CN117115947A - Door lock control method and related device - Google Patents

Door lock control method and related device Download PDF

Info

Publication number
CN117115947A
CN117115947A CN202311114129.0A CN202311114129A CN117115947A CN 117115947 A CN117115947 A CN 117115947A CN 202311114129 A CN202311114129 A CN 202311114129A CN 117115947 A CN117115947 A CN 117115947A
Authority
CN
China
Prior art keywords
door lock
target object
detection area
risk
controlling
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311114129.0A
Other languages
Chinese (zh)
Inventor
李秦禾子
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Bank of China Ltd
Original Assignee
Bank of China Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Bank of China Ltd filed Critical Bank of China Ltd
Priority to CN202311114129.0A priority Critical patent/CN117115947A/en
Publication of CN117115947A publication Critical patent/CN117115947A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00563Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys using personal physical data of the operator, e.g. finger prints, retinal images, voicepatterns

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The application discloses a door lock control method and a related device, which can be applied to the financial field or other fields, wherein the method comprises the following steps: responding to an access request of a target object for a detection area, collecting and verifying object authority information of the target object, and controlling a door lock to be opened if the object authority information passes verification; responding to the condition that a target object enters a detection area, controlling a door lock to be in a closed state, collecting behavior information of the target object in the detection area in real time, and performing risk assessment on the behavior information to obtain a corresponding risk assessment index; when the risk assessment index is larger than the risk threshold value, controlling the door lock to be in a locking state; and when the risk assessment index is not greater than the risk threshold value, controlling the door lock to be in a closed state. The application can improve the protection safety of the detection area.

Description

Door lock control method and related device
Technical Field
The application relates to the field of data processing, in particular to a door lock control method and a related device.
Background
With the continuous development of financial business and computer technology, banks are also developing faster and faster, and more financial transactions are involved in banks. For banking institutions, vaults for storing valuable articles such as cash, securities, important certificates, gold and silver are an important central link of cash supply chains and play an important role in financial transactions, so that the demands of the banking institutions for door lock safety protection of the vaults are gradually increased.
In the related art, the user information corresponding to the user entering the vault is identified and checked by installing the camera on the vault door lock, and when the user information is checked, the door lock is controlled to be opened to allow the user to enter the vault, however, the door lock control mode is difficult to identify the activity information of the user in the vault, so that the activity information of the user in the vault cannot be responded in time, a certain risk exists, and the vault protection safety is low.
Disclosure of Invention
Therefore, the embodiment of the application provides a door lock control method, which can improve the protection safety in a detection area.
The first aspect of the application provides a door lock control method, which comprises the following steps:
responding to an access request of a target object for a detection area, collecting and verifying object authority information of the target object, and controlling a door lock to be opened if the object authority information passes verification;
responding to the target object entering the detection area, controlling the door lock to be in a closed state, collecting behavior information of the target object in the detection area in real time, and performing risk assessment on the behavior information to obtain a corresponding risk assessment index;
when the risk assessment index is larger than a risk threshold value, controlling the door lock to be in a locking state;
and controlling the door lock to be in a closed state when the risk assessment index is not greater than the risk threshold value.
Optionally, in response to the target object entering the detection area, controlling the door lock to be in a closed state, collecting behavior information of the target object in the detection area in real time, and performing risk assessment on the behavior information, where obtaining a corresponding risk assessment index includes:
controlling the door lock to be in a closed state in response to the target object entering the detection area, identifying an operation object of the target object and an operation behavior aiming at the operation object according to a video picture acquired in real time in the detection area, and extracting a moving track of the target object in the detection area;
performing similarity matching on the activity track and track evaluation rules in a preset rule base, and accumulating risk coefficients corresponding to the track evaluation rules larger than a first similarity threshold value to obtain a first risk coefficient corresponding to the activity track;
performing similarity matching on the operation behaviors and behavior evaluation rules in the preset rule base, and accumulating risk coefficients corresponding to the behavior evaluation rules larger than a second similarity threshold value to obtain second risk coefficients corresponding to the operation behaviors;
the risk assessment index is obtained based on the first risk coefficient and the second risk coefficient.
Optionally, the method further comprises:
when the door lock is in the locking state, responding to the complaint request of the target object, performing secondary evaluation on the behavior information to obtain a secondary evaluation result;
if the secondary evaluation result is that the verification is passed, controlling the door lock to be switched from the locking state to the closing state; otherwise, the door lock is controlled to maintain the locking state.
Optionally, the method further comprises:
when the door lock is in the closed state, responding to a request for leaving a warehouse of a target object, and collecting and verifying the object authority information;
if the verification of the object authority information is passed, controlling the door lock to be opened; and if the verification of the object authority information is not passed, switching the door lock to a locking state.
Optionally, the object rights information includes: identity identification information and authority valid time; and when the authentication of the identity identification information is passed and the authentication time corresponding to the object authority information is within the authority effective time, the authentication of the object authority information is passed.
A second aspect of the present application provides a door lock control apparatus, the apparatus comprising:
an authentication unit configured to: responding to an access request of a target object for a detection area, collecting and verifying object authority information of the target object, and controlling a door lock to be opened if the object authority information passes verification;
a risk assessment unit for: responding to the target object entering the detection area, controlling the door lock to be in a closed state, collecting behavior information of the target object in the detection area in real time, and performing risk assessment on the behavior information to obtain a corresponding risk assessment index;
a control unit for: when the risk assessment index is larger than a risk threshold value, controlling the door lock to be in a locking state;
the control unit is further configured to: and controlling the door lock to be in a closed state when the risk assessment index is not greater than the risk threshold value.
Optionally, the risk assessment unit is specifically configured to:
controlling the door lock to be in a closed state in response to the target object entering the detection area, identifying an operation object of the target object and an operation behavior aiming at the operation object according to a video picture acquired in real time in the detection area, and extracting a moving track of the target object in the detection area;
performing similarity matching on the activity track and track evaluation rules in a preset rule base, and accumulating risk coefficients corresponding to the track evaluation rules larger than a first similarity threshold value to obtain a first risk coefficient corresponding to the activity track;
performing similarity matching on the operation behaviors and behavior evaluation rules in the preset rule base, and accumulating risk coefficients corresponding to the behavior evaluation rules larger than a second similarity threshold value to obtain second risk coefficients corresponding to the operation behaviors;
the risk assessment index is obtained based on the first risk coefficient and the second risk coefficient.
Optionally, the control unit is further configured to:
when the door lock is in the locking state, responding to the complaint request of the target object, performing secondary evaluation on the behavior information to obtain a secondary evaluation result;
if the secondary evaluation result is that the verification is passed, controlling the door lock to be switched from the locking state to the closing state; otherwise, the door lock is controlled to maintain the locking state.
A third aspect of the present application provides a door lock control apparatus, the apparatus comprising: a memory and a processor;
the memory is used for storing instructions;
the processor is configured to execute the instruction in the memory, and perform the door lock control method according to any one of the above.
A fourth aspect of the present application provides a computer readable storage medium storing program code or instructions which, when run on a computer, cause the computer to perform the door lock control method of any one of the above.
From the above technical scheme, the application has the following advantages: acquiring and verifying object authority information of a target object by responding to an access request of the target object for a detection area, and controlling a door lock to be opened if the object authority information passes verification; responding to the condition that a target object enters a detection area, controlling a door lock to be in a closed state, collecting behavior information of the target object in the detection area in real time, and performing risk assessment on the behavior information to obtain a corresponding risk assessment index; when the risk assessment index is larger than the risk threshold value, controlling the door lock to be in a locking state; and when the risk assessment index is not greater than the risk threshold value, controlling the door lock to be in a closed state. And when the object authority information of the target object is verified, performing risk assessment on the behavior information of the target object in the detection area, and controlling the door lock state based on the object authority information and the behavior information, so that the door lock state can respond according to the behavior of a user in the detection area, the protection risk of the detection area is reduced, and the protection safety of the detection area is improved.
Drawings
Fig. 1 is a method flowchart of a door lock control method according to an embodiment of the present application;
fig. 2 is a schematic structural diagram of a door lock control device according to an embodiment of the present application.
Detailed Description
Embodiments of the present application will be described in more detail below with reference to the accompanying drawings. While the application is susceptible of embodiment in the drawings, it is to be understood that the application may be embodied in various forms and should not be construed as limited to the embodiments set forth herein, but rather are provided to provide a more thorough and complete understanding of the application. It should be understood that the drawings and embodiments of the application are for illustration purposes only and are not intended to limit the scope of the present application.
In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present application, but the present application may be practiced in other ways other than those described herein, and persons skilled in the art will readily appreciate that the present application is not limited to the specific embodiments disclosed below.
It should be noted that the door lock control method and the related device provided by the application can be used in the financial field or other fields, for example, can be used in a bank vault door lock control scene in the financial field. Other fields are any field other than the financial field, for example, the data processing field. The foregoing is merely exemplary, and the application fields of the door lock control method and the related device provided by the present application are not limited.
With the continuous development of financial business and computer technology, banks are also developing faster and faster, and more financial transactions are involved in banks. For banking institutions, vaults for storing valuable articles such as cash, securities, important certificates, gold and silver are an important central link of cash supply chains and play an important role in financial transactions, so that the demands of the banking institutions for door lock safety protection of the vaults are gradually increased.
In the related art, the user information corresponding to the user entering the vault is identified and checked by installing the camera on the vault door lock, and when the user information is checked, the door lock is controlled to be opened to allow the user to enter the vault, however, the door lock control mode is difficult to identify the activity information of the user in the vault, so that the activity information of the user in the vault cannot be responded in time, and the protection safety of the door lock control method is lower and has a certain risk for the detection area in the vault.
Based on the above, the application provides a door lock control method, which is used for responding to an access request of a target object for a detection area, collecting and verifying the object authority information of the target object, and controlling the door lock to be opened if the object authority information is verified; responding to the condition that a target object enters a detection area, controlling a door lock to be in a closed state, collecting behavior information of the target object in the detection area in real time, and performing risk assessment on the behavior information to obtain a corresponding risk assessment index; when the risk assessment index is larger than the risk threshold value, controlling the door lock to be in a locking state; and when the risk assessment index is not greater than the risk threshold value, controlling the door lock to be in a closed state. And when the object authority information of the target object is verified, performing risk assessment on the behavior information of the target object in the detection area, and controlling the door lock state based on the object authority information and the behavior information, so that the door lock state can respond according to the behavior of a user in the detection area, the protection risk of the detection area is reduced, and the protection safety of the detection area is improved.
It should be understood that when the detection area is a bank vault, the embodiment of the application verifies the object authority information before the target object enters the bank vault, and after the target object enters the bank vault, the activity of the target object in the vault is identified by collecting the behavior information of the target object in the bank vault, and the door lock state is controlled by the risk assessment index obtained by carrying out risk assessment on the behavior information, so that the timely response to the activity of the target object in the vault is realized, and the protection safety of the bank vault is improved.
Referring to fig. 1, fig. 1 is a flowchart of a method for controlling a door lock according to an embodiment of the present application, where the method specifically includes the following steps:
step 101: and responding to an access request of a target object for a detection area, collecting and verifying the object authority information of the target object, and controlling the door lock to be opened if the object authority information passes the verification.
In the embodiment of the present application, the access request of the target object to the detection area may be triggered in various manners, for example, the target object actively sends the access request to the door lock corresponding to the detection area, or when the target object appears in the identification area of the door lock of the detection area, the door lock automatically collects the object permission information corresponding to the target object, and automatically triggers the access request of the target object to the detection area, or of course, may trigger the access request of the target object to the detection area in other manners, which is not limited in particular in the embodiment of the present application.
When the target object triggers an access request aiming at the detection area, acquiring object authority information of the target object, wherein the object authority information is used for identifying whether the target object has authority to enter the detection area or not, verifying the object authority information, and if the verification is passed, the target object is considered to have the authority to enter the detection area, and at the moment, the door lock is controlled to be opened, so that the target object can enter the detection area.
It should be noted that, the detection area in the embodiment of the present application may be a bank vault, and after the door lock disposed in the bank vault receives the access request of the target object, it is determined whether the target object has the right to enter the bank vault by collecting and verifying the object right information of the target object.
Specifically, the object permission information may be generated based on an access request initiated by a target object for a detection area, for example, if the target object is a bank employee and the detection area is a bank vault, when the target object needs to enter the bank vault, the access request is initiated to the bank vault first, and after the access request is approved, the object permission information of the target object is generated based on the identity information and the access request of the target object, and the object permission information is stored in the database as valid permission information. Triggering a door lock deployed on the bank vault when a target object arrives at the bank vault door, responding to an access request of the target object for the bank vault, acquiring object authority information of the target object which is currently triggered to access the request through a camera, an infrared detector and other devices deployed on the current door lock, comparing the object authority information with effective authority information stored in a database, and verifying whether the object authority information is consistent with the effective authority information, if so, allowing the target object to enter the bank vault; otherwise, the target object cannot be allowed to enter the bank vault without passing the verification.
In one possible implementation, the object rights information includes: identity identification information and authority valid time; and when the authentication of the identity identification information is passed and the authentication time corresponding to the object authority information is within the authority effective time, the authentication of the object authority information is passed.
The identity recognition information can be one or more of biological recognition information such as face information, fingerprint information, iris information and the like, and the identity of the user is determined through the identity recognition information; the rights validity time is a time period in which the target user has access rights to the detection area, which is stored in the object rights information, and the verification time is a time point corresponding to which the door lock verifies the object rights information in response to the access request. For example, in the object authority information of the target object, the saved authority effective time is 8 to 9 in the morning, when the target object responds to the access request at 8 in the morning by half triggering the door lock, the target object has the access authority of the detection area according to the authority effective time, and the object authority information passes the verification; however, when the target object responds to the access request by the 9 th half-triggered door lock in the morning, the target object does not have the access right of the detection area, and then the object right information cannot pass verification.
And respectively verifying the identity and the authority effective time of the target object through the object authority information, and verifying the object authority information when the identity and the authority effective time pass through the verification, thereby improving the accuracy of verifying the authority of the target object.
Step 102: and responding to the target object entering the detection area, controlling the door lock to be in a closed state, collecting behavior information of the target object in the detection area in real time, and performing risk assessment on the behavior information to obtain a corresponding risk assessment index.
When the door lock is opened, after the target object enters the detection area, the door lock is controlled to be in a closed state, and the door lock is closed again, so that the protection safety in the detection area is ensured. And acquiring behavior information of the target object in real time in the detection area, such as behaviors of taking, placing, opening, closing and the like, integrating the behaviors to form behavior information, performing risk assessment on the behavior information to obtain a corresponding risk assessment index, determining whether the behavior information of the current target user has an influence on the safety of the detection area through the risk assessment index, and judging whether the target object has an influence on articles stored in the bank vault through detecting the behavior information of the target object in the bank vault when the detection area is the bank vault so as to avoid loss.
In one possible implementation, step 102 may be implemented as follows:
step 11: and responding to the target object entering the detection area, controlling the door lock to be in a closed state, identifying an operation object of the target object and an operation behavior aiming at the operation object according to a video picture acquired in real time in the detection area, and extracting a moving track of the target object in the detection area.
The image acquisition is performed in real time in a video recording mode in the detection area through the camera arranged in the detection area or the inner side of the door lock, and the operation object of the target object in the detection area and the operation behavior aiming at the operation object are identified from the video image acquired in real time, for example, when the detection area is a bank vault, the operation object of the target object in the bank vault can be facilities such as cash boxes and storage cabinets, and the corresponding operation behavior can be picking up, putting down, opening and closing.
Further, the object permission information may further include information related to an operation object, for example, when the detection area is a bank vault, if the operation object in the object permission information is a cash box, but in a video image collected in real time, the operation object actually processed by the target object is a locker, then through the video image, the behavior of the target object may be considered to have a greater risk, and when the risk exceeds a certain threshold, the door lock is controlled to be in a locked state, so as to ensure property safety in the bank vault.
Meanwhile, based on the video pictures acquired in real time in the detection area, the moving track of the target object in the detection area can be extracted. Taking a detection area as an example of a bank vault, after a target object enters the bank vault, acquiring video pictures acquired in real time, numbering each video picture, calculating repeated values of the video pictures at different angles, reserving one frame in the video pictures at the same time and at multiple angles through the repeated value calculation, and splicing the video frames corresponding to each time according to a time sequence to obtain the moving track of the target object in the bank vault.
Step 12: and performing similarity matching on the moving track and track evaluation rules in a preset rule base, and accumulating risk coefficients corresponding to the track evaluation rules larger than a first similarity threshold value to obtain a first risk coefficient corresponding to the moving track.
When risk assessment is carried out on the behavior information of the target object, a preset rule base is used, and the preset rule base comprises track assessment rules and behavior assessment rules. The track evaluation rule is generated based on historical data, and records various historical activity tracks which occur in a detection area and risk coefficients corresponding to the historical activity tracks. Performing similarity matching on the moving track of the target object in the detection area and a track evaluation rule, and when the similarity between the moving track and the historical moving track recorded in the track evaluation rule is greater than a first similarity threshold, considering that the track evaluation rule is successfully matched; accumulating risk coefficients corresponding to all successfully matched track evaluation rules in a preset rule base, and finally obtaining a first risk coefficient corresponding to the moving track of the target object in the detection area.
Step 13: and performing similarity matching on the operation behaviors and behavior evaluation rules in the preset rule base, and accumulating risk coefficients corresponding to the behavior evaluation rules larger than a second similarity threshold value to obtain second risk coefficients corresponding to the operation behaviors.
The behavior evaluation rules in the preset rule base can also be generated based on historical data, wherein the historical operation behaviors which occur in the detection area and the risk coefficients corresponding to the historical operation behaviors are recorded. Performing similarity matching on the operation behaviors of the target object in the detection area and the behavior evaluation rules, and when the similarity of the operation behaviors and the historical operation behaviors recorded in the behavior evaluation rules is greater than a second similarity threshold, considering that the behavior evaluation rules are successfully matched; and accumulating risk coefficients corresponding to all the behavior evaluation rules successfully matched in the preset rule base, and finally obtaining a second risk coefficient corresponding to the operation behavior of the target object in the detection area.
Further, in order to update the preset rule base, a third similarity threshold may be further set, where the third similarity threshold is smaller than the second similarity threshold. When the similarity between the operation behavior and the behavior evaluation rule is greater than a third similarity threshold but less than or equal to a second similarity threshold, a plurality of video frames adjacent to the video frame can be intercepted according to the video frame corresponding to the operation behavior, the operation behavior is expanded by extracting the action of the target object from the plurality of video frames, the similarity matching is performed again based on the expanded operation behavior, and if the matching is successful, a new behavior evaluation rule is generated based on the operation behavior before expansion.
It should be noted that, the first similarity threshold and the second similarity threshold may be set according to actual needs, and may be the same or different, which is not specifically limited in the embodiment of the present application.
Step 14: the risk assessment index is obtained based on the first risk coefficient and the second risk coefficient.
In the embodiment of the application, the behavior information of the target object may specifically include an activity track and an operation behavior. Based on the first risk coefficient corresponding to the moving track of the target object in the detection area and the second risk coefficient corresponding to the operation behavior of the target object in the detection area, a risk assessment index corresponding to the behavior information of the target object in the detection area can be obtained, whether the behavior information has a large risk or not is assessed according to the risk assessment index, and then the state of the door lock is controlled according to the risk assessment result.
It should be noted that, in the embodiment of the present application, in addition to the numerical parameter, such as the risk coefficient, a grading parameter, such as the risk level, may be used to describe risk degrees corresponding to different activity tracks or different operation behaviors, which is not specifically limited in the embodiment of the present application.
By detecting the operation object, the operation behavior and the activity track of the target object in the detection area, the risk possibly existing in the behavior information of the target object in the detection area is estimated, and the final corresponding risk assessment index is obtained, so that the accuracy of risk assessment in the detection area is improved.
Step 103: and when the risk assessment index is larger than a risk threshold value, controlling the door lock to be in a locking state.
If the obtained risk assessment index is larger than the preset risk threshold according to the behavior information of the target object in the detection area, the behavior of the target object in the detection area is considered to have larger risk, and the safety of the detection area is possibly influenced greatly, so that the door lock is controlled to be in a locking state, and in the locking state, the door lock cannot be opened in response to a request of leaving a warehouse of the target object on the inner side of the door, and cannot be opened in response to a request of accessing other objects on the outer side of the door.
In the locking state, when the target object wants to leave the detection area, a complaint request can be submitted, and the door lock responds to the complaint request to carry out secondary evaluation on the behavior information of the target object in the detection area, so as to obtain a corresponding secondary evaluation result; if the secondary evaluation result is that verification passes, controlling the door lock to be switched from a locking state to a closing state, wherein in the closing state, the target object can unlock the door lock based on the verification object authority information of the ex-warehouse request; otherwise, when the secondary evaluation result is not verified yet, the door lock is controlled to be in a locking state.
When the behavior information of the target object is subjected to secondary evaluation, expanding the video frames corresponding to the behavior with larger current risks, intercepting a certain number of video frames forwards and backwards respectively, re-extracting the behavior from the expanded video frame sequence to perform risk evaluation, and if the risk evaluation index is still larger than a risk threshold value in the finally obtained secondary evaluation result, considering that the behavior information of the target object has larger risks, and if the secondary evaluation result is not verified, controlling the door lock to keep a locking state; and if the risk evaluation index is smaller than or equal to the risk threshold in the secondary evaluation result, the secondary evaluation result is verified to pass, and the door lock is controlled to be switched to the closed state.
Step 104: and controlling the door lock to be in a closed state when the risk assessment index is not greater than the risk threshold value.
If the obtained risk assessment index is not greater than the preset risk threshold according to the behavior information of the target object in the detection area, the behavior of the target object in the detection area is considered to be free of larger risk, and the door lock is controlled to be in a closed state.
When the door lock is in a closed state, a request for the target object to be delivered can be responded, the object authority information corresponding to the target object to be delivered currently is collected based on the request for the delivery, the object authority information is verified, if the verification is passed, the door lock is controlled to be opened, and the target object can normally leave the detection area after the door lock is opened; if the verification is not passed, the door lock is switched to a locking state so as to ensure the protection safety in the detection area.
According to the embodiment of the application, the access request of the target object to the detection area is responded, the object authority information of the target object is collected and verified, and if the verification of the object authority information is passed, the door lock is controlled to be opened; responding to the condition that a target object enters a detection area, controlling a door lock to be in a closed state, collecting behavior information of the target object in the detection area in real time, and performing risk assessment on the behavior information to obtain a corresponding risk assessment index; when the risk assessment index is larger than the risk threshold value, controlling the door lock to be in a locking state; and when the risk assessment index is not greater than the risk threshold value, controlling the door lock to be in a closed state. And when the object authority information of the target object is verified, performing risk assessment on the behavior information of the target object in the detection area, and controlling the door lock state based on the object authority information and the behavior information, so that the door lock state can respond according to the behavior of a user in the detection area, the protection risk of the detection area is reduced, and the protection safety of the detection area is improved.
Although operations are depicted in a particular order, this should not be understood as requiring that such operations be performed in the particular order shown or in sequential order. In certain circumstances, multitasking and parallel processing may be advantageous.
It should be understood that the various steps recited in the method embodiments of the present application may be performed in a different order and/or performed in parallel. Furthermore, method embodiments may include additional steps and/or omit performing the illustrated steps. The scope of the application is not limited in this respect.
Referring to fig. 2, fig. 2 is a schematic structural diagram of a door lock control device according to an embodiment of the present application, where the device includes:
an authentication unit 201 for: responding to an access request of a target object for a detection area, collecting and verifying object authority information of the target object, and controlling a door lock to be opened if the object authority information passes verification;
a risk assessment unit 202 for: responding to the target object entering the detection area, controlling the door lock to be in a closed state, collecting behavior information of the target object in the detection area in real time, and performing risk assessment on the behavior information to obtain a corresponding risk assessment index;
a control unit 203 for: when the risk assessment index is larger than a risk threshold value, controlling the door lock to be in a locking state;
the control unit 203 is further configured to: and controlling the door lock to be in a closed state when the risk assessment index is not greater than the risk threshold value.
In one possible implementation, the risk assessment unit 202 is specifically configured to:
controlling the door lock to be in a closed state in response to the target object entering the detection area, identifying an operation object of the target object and an operation behavior aiming at the operation object according to a video picture acquired in real time in the detection area, and extracting a moving track of the target object in the detection area;
performing similarity matching on the activity track and track evaluation rules in a preset rule base, and accumulating risk coefficients corresponding to the track evaluation rules larger than a first similarity threshold value to obtain a first risk coefficient corresponding to the activity track;
performing similarity matching on the operation behaviors and behavior evaluation rules in the preset rule base, and accumulating risk coefficients corresponding to the behavior evaluation rules larger than a second similarity threshold value to obtain second risk coefficients corresponding to the operation behaviors;
the risk assessment index is obtained based on the first risk coefficient and the second risk coefficient.
In a possible implementation, the control unit 203 is further configured to:
when the door lock is in the locking state, responding to the complaint request of the target object, performing secondary evaluation on the behavior information to obtain a secondary evaluation result;
if the secondary evaluation result is that the verification is passed, controlling the door lock to be switched from the locking state to the closing state; otherwise, the door lock is controlled to maintain the locking state.
In a possible implementation, the control unit 203 is further configured to:
when the door lock is in the closed state, responding to a request for leaving a warehouse of a target object, and collecting and verifying the object authority information;
if the verification of the object authority information is passed, controlling the door lock to be opened; and if the verification of the object authority information is not passed, switching the door lock to a locking state.
In one possible implementation, the object rights information includes: identity identification information and authority valid time; the verification unit 201 is specifically configured to:
and when the authentication of the identity identification information is passed and the authentication time corresponding to the object authority information is within the authority effective time, the authentication of the object authority information is passed.
The embodiment of the application provides door lock control equipment, which comprises the following components: a memory and a processor;
the memory is used for storing instructions;
the processor is configured to execute the instruction in the memory, and execute the door lock control method described above.
Embodiments of the present application provide a computer readable storage medium storing program code or instructions that, when run on a computer, cause the computer to perform the door lock control method described above.
The names of messages or information interacted between the devices in the embodiments of the present application are for illustrative purposes only and are not intended to limit the scope of such messages or information.
Computer program code for carrying out operations of the present application may be written in one or more programming languages, including, but not limited to, an object oriented programming language such as Java, smalltalk, C ++ and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external computer (for example, through the Internet using an Internet service provider).
It will be clear to those skilled in the art that, for convenience and brevity of description, specific working procedures of the above-described systems, apparatuses and units may refer to corresponding procedures in the foregoing method embodiments, which are not repeated herein.
In the several embodiments provided in the present application, it should be understood that the disclosed systems, devices, and methods may be implemented in other manners. For example, the apparatus embodiments described above are merely illustrative, e.g., the division of the units is merely a logical function division, and there may be additional divisions when actually implemented, e.g., multiple units or components may be combined or integrated into another system, or some features may be omitted or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be an indirect coupling or communication connection via some interfaces, devices or units, which may be in electrical, mechanical or other form.
The units described as separate units may or may not be physically separate, and units shown as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional unit in the embodiments of the present application may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit. The integrated units may be implemented in hardware or in software functional units.
The integrated units, if implemented in the form of software functional units and sold or used as stand-alone products, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application may be embodied essentially or in part or all of the technical solution or in part in the form of a software product stored in a storage medium, including instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to perform all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: a usb disk, a removable hard disk, a Read-Only Memory (ROM), a random access Memory (Random Access Memory, RAM), a magnetic disk, or an optical disk, or other various media in which a computer program can be stored.
The above embodiments are only for illustrating the technical solution of the present application, and not for limiting the same; although the application has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical scheme described in the foregoing embodiments can be modified or some technical features thereof can be replaced by equivalents; such modifications and substitutions do not depart from the spirit and scope of the technical solutions of the embodiments of the present application.

Claims (10)

1. A door lock control method, the method comprising:
responding to an access request of a target object for a detection area, collecting and verifying object authority information of the target object, and controlling a door lock to be opened if the object authority information passes verification;
responding to the target object entering the detection area, controlling the door lock to be in a closed state, collecting behavior information of the target object in the detection area in real time, and performing risk assessment on the behavior information to obtain a corresponding risk assessment index;
when the risk assessment index is larger than a risk threshold value, controlling the door lock to be in a locking state;
and controlling the door lock to be in a closed state when the risk assessment index is not greater than the risk threshold value.
2. The method of claim 1, wherein the controlling the door lock to be in a closed state in response to the target object entering the detection area, collecting behavior information of the target object in the detection area in real time, and performing risk assessment on the behavior information, and obtaining a corresponding risk assessment index includes:
controlling the door lock to be in a closed state in response to the target object entering the detection area, identifying an operation object of the target object and an operation behavior aiming at the operation object according to a video picture acquired in real time in the detection area, and extracting a moving track of the target object in the detection area;
performing similarity matching on the activity track and track evaluation rules in a preset rule base, and accumulating risk coefficients corresponding to the track evaluation rules larger than a first similarity threshold value to obtain a first risk coefficient corresponding to the activity track;
performing similarity matching on the operation behaviors and behavior evaluation rules in the preset rule base, and accumulating risk coefficients corresponding to the behavior evaluation rules larger than a second similarity threshold value to obtain second risk coefficients corresponding to the operation behaviors;
the risk assessment index is obtained based on the first risk coefficient and the second risk coefficient.
3. The method according to claim 1, wherein the method further comprises:
when the door lock is in the locking state, responding to the complaint request of the target object, performing secondary evaluation on the behavior information to obtain a secondary evaluation result;
if the secondary evaluation result is that the verification is passed, controlling the door lock to be switched from the locking state to the closing state; otherwise, the door lock is controlled to maintain the locking state.
4. The method according to claim 1, wherein the method further comprises:
when the door lock is in the closed state, responding to a request for leaving a warehouse of a target object, and collecting and verifying the object authority information;
if the verification of the object authority information is passed, controlling the door lock to be opened; and if the verification of the object authority information is not passed, switching the door lock to a locking state.
5. The method according to any one of claims 1 to 4, wherein the object rights information includes: identity identification information and authority valid time; and when the authentication of the identity identification information is passed and the authentication time corresponding to the object authority information is within the authority effective time, the authentication of the object authority information is passed.
6. A door lock control apparatus, characterized by comprising:
an authentication unit configured to: responding to an access request of a target object for a detection area, collecting and verifying object authority information of the target object, and controlling a door lock to be opened if the object authority information passes verification;
a risk assessment unit for: responding to the target object entering the detection area, controlling the door lock to be in a closed state, collecting behavior information of the target object in the detection area in real time, and performing risk assessment on the behavior information to obtain a corresponding risk assessment index;
a control unit for: when the risk assessment index is larger than a risk threshold value, controlling the door lock to be in a locking state;
the control unit is further configured to: and controlling the door lock to be in a closed state when the risk assessment index is not greater than the risk threshold value.
7. The apparatus of claim 6, wherein the risk assessment unit is specifically configured to:
controlling the door lock to be in a closed state in response to the target object entering the detection area, identifying an operation object of the target object and an operation behavior aiming at the operation object according to a video picture acquired in real time in the detection area, and extracting a moving track of the target object in the detection area;
performing similarity matching on the activity track and track evaluation rules in a preset rule base, and accumulating risk coefficients corresponding to the track evaluation rules larger than a first similarity threshold value to obtain a first risk coefficient corresponding to the activity track;
performing similarity matching on the operation behaviors and behavior evaluation rules in the preset rule base, and accumulating risk coefficients corresponding to the behavior evaluation rules larger than a second similarity threshold value to obtain second risk coefficients corresponding to the operation behaviors;
the risk assessment index is obtained based on the first risk coefficient and the second risk coefficient.
8. The apparatus of claim 6, wherein the control unit is further configured to:
when the door lock is in the locking state, responding to the complaint request of the target object, performing secondary evaluation on the behavior information to obtain a secondary evaluation result;
if the secondary evaluation result is that the verification is passed, controlling the door lock to be switched from the locking state to the closing state; otherwise, the door lock is controlled to maintain the locking state.
9. A door lock control apparatus, characterized in that the apparatus comprises: a memory and a processor;
the memory is used for storing instructions;
the processor being configured to execute the instructions in the memory and to perform the method of any of claims 1-5.
10. A computer readable storage medium, characterized in that the computer readable storage medium stores program code or instructions, which when run on a computer, cause the computer to perform the method of any of the preceding claims 1-5.
CN202311114129.0A 2023-08-31 2023-08-31 Door lock control method and related device Pending CN117115947A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311114129.0A CN117115947A (en) 2023-08-31 2023-08-31 Door lock control method and related device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311114129.0A CN117115947A (en) 2023-08-31 2023-08-31 Door lock control method and related device

Publications (1)

Publication Number Publication Date
CN117115947A true CN117115947A (en) 2023-11-24

Family

ID=88798068

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311114129.0A Pending CN117115947A (en) 2023-08-31 2023-08-31 Door lock control method and related device

Country Status (1)

Country Link
CN (1) CN117115947A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN118230453A (en) * 2024-05-22 2024-06-21 深圳市久通物联科技股份有限公司 Remote control method and device for container door lock

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN118230453A (en) * 2024-05-22 2024-06-21 深圳市久通物联科技股份有限公司 Remote control method and device for container door lock

Similar Documents

Publication Publication Date Title
CN101266704B (en) ATM secure authentication and pre-alarming method based on face recognition
WO2017107734A1 (en) Method and system for financial terminal security protection
CN110246074A (en) A kind of community security protection management system and method based on multidimensional acquisition
CN108922074A (en) Without card withdrawal method, apparatus, computer equipment and storage medium
CN101911137A (en) The combination of face recognition in cross channel authentication
US20150278812A1 (en) Biometric matching system using input biometric sample
JP2007316821A (en) Security monitoring device, security monitoring system, and security monitoring method
CN101556717A (en) ATM intelligent security system and monitoring method
CN109784231B (en) Security information management method, device and storage medium
CN117115947A (en) Door lock control method and related device
CN106097508B (en) A kind of access control system and method based on certificate or certificate two dimensional code
CN111462417A (en) Multi-information verification system and multi-information verification method for unmanned bank
US8749347B1 (en) Authorized custodian verification
CN105931327A (en) Access control monitoring method and system
US8502644B1 (en) Physical item security: tracking device activation
KR20220160996A (en) Face Authentication based Non-face-to-face Authentication and blacklist person identification system for Anti-Money Laundering and method of the same
JP5745790B2 (en) Entrance / exit management system
US11948365B2 (en) Frictionless authentication and monitoring
CN1492375A (en) Method for using finger print identification technology in bank teller management
CN107533790A (en) System and method for managing the identity information being stored in Cloud Server
Dirgantara et al. Design of Face Recognition Security System on Public Spaces
Jaiganesh et al. Anti Theft Control of Automatic Teller Machine Using Wireless Sensors
CN112669509A (en) Access control management method, system, electronic device and storage medium
CN112150733B (en) Bank card misoperation processing method, device and equipment
CN114255417A (en) Checking current situation rule detection method, device, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination