CN118172849A - Intelligent lock capable of preventing technical unlocking and technical unlocking preventing method - Google Patents

Intelligent lock capable of preventing technical unlocking and technical unlocking preventing method Download PDF

Info

Publication number
CN118172849A
CN118172849A CN202410305795.0A CN202410305795A CN118172849A CN 118172849 A CN118172849 A CN 118172849A CN 202410305795 A CN202410305795 A CN 202410305795A CN 118172849 A CN118172849 A CN 118172849A
Authority
CN
China
Prior art keywords
intelligent lock
request
detection
unlocking
determining
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202410305795.0A
Other languages
Chinese (zh)
Inventor
钟棂骜
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Kaifeni Technology Co ltd
Original Assignee
Shenzhen Kaifeni Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Kaifeni Technology Co ltd filed Critical Shenzhen Kaifeni Technology Co ltd
Priority to CN202410305795.0A priority Critical patent/CN118172849A/en
Publication of CN118172849A publication Critical patent/CN118172849A/en
Pending legal-status Critical Current

Links

Landscapes

  • Lock And Its Accessories (AREA)

Abstract

The invention provides an intelligent lock capable of preventing technical unlocking and a technical unlocking preventing method, comprising the following steps: the information acquisition module is used for acquiring request parameters of a user based on a triggering request of the user to the intelligent lock, and calling corresponding detection records and authentication sequences based on type sources of the request parameters; the information verification module is used for carrying out standard detection on the request parameters based on the detection record and the identification sequence, and carrying out unlocking linkage control on a linkage device in the intelligent lock after the detection is passed; and the emergency response module is used for starting the active anti-prying monitoring after the detection fails and carrying out anti-prying alarm according to the safety state change amount of the intelligent lock based on the opening result. The accuracy of preventing technical unlocking monitoring is improved, meanwhile, the reliability and timeliness of anti-prying early warning are also improved, and the safety coefficient is improved.

Description

Intelligent lock capable of preventing technical unlocking and technical unlocking preventing method
Technical Field
The invention relates to the technical field of equipment monitoring, in particular to an intelligent lock capable of preventing technical unlocking and a technical unlocking preventing method.
Background
Along with the continuous development of science and technology, more and more users choose to adopt intelligent locks for safety precaution, and the intelligent locks have the advantages of convenience, intelligent management and the like while providing basic security, thereby providing great convenience for the users;
At present, most of existing intelligent locks adopt unlocking modes such as passwords, fingerprints, card swiping and the like, but the modes cause potential safety hazards of the intelligent locks, such as the traditional intelligent locks are easy to crack by the passwords, bluetooth interference and the like, and meanwhile, the lock body of some intelligent locks is simpler in design and easy to pry or destroy, crack the potential safety hazards in the aspects of the passwords and the like, so that the safety coefficient of the intelligent locks is greatly reduced;
therefore, in order to overcome the defects, the invention provides an intelligent lock capable of preventing technical unlocking and a technical unlocking preventing method.
Disclosure of Invention
The invention provides an intelligent lock for preventing technical unlocking and an anti-technical unlocking method, which are used for accurately and effectively extracting request parameters required by unlocking through analyzing a triggering request submitted by a user, and carrying out standard detection on the request parameters by calling corresponding detection records and identification sequences according to type sources of the request parameters, so that the accuracy and the accuracy of triggering request detection are ensured, secondly, the intelligent lock is controlled after the standard detection is passed, the door lock is opened in time after the standard detection is passed, finally, after the detection is not passed, active anti-prying monitoring is started, and corresponding anti-prying alarm is carried out according to the safety state change quantity of the intelligent lock, thereby improving the accuracy of anti-technical unlocking monitoring, simultaneously improving the reliability and the timeliness of anti-prying early warning and improving the safety coefficient.
The invention provides an intelligent lock for preventing technical unlocking, which comprises:
The information acquisition module is used for acquiring request parameters of a user based on a triggering request of the user to the intelligent lock, and calling corresponding detection records and authentication sequences based on type sources of the request parameters;
The information verification module is used for carrying out standard detection on the request parameters based on the detection record and the identification sequence, and carrying out unlocking linkage control on a linkage device in the intelligent lock after the detection is passed;
And the emergency response module is used for starting the active anti-prying monitoring after the detection fails and carrying out anti-prying alarm according to the safety state change amount of the intelligent lock based on the opening result.
Preferably, an intelligent lock for preventing technical unlocking, an information acquisition module includes:
a request acquisition unit configured to:
performing multi-angle triggering monitoring on the intelligent lock based on a linkage monitoring sensor in the intelligent lock;
determining that when a user operates the intelligent lock based on the multi-angle triggering monitoring result, acquiring a triggering request submitted by the user aiming at the intelligent lock in real time;
a request parsing unit, configured to:
transmitting a trigger request to a master control center based on wireless communication;
Analyzing the trigger request based on the main control center, and determining login characteristic information corresponding to the trigger request;
And the parameter determining unit is used for extracting key characteristic parameters of the login characteristic information based on unlocking execution standards to obtain request parameters of a user.
Preferably, an intelligent lock for preventing technical unlocking, an information acquisition module includes:
The inspection unit is used for:
determining the component structures of the intelligent lock in different safety operation and maintenance processes and the safety operation and maintenance strategies of the component structures;
Determining a periodic inspection task for the intelligent lock based on the component structure and the security operation and maintenance strategy;
performing periodic inspection on the intelligent lock based on the periodic inspection task to obtain a detection record sequence of the intelligent lock;
sequentially determining detection holes existing in the lower detection record relative to the upper detection record based on the inspection progressive sequence;
a rule perfecting unit for:
determining a patch to the intelligent lock based on the detection vulnerability;
and perfecting the verification rule of the intelligent lock based on the patch program.
Preferably, an intelligent lock for preventing technical unlocking, an information verification module, includes:
a parameter processing unit for:
Determining an authentication item for the request parameter based on the detection record and the authentication sequence, and determining key information points to be contained in the request parameter based on the authentication item;
generating a regular expression module based on the key information points, and extracting the key information points in the request parameters based on the regular expression module to obtain a key information set;
a specification detection unit for:
Determining a standard detection level of an authentication project based on a service standard of the intelligent lock, and sequentially carrying out cis-position standard detection on each key information element in the key information set according to the standard detection level based on a verification rule with perfect detection records and an authentication sequence;
Formulating a multi-point jumping trigger mechanism based on the priority specification detection, and mapping the priority of the priority specification detection result to the multi-point jumping trigger mechanism to carry out rule verification jumping judgment;
A control unit for:
if the rule verification out-of-step judgment judges that the current standard result does not meet the unlocking right, a standard verification process is out-of-step based on a multi-point jumping trigger mechanism, and the unlocking request of the current user is rejected;
otherwise, determining an unlocking mode of the intelligent lock based on the type source of the request parameter, locking the linkage device based on the unlocking mode, and controlling the linkage device to cooperatively unlock.
Preferably, an intelligent lock capable of preventing technical unlocking comprises an identity information check, a right check and an unlocking position check.
Preferably, an intelligent lock for preventing technical unlocking, a control unit, includes:
The parameter extraction subunit is used for determining the number of the requester, the request time and the request times in unit time based on the background operation data of the intelligent lock after the standard detection of the request parameters is passed;
The recording subunit is used for synchronously updating the number of the requester, the request time and the request times in unit time in the record log, and determining the effective record duration of the single record parameter in the record log based on the synchronous updating result;
and the cleaning subunit is used for cleaning the failure recording parameters based on the effective recording time length.
The invention provides a method for preventing technical unlocking, which comprises the following steps:
Acquiring request parameters of a user based on a triggering request of the user to the intelligent lock, and calling corresponding detection records and authentication sequences based on type sources of the request parameters;
The request parameters are subjected to standard detection based on the detection record and the identification sequence, and unlocking linkage control is performed on a linkage device in the intelligent lock after the detection is passed;
After the detection fails, the active anti-prying monitoring is started, and anti-prying alarm is carried out according to the safety state change amount of the intelligent lock based on the opening result
Compared with the prior art, the invention has the following beneficial effects:
1. The triggering request submitted by a user is analyzed, the request parameters required by unlocking are accurately and effectively extracted, the corresponding detection record and identification sequence are called according to the type source of the request parameters to perform standard detection on the request parameters, the accuracy and the accuracy of triggering request detection are ensured, the intelligent lock is controlled after the standard detection is passed, the door lock is timely opened after the standard detection is passed, finally, after the detection is failed, the active anti-prying monitoring is started, the corresponding anti-prying alarm is performed according to the safety state change amount of the intelligent lock, the accuracy of technical unlocking monitoring is improved, the reliability and the timeliness of anti-prying early warning are also improved, and the safety coefficient is improved.
2. According to the method, the authentication items of the request parameters are determined according to the detection records and the authentication sequences, key information points needed to be contained in the request are locked according to the authentication items, so that a corresponding regular expression mode is generated according to a needed key point set, key information points in the request parameters are extracted according to the regular expression mode, normalization detection is carried out on the extracted key information points according to verification rules with perfect detection records and the authentication sequences, finally, a multi-point leachable trigger mechanism is formulated, and rule verification leaping judgment is carried out on normalization detection results through the multi-point leachable trigger mechanism, so that unlocking operation of a linkage device is controlled after the request parameters meet normalization verification is guaranteed, accuracy and reliability of verification of the request parameters are improved, and safety coefficient of the intelligent lock is also improved.
Additional features and advantages of the application will be set forth in the description which follows, and in part will be obvious from the description, or may be learned by practice of the application. The objects and other advantages of the application may be realized and obtained by means of the instrumentalities particularly pointed out in the specification.
The technical scheme of the invention is further described in detail through the drawings and the embodiments.
Drawings
The accompanying drawings are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate the invention and together with the embodiments of the invention, serve to explain the invention. In the drawings:
FIG. 1 is a flow chart of an intelligent lock for preventing technical unlocking in an embodiment of the invention;
FIG. 2 is a flow chart of an information acquisition module in an intelligent lock for preventing technical unlocking in an embodiment of the invention;
Fig. 3 is a flowchart of a method for preventing technical unlocking in an embodiment of the present invention.
Detailed Description
The preferred embodiments of the present invention will be described below with reference to the accompanying drawings, it being understood that the preferred embodiments described herein are for illustration and explanation of the present invention only, and are not intended to limit the present invention.
Example 1:
this embodiment provides an intelligent lock that prevents technical unlocking, as shown in fig. 1, includes:
The information acquisition module is used for acquiring request parameters of a user based on a triggering request of the user to the intelligent lock, and calling corresponding detection records and authentication sequences based on type sources of the request parameters;
The information verification module is used for carrying out standard detection on the request parameters based on the detection record and the identification sequence, and carrying out unlocking linkage control on a linkage device in the intelligent lock after the detection is passed;
And the emergency response module is used for starting the active anti-prying monitoring after the detection fails and carrying out anti-prying alarm according to the safety state change amount of the intelligent lock based on the opening result.
In this embodiment, the triggering request refers to unlocking request information submitted by a user to the intelligent lock, including face recognition unlocking, fingerprint unlocking, password unlocking and card unlocking.
In this embodiment, the request parameters refer to unlocking instruction information that can be obtained by analyzing the intelligent lock in the triggering request, including specific face features, fingerprint line conditions, input specific password values, and the like.
In this embodiment, the specific unlocking mode used for representing the current submission of the user when the type is derived is one of face recognition unlocking, fingerprint unlocking, password unlocking and card unlocking.
In this embodiment, the detection record refers to a vulnerability and a daily operation parameter of the intelligent lock obtained after real-time detection in the operation and maintenance process of the intelligent lock, so as to perfect a standard verification rule of the intelligent lock through the detection record, that is, repair the standard verification rule in time when the vulnerability exists.
In this embodiment, the authentication sequence refers to specific parameters in the smart lock for verifying whether the request parameters submitted by the user meet the unlocking condition, including face features and fingerprint information that can be unlocked.
In this embodiment, the linkage is all the components already present in the smart lock, i.e. capable of cooperating to achieve unlocking.
In this embodiment, the security state change amount refers to the amount of change that occurs in the security coefficient of the smart lock.
The beneficial effects of the technical scheme are as follows: the triggering request submitted by a user is analyzed, the request parameters required by unlocking are accurately and effectively extracted, the corresponding detection record and identification sequence are called according to the type source of the request parameters to perform standard detection on the request parameters, the accuracy and the accuracy of triggering request detection are ensured, the intelligent lock is controlled after the standard detection is passed, the door lock is timely opened after the standard detection is passed, finally, after the detection is failed, the active anti-prying monitoring is started, the corresponding anti-prying alarm is performed according to the safety state change amount of the intelligent lock, the accuracy of technical unlocking monitoring is improved, the reliability and the timeliness of anti-prying early warning are also improved, and the safety coefficient is improved.
Example 2:
on the basis of embodiment 1, this embodiment provides an intelligent lock for preventing technical unlocking, as shown in fig. 2, an information acquisition module, including:
The request acquisition unit is used for performing multi-angle triggering monitoring on the intelligent lock based on the linkage monitoring sensor in the intelligent lock, and determining that when a user operates the intelligent lock based on a multi-angle triggering monitoring result, a triggering request submitted by the user for the intelligent lock is acquired in real time;
the request analysis unit is used for transmitting the trigger request to the main control center based on wireless communication, analyzing the trigger request based on the main control center and determining login characteristic information corresponding to the trigger request;
And the parameter determining unit is used for extracting key characteristic parameters of the login characteristic information based on unlocking execution standards to obtain request parameters of a user.
In this embodiment, the linkage monitoring sensor is set in advance, and is used for detecting triggering requests of the intelligent lock under different angles, including a face monitoring sensor, a touch sensor and the like, wherein the multi-angle triggering monitoring is that the intelligent lock triggering monitoring is performed from the angles of face, fingerprint or password and the like through the linkage monitoring sensor.
In this embodiment, the master control center is set in advance, and is a service center for analyzing each request information.
In this embodiment, the login feature information refers to a specific login mode and specific login parameters corresponding to the trigger request, including specific password parameters or specific texture conditions of the fingerprint.
In this embodiment, unlocking execution criteria are known in advance for extracting user-specific request parameters from the login feature information.
In this embodiment, the key feature parameters are extracted from the login feature information, i.e. the data pieces that characterize the user specific login information.
The beneficial effects of the technical scheme are as follows: the intelligent lock is monitored through the linkage monitoring sensor in a multi-angle triggering manner, so that when a user triggers the intelligent lock, the triggering request of the user is monitored in time, and then the monitored triggering request is transmitted to the main control center for analysis, so that the request parameters of the user are accurately and effectively determined, and whether the user belongs to normal unlocking or not is judged according to the request parameters, and unlocking operation can be performed timely according to the triggering request.
Example 3:
on the basis of embodiment 1, this embodiment provides an intelligent lock for preventing technical unlocking, and an information acquisition module includes:
A parameter analyzing unit for:
Extracting text semantics of the request parameters, and determining parameter backgrounds and context parameter characterizations of the request parameters based on the text semantics;
Determining a target purpose of the request parameter based on the parameter context and the context parameter characterization, and determining a type source of the request parameter based on the target purpose;
The data calling unit is used for accessing the database with the corresponding dimension based on the type source to obtain the detection record and the identification sequence corresponding to the type source of the request parameter.
In this embodiment, the text semantics refers to the meaning of specific data that the request parameters need to characterize, and may be, for example, the identity of the user, etc.
In this embodiment, the parameter context is one of key parameters for determining a specific application of the request parameter, for example, may be a generation condition corresponding to the request parameter, an application scenario corresponding to the request parameter, and the like, and specifically may be fingerprint unlocking, facial recognition unlocking, password unlocking, and the like.
In this embodiment, the context parameter characterization refers to the data characteristics of the request parameters that characterize the data context logic relationship.
In this embodiment, the type source is a specific unlocking mode corresponding to the characterization request parameter, including fingerprint, face, password, card, etc.
The beneficial effects of the technical scheme are as follows: the text semantics of the request parameters are extracted, so that the parameter background and the context parameter representation of the request parameters are accurately and effectively determined according to the text semantics, the target purpose of the request parameters is locked according to the determined parameter background and the context parameter representation, the type source of the request parameters is determined according to the target purpose, and finally, the database of the corresponding dimension is accessed according to the type source of the request parameters, thereby locking the corresponding detection record and the identification sequence, facilitating the accurate and effective verification of the normalization of the request parameters, and guaranteeing the accuracy and reliability of unlocking.
Example 4:
on the basis of embodiment 1, this embodiment provides an intelligent lock for preventing technical unlocking, and an information acquisition module includes:
The inspection unit is used for:
determining component structures of the intelligent lock in different safety operation and maintenance flows and safety operation and maintenance strategies of the component structures, and determining periodic inspection tasks of the intelligent lock based on the component structures and the safety operation and maintenance strategies;
Performing periodic inspection on the intelligent lock based on the periodic inspection task to obtain a detection record sequence of the intelligent lock, and sequentially determining detection holes of lower detection records relative to upper detection records based on the inspection progressive sequence;
And the rule perfecting unit is used for determining the patch program of the intelligent lock based on the detection vulnerability and perfecting the verification rule of the intelligent lock based on the patch program.
In this embodiment, different security operation and maintenance flows refer to different unlocking modes corresponding to the intelligent lock and specific operation links corresponding to the different unlocking modes.
In this embodiment, the security operation and maintenance policy refers to standards or rules, etc. that different component structures need to follow during operation.
In this embodiment, the periodic inspection task refers to an inspection period of the intelligent lock, a specific inspection item required to be performed in each inspection period, and the like.
In this embodiment, the detection record sequence refers to each inspection result obtained after the intelligent lock is periodically inspected, and the inspection results are arranged according to the inspection time.
In this embodiment, the lower detection record refers to a detection record sequence located at the rear of the adjacent detection record sequences, and the upper detection record refers to a detection record sequence located at the front of the adjacent detection record sequences.
In this embodiment, the patch program is determined according to the detection vulnerability, and is an encoding program for repairing the detection vulnerability, where the detection vulnerability is the potential safety hazard existing in the intelligent lock at present.
The beneficial effects of the technical scheme are as follows: the method has the advantages that the component structures of the intelligent lock in different safety operation and maintenance processes and the safety operation and maintenance strategies of the component structures are determined, the intelligent lock periodic inspection task is accurately and effectively determined, the intelligent lock is periodically inspected through the periodic inspection task, the detection record sequence of the intelligent lock is accurately and effectively determined, the detection loopholes existing at present of the intelligent lock are also conveniently determined according to the detection record sequence, and finally, corresponding patch programs are determined according to the obtained detection loopholes, so that verification rules of the intelligent lock are perfected according to the patch programs, accuracy of verification of request parameters by the intelligent lock is ensured, and the working safety coefficient of the intelligent lock is also improved.
Example 5:
on the basis of embodiment 1, this embodiment provides an intelligent lock that prevents technical unlocking, information verification module, includes:
a parameter processing unit for:
Determining an authentication item for the request parameter based on the detection record and the authentication sequence, and determining key information points to be contained in the request parameter based on the authentication item;
generating a regular expression module based on the key information points, and extracting the key information points in the request parameters based on the regular expression module to obtain a key information set;
a specification detection unit for:
Determining a standard detection level of an authentication project based on a service standard of the intelligent lock, and sequentially carrying out cis-position standard detection on each key information element in the key information set according to the standard detection level based on a verification rule with perfect detection records and an authentication sequence;
Formulating a multi-point jumping trigger mechanism based on the priority specification detection, and mapping the priority of the priority specification detection result to the multi-point jumping trigger mechanism to carry out rule verification jumping judgment;
A control unit for:
if the rule verification out-of-step judgment judges that the current standard result does not meet the unlocking right, a standard verification process is out-of-step based on a multi-point jumping trigger mechanism, and the unlocking request of the current user is rejected;
otherwise, determining an unlocking mode of the intelligent lock based on the type source of the request parameter, locking the linkage device based on the unlocking mode, and controlling the linkage device to cooperatively unlock.
In this embodiment, the authentication items refer to various indexes that require normalized verification of the request parameter, and may be, for example, the value of the request parameter, the data type of the request parameter, and the like.
In this embodiment, the key information point refers to main verification information corresponding to each authentication item included in the request parameter.
In this embodiment, the regular expression module is generated according to key information points that should be included in the request parameter, and is used for extracting a model for extracting key information points required in the request parameter, so as to accurately and quickly extract the key information points in the request parameter.
In this embodiment, the key information set refers to a result obtained by extracting all key information points in the request parameters through a regular expression module.
In this embodiment, the service standard is known in advance, and is used to characterize the manner in which the smart lock is unlocked, and the normative verification rule and the stringency of the request parameters when the smart lock is unlocked.
In this embodiment, the specification detection level refers to the order in which different authentication items are detected, in order to specify the verification order for different authentication items in the request parameters.
In this embodiment, the key information element refers to different key information contained in the key information set.
In this embodiment, the multi-point leachable trigger mechanism refers to that when there is an authentication item that does not meet the requirement, the normal verification process for the request parameter is directly leaped out, and verification is not required for the subsequent non-verified item.
In this embodiment, the rule verification jump-out judgment refers to judging whether the current normalization verification flow needs to be stopped, that is, judging whether an authentication item which does not satisfy the normalization requirement exists.
The beneficial effects of the technical scheme are as follows: according to the method, the authentication items of the request parameters are determined according to the detection records and the authentication sequences, key information points needed to be contained in the request are locked according to the authentication items, so that a corresponding regular expression mode is generated according to a needed key point set, key information points in the request parameters are extracted according to the regular expression mode, normalization detection is carried out on the extracted key information points according to verification rules with perfect detection records and the authentication sequences, finally, a multi-point leachable trigger mechanism is formulated, and rule verification leaping judgment is carried out on normalization detection results through the multi-point leachable trigger mechanism, so that unlocking operation of a linkage device is controlled after the request parameters meet normalization verification is guaranteed, accuracy and reliability of verification of the request parameters are improved, and safety coefficient of the intelligent lock is also improved.
Example 6:
On the basis of embodiment 5, this embodiment provides an intelligent lock for preventing technical unlocking, which is characterized in that the authentication items include identity information verification, authority verification and unlocking position verification.
Example 7:
On the basis of embodiment 5, this embodiment provides an intelligent lock that prevents technical unlocking, and its characterized in that, the control unit includes:
The parameter extraction subunit is used for determining the number of the requester, the request time and the request times in unit time based on the background operation data of the intelligent lock after the standard detection of the request parameters is passed;
The recording subunit is used for synchronously updating the number of the requester, the request time and the request times in unit time in the record log, and determining the effective record duration of the single record parameter in the record log based on the synchronous updating result;
and the cleaning subunit is used for cleaning the failure recording parameters based on the effective recording time length.
In this embodiment, the background operation data refers to operation parameters of the smart lock itself, including unlocking operations performed in different periods, user information of a user who requests unlocking, and the like.
In this embodiment, the requestor number is a type of indicia used to characterize the requestor's identity information.
In this embodiment, the effective recording duration refers to the maximum duration that each recording parameter can be stored in the smart lock.
The beneficial effects of the technical scheme are as follows: after the standard detection of the request parameters is passed, the request parameters required by each unlocking are accurately and effectively recorded according to the background operation data of the intelligent lock, then the request parameters required by each unlocking are synchronously updated in a log, and the failure record parameters in the log are timely cleaned according to the effective record duration of the single record parameters in the log, so that verification rules of the intelligent lock are improved, and the accuracy of monitoring for preventing technical unlocking is improved.
Example 8:
On the basis of embodiment 1, this embodiment provides an intelligent lock that prevents technical unlocking, and emergent response module includes:
a behavior analysis unit for:
After the detection is failed, historical unlocking data of the authorized user are extracted based on a service log of the intelligent lock, data mining is carried out on the historical unlocking data based on standard unlocking requirements, and target operation behaviors executed by the authorized user in different time periods are determined;
Determining unlocking behavior habits of an authorized user based on target operation behaviors, and determining an unlocking behavior feature set based on the unlocking behavior habits;
an active monitoring unit for:
generating an unlocking behavior portrait of the authorized user based on the unlocking behavior feature set, and determining the membership of the request parameter relative to the unlocking behavior portrait;
If the membership is smaller than a preset membership threshold, judging that the current user has abnormal unlocking behaviors, and triggering the intelligent lock to open and actively prevent prying monitoring based on a judgment result.
In this embodiment, the service log is used to record unlocking data of different users on the intelligent lock, including unlocking habits of the users, and the like.
In this embodiment, the standard unlocking requirement is known in advance.
In this embodiment, the target operation behavior refers to an unlocking mode of the intelligent lock by the authorized user in different time periods, and the like.
In this embodiment, the unlocking behavior feature set refers to a data parameter determined according to the unlocking behavior habit of the authorized user, that is, capable of characterizing the unlocking characteristics of the authorized user.
In this embodiment, the unlocking behavior representation is generated according to unlocking behavior characteristics of authorized users, and is used to characterize unlocking characteristics corresponding to each authorized user.
In this embodiment, the membership is used to represent the matching degree of the current request parameter and the unlocking behavior picture, and the higher the membership is, the more similar the current request parameter and the unlocking behavior picture are.
In this embodiment, the preset membership threshold is set in advance.
The beneficial effects of the technical scheme are as follows: through detecting failing, extracting the historical unlocking data of the authorized user, carrying out data mining on the historical unlocking data of the authorized user, realizing accurate and effective determination on the target operation behaviors of the authorized user, secondly, analyzing the unlocking behavior habits of the authorized user according to the target operation behaviors, realizing determination on unlocking behavior portraits of different authorized users according to the unlocking behavior habits, finally, matching request parameters with the unlocking behavior portraits of the authorized user, realizing accurate judgment on whether the current request parameters are abnormal or not, triggering the intelligent lock to open the active anti-prying monitoring when the current request parameters are abnormal, improving the accuracy and reliability of preventing technical unlocking, and also ensuring the safety coefficient of the intelligent lock.
Example 9:
On the basis of embodiment 1, this embodiment provides an intelligent lock that prevents technical unlocking, and its characterized in that, emergent response module includes:
the anti-prying monitoring unit is used for controlling the multi-dimensional sensor to monitor the real-time state of the intelligent lock in a multi-dimensional manner based on the unlocking result, and obtaining multi-dimensional state parameters of the intelligent lock based on the multi-dimensional monitoring;
pick-proof alarm unit for:
synthesizing the multidimensional state parameters based on preset dimensional weights to obtain the current safety state coefficient of the intelligent lock, and performing difference comparison on the safety state coefficient and the standard safety coefficient to obtain the safety state change amount of the intelligent lock;
And when the safety state change amount exceeds a preset threshold value, carrying out local anti-prying alarm based on the intelligent lock and sending a remote alarm notification to the management terminal.
In this embodiment, the multidimensional state parameter refers to an operation parameter of the intelligent lock in different aspects, which is obtained after the multidimensional sensor monitors the real-time state of the intelligent lock in a multidimensional manner.
In this embodiment, the preset dimension weights are known in advance and are used to represent the corresponding importance degrees of different dimensions in the overall operation condition of the intelligent lock.
In this embodiment, the security state coefficient is determined according to a preset dimension weight and a multidimensional state parameter, and is used to characterize the current security protection state of the intelligent lock.
In this embodiment, the standard security coefficient is set in advance.
The beneficial effects of the technical scheme are as follows: the real-time state of the intelligent lock is monitored in a multi-dimensional mode through the control of the multi-dimensional sensor, the current safety state coefficient of the intelligent lock is accurately and effectively determined according to the monitoring result, the determined safety coefficient is compared with the standard safety coefficient in a difference mode, the safety state change amount of the intelligent lock is locked, finally, whether alarm notification is required to be carried out or not is accurately judged according to the safety state change amount, the timeliness and the reliability of active anti-prying of the intelligent lock are ensured, and meanwhile, the reliability of technical unlocking prevention is also improved.
Example 10:
The embodiment provides a method for preventing technical unlocking, as shown in fig. 3, including:
Step 1: acquiring request parameters of a user based on a triggering request of the user to the intelligent lock, and calling corresponding detection records and authentication sequences based on type sources of the request parameters;
Step 2: the request parameters are subjected to standard detection based on the detection record and the identification sequence, and unlocking linkage control is performed on a linkage device in the intelligent lock after the detection is passed;
Step 3: and after the detection fails, opening active anti-prying monitoring, and carrying out anti-prying alarm according to the safety state change amount of the intelligent lock based on the opening result.
The beneficial effects of the technical scheme are as follows: the triggering request submitted by a user is analyzed, the request parameters required by unlocking are accurately and effectively extracted, the corresponding detection record and identification sequence are called according to the type source of the request parameters to perform standard detection on the request parameters, the accuracy and the accuracy of triggering request detection are ensured, the intelligent lock is controlled after the standard detection is passed, the door lock is timely opened after the standard detection is passed, finally, after the detection is failed, the active anti-prying monitoring is started, the corresponding anti-prying alarm is performed according to the safety state change amount of the intelligent lock, the accuracy of technical unlocking monitoring is improved, the reliability and the timeliness of anti-prying early warning are also improved, and the safety coefficient is improved.
It will be apparent to those skilled in the art that various modifications and variations can be made to the present invention without departing from the spirit or scope of the invention. Thus, it is intended that the present invention also include such modifications and alterations insofar as they come within the scope of the appended claims or the equivalents thereof.

Claims (7)

1. An intelligent lock for preventing technical unlocking, which is characterized by comprising:
The information acquisition module is used for acquiring request parameters of a user based on a triggering request of the user to the intelligent lock, and calling corresponding detection records and authentication sequences based on type sources of the request parameters;
The information verification module is used for carrying out standard detection on the request parameters based on the detection record and the identification sequence, and carrying out unlocking linkage control on a linkage device in the intelligent lock after the detection is passed;
And the emergency response module is used for starting the active anti-prying monitoring after the detection fails and carrying out anti-prying alarm according to the safety state change amount of the intelligent lock based on the opening result.
2. The intelligent lock for preventing technical unlocking according to claim 1, wherein the information acquisition module comprises:
a request acquisition unit configured to:
performing multi-angle triggering monitoring on the intelligent lock based on a linkage monitoring sensor in the intelligent lock;
determining that when a user operates the intelligent lock based on the multi-angle triggering monitoring result, acquiring a triggering request submitted by the user aiming at the intelligent lock in real time;
a request parsing unit, configured to:
transmitting a trigger request to a master control center based on wireless communication;
Analyzing the trigger request based on the main control center, and determining login characteristic information corresponding to the trigger request;
And the parameter determining unit is used for extracting key characteristic parameters of the login characteristic information based on unlocking execution standards to obtain request parameters of a user.
3. The intelligent lock for preventing technical unlocking according to claim 1, wherein the information acquisition module comprises:
The inspection unit is used for:
determining the component structures of the intelligent lock in different safety operation and maintenance processes and the safety operation and maintenance strategies of the component structures;
Determining a periodic inspection task for the intelligent lock based on the component structure and the security operation and maintenance strategy;
performing periodic inspection on the intelligent lock based on the periodic inspection task to obtain a detection record sequence of the intelligent lock;
sequentially determining detection holes existing in the lower detection record relative to the upper detection record based on the inspection progressive sequence;
a rule perfecting unit for:
determining a patch to the intelligent lock based on the detection vulnerability;
and perfecting the verification rule of the intelligent lock based on the patch program.
4. The intelligent lock for preventing technical unlocking according to claim 1, wherein the information verification module comprises:
a parameter processing unit for:
Determining an authentication item for the request parameter based on the detection record and the authentication sequence, and determining key information points to be contained in the request parameter based on the authentication item;
generating a regular expression module based on the key information points, and extracting the key information points in the request parameters based on the regular expression module to obtain a key information set;
a specification detection unit for:
Determining a standard detection level of an authentication project based on a service standard of the intelligent lock, and sequentially carrying out cis-position standard detection on each key information element in the key information set according to the standard detection level based on a verification rule with perfect detection records and an authentication sequence;
Formulating a multi-point jumping trigger mechanism based on the priority specification detection, and mapping the priority of the priority specification detection result to the multi-point jumping trigger mechanism to carry out rule verification jumping judgment;
A control unit for:
if the rule verification out-of-step judgment judges that the current standard result does not meet the unlocking right, a standard verification process is out-of-step based on a multi-point jumping trigger mechanism, and the unlocking request of the current user is rejected;
otherwise, determining an unlocking mode of the intelligent lock based on the type source of the request parameter, locking the linkage device based on the unlocking mode, and controlling the linkage device to cooperatively unlock.
5. The intelligent lock for preventing technical unlocking according to claim 4, wherein the authentication items include identity information verification, authority verification, and unlocking position verification.
6. The intelligent lock for preventing technical unlocking according to claim 4, wherein the control unit comprises:
The parameter extraction subunit is used for determining the number of the requester, the request time and the request times in unit time based on the background operation data of the intelligent lock after the standard detection of the request parameters is passed;
The recording subunit is used for synchronously updating the number of the requester, the request time and the request times in unit time in the record log, and determining the effective record duration of the single record parameter in the record log based on the synchronous updating result;
and the cleaning subunit is used for cleaning the failure recording parameters based on the effective recording time length.
7. A method for preventing technical unlocking, characterized in that the method is used for executing a system of intelligent locks for preventing technical unlocking according to any one of claims 1-6.
CN202410305795.0A 2024-03-18 2024-03-18 Intelligent lock capable of preventing technical unlocking and technical unlocking preventing method Pending CN118172849A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202410305795.0A CN118172849A (en) 2024-03-18 2024-03-18 Intelligent lock capable of preventing technical unlocking and technical unlocking preventing method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202410305795.0A CN118172849A (en) 2024-03-18 2024-03-18 Intelligent lock capable of preventing technical unlocking and technical unlocking preventing method

Publications (1)

Publication Number Publication Date
CN118172849A true CN118172849A (en) 2024-06-11

Family

ID=91360135

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202410305795.0A Pending CN118172849A (en) 2024-03-18 2024-03-18 Intelligent lock capable of preventing technical unlocking and technical unlocking preventing method

Country Status (1)

Country Link
CN (1) CN118172849A (en)

Similar Documents

Publication Publication Date Title
US8079061B2 (en) Authentication system managing method
Prabhakar et al. Biometric recognition: Security and privacy concerns
EP2069993B1 (en) Security system and method for detecting intrusion in a computerized system
CN112182519B (en) Computer storage system security access method and access system
US11902307B2 (en) Method and apparatus for network fraud detection and remediation through analytics
US20110314549A1 (en) Method and apparatus for periodic context-aware authentication
US20110314558A1 (en) Method and apparatus for context-aware authentication
CN107124395B (en) Identification method of user identity identification system based on keystroke rhythm
CN111767583A (en) Block chain-based enterprise internal information security guarantee method and system
JP2005084991A (en) Terminal user monitoring system
CN110148264B (en) Management method and equipment of storage cabinet
WO2015099607A1 (en) An integrated access control and identity management system
CN117527430A (en) Zero-trust network security dynamic evaluation system and method
CN116915515B (en) Access security control method and system for industrial control network
WO1997031317A1 (en) Method for controlling access to information system
CN118172849A (en) Intelligent lock capable of preventing technical unlocking and technical unlocking preventing method
CN110084008A (en) A method of it is antitheft for computerized information
CN112019346A (en) Method, device and system for authenticating and processing mobile terminal user identity
CN116541815B (en) Computer equipment operation and maintenance data safety management system
CN112907789B (en) Message information pushing method, intelligent door lock and readable storage medium
CN112966243B (en) Privacy-protecting core-body verification processing method and device
CN117521042B (en) High-risk authorized user identification method based on ensemble learning
CN112200940B (en) System and method for identifying abnormal use state of contract house
CN115085956B (en) Intrusion detection method, intrusion detection device, electronic equipment and storage medium
CN117014573A (en) Monitoring method, monitoring device, air conditioner and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination