • Y02P90/00Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
    • Y02P90/02Total factory control, e.g. smart factories, flexible manufacturing systems [FMS] or integrated manufacturing systems [IMS]

Abstract

The application provides a control method and device of an intelligent lock, the intelligent lock and a storage medium, and relates to the technical field of intelligent home. The method comprises the following steps: collecting first voice information and judging whether preset conditions are met or not; and if the first voice information is determined to meet the preset condition, executing the operation corresponding to the first voice information. Therefore, the embodiment of the application can identify the target object through the voice information, and after the target object passes the identification, the intelligent lock is controlled to execute corresponding operation, the cooperation with the terminal bound with the intelligent lock is not needed, the use cost of the intelligent lock is reduced, the operation can be simplified, the usability is good, and the use experience is improved.

Description

Control method and device of intelligent lock, intelligent lock and storage medium
Technical Field
The application relates to the technical field of intelligent home, in particular to a control method and device of an intelligent lock, the intelligent lock and a storage medium.
Background
Every family has an entrance door, whatever the door has a lock. Some are open locks and others are built-in locks. The lock is unlocked by inserting a key into the lock cylinder. Although the anti-theft function of locks can be enhanced in a number of ways to increase the security of the locks, these locks often have difficulty protecting where the lock is to be unlocked by a practitioner. Various master keys can be purchased on the Internet, and a plurality of locks can be opened by simple training, so that the safety of family households is reduced.
In order to improve the security of tool to lock, intelligent lock has appeared. They all have several characteristics: the intelligent terminal has the advantages that the intelligent terminal can be connected with the microcontroller in a wireless communication mode (Bluetooth, wiFi, ZIGBEE and the like), and safety (key sharing and encryption mechanisms, fingerprint unlocking modes, image recognition technology and the like) is emphasized.
However, the intelligent locks on the market at present are all seriously dependent on the intelligent terminal APP, so that children or old people can have embarrassment outside a refused door because the intelligent terminal APP is not used, and meanwhile, if the intelligent locks are controlled by the APP, the terminal APP needs to be opened in the whole course when the operation is executed, a series of operations of controlling the APP to connect the lock, clicking an interface operation button and the like are executed, so that the control of the intelligent locks is extremely troublesome; some intelligent locks control the intelligent locks by using fingerprint and image recognition modes, but have higher cost; some of the unlocking methods use a mode close to automatic unlocking, but the positioning means such as GPS are needed, the unlocking methods still depend on a terminal, the time delay is large, and the precision is low. In general, these smart lock solutions remain to be improved in terms of cost control and ease of use.
Disclosure of Invention
The embodiment of the application provides a control method and device of an intelligent lock, the intelligent lock and a storage medium, which can solve the problems of the need of terminal cooperation, high cost and poor usability. In order to achieve the object, embodiments of the present application provide the following solutions.
According to an aspect of the embodiment of the present application, there is provided a control method of an intelligent lock, including: collecting first voice information and judging whether preset conditions are met or not;
and if the first voice information is determined to meet the preset condition, executing the operation corresponding to the first voice information, wherein the preset condition comprises that the first voice information comprises a preset operation instruction, and the voiceprint corresponding to the first voice information is matched with the preset voiceprint.
In one possible implementation, the method further includes:
responding to configuration operation for a voice control function, and acquiring second voice information corresponding to the configuration operation; or, acquiring second voice information sent by the client bound with the intelligent lock;
determining a preset voiceprint and a preset operation instruction according to the second voice information;
and locally storing and/or uploading the preset voiceprint and the preset operation instruction to a server.
In one possible implementation manner, the obtaining the second voice information corresponding to the configuration operation includes:
guiding the target object to input voice information according to preset information, and denoising the voice information to obtain second voice information;
or (b)
And guiding the target object to adjust the input environment according to preset information, and acquiring second voice information input by the target object in the adjusted input environment.
In one possible implementation manner, the collecting the first voice information includes:
detecting a preset area through an induction module, and if the preset area is determined to have a target object, calling a voice acquisition module to acquire first voice information corresponding to the target object, wherein the induction module comprises at least one of a camera, an infrared sensor and a radar;
and analyzing the first voice information through a voice analysis module to obtain a target voiceprint and a target operation instruction.
In one possible implementation, the method further includes:
if the target voiceprint fails to match with the preset voiceprint and/or the target operation instruction fails to match with the preset operation instruction, warning information is sent to a client bound with the intelligent lock;
and carrying out image acquisition according to the received image acquisition instruction so as to process through the acquired image, wherein the processing comprises at least one of door opening, operation interface displaying, video recording, sound recording and alarming.
In one possible implementation manner, the performing the operation corresponding to the first voice information includes:
and collecting voiceprint information in a time period corresponding to the door opening operation, comparing the voiceprint information with voiceprints in a preset voiceprint library, and processing according to a matching result, wherein the processing mode comprises reminding at least one of a preset object and an alarm through a cloud.
In one possible implementation, the method further includes:
if the first voice information is determined to meet the preset condition, acquiring the biological identification information corresponding to the first voice information, and comparing the biological identification information with the preset biological identification information, wherein the biological identification information comprises at least one of an image, a fingerprint, a height and a palmprint of a target object corresponding to the first voice information;
and if the biological identification information is determined to be matched with the preset biological identification information according to the comparison result, executing the operation corresponding to the first voice information.
According to another aspect of the present application, there is provided a control device of an intelligent lock, the device comprising:
the acquisition module is used for acquiring the first voice information;
the judging module judges whether the first voice information meets a preset condition or not; the preset conditions comprise that the first voice information comprises a preset operation instruction, and voiceprints corresponding to the first voice information are matched with preset voiceprints;
and the operation execution module is used for executing the operation corresponding to the first voice information when the first voice information is determined to meet the preset condition.
According to another aspect of an embodiment of the present application, there is provided a smart lock including a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing a method as described above when executing the program.
According to a further aspect of embodiments of the present application, there is provided a computer readable storage medium having stored thereon a computer program which, when executed by a processor, implements the steps of the method as described above.
The technical scheme provided by the embodiment of the application has the beneficial effects that:
in the control method of the intelligent lock provided by the application, the first voice information is collected through the voice collection module, and when the first voice information comprises a preset operation instruction and the first voice information is matched with a preset voiceprint, the operation corresponding to the first voice information is executed. The embodiment of the application utilizes the voice acquisition module to acquire the first voice information, carries out voiceprint recognition and instruction recognition on the first voice information, and executes corresponding operation after the recognition is passed. Therefore, the embodiment of the application can identify the target object through the voice information, and after the target object passes the identification, the intelligent lock is controlled to execute corresponding operation, the matching with the terminal bound with the intelligent lock is not needed, the use cost of the intelligent lock is reduced, the operation can be simplified, the usability is good, and the use experience is improved;
according to the embodiment of the application, the second voice information is acquired in response to the configuration operation aiming at the voice control function, and the voice print and the operation instruction are recorded according to the second voice information, so that the flexible recording of the voice control information related to the intelligent lock can be realized, the control object of the intelligent lock can be conveniently and quickly added, the operation is simple, and the usability is good;
when the embodiment of the application acquires the second voice information, the target object is guided to record the voice information by using the preset information, so that the speed of recording the voice information is effectively improved, the quality of the second voice information is improved by processing the recorded voice information or changing the recording environment, and the reliability of the subsequent voice recognition is improved;
according to the embodiment of the application, the sensing module detects the preset area, and when the target object exists in the preset area, the voice acquisition module is called to acquire the first voice information corresponding to the target object, and the target voiceprint and the target operation instruction are acquired through the first voice information;
according to the embodiment of the application, when the first voice information does not meet the preset condition, warning information is sent to the client bound by the intelligent lock, the image is collected according to the fed-back information, and corresponding processing is carried out according to the collected image;
when the operation corresponding to the first voice information is executed, the voiceprint information in the time period corresponding to the operation is obtained, and at least one operation of reminding a preset object and alarming is performed according to the matching result of the voiceprint information and the voiceprints in the voiceprint library, so that the use safety of the intelligent lock can be improved, the specific object is prevented from approaching, and the safe and reliable use of the intelligent lock is ensured;
after the first voice information is determined to meet the preset condition, the biological identification information corresponding to the first voice information is acquired, the target object is further identified through the biological identification information, and after the identification is passed, the operation corresponding to the first voice information is executed, and the identity of the target object is identified through a plurality of identification modes, so that the possibility of false identification of the intelligent lock is reduced, and the safety and reliability of the intelligent lock are effectively ensured.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the following description will simply refer to the drawings that are required to be used in the description of the embodiments of the present application.
FIG. 1 is a flowchart of a control method of an intelligent lock according to an embodiment of the present application;
FIG. 2 is a flow chart of another embodiment of a control method of the smart lock according to the present application;
FIG. 3 is a workflow diagram of a control method of an intelligent lock according to an embodiment of the present application;
fig. 4 is a block diagram of a control device of an intelligent lock according to an embodiment of the present application;
fig. 5 is a block diagram of an intelligent lock according to an embodiment of the present application.
Detailed Description
Embodiments of the present application are described below with reference to the drawings in the present application. It should be understood that the embodiments described below with reference to the drawings are exemplary descriptions for explaining the technical solutions of the embodiments of the present application, and the technical solutions of the embodiments of the present application are not limited.
As used herein, the singular forms "a", "an", "the" and "the" are intended to include the plural forms as well, unless expressly stated otherwise, as understood by those skilled in the art. It will be further understood that the terms "comprises" and "comprising," when used in this specification, specify the presence of stated features, information, data, steps, operations, elements, and/or components, but do not preclude the presence or addition of other features, information, data, steps, operations, elements, components, and/or groups thereof, all of which may be included in the present specification. It will be understood that when an element is referred to as being "connected" or "coupled" to another element, it can be directly connected or coupled to the other element or intervening elements may be present. Further, "connected" or "coupled" as used herein may include wirelessly connected or wirelessly coupled. The term "and/or" as used herein indicates at least one of the items defined by the term, e.g. "a and/or B" indicates implementation as "a", or as "a and B".
For the purpose of making the objects, technical solutions and advantages of the present application more apparent, the following detailed description of the embodiments of the present application will be given with reference to the accompanying drawings.
The technical solutions of the embodiments of the present application and technical effects produced by the technical solutions of the present application are described below by describing several exemplary embodiments. It should be noted that the following embodiments may be referred to, or combined with each other, and the description will not be repeated for the same terms, similar features, similar implementation steps, and the like in different embodiments.
The application provides a control method and device of an intelligent lock, the intelligent lock and a storage medium, and aims to solve at least one technical problem in the prior art.
The embodiment of the application provides a control method of an intelligent lock, as shown in fig. 1, the control method comprises the steps of S101 and S102:
s101: and collecting the first voice information and judging whether a preset condition is met.
Optionally, the voice collecting module may be disposed on the smart lock, or may be disposed on other devices (such as a doorbell, a key, a mobile phone, etc.) other than the smart lock, where the smart lock collects the first voice information input by the target object through the voice collecting module. The voice acquisition module is provided with a voiceprint acquisition element, and the voiceprint acquisition element is utilized to acquire first voice information comprising target object voiceprints.
Optionally, in order to save power consumption, the intelligent lock may further detect whether a voice information acquisition instruction is received, and after determining that the voice information acquisition instruction is received, start the voice acquisition module to acquire the first voice information.
In one embodiment, a key for inputting a voice information acquisition instruction is arranged on the intelligent lock, the target object presses the key, and the intelligent lock determines that the voice information acquisition instruction is received. And starting a voice acquisition module in a standby state, and controlling the voice acquisition module to acquire the first voice information.
Optionally, before the first voice information is collected, voiceprint setting and operation instruction setting are also required. Therefore, the control method of the present application further includes: responding to configuration operation for the voice control function, and acquiring second voice information corresponding to the configuration operation; or, acquiring second voice information sent by the client bound with the intelligent lock; determining a preset voiceprint and a preset operation instruction according to the second voice information; and locally storing or uploading a preset voiceprint and a preset operation instruction to a server. Before responding to configuration operation or acquiring second voice information sent by the client, the intelligent lock can display a description or prompt information related to second voice information input by itself or through the client so as to improve the speed and accuracy of the second voice information input. The operation instruction comprises operations which can be executed by opening the door, displaying an operation interface, inputting voice information, deleting voice information, alarming and notifying a designated object and other intelligent locks.
Optionally, when the second voice information is acquired, information of a target object outputting the second voice information may be recorded, and the information of the target object may be associated with a voiceprint and an operation instruction corresponding to the second voice information. The information of the target object includes the biological identification information, name, number and other information capable of distinguishing the target object.
In one embodiment, the intelligent lock stores a description related to the input of the second voice information, and when the intelligent lock is installed or after detecting that the target object needs to input the second voice information (for example, the target object selects the door opening information setting function of the intelligent lock), the description is displayed, the target object is prompted to execute a configuration operation for the voice control function through the description, and the configuration operation is responded to obtain the second voice information corresponding to the configuration operation. The configuration operation comprises information setting, voice print recording operation, voice print deleting operation, operation instruction confirming operation and other operation related to second voice information recording.
In another embodiment, the smart lock is connected to a mobile phone of the target object, and a client on the mobile phone for managing the smart lock binds the smart lock. The target object uses the client to input operation instructions related to the second voice information, and the client or the intelligent lock displays the instruction book through the client. The target object sends out second voice information according to the instruction book, and the client acquires the second voice information of the target object through the mobile phone and sends the second voice information to the intelligent lock. The intelligent lock can be connected with the mobile phone in other wireless transmission modes through infrared, NFC, bluetooth and WiFi, and information transmission is performed.
Optionally, in order to improve security of the smart lock, before responding to a configuration operation for the voice control function, the smart lock may further detect whether a target object corresponding to the configuration operation is a preset management object capable of performing the configuration operation, and if so, execute the configuration operation to obtain the second voice information. If not, refusing to execute the configuration operation.
Optionally, to improve the quality of the second voice information, acquiring the second voice information corresponding to the configuration operation includes: guiding the target object to input voice information according to preset information, and denoising the voice information to obtain second voice information; or guiding the target object to adjust the input environment according to the preset information, and acquiring the second voice information input by the target object in the adjusted input environment. The intelligent lock can detect the current input environment, detect whether other people or interference sounds exist in the current input environment according to images or sounds of the input environment, and if yes, prompt a target object that the input environment does not meet input conditions.
In one embodiment, the intelligent lock may be embedded with a noise reduction chip, through which the second voice information is subjected to noise reduction processing, so as to determine a preset voiceprint and a preset operation instruction according to the second voice information.
Optionally, in order to avoid the wrong first voice information of collection of intelligence lock, promote the reliability and reduce the consumption of intelligence lock, gather first voice information through the voice acquisition module, include: detecting a preset area through an induction module, and if the preset area is determined to have a target object, calling a voice acquisition module to acquire first voice information corresponding to the target object, wherein the induction module comprises at least one of a camera, an infrared sensor and a radar; and analyzing the first voice information through a voice analysis module to obtain the target voiceprint and the target operation instruction. The radar may include an ultrasonic radar, a millimeter wave radar, and other radars capable of detecting the location of a target object. The voice analysis module comprises a voiceprint identifier, and a target voiceprint and a target operation instruction are obtained through the voiceprint identifier. The voice acquisition module can be in a standby state when the sensing module detects that a target object exists in a preset area, and the voice acquisition module is separated from the standby state after receiving information of the target object detected by the preset area transmitted by the sensing module, so as to acquire first voice information.
In one embodiment, the sensing module may include a camera, the preset area is an area capable of capturing a facial image of the target object, the smart lock captures an image of the target object through the camera, and determines whether the image has the facial image of the target object, if the image has the facial image, the preset area is determined to have the target object, the voice acquisition module is called to acquire first voice information corresponding to the target object, and the voice analysis module in the smart lock is used to analyze the first voice information to obtain the target voiceprint and the target operation instruction.
S102: if the first voice information is determined to meet the preset condition, executing the operation corresponding to the first voice information, wherein the preset condition comprises that the first voice information comprises a preset operation instruction, and the voiceprint corresponding to the first voice information is matched with the preset voiceprint.
Optionally, after the intelligent lock acquires the first voice information, the target voiceprint and the target operation instruction corresponding to the first voice information are acquired. Judging whether the target operation instruction comprises a preset operation instruction and whether the target voiceprint is a preset voiceprint. If yes, determining that the first voice information comprises a preset operation instruction, and matching the voiceprint corresponding to the first voice information with the preset voiceprint, thereby determining that the first voice information meets the preset condition, and executing corresponding operations, such as opening a door, displaying an operation interface, inputting voice information, deleting voice information, alarming, notifying a designated object and other operations which can be executed by the intelligent lock, according to the operation instruction included in the first voice information.
In one embodiment, the intelligent lock records second voice information input by the target object, and determines a preset voiceprint and a preset operation instruction (sesame door opening) according to the second voice information. When the door is opened, the target object sends out first voice information in a preset area, the intelligent lock acquires the first voice information through the voice acquisition module, the voice analysis module analyzes the first voice information to obtain a target voiceprint of the first voice information and a target operation instruction (sesame door opening), the target voiceprint is compared with the preset voiceprint, the target voiceprint is determined to be matched with the preset voiceprint, the target operation instruction is determined to comprise the preset operation instruction, and the intelligent lock executes operations corresponding to the operation instruction, such as opening the intelligent lock, notifying the appointed object and the like.
Compared with the prior art, the scheme provided by the application collects the first voice information through the voice collection module, and executes the operation corresponding to the first voice information when the first voice information comprises the preset operation instruction and the first voice information is matched with the preset voiceprint. The embodiment of the application utilizes the voice acquisition module to acquire the first voice information, carries out voiceprint recognition and instruction recognition on the first voice information, and executes corresponding operation after the recognition is passed. Therefore, the embodiment of the application can identify the target object through the voice information, and after the target object passes the identification, the intelligent lock is controlled to execute corresponding operation, the cooperation with the terminal bound with the intelligent lock is not needed, the use cost of the intelligent lock is reduced, the operation can be simplified, the usability is good, and the use experience is improved.
For the control method of the intelligent lock, the application provides a possible mode, as shown in fig. 2, the control method comprises the following steps:
s201: and detecting a preset area through the sensing module, and if the target object exists in the preset area, calling the voice acquisition module to acquire first voice information corresponding to the target object.
Optionally, the sensing module includes at least one of a camera, an infrared sensor and a radar, and the intelligent lock can open the sensing module in a preset time period, detect whether a target object exists in a preset area through the sensing module, and also can open the sensing module after receiving an opening instruction of the sensing module, which is input by the target object in a key, voice, gesture, terminal and other modes or tools, so as to detect whether the target object exists in the preset area.
Optionally, after detecting that the target object exists in the preset area, the intelligent lock may further acquire image or action information of the target object, detect whether the target object is stressed or has other situations requiring early warning according to the image or action information, if yes, do not identify the first voice information, generate corresponding reminding information, and send the reminding information to the preset object (such as a reminding object specified by a user).
In one embodiment, the sensing module is a camera, the intelligent lock acquires an image of a preset area through the camera, detects whether a target object exists in the preset area according to the image, acquires first voice information through the voice acquisition module after determining that the target object exists in the preset area, and controls the camera to continuously shoot the image of the target object, and acquires action information of the target object through the image. If the action information is determined to indicate that the target object is stressed, the first voice information is not recognized, prompting information of the stressed target object is generated and sent to a designated object, the object is preset by a householder, and the sent object is designated when the stress condition occurs.
S202: and analyzing the first voice information through a voice analysis module to obtain the target voiceprint and the target operation instruction.
Optionally, identifying the first voice information by a voice print identifier in the voice analysis module to obtain a target voice print, and identifying the content of the first voice information, so as to obtain a target operation instruction corresponding to the first voice information.
S203: if the first voice information is determined to meet the preset condition, acquiring the biological identification information corresponding to the first voice information, and comparing the biological identification information with the preset biological identification information.
Optionally, the smart lock acquires the target object outputting the first voice information, where the smart lock may determine the target object through a sound positioning manner, may identify the target object through the sensing module, and may prompt the target object to input the biometric information after acquiring the first voice information, and determine the object inputting the biometric information as the target object.
Optionally, the biometric information includes a fingerprint, palm print, pupil, and other information that can be used to identify the target object.
Optionally, the intelligent lock pre-stores the corresponding relation between each preset voiceprint or preset operation instruction and preset biological identification information, after determining that the first voice information meets the preset condition, judges whether the preset biological identification information corresponding to the target voiceprint or target operation instruction in the first voice information is matched with the input biological identification information, and further carries out identity identification on the target object in the mode, so that the possibility of false identification of the intelligent lock is reduced (if the situation that the first voice information is played by using recording and broadcasting equipment and the intelligent lock is misled) and the safety of intelligent lock control is improved.
In one embodiment, the input biometric information is a fingerprint and the preset biometric information corresponds to a preset voiceprint. After the first voice information is determined to be in accordance with the preset condition, acquiring preset biological identification information (namely, preset fingerprints) corresponding to the preset voiceprints, and judging whether the fingerprints corresponding to the first voice information are matched with the preset biological identification information or not.
Optionally, if the matching of the target voiceprint and the preset voiceprint fails and/or the matching of the target operation instruction and the preset operation instruction fails, sending warning information to the client bound with the intelligent lock; and carrying out image acquisition according to the received image acquisition instruction so as to carry out door opening processing through the acquired image, wherein the door opening processing comprises door opening and alarming, and the image is an image of a target object acquired according to the image acquisition instruction.
In one embodiment, if the target voiceprint fails to match with the preset voiceprint, the intelligent lock sends the warning information to the client bound by the intelligent lock according to the warning information of the failed voiceprint matching. And after receiving the image acquisition instruction sent by the client, acquiring an image of the target object sending the first voice information, and sending the image to the client. The intelligent lock can also directly collect the information of the target object after determining that the matching fails and send the information to the client bound by the intelligent lock.
S204: and if the biological identification information is determined to be matched with the preset biological identification information according to the comparison result, executing the operation corresponding to the first voice information.
Optionally, in order to identify suspicious personnel and improve security of the smart lock, the step of executing an operation corresponding to the first voice information includes: and collecting voiceprint information in a time period corresponding to the operation, comparing the voiceprint information with voiceprints in a preset voiceprint library, and processing according to a matching result, wherein the processing mode comprises reminding at least one of a preset object and an alarm through a cloud.
In one embodiment, the preset voiceprint library is a voiceprint library of a specific person (such as a thief or evasion), and the smart lock collects relevant voiceprint information (such as voiceprint information of other objects in the vicinity of the target object) in a time period corresponding to the door opening operation. Comparing the voiceprint information with the voiceprint information in the voiceprint library, if the voiceprint library has the matchable voiceprints, determining that a specific person exists currently, acquiring information of the specific person corresponding to the matched voiceprints, generating reminding information according to the information of the specific person and positioning information of the intelligent lock, reminding a preset object (such as a user owner) that the specific person exists nearby through a cloud, improving vigilance of the preset object, and performing corresponding processing (such as alarm processing) according to information fed back by the preset object.
The specific working process related to the control method of the intelligent lock is further described below.
In an embodiment, the intelligent lock is controlled to open the door through the first voice information, as shown in fig. 3, the intelligent lock performs configuration operation on the intelligent lock, the intelligent lock guides the target object to input voiceprints of the target object and other objects and operation instructions, the operation instructions can be limited to be within four Chinese characters, such as opening the door, opening the door through sesame, and the like, and after the intelligent lock determines that recording is completed, the intelligent lock performs the door opening operation based on the first voice information input by the target object.
When the intelligent lock works, the preset area is detected, after the target object exists in the preset area, the intelligent lock is awakened, an object needing to be opened speaks an operation instruction recorded by itself in the preset area, the first voice information of the object is collected through the voice collection module, the first voice information is sent to the voice analysis module, the voice analysis module recognizes and distinguishes the first voice information, and through comparison, voiceprint matching is found and the operation instruction comprises the preset operation instruction, and then the door is opened. If the matching is determined to be failed, an alarm is sent to a mobile phone of the target object to tell the target object that someone tries to open the door, after the target object receives the alarm, the mobile phone can be connected with a camera of the intelligent lock to capture an image of the object with the door currently opened, and if the image is found to be a familiar person, an instruction can be sent to the intelligent lock through a network to control the intelligent lock to open the door. If a stranger is found, the intelligent lock can be controlled to give an alarm (such as sound or alarm).
It should be noted that, in the alternative embodiment of the present application, the related data (such as the first voice information, the voiceprint, the operation instruction, etc.) needs to be licensed or agreed to by the target object when the above embodiment of the present application is applied to a specific product or technology, and the collection, use and processing of the related data need to comply with the relevant laws and regulations and standards of the relevant country and region. That is, in the embodiment of the present application, if data related to the subject is involved, the data needs to be obtained through the subject authorization consent and in accordance with the relevant laws and regulations and standards of the country and region.
The embodiment of the application also provides a control device of the intelligent lock. As shown in fig. 4, the control device 300 of the smart lock of the present embodiment includes an acquisition module 301, a determination module 302, and an operation execution module 303. The collection module 301 is configured to collect the first voice information through the voice collection module. A determining module 302, configured to determine whether the first voice information meets a preset condition; the preset condition comprises that the first voice information comprises a preset operation instruction, and the voiceprint corresponding to the first voice information is matched with the preset voiceprint. The operation execution module 303 is configured to execute an operation corresponding to the first voice information when it is determined that the first voice information meets a preset condition, where the preset condition includes that the first voice information includes a preset operation instruction, and a voiceprint corresponding to the first voice information is matched with a preset voiceprint.
Optionally, the control device is further configured to obtain second voice information corresponding to the configuration operation in response to the configuration operation for the voice control function; or, acquiring second voice information sent by the client bound with the intelligent lock; determining a preset voiceprint and a preset operation instruction according to the second voice information; and locally storing and/or uploading preset voiceprints and preset operation instructions to a server.
Optionally, obtaining second voice information corresponding to the configuration operation includes: guiding the target object to input voice information according to preset information, and denoising the voice information to obtain second voice information; or guiding the target object to adjust the input environment according to the preset information, and acquiring the second voice information input by the target object in the adjusted input environment.
Optionally, collecting the first voice information includes: detecting a preset area through an induction module, and if the preset area is determined to have a target object, calling a voice acquisition module to acquire first voice information corresponding to the target object, wherein the induction module comprises at least one of a camera, an infrared sensor and a radar; and analyzing the first voice information through a voice analysis module to obtain the target voiceprint and the target operation instruction.
Optionally, the method further comprises: if the target voiceprint fails to match with the preset voiceprint and/or the target operation instruction fails to match with the preset operation instruction, warning information is sent to a client bound with the intelligent lock; and carrying out image acquisition according to the received image acquisition instruction so as to process through the acquired image, wherein the processing comprises any one of door opening and alarming, and the acquired image is an image of a target object acquired according to the image acquisition instruction.
Optionally, executing the operation corresponding to the first voice information includes: and collecting voiceprint information in a time period corresponding to the operation, comparing the voiceprint information with voiceprints in a preset voiceprint library, and processing according to a matching result, wherein the processing mode comprises reminding at least one of a preset object and an alarm through a cloud.
Optionally, the method further comprises: if the first voice information is determined to meet the preset condition, acquiring the biological identification information corresponding to the first voice information, and comparing the biological identification information with the preset biological identification information, wherein the biological identification information comprises at least one of an image, a fingerprint, a height and a palmprint of a target object corresponding to the first voice information; and if the biological identification information is determined to be matched with the preset biological identification information according to the comparison result, executing the operation corresponding to the first voice information.
The embodiment of the application provides electronic equipment, which comprises a memory, a processor and a computer program stored on the memory, wherein the processor executes the computer program to realize the steps of a control method of an intelligent lock.
In an alternative embodiment, there is provided an electronic device, as shown in fig. 5, the electronic device 4000 shown in fig. 5 includes: a processor 4001 and a memory 4003. Wherein the processor 4001 is coupled to the memory 4003, such as via a bus 4002. Optionally, the electronic device 4000 may further comprise a transceiver 4004, the transceiver 4004 may be used for data interaction between the electronic device and other electronic devices, such as transmission of data and/or reception of data, etc. It should be noted that, in practical applications, the transceiver 4004 is not limited to one, and the structure of the electronic device 4000 is not limited to the embodiment of the present application.
The processor 4001 may be a CPU (Central Processing Unit ), general purpose processor, DSP (Digital Signal Processor, data signal processor), ASIC (Application Specific Integrated Circuit ), FPGA (Field Programmable Gate Array, field programmable gate array) or other programmable logic device, transistor logic device, hardware components, or any combination thereof. Which may implement or perform the various exemplary logic blocks, modules and circuits described in connection with this disclosure. The processor 4001 may also be a combination that implements computing functionality, e.g., comprising one or more microprocessor combinations, a combination of a DSP and a microprocessor, etc.
Bus 4002 may include a path to transfer information between the aforementioned components. Bus 4002 may be a PCI (Peripheral Component Interconnect, peripheral component interconnect standard) bus or an EISA (Extended Industry Standard Architecture ) bus, or the like. The bus 4002 can be divided into an address bus, a data bus, a control bus, and the like. For ease of illustration, only one thick line is shown in fig. 5, but not only one bus or one type of bus.
Memory 4003 may be, but is not limited to, ROM (Read Only Memory) or other type of static storage device that can store static information and instructions, RAM (Random Access Memory ) or other type of dynamic storage device that can store information and instructions, EEPROM (Electrically Erasable Programmable Read Only Memory ), CD-ROM (Compact Disc Read Only Memory, compact disc Read Only Memory) or other optical disk storage, optical disk storage (including compact discs, laser discs, optical discs, digital versatile discs, blu-ray discs, etc.), magnetic disk storage media, other magnetic storage devices, or any other medium that can be used to carry or store a computer program and that can be Read by a computer.
The memory 4003 is used for storing a computer program for executing an embodiment of the present application, and is controlled to be executed by the processor 4001. The processor 4001 is configured to execute a computer program stored in the memory 4003 to realize the steps shown in the foregoing method embodiment.
The electronic device may be any electronic product that can perform man-machine interaction with an object, for example, a personal computer, a tablet computer, a smart phone, a personal digital assistant (Personal Digital Assistant, PDA), a game console, an interactive internet protocol television (Internet Protocol Television, IPTV), a smart wearable device, and the like.
The electronic device may also include a network device and/or an object device. Wherein the network device includes, but is not limited to, a single network server, a server group made up of multiple network servers, or a cloud based on cloud computing (CloudComputing) made up of a large number of hosts or network servers.
The network in which the electronic device is located includes, but is not limited to, the internet, a wide area network, a metropolitan area network, a local area network, a virtual private network (Virtual Private Network, VPN), and the like.
Embodiments of the present application provide a computer readable storage medium having a computer program stored thereon, which when executed by a processor, implements the steps of the foregoing method embodiments and corresponding content.
The terms "first," "second," "third," "fourth," "1," "2," and the like in the description and in the claims and in the above figures, if any, are used for distinguishing between similar objects and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used may be interchanged where appropriate, such that the embodiments of the application described herein may be implemented in other sequences than those illustrated or otherwise described.
It should be understood that, although various operation steps are indicated by arrows in the flowcharts of the embodiments of the present application, the order in which these steps are implemented is not limited to the order indicated by the arrows. In some implementations of embodiments of the application, the implementation steps in the flowcharts may be performed in other orders as desired, unless explicitly stated herein. Furthermore, some or all of the steps in the flowcharts may include multiple sub-steps or multiple stages based on the actual implementation scenario. Some or all of these sub-steps or phases may be performed at the same time, or each of these sub-steps or phases may be performed at different times, respectively. In the case of different execution time, the execution sequence of the sub-steps or stages can be flexibly configured according to the requirement, which is not limited by the embodiment of the present application.
The foregoing is merely an optional implementation manner of some of the implementation scenarios of the present application, and it should be noted that, for those skilled in the art, other similar implementation manners based on the technical ideas of the present application are adopted without departing from the technical ideas of the scheme of the present application, and the implementation manner is also within the protection scope of the embodiments of the present application.

Claims (10)

1. The control method of the intelligent lock is characterized by comprising the following steps:
collecting first voice information and judging whether preset conditions are met or not;
and if the first voice information is determined to meet the preset condition, executing the operation corresponding to the first voice information, wherein the preset condition comprises that the first voice information comprises a preset operation instruction, and the voiceprint corresponding to the first voice information is matched with the preset voiceprint.
2. The method according to claim 1, wherein the method further comprises:
responding to configuration operation for a voice control function, and acquiring second voice information corresponding to the configuration operation; or, acquiring second voice information sent by the client bound with the intelligent lock;
determining a preset voiceprint and a preset operation instruction according to the second voice information;
and locally storing and/or uploading the preset voiceprint and the preset operation instruction to a server.
3. The method of claim 2, wherein the obtaining the second voice information corresponding to the configuration operation comprises:
guiding a target object to input voice information according to preset information, and denoising the voice information to obtain second voice information;
or (b)
And guiding the target object to adjust the input environment according to preset information, and acquiring second voice information input by the target object in the adjusted input environment.
4. The method of claim 1, wherein the collecting the first voice information comprises:
detecting a preset area through an induction module, and if the preset area is determined to have a target object, calling a voice acquisition module to acquire first voice information corresponding to the target object, wherein the induction module comprises at least one of a camera, an infrared sensor and a radar;
and analyzing the first voice information through a voice analysis module to obtain a target voiceprint and a target operation instruction.
5. The method according to claim 4, wherein the method further comprises:
if the target voiceprint fails to match with the preset voiceprint and/or the target operation instruction fails to match with the preset operation instruction, warning information is sent to a client bound with the intelligent lock;
and carrying out image acquisition according to the received image acquisition instruction so as to process through the acquired image, wherein the processing comprises at least one of door opening, operation interface displaying, video recording, sound recording and alarming.
6. The method of claim 1, wherein the performing the operation corresponding to the first voice information comprises:
and collecting voiceprint information in a time period corresponding to the operation, comparing the voiceprint information with voiceprints in a preset voiceprint library, and processing according to a matching result, wherein the processing mode comprises reminding at least one of a preset object and an alarm through a cloud.
7. The method according to claim 1, wherein the method further comprises:
if the first voice information is determined to meet the preset condition, acquiring the biological identification information corresponding to the first voice information, and comparing the biological identification information with the preset biological identification information, wherein the biological identification information comprises at least one of an image, a fingerprint, a height and a palmprint of a target object corresponding to the first voice information;
and if the biological identification information is determined to be matched with the preset biological identification information according to the comparison result, executing the operation corresponding to the first voice information.
8. A control device for an intelligent lock, the device comprising:
the acquisition module is used for acquiring the first voice information;
the judging module is used for judging whether the first voice information meets the preset condition or not; the preset conditions comprise that the first voice information comprises a preset operation instruction, and voiceprints corresponding to the first voice information are matched with preset voiceprints;
and the operation execution module is used for executing the operation corresponding to the first voice information when the first voice information is determined to meet the preset condition.
9. A smart lock comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor implements the method of any of claims 1-7 when the program is executed by the processor.
10. A computer readable storage medium, on which a computer program is stored, characterized in that the computer program, when being executed by a processor, implements the steps of the method according to any of claims 1-7.
CN202310659886.XA 2023-06-05 2023-06-05 Control method and device of intelligent lock, intelligent lock and storage medium Pending CN116631102A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310659886.XA CN116631102A (en) 2023-06-05 2023-06-05 Control method and device of intelligent lock, intelligent lock and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310659886.XA CN116631102A (en) 2023-06-05 2023-06-05 Control method and device of intelligent lock, intelligent lock and storage medium

Publications (1)

Publication Number Publication Date
CN116631102A true CN116631102A (en) 2023-08-22

Family

ID=87616941

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310659886.XA Pending CN116631102A (en) 2023-06-05 2023-06-05 Control method and device of intelligent lock, intelligent lock and storage medium

Country Status (1)

Country Link
CN (1) CN116631102A (en)

Similar Documents

Publication Publication Date Title
CN105678872B (en) A kind of access control system and its authorization method and access control terminal equipment
KR102350507B1 (en) Access control method, access control device, system and storage medium
CN104796857B (en) Location-based security system for portable electronic device
CN105975182B (en) A kind of terminal operation method and terminal
CN104850827B (en) Fingerprint identification method and device
CN107578519A (en) A kind of intelligent access control system and intelligent entrance guard method for unlocking
JP2020520511A (en) Access control method and apparatus, system, electronic device, program and medium
KR102237086B1 (en) Apparatus and method for controlling a lobby phone that enables video surveillance through a communication terminal that can use a 5G mobile communication network based on facial recognition technology
US11496471B2 (en) Mobile enrollment using a known biometric
CN106778179A (en) A kind of identity identifying method based on the identification of ultrasonic wave lip reading
CN106557755A (en) Fingerprint template acquisition methods and device
CN111291087A (en) Information pushing method and device based on face detection
US11050827B1 (en) Method and device for identifying suspicious object movements based on historical received signal strength indication information associated with internet-of-things devices
TW201931186A (en) Identity recognition method, apparatus and system
CN112183167B (en) Attendance checking method, authentication method, living body detection method, device and equipment
US20170249495A1 (en) Methods, devices, and computer-readable mediums for verifying a fingerprint
CN116631102A (en) Control method and device of intelligent lock, intelligent lock and storage medium
CN107133550A (en) Fingerprint authentication method and device
CN111339829B (en) User identity authentication method, device, computer equipment and storage medium
CN110675880B (en) Identity verification method and device and electronic equipment
WO2016058540A1 (en) Identity authentication method and apparatus and storage medium
CN113345137A (en) Control method of intelligent door lock, intelligent door lock and storage medium
JP5524250B2 (en) Abnormal behavior detection device, monitoring system, abnormal behavior detection method and program
CN107403080B (en) Method for hiding/displaying application program and terminal equipment
CN107577165B (en) Control method of multiple intelligent devices and control device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination