WO2020078094A1 - 解锁方法、装置和门锁 - Google Patents

解锁方法、装置和门锁 Download PDF

Info

Publication number
WO2020078094A1
WO2020078094A1 PCT/CN2019/101055 CN2019101055W WO2020078094A1 WO 2020078094 A1 WO2020078094 A1 WO 2020078094A1 CN 2019101055 W CN2019101055 W CN 2019101055W WO 2020078094 A1 WO2020078094 A1 WO 2020078094A1
Authority
WO
WIPO (PCT)
Prior art keywords
target user
information
currently
perform
unlocking
Prior art date
Application number
PCT/CN2019/101055
Other languages
English (en)
French (fr)
Inventor
董明珠
谭建明
李绍斌
戚发贵
彭磊
Original Assignee
珠海格力电器股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 珠海格力电器股份有限公司 filed Critical 珠海格力电器股份有限公司
Publication of WO2020078094A1 publication Critical patent/WO2020078094A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00563Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys using personal physical data of the operator, e.g. finger prints, retinal images, voicepatterns

Definitions

  • the present disclosure relates to the field of electronic technology, and in particular, to an unlocking method, device, and door lock.
  • door locks based on human biometric information to unlock, for example, based on fingerprint , Iris, face information, palm print and other biometric information to unlock.
  • the biometric information listed above may be leaked and stolen by other people. For example, if a stranger uses the stolen fingerprint information to unlock and steal, As a result, the security of the door lock is greatly reduced, which in turn poses a threat to people's property and even safety. It can be seen that the security of current door locks is low, and the user experience is poor.
  • an unlocking method includes:
  • determining whether the target user is currently likely to perform the unlock operation includes:
  • the state reference information determine whether the target user is currently in a sleep state
  • determining whether the target user is currently in a sleep state according to the state reference information includes:
  • the state reference information is the heart rate information of the target user, determine whether the target user is currently in a sleep state according to the heart rate value represented by the heart rate information; or,
  • the state reference information is user image information of the target user, it is determined whether the target user is currently in a sleep state according to the gesture or action represented by the user image information.
  • determining whether the target user is currently likely to perform the unlock operation includes:
  • the current location information determine whether the current location of the target user is outside a preset distance
  • the method further includes:
  • an unlock verification instruction is sent to the terminal device, wherein the unlock verification instruction is used to instruct the terminal device to feedback preset verification information;
  • the preset verification information sent by the terminal device is not received, it is determined that the target user is currently unable to perform the unlock operation.
  • determining whether the target user is currently likely to perform the unlock operation includes:
  • an unlocking device in a second aspect, includes:
  • Collection module for collecting biometric information to be verified
  • a determining module configured to match the biometric information to be verified with the preset biometric information to determine whether the target user corresponding to the biometric information to be verified has unlocking authority; The user has unlock permission;
  • the judging module is used for judging whether the target user may perform unlocking operation when the target user has unlocking authority;
  • the processing module is configured to refuse to unlock if the target user is currently unable to perform the unlock operation.
  • the judgment module is used to:
  • the state reference information determine whether the target user is currently in a sleep state
  • the judgment module is used to:
  • the state reference information is the heart rate information of the target user, determine whether the target user is currently in a sleep state according to the heart rate value represented by the heart rate information; or,
  • the state reference information is user image information of the target user, it is determined whether the target user is currently in a sleep state according to the gesture or action represented by the user image information.
  • the judgment module is used to:
  • the current location information determine whether the current location of the target user is outside a preset distance
  • the judgment module is also used to:
  • an unlock verification instruction is sent to the terminal device, wherein the unlock verification instruction is used to instruct the terminal device to feedback preset verification information;
  • the preset verification information sent by the terminal device is not received, it is determined that the target user is currently unable to perform the unlock operation.
  • the judgment module is used to:
  • a door lock in a third aspect, includes:
  • Memory used to store program instructions
  • a processor configured to call program instructions stored in the memory, and perform the steps included in any method in the first aspect according to the obtained program instructions;
  • the wireless communication module is used to obtain status reference information, location information, and target room image information of the target user.
  • a non-transitory computer-readable storage medium that stores computer-executable instructions for causing a computer to perform the steps included in any method of the first aspect.
  • the door lock when unlocking based on the user's biometric information, the door lock may first collect the user's biometric information to be verified, and then match the collected biometric information to be verified with the preset biometric information, To determine whether the target user corresponding to the biometric information to be verified has unlocking authority, thereby realizing verification of the unlocking authority based on the biometric information, further, when it is determined that the target user corresponding to the collected biometric information to be verified has unlocking authority , It will further determine whether the target user is currently likely to perform the unlock operation.
  • the accuracy of unlocking is further improved by verifying the possibility of the user actually unlocking, so as to ensure the safety of unlocking, improve the security of the door lock, and thus improve the user experience.
  • FIG. 1 is a schematic structural diagram of a door lock in an embodiment of the present disclosure
  • FIG. 3 is a flowchart of determining whether a target user may perform an unlock operation in an embodiment of the present disclosure
  • FIG. 4 is another flowchart of determining whether a target user may perform an unlock operation in an embodiment of the present disclosure
  • FIG. 5 is a structural block diagram of an unlocking device in an embodiment of the present disclosure.
  • FIG. 6 is a schematic structural diagram of a door lock in an embodiment of the present disclosure.
  • multiple may mean at least two, for example, two, three or more, and the embodiments of the present application are not limited.
  • the user when the user needs to open the door lock to enter the room, the user can enter the biometric information to open the door lock to enter the room, for example, the smart door lock shown in FIG. 1, where the user can enter the password Enter the preset password in area 101, you can swipe in the swipe area 102, you can enter the preset face information in the face verification area 103, specifically, the smart door lock can be equipped with a camera to collect the user's face image information, of course You can also enter fingerprint information in the fingerprint verification area 105, and then after the verification information matches the pre-stored verification information, the smart lock can be unlocked, so that the user can screw the door handle 104 to open the door.
  • the smart door lock shown in FIG. 1, where the user can enter the password Enter the preset password in area 101, you can swipe in the swipe area 102, you can enter the preset face information in the face verification area 103, specifically, the smart door lock can be equipped with a camera to collect the user's face image information, of course You can also enter fingerprint information in the fingerprint verification
  • biometric information such as face information, fingerprint information
  • password such as password
  • access card is user-specific and unique, but with the continuous development of technology
  • fingerprint information in the method for unlocking And face information can be copied and stolen. If someone uses these copied biometric information to unlock, it will reduce the security of the door lock, causing damage to the user's property, and may also threaten the user's safety. .
  • an embodiment of the present disclosure provides an unlocking method. After collecting biometric information, the collected biometric information is matched with preset biometric information. If the matching is successful, it can be determined that the biometric information corresponds to Of the target users have unlocking authority. Further, in order to avoid the duplication of biometric information, it is possible to further determine whether the target user is currently likely to perform the unlocking operation, that is, to judge the current actual situation of the target user. Unlocking is not possible, for example, if the target user is currently sleeping, or if the target user is currently in another city, then the unlock request can be directly rejected.
  • the unlocking method provided by an embodiment of the present disclosure may be performed by a door lock with an access control function, such as a smart door lock as shown in FIG. 1, or may be another type of door lock that can collect user input And verify the unlocking authority based on the collected biometric information, and at the same time, it can also judge the current status of the user, so as to accurately determine the legality of the current unlocking request, and improve the security of the door lock.
  • a door lock with an access control function such as a smart door lock as shown in FIG. 1
  • an access control function such as a smart door lock as shown in FIG. 1
  • the unlocking authority based on the collected biometric information
  • an embodiment of the present disclosure provides an unlocking method, which may be performed by the aforementioned door lock or smart door lock.
  • the specific flow of this method is described as follows.
  • Step 201 Collect biometric information to be verified.
  • the unlocking method in the embodiments of the present disclosure can be applied to application scenarios that require the use of door locks for security, such as companies and families, that is, the door locks can be included in this scenario, and the unlocking method of the door locks can be based on a person (user)
  • the biometric information is used for unlocking verification.
  • the biometric information may include fingerprint feature information or palmprint feature information, or iris feature information, or face feature information, and of course, voiceprint information or other
  • the unlocking method in the embodiment of the present disclosure will be described below by taking the biometric information as a human face as an example.
  • the user when the user wants to enter the room, the user can verify his own face information by aligning the face with the face information verification area 103 as shown in FIG. 1, and then the door lock collects the person of the current user Face information.
  • Step 202 Match the biometric information to be verified with the preset biometric information to determine whether the target user corresponding to the biometric information to be verified has unlock permission.
  • Step 203 If the biometric information to be verified matches the preset biometric information successfully, it is determined that the target user corresponding to the biometric information to be verified has unlock permission.
  • the door lock matches the collected face information of the current user with the preset biometric information, that is, the preset face information.
  • the preset biometric information includes all preset face information that can unlock the door lock, and may also include the identity information relationship corresponding to the face information of all users with unlock permissions, which is determined according to the matching result
  • the specific implementation manner of using the biometric information to verify the unlocking authority may adopt any existing methods, and the embodiments of the present disclosure are not limited.
  • the face information of A, B, and C can be preset as the preset biometric information of the door lock, and A, B, and C
  • the correspondence between the face information of C and the identities of A, B, and C can also be stored in advance. If the biometric information to be verified is the face information of A, then since the face information of A exists in the preset biometric information, this Then, it can be determined that A has unlocking authority, and then the target user corresponding to the biometric information to be verified is determined to be A according to the aforementioned identity correspondence.
  • Step 204 When the target user has unlock permission, determine whether the target user is currently likely to perform the unlock operation.
  • the unlocking is generally only performed when the biometric information matches, and there is a case where the biometric information is stolen and used, so in order to improve the security of unlocking Performance and accuracy. Further, in the embodiments of the present disclosure, it can also be determined whether the target user is currently likely to perform the unlocking operation, so as to improve the security of unlocking by means of secondary verification. In different application scenarios, different judgment methods can be used to judge whether the target user may perform the unlock operation.
  • three types of methods based on state reference information, based on location information, and current environmental image information in the target room targeted for unlocking may be generally adopted to determine whether the current target user may perform the unlocking operation.
  • the method based on the state reference information is, for example, the state reference information of the target user obtained based on the biosensor, for example, the value of the heart rate of the target user collected by the heart rate sensor worn by the target user, the value of the heart rate can be understood as
  • the judgment method based on the state reference information can intuitively reflect the user's physical state, which can reflect the current actual state or action of the user, and can improve the accuracy of the judgment.
  • the method based on the location of the target user is, for example, to obtain the current location information of the target user, and then determine whether it is currently possible to perform the unlock operation, that is to say, based on the aforementioned method based on the status of the target user, there is another method available.
  • the selected judgment method so as to enhance the applicability and flexibility of the solution, and because the real-time position is determined dynamically, the variable position information determination method makes the determination more targeted, and further improves the accuracy and flexibility.
  • the first judgment method is shown in the flowchart shown in FIG. 3, and the specific implementation process is as follows.
  • Step 301 Obtain the target user's status reference information
  • Step 302 Determine whether the target user is currently sleeping according to the state reference information
  • Step 303 If it is in the sleep state, it is determined that the target user is currently unable to perform the unlock operation.
  • the way to obtain the target user's state reference information may be to obtain the target user's heart rate information, and determine whether the target user is currently sleeping according to the heart rate value represented by the heart rate information.
  • the door lock can acquire the heart rate information of the target user through the built-in wireless communication module, specifically, the biosensor configured by the target user can be requested to send the heart rate information of the target user, or the biosensor can periodically set the heart rate of the target user Information is reported so that the door lock can obtain the dynamic heart rate information of the target user in time.
  • the wireless communication module may be a Bluetooth Low Energy (BLE) module, near field communication technology (Near Field Communication, NFC), wireless fidelity (Wireless Fidelity, WiFi), mobile network module, etc.
  • BLE Bluetooth Low Energy
  • NFC Near Field Communication
  • WiFi Wireless Fidelity
  • mobile network module etc.
  • the wireless communication module to be used can be determined according to actual needs, which is not limited in the embodiments of the present disclosure.
  • the heart rate value measured by the target user's wearable device can be obtained through the wireless communication module in the door lock, and then the heart rate value is preset in the door lock Compare the heart rate range of the user to determine whether the target user is sleeping.
  • the heart rate of adult men is: 60-80 beats / min
  • the heart rate of women is: 70- 90 beats / min
  • the heart rate is generally low, for example: 50-70 beats / min for men and 60-70 beats / min for women to set the preset heart rate range, so that the current user can be judged by comparison Whether it is in sleep state.
  • the preset heart rate range when sleeping is: male heart rate 50-70 beats / min, female heart rate 60-70 beats / min, the determined target user is dad, and the obtained dad's heart rate value is 65, According to the preset heart rate range, it can be judged that the father's heart rate value is within the heart rate range corresponding to the sleeping state, then it can be determined that the father is currently in the sleeping state, and since it is sleeping, it is naturally impossible to perform the unlock operation.
  • the state reference information can also be the user image information of the target user.
  • the posture or movement of the target user can be determined, and then based on the determined posture or movement Determine whether the target user is currently sleeping. If it is determined that the target user is in the sleep state, it is naturally impossible to perform the unlocking operation.
  • the second judgment method is shown in the flowchart shown in FIG. 4, and the specific implementation process is as follows:
  • Step 401 Obtain the current location information sent by the terminal device corresponding to the target user;
  • Step 402 Determine whether the current location of the target user is beyond the preset distance according to the current location information
  • Step 403 If it is outside the preset distance, it is determined that the target user is currently impossible to perform the unlock operation.
  • the current location information of the terminal device corresponding to the target user can be obtained.
  • the terminal device can be a mobile phone, a wearable device, etc., which is carried by the target user and can send the location to the door lock Information device, and then determine whether the current location of the target user is outside the preset distance according to the obtained current location information, the preset distance can be based on the position of the door lock itself, for example, the preset distance is set to It is 10 meters away from the door lock. If the current location of the target user is outside the preset distance, it means that the target user is currently far away from the door lock, so it is naturally impossible to enter biometric information to perform the unlock operation.
  • the door lock obtains the current location of the mobile phone used by the target user A through the wireless communication module is 50 kilometers away from the door lock, This indicates that the target user A is currently at a distance of 50 kilometers, and it is impossible to enter his biometric information on the door lock to unlock it. At this time, it can be considered that the biometric information to be verified collected by the door lock is used by others. For target user A, this unlock request is illegal and unsafe.
  • the door lock may send an unlock verification instruction to the terminal device carried by the target user, so that the terminal device returns preset verification information through the unlock verification instruction, for example Taking the terminal device as a mobile phone as an example, the door lock sends an unlock verification instruction to the mobile phone. After the mobile phone receives the unlock verification instruction, the user can feedback the preset verification information to the door lock through the mobile phone, based on whether the correct preset verification information is received Determine whether the target user is likely to perform the unlock operation, or if the stolen user may not return the verification information to the door lock at all, so it is impossible for the door lock to receive the preset verification information sent by the mobile phone.
  • the preset verification information may be a preset password information, or a preset password information, or a preset gesture pattern information, etc., which can be matched in the location by sending verification to the mobile phone carried by the user
  • the user's fingerprint information may be stolen by others. If the user's mobile phone is also stolen, the judgment based on biometric information and location information is also inaccurate.
  • the door lock may send an unlock verification instruction to the terminal device corresponding to the target user, and after the terminal device corresponding to the target user receives the unlock verification instruction , If it is a real target user, you can enter 356783 in the mobile phone to successfully unlock, if it is a stolen user, then you can not know the preset verification information of 356783, so you can not feedback the correct preset verification information to the door lock through the mobile phone, this The door lock will refuse to unlock, thus ensuring the legality and safety of unlocking.
  • the above second judgment method can better improve the security of unlocking the door lock, thereby improving the user experience, and avoiding the situation that the door lock is unlocked when the user's unlocking biometrics are copied and the terminal device is stolen. .
  • the current environmental image information in the room can be obtained by the camera or other camera-capable device in the room targeted for unlocking.
  • the target room targeted for unlocking is referred to as the target room below.
  • the environmental image information may include all image information in the target room, such as image information of furniture, people, animals, etc.
  • the door lock may perform image recognition to determine the target user Whether it is located in the target room, specifically, for example, the face user can be used to determine whether the target user is in the target room, or other methods can be used to determine whether the target user is in the target room based on the obtained environmental image information .
  • the third judgment method is to match the environmental image information in the target room with the target user's biometric information (such as face image information), which can more effectively determine whether the target user is in the room in real time. In this case, the target user does not need to perform the unlock operation at all.
  • This judgment method can also enhance the security of the door lock to a certain extent, thereby improving the user experience.
  • Step 205 If the target user is currently unable to perform the unlock operation, refuse to unlock.
  • the unlock is refused, thereby ensuring the security of unlocking. Further, if the target user has been frequently unlocked within a certain period of time, for example, within ten minutes, and is constantly refused to unlock, the door lock can also be sent to the terminal device corresponding to the target user through the wireless communication module Prompt information to effectively prompt the user, enhance the security of the door lock, and improve the user experience.
  • the door lock when unlocking based on the user's biometric information, the door lock may first collect the user's biometric information to be verified, and then match the collected biometric information to be verified with the preset biometric information, To determine whether the target user corresponding to the biometric information to be verified has unlocking authority, thereby realizing verification of the unlocking authority based on the biometric information, further, when it is determined that the target user corresponding to the collected biometric information to be verified has unlocking authority , It will further determine whether the target user is currently likely to perform the unlock operation.
  • the accuracy of unlocking is further improved by verifying the possibility of the user actually unlocking, thereby ensuring the safety of unlocking, improving the security of the door lock, and thus improving the user experience.
  • the embodiments of the present disclosure provide a device for unlocking, which can realize the function corresponding to the foregoing unlocking method.
  • the unlocking device may be a hardware structure, a software module, or a hardware structure plus a software module.
  • the unlocking device may be implemented by a chip system, and the chip system may be constituted by a chip, or may include a chip and other discrete devices.
  • the unlocking device includes an acquisition module 501, a determination module 502, a determination module 503, and a processing module 504. among them:
  • Collection module 501 used to collect biometric information to be verified
  • the determining module 502 is used to match the biometric information to be verified with the preset biometric information to determine whether the target user corresponding to the biometric information to be verified has unlocking authority; wherein, if the matching succeeds, the target user has unlocking authority;
  • the judgment module 503 is used to judge whether the target user is currently likely to perform the unlock operation when the target user has unlock permission
  • the processing module 504 is configured to refuse to unlock if the target user is currently unable to perform the unlock operation.
  • the determination module 503 is used to obtain the state reference information of the target user; based on the state reference information, determine whether the target user is currently in a sleep state; and if in the sleep state, determine that the target user is currently impossible Perform unlock operation.
  • the determination module 503 is configured to determine whether the target user is currently sleeping according to the heart rate value represented by the heart rate information when the state reference information is the heart rate information of the target user; or, the state reference information is When the user image information of the target user is used, it is determined whether the target user is currently in a sleep state according to the gesture or action represented by the user image information.
  • the judgment module 503 is used to obtain the current location information sent by the terminal device corresponding to the target user; based on the current location information, it is determined whether the current location of the target user is outside the preset distance; And if it is outside the preset distance, it is determined that the target user is currently impossible to perform the unlock operation.
  • the judgment module 503 is further configured to send an unlock verification instruction to the terminal device if it is within a preset distance, where the unlock verification instruction is used to instruct the terminal device to feedback preset verification information; if not After receiving the preset verification information sent by the terminal device, it is determined that the target user is currently impossible to perform the unlock operation.
  • the determination module 503 is used to obtain current environmental image information in the target room targeted for unlocking; based on the current environmental image information, determine whether the target user is currently located in the target room; Within the target room, it is determined that the target user is currently unable to perform the unlock operation.
  • the division of the modules in the embodiments of the present disclosure is schematic, and is only a division of logical functions. In actual implementation, there may be other ways of dividing.
  • the functional modules in the embodiments of the present disclosure may be integrated in one process. In the device, it can also exist alone physically, or two or more modules can be integrated into one module.
  • the above integrated modules can be implemented in the form of hardware or software function modules.
  • an embodiment of the present disclosure provides a door lock, as shown in FIG. 6, the door lock includes at least one processor 601 and a memory 602 connected to the at least one processor, which is not limited in the embodiments of the present disclosure
  • the specific connection medium between the processor 601 and the memory 602, in FIG. 6 is an example of the connection between the processor 601 and the memory 602 through the bus 600, the bus 600 is indicated by a thick line in FIG. 6, the connection between other components
  • the method is for illustrative purposes only and is not intended to be limiting.
  • the bus 600 can be divided into an address bus, a data bus, and a control bus. For ease of representation, only a thick line is used in FIG.
  • the door lock can also include a wireless communication module 603, which can also be connected to the processor 601 and the memory 602 through the bus 600, and can be matched according to the stored information of the memory 602 to determine whether the target user may perform an unlock operation .
  • the memory 602 stores instructions executable by at least one processor 601, and the at least one processor 601 can execute the steps included in the foregoing unlocking method by executing the instructions stored by the memory 602.
  • the processor 601 is the control center of the door lock, can use various interfaces and lines to connect the various parts of the entire door lock, by running or executing the instructions stored in the memory 602 and calling the data stored in the memory 602, the door lock Various functions and processing data to monitor the door lock as a whole.
  • the processor 601 may include one or more processing units, and the processor 601 may integrate an application processor and a modem processor, where the application processor mainly processes an operating system, a user interface, and application programs, etc.
  • the modulation processor mainly handles wireless communication. It can be understood that, the foregoing modem processor may not be integrated into the processor 601.
  • the processor 601 and the memory 602 may be implemented on the same chip, and in some embodiments, they may also be implemented on separate chips.
  • the processor 601 may be a general-purpose processor, such as a central processing unit (CPU), a digital signal processor, an application specific integrated circuit, a field programmable gate array or other programmable logic device, a discrete gate or transistor logic device, and a discrete hardware component. Implement or execute the methods, steps, and logical block diagrams disclosed in the embodiments of the present disclosure.
  • the general-purpose processor may be a microprocessor or any conventional processor. The steps of the method disclosed in conjunction with the embodiments of the present disclosure may be directly embodied and executed by a hardware processor, or may be executed and completed by a combination of hardware and software modules in the processor.
  • the memory 602 is a non-volatile computer-readable storage medium, and can be used to store non-volatile software programs, non-volatile computer executable programs, and modules.
  • the memory 602 may include at least one type of storage medium, such as flash memory, hard disk, multimedia card, card-type memory, random access memory (Random Access Memory, RAM), static random access memory (Static Random Access Memory, SRAM), Programmable read-only memory (Programmable Read Only Memory, PROM), read-only memory (Read Only Memory, ROM), electrically erasable programmable read-only memory (Electrically Programmable Read-Only Memory, EEPROM), magnetic memory, disk , CD, etc.
  • the memory 602 is any other medium that can be used to carry or store desired program code in the form of instructions or data structures and can be accessed by a computer, but is not limited thereto.
  • the memory 602 in the embodiment of the present disclosure may also be a circuit or any other device capable of realizing a storage function, which is used to store program instructions and / or data.
  • the code corresponding to the unlocking method described in the foregoing embodiment can be solidified into the chip, so that the chip can perform the steps of the unlocking method described above when the chip is running, how to design the processor 601 Programming is a technique well known to those skilled in the art, and will not be repeated here.
  • an embodiment of the present disclosure also provides a non-transitory readable storage medium that stores computer instructions, and when the computer instructions run on the computer, causes the computer to perform the steps of the unlocking method as described above.
  • various aspects of the unlocking method provided by the present disclosure may also be implemented in the form of a program product, which includes program code, and when the program product runs on the unlocking device, the program code is used In order for the unlocking device to perform the steps in the unlocking method according to various exemplary embodiments of the present disclosure described above in this specification.
  • the embodiments of the present disclosure may be provided as methods, systems, or computer program products. Therefore, the present disclosure may take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment combining software and hardware aspects. Moreover, the present disclosure may take the form of a computer program product implemented on one or more computer usable storage media (including but not limited to disk storage and optical storage, etc.) containing computer usable program code.
  • a computer usable storage media including but not limited to disk storage and optical storage, etc.
  • the embodiments of the present disclosure may be provided as methods, systems, or computer program products. Therefore, the present disclosure may take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment combining software and hardware. Moreover, the present disclosure may take the form of a computer program product implemented on one or more computer usable storage media (including but not limited to disk storage and optical storage, etc.) containing computer usable program code.
  • a computer usable storage media including but not limited to disk storage and optical storage, etc.
  • These computer program instructions may also be stored in a computer readable memory that can guide a computer or other programmable data processing device to work in a specific manner, so that the instructions stored in the computer readable memory produce an article of manufacture including an instruction device, the instructions The device implements the functions specified in one block or multiple blocks of the flowchart one flow or multiple flows and / or block diagrams.
  • These computer program instructions can also be loaded onto a computer or other programmable data processing device, so that a series of operating steps are performed on the computer or other programmable device to produce computer-implemented processing, which is executed on the computer or other programmable device
  • the instructions provide steps for implementing the functions specified in one block or multiple blocks of the flowchart one flow or multiple flows and / or block diagrams.

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Lock And Its Accessories (AREA)

Abstract

一种解锁方法、装置和门锁。解锁方法包括:采集待验证生物特征信息(201),将待验证生物特征信息与预设生物特征信息进行匹配(202),以确定待验证生物特征信息对应的目标用户是否具有开锁权限(203),其中,若匹配成功则表明目标用户具有开锁权限,在目标用户具有开锁权限时,判断目标用户当前是否可能执行开锁操作(204),若目标用户当前不可能执行开锁操作,则拒绝解锁(205)。从而,提高门锁的安全性。

Description

解锁方法、装置和门锁
相关申请的交叉引用
本申请是以CN申请号为201811222821.4,申请日为2018年10月19日的申请为基础,并主张其优先权,该CN申请的公开内容在此作为整体引入本申请中。
技术领域
本公开涉及电子技术领域,尤其涉及一种解锁方法、装置和门锁。
背景技术
随着科技的不断发展,为了保障人们财产及生命安全,门锁的安全问题是社会一直热议和重视的问题,因而设计了基于人的生物特征信息来进行解锁的门锁,例如,基于指纹、虹膜、人脸信息、掌纹等人的生物特征信息来进行解锁。
然而,虽然解锁的方式越来越多样,但是,随着科技的进步,上述列举的生物特征信息可能泄露,而被其他人盗用,这样的话,例如陌生人使用盗用的指纹信息来开锁盗窃的话,致使门锁的安全性就大幅降低,进而对人们的财产甚至安全造成威胁。可见,目前的门锁安全性较低,用户的使用体验较差。
发明内容
第一方面,提供一种解锁方法,所述方法包括:
采集待验证生物特征信息;
将所述待验证生物特征信息与预设生物特征信息进行匹配,以确定所述待验证生物特征信息对应的目标用户是否具有开锁权限;其中,若匹配成功则表明所述目标用户具有开锁权限;
在所述目标用户具有开锁权限时,判断所述目标用户当前是否可能执行开锁操作;
若所述目标用户当前不可能执行开锁操作,则拒绝解锁。
可选的,判断所述目标用户当前是否可能执行开锁操作,包括:
获得所述目标用户的状态参考信息;
根据所述状态参考信息,判断所述目标用户当前是否处于睡眠状态;
若处于所述睡眠状态,则确定所述目标用户当前不可能执行开锁操作。
可选的,根据所述状态参考信息,判断所述目标用户当前是否处于睡眠状态,包括:
在所述状态参考信息为所述目标用户的心率信息时,根据所述心率信息表征的心率值判断所述目标用户当前是否处于睡眠状态;或者,
在所述状态参考信息为所述目标用户的用户图像信息时,根据所述用户图像信息表征的姿势或动作判断所述目标用户当前是否处于睡眠状态。
可选的,确定所述目标用户当前是否可能执行开锁操作,包括:
获得与所述目标用户对应的终端设备发送的当前位置信息;
根据所述当前位置信息,判断所述目标用户当前所处的位置是否在预设距离之外;
若在所述预设距离之外,则确定所述目标用户当前不可能执行开锁操作。
可选的,所述方法还包括:
若在所述预设距离之内,向所述终端设备发送开锁验证指示,其中,所述开锁验证指示用于指示所述终端设备反馈预设验证信息;
若未接收所述终端设备发送的所述预设验证信息,则确定所述目标用户当前不可能执行开锁操作。
可选的,确定所述目标用户当前是否可能执行开锁操作,包括:
获得开锁针对的目标房间内的当前的环境图像信息;
根据所述当前的环境图像信息,判断所述目标用户当前是否位于所述目标房间之内;
若位于所述目标房间之内,则确定所述目标用户当前不可能执行开锁操作。
第二方面,提供一种解锁装置,所述解锁装置包括:
采集模块,用于采集待验证生物特征信息;
确定模块,用于将所述待验证生物特征信息与预设生物特征信息进行匹配,以确定所述待验证生物特征信息对应的目标用户是否具有开锁权限;其中,若匹配成功则表明所述目标用户具有开锁权限;
判断模块,用于在所述目标用户具有开锁权限时,判断所述目标用户当前是否可能执行开锁操作;
处理模块,用于若所述目标用户当前不可能执行开锁操作,则拒绝解锁。
可选的,所述判断模块用于:
获得所述目标用户的状态参考信息;
根据所述状态参考信息,判断所述目标用户当前是否处于睡眠状态;
若处于所述睡眠状态,则确定所述目标用户当前不可能执行开锁操作。
可选的,所述判断模块用于:
在所述状态参考信息为所述目标用户的心率信息时,根据所述心率信息表征的心率值 判断所述目标用户当前是否处于睡眠状态;或者,
在所述状态参考信息为所述目标用户的用户图像信息时,根据所述用户图像信息表征的姿势或动作判断所述目标用户当前是否处于睡眠状态。
可选的,所述判断模块用于:
获得与所述目标用户对应的终端设备发送的当前位置信息;
根据所述当前位置信息,判断所述目标用户当前所处的位置是否在预设距离之外;
若在所述预设距离之外,则确定所述目标用户当前不可能执行开锁操作。
可选的,所述判断模块还用于:
若在所述预设距离之内,向所述终端设备发送开锁验证指示,其中,所述开锁验证指示用于指示所述终端设备反馈预设验证信息;
若未接收所述终端设备发送的所述预设验证信息,则确定所述目标用户当前不可能执行开锁操作。
可选的,所述判断模块用于:
获得开锁针对的目标房间内的当前的环境图像信息;
根据所述当前的环境图像信息,判断所述目标用户当前是否位于所述目标房间之内;
若位于所述目标房间之内,则确定所述目标用户当前不可能执行开锁操作。
第三方面,提供一种门锁,所述门锁包括:
存储器,用于存储程序指令;
处理器,用于调用所述存储器中存储的程序指令,按照获得的程序指令执行第一方面中的任一方法包括的步骤;
无线通信模块,用于获得目标用户的状态参考信息、位置信息、目标房间图像信息。
第四方面,提供一种非瞬时性计算机可读存储介质,该存储介质存储有计算机可执行指令,所述计算机可执行指令用于使计算机执行第一方面中的任一方法包括的步骤。
本公开实施例中,在基于用户的生物特征信息进行解锁的时候,门锁可以先采集用户的待验证生物特征信息,然后将采集到的待验证生物特征信息与预设生物特征信息进行匹配,以判断待验证生物特征信息对应的目标用户是否具有开锁权限,从而实现基于生物特征信息进行的开锁权限的验证,进一步地,在确定采集到的待验证生物特征信息对应的目标用户具备开锁权限时,还会进一步地判断该目标用户当前是否有可能执行开锁操作,若确定该目标用户当前不可能执行开锁操作,即使生物特征信息验证通过也会拒绝解锁,这样可以在用户的生物特征信息被别人盗用于开锁的情形下,通过验证用户实际开锁的可能 性来进一步地提高解锁的准确性,从而确保开锁安全,提高门锁的安全性,进而提升用户的使用体验。
附图说明
为了更清楚地说明本公开实施例或现有技术中的技术方案,下面将对实施例描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本公开的一些实施例。
图1为本公开实施例中的一种门锁的结构示意图;
图2为本公开实施例中的一种解锁方法的流程图;
图3为本公开实施例中的一种判断目标用户是否可能执行开锁操作的流程图;
图4为本公开实施例中的另一种判断目标用户是否可能执行开锁操作的流程图;
图5为本公开实施例中的解锁装置的结构框图;
图6为本公开实施例中的门锁的结构示意图。
具体实施方式
为使本公开的目的、技术方案和优点更加清楚明白,下面将结合本公开实施例中的附图,对本公开实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本公开一部分实施例,而不是全部的实施例。基于本公开中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本公开保护的范围。在不冲突的情况下,本公开中的实施例及实施例中的特征可以相互任意组合。并且,虽然在流程图中示出了逻辑顺序,但是在某些情况下,可以以不同于此处的顺序执行所示出或描述的步骤。
本公开的说明书和权利要求书及上述附图中的术语“第一”和“第二”是用于区别不同对象,而非用于描述特定顺序。此外,术语“包括”以及它们任何变形,意图在于覆盖不排他的保护。例如包含了一系列步骤或单元的过程、方法、系统、产品或设备没有限定于已列出的步骤或单元,而是可选地还包括没有列出的步骤或单元,或可选地还包括对于这些过程、方法、产品或设备固有的其它步骤或单元。
本公开实施例中,“多个”可以表示至少两个,例如可以是两个、三个或者更多个,本申请实施例不做限制。
另外,本文中术语“和/或”,仅仅是一种描述关联对象的关联关系,表示可以存在三种关系,例如,A和/或B,可以表示:单独存在A,同时存在A和B,单独存在B这三 种情况。另外,本文中字符“/”,在不做特别说明的情况下,一般表示前后关联对象是一种“或”的关系。
现有技术中,当用户需要打开门锁进入房间时,用户可以通过输入生物特征信息来打开门锁,从而进入房间内,例如,如图1所示的智能门锁,其中用户可以在密码输入区域101输入预设密码,可以在刷卡区域102刷卡,可以通在人脸验证区域103输入预设人脸信息,具体来说,智能门锁可以配置有摄像头以采集用户的人脸图像信息,当然还可以在指纹验证区域105输入指纹信息,然后在验证信息与预存的验证信息匹配之后,智能锁则可以解锁,从而,用户可以拧着门把104开门。虽然上述的生物特征信息(例如人脸信息、指纹信息)、密码、以及门禁卡是用户特定的,具有唯一性,但是随着科技的不断发展,上述的用于进行解锁的方式中的指纹信息和人脸信息等都可能被复制盗用,若有人使用这些复制生物特征信息进行解锁,则会降低门锁的安全性,从而对用户造成财产等损失,并且还可会对用户的安全也存在威胁。
鉴于此,本公开实施例提供了一种解锁方法,该方法是在采集生物特征信息之后,将采集的生物特征信息与预设的生物特征信息进行匹配,若匹配成功则可以确定生物特征信息对应的目标用户具有开锁权限,进一步地,为了避免生物特征信息的复制冒用,可以进一步地判断该目标用户当前是否可能执行开锁操作,即对目标用户当前的实际情况进行判断,若确定用户当前根本不可能进行开锁操作,例如确定目标用户当前正在睡觉,或者确定目标用户当前正处于另外一个城市,那么则可以直接拒绝开锁请求,这样的话,即使在生物特征信息验证通过的情况下,可以通过进一步地的判断来提高开锁的有效性,从而增强了门锁的安全,确保了是目标用户本人在输入其生物特征信息进行的合法的开锁,避免用户的财产损失和人身安全,进而提升用户的使用体验。
本公开实施例提供的解锁方法可以由具备门禁功能的门锁执行,该门锁例如是如图1所示的智能门锁,或者还可以是其它类型的门锁,该门锁能够采集用户输入的生物特征信息,并根据采集到的生物特征信息进行开锁权限的验证,同时还可以判断用户的当前状态,进而实现对当前的开锁请求的合法性进行准确的判断,提高门锁的安全性。
下面结合说明书附图介绍本公开实施例提供的技术方案。
请参见图2,本公开实施例提供一种解锁方法,该方法可以由前述提到的门锁或智能门锁执行。该方法的具体流程描述如下。
步骤201:采集待验证生物特征信息。
本公开实施例中的解锁方法,可以应用于公司、家庭等需要使用门锁进行安全保障的应用场景,即在该场景中可以包括门锁,其中的门锁的解锁方法可以基于人(用户)的生 物特征信息来进行开锁验证,具体的,生物特征信息可以包括指纹特征信息或者掌纹特征信息,也可以是虹膜特征信息,还可以是人脸特征信息、当然还可以是声纹信息或其它类型的生物特征信息,后文中将以生物特征信息为人脸为例来对本公开实施例中的解锁方法进行说明。
在本公开实施例中,当用户想要进入房间时,用户可以通过如图1所示的人脸信息验证区103对准人脸验证自己的人脸信息,进而门锁采集到当前用户的人脸信息。
步骤202:将待验证生物特征信息与预设生物特征信息进行匹配,以确定待验证生物特征信息对应的目标用户是否具有开锁权限。
步骤203:若待验证生物特征信息与预设生物特征信息匹配成功,则确定待验证生物特征信息对应的目标用户具有开锁权限。
如前所述,门锁在采集到当前用户的人脸信息后,将采集到的当前用户的人脸信息与预设生物特征信息即预设人脸信息进行匹配,为了便于描述,本公开实施例中将当前需要进行开锁权限验证的用户称作目标用户,即将采集到待验证生物特征信息对应的用户称作目标用户。具体的,预设的生物特征信息包含有可以解锁该门锁的预设的所有的人脸信息,还可以包括所有具有开锁权限的用户的人脸信息相对应的身份信息关系,根据匹配结果确定待验证生物特征信息对应的目标用户以及该目标用户是否具有开锁权限,具体的,若匹配成功则表明目标用户具有开锁权限。采用生物特征信息进行开锁权限验证的具体实施方式可以采用现有的任意方式,本公开实施例不做限制。
例如,假设拥有对门锁的开锁权限的用户有三人,分别为A、B、C,则A、B、C的人脸信息可以预设为该门锁的预设生物特征信息,且A、B、C的人脸信息与A、B、C的身份对应关系也可以预先存储,若待验证生物特征信息为A的人脸信息,那么由于A的人脸信息存在于预设生物特征信息中,此时则可以确定A具有开锁权限,进而根据前述的身份对应关系确定出该待验证生物特征信息对应的目标用户为A。
步骤204:在目标用户具有开锁权限时,判断目标用户当前是否可能执行开锁操作。
如前所述,在现有的解锁方式中,在进行解锁时一般仅在生物特征信息匹配时则会进行解锁,这其中存在生物特征信息被盗取冒用的情况,所以为了提高解锁的安全性和准确性,进一步地,本公开实施例中还可以判断目标用户当前是否可能执行开锁操作,以通过二次验证的方式来提高解锁的安全性。在不同的应用场景中,可以采用不同的判断方式来判断目标用户是否可能执行开锁操作。
在本公开实施例中,大致可以采用基于状态参考信息、基于位置信息以及开锁针对的目标房间内的当前的环境图像信息这三类方式来判断当前目标用户是否可能执行开锁操 作。
其中,基于状态参考信息的方式例如是基于生物传感器获取的目标用户的状态参考信息,例如通过目标用户随身佩戴的心率传感器采集得到的目标用户的心率的数值,该心率的数值即可理解为本公开实施例中的状态参考信息,基于状态参考信息的判断方式能够直观地反映用户的身体状态,从而可以体现出用户当前的实际状态或动作,可以提高判断的准确性。
基于目标用户的位置的方式例如是获取目标用户当前的位置信息,进而判断当前是否可能执行开锁操作,也就是说,在前述的基于目标用户状态参考的方式的基础上还提供了另一种可选的判断方式,从而增强方案的适用性和灵活性,并且由于是通过实时的位置动态的进行确定,通过可变的位置信息的确定方式使得确定的针对性更强,进一步地提高准确性和灵活性。
基于获得开锁针对的目标房间的图像信息来判断目标用户是否可能进行开锁操作的判断方式,可以更实时有效的确定目标用户是否可能执行开锁操作,增强了门锁的安全性,从而提升用户体验。
为了便于本领域技术人员理解,以下列举几种可能的方式来说明如何从判断目标用户是否可能执行开锁操作,应该理解的是,以下举例只是示意性的说明,其并不对本公开实施例构成限定,除去以下所列举的方式,在具体实施过程中还可以再采用其它的确定方式,本文中并不穷举。
第一种判断方式如图3所示的流程图所示,具体实施过程如下。
步骤301:获得目标用户的状态参考信息;
步骤302:根据状态参考信息,判断目标用户当前是否处于睡眠状态;
步骤303:若处于睡眠状态,则确定目标用户当前不可能执行开锁操作。
在第一种判断方式中,获得目标用户的状态参考信息的方式可以是获取目标用户的心率信息,根据心率信息表征的心率值判断目标用户当前是否处于睡眠状态,具体的,当确定目标用户之后,门锁可以通过内置的无线通信模块获取目标用户的心率信息,具体来说,可以向目标用户配置的生物传感器请求发送该目标用户的心率信息,或者,该生物传感器可以定时将目标用户的心率信息上报,以便于门锁能够及时地获得目标用户的动态的心率信息。其中,无线通信模块可以是低功耗蓝牙(Bluetooth Low Energy,BLE)模块,近距离无线通讯技术(Near Field Communication、NFC)、无线保真(Wireless Fidelity,WiFi)、移动网络模块,等等,可以根据实际需要确定使用哪种无线通信模块,本公开实施例不做限定。
在具体的实践过程中,当确定目标用户之后,通过门锁中的无线通信模块可以获得目标用户的穿戴设备(例如智能手环)测量的心率值,然后将这个心率值与门锁中预设的心率范围进行比较,判断目标用户是否处于睡眠状态,具体的,在实践过程中,可以根据正常人安静的时候:成年男性的心率是:60-80次/min、女性的心率是:70-90次/min;入睡状态时,心率一般较低,例如是:男性为50-70次/min、女性为60-70次/min来设置预设的心率范围,从而通过比较可以判断目标用户当前是否处于睡眠状态。
例如,预设的睡觉时的心率范围为:男性的心率为50-70次/min、女性的心率60-70次/min,确定的目标用户为爸爸,且获得的爸爸的心率值为65,根据预设的心率范围可以判断出爸爸的心率值处于睡觉状态对应的心率范围内,那么则可以确定爸爸当前处于睡眠状态,由于正在睡觉,那么自然就不可能再执行开锁操作。
在第一种判断方式中,状态参考信息还可以是目标用户的用户图像信息,通过对获得的用户图像信息进行图像分析,可以确定目标用户的姿势或动作,进而根据确定出的姿势或动作来判断目标用户当前是否正在睡觉,若确定目标用户处于睡眠状态,那么自然就不可能再执行开锁操作。
第二种判断方式如图4所示的流程图所示,具体实施过程如下:
步骤401:获得与目标用户对应的终端设备发送的当前位置信息;
步骤402:根据当前位置信息,判断目标用户当前所处的位置是否在预设距离之外;
步骤403:若在预设距离之外,则确定目标用户当前不可能执行开锁操作。
在第二种判断方式中,在确定目标用户之后,可以获得目标用户对应的终端设备的当前位置信息,具体的,终端设备可以是手机、穿戴设备等目标用户携带的并可以向门锁发送位置信息的设备,然后根据获得的当前位置信息判断目标用户当前所处的位置是否在预设距离之外,该预设距离可以以门锁自身所处的位置为基准,例如将预设距离设置为距离门锁10米,若目标用户当前所处的位置是在预设距离之外,即表明目标用户当前距离门锁是较远的,那么自然就不可能录入生物特征信息进行开锁操作。
例如,假设确定的目标用户为A,以智能设备为手机、预设范围为10米为例,门锁通过无线通信模块获得目标用户A使用的手机当前所处的位置距离门锁为50公里,即表明目标用户A当前也在距离50公里的位置,其根本不可能在门锁上录入他的生物特征信息进行开锁,此时则可以认为门锁采集到的待验证生物特征信息是别人冒用目标用户A的,此次开锁请求是非法、不安全的。
另外,若目标用户的当前位置在预设距离之内,为了进一步确保安全,门锁可以向目标用户携带的终端设备发送开锁验证指示,以通过该开锁验证指示终端设备反馈预设验证 信息,例如,以终端设备为手机为例,门锁向手机发送开锁验证指示,手机接收到开锁验证指示之后,用户可以通过手机向门锁反馈预设验证信息,根据是否接收到正确的预设验证信息来判断目标用户是否可能执行开锁操作,或者,如若是盗用的用户可能根本就不会向门锁返回验证信息,所以门锁也就不可能接收到手机发送的预设验证信息。具体的,预设验证信息可以是一个预设的密码信息,或者一个预设的口令信息,或者是一个预设的手势图案信息等等,通过向用户携带的手机发送验证的方式可以在位置匹配的基础上进一步地开锁的安全性,例如,用户的指纹信息可能被别人盗取,如果用户的手机也正好被盗用了的话,仅根据生物特征信息和位置信息所作出的判断也是不准确的。
例如,目标用户的当前位置信息在预设之内且预设验证信息是356783,则门锁可以向目标用户对应的终端设备发送开锁验证指示,目标用户对应的终端设备接收到改开锁验证指示之后,若是真实的目标用户则可以在手机中输入356783,以成功开锁,若是盗用的用户,那么则无法知道356783的预设验证信息,所以无法通过手机向门锁反馈正确的预设验证信息,此时门锁则会拒绝解锁,从而确保开锁的合法和安全。
上述的第二种判断方式,可以更好的提高门锁解锁的安全性,从而提升用户体验,避免了用户的开锁生物特征被人复制且终端设备被人盗走时的门锁被开的情况发生。
第三种判断方式,可以先获得开锁针对的目标房间内的当前的环境图像信息,再根据获得的环境图像信息判断目标用户当前是否位于目标房间之内,若确定目标用户位于目标房间之内,则确定目标用户当前不可能执行开锁操作。
在第三种判断方式中,可以通过开锁针对的房间内的摄像头或者其他具有摄像功能的设备获取该房间内的当前的环境图像信息,为了便于描述以下将开锁针对的目标房间称为目标房间,具体的,环境图像信息可以包括目标房间内的所有图像信息,例如家具、人、动物等的图像信息,门锁在获得目标房间内的环境图像信息之后,可以对其进行图像识别以判断目标用户是否位于目标房间之内,具体的,例如可以通过人脸识别技术判断目标用户是目标房间之内,或者还可以采用其他的方式来基于获得的环境图像信息来判断目标用户是否处于目标房间之内。
第三种判断方式,根据目标房间内的环境图像信息与目标用户的生物特征信息(例如人脸图像信息)进行匹配,可以更实时有效的确定目标用户是否在房间内,如果确定目标用户在房间内,那么目标用户根本就没有必要进行开锁操作,通过该判断方式也可以在一定程度上增强门锁的安全性,从而提升用户体验。
步骤205:若目标用户当前不可能执行开锁操作,则拒绝解锁。
在本公开实施例中,基于前述的判断方式,若判断出目标用户当前不可能进行解锁, 则拒绝解锁,进而确保开锁的安全性。进一步地,若在某个时间段内,例如在十分钟内,该目标用户一直在频繁地进行解锁,且被不断拒绝解锁,那么门锁还可以通过无线通信模块向目标用户对应的终端设备发送提示信息,从而对用户进行有效提示,增强门锁的安全性,提升了用户体验。
本公开实施例中,在基于用户的生物特征信息进行解锁的时候,门锁可以先采集用户的待验证生物特征信息,然后将采集到的待验证生物特征信息与预设生物特征信息进行匹配,以判断待验证生物特征信息对应的目标用户是否具有开锁权限,从而实现基于生物特征信息进行的开锁权限的验证,进一步地,在确定采集到的待验证生物特征信息对应的目标用户具备开锁权限时,还会进一步地判断该目标用户当前是否有可能执行开锁操作,若确定该目标用户当前不可能执行开锁操作,即使生物特征信息验证通过也会拒绝解锁,这样可以在用户的生物特征信息被别人盗用开锁的情形下,通过验证用户实际开锁的可能性来进一步地提高解锁的准确性,从而确保开锁安全,提高门锁的安全性,进而提升用户的使用体验。
基于同一发明构思,本公开实施例提供了一种用于解锁装置,该解锁装置能够实现前述的解锁方法对应的功能。该解锁装置可以是硬件结构、软件模块、或硬件结构加软件模块。该解锁装置可以由芯片系统实现,芯片系统可以由芯片构成,也可以包含芯片和其他分立器件。请参见图5所示,该解锁装置包括采集模块501、确定模块502、判断模块503和处理模块504。其中:
采集模块501,用于采集待验证生物特征信息;
确定模块502,用于将待验证生物特征信息与预设生物特征信息进行匹配,以确定待验证生物特征信息对应的目标用户是否具有开锁权限;其中,若匹配成功则表明目标用户具有开锁权限;
判断模块503,用于在目标用户具有开锁权限时,判断目标用户当前是否可能执行开锁操作;
处理模块504,用于若目标用户当前不可能执行开锁操作,则拒绝解锁。
在一种可能的实施方式中,判断模块503,用于获得目标用户的状态参考信息;根据状态参考信息,判断目标用户当前是否处于睡眠状态;以及若处于睡眠状态,则确定目标用户当前不可能执行开锁操作。
在一种可能的实施方式中,判断模块503,用于在状态参考信息为目标用户的心率信息时,根据心率信息表征的心率值判断目标用户当前是否处于睡眠状态;或者,在状态参考信息为目标用户的用户图像信息时,根据用户图像信息表征的姿势或动作判断目标用户 当前是否处于睡眠状态。
在一种可能的实施方式中,判断模块503,用于获得与目标用户对应的终端设备发送的当前位置信息;根据当前位置信息,判断目标用户当前所处的位置是否在预设距离之外;以及若在预设距离之外,则确定目标用户当前不可能执行开锁操作。
在一种可能的实施方式中,判断模块503,还用于若在预设距离之内,向终端设备发送开锁验证指示,其中,开锁验证指示用于指示终端设备反馈预设验证信息;若未接收终端设备发送的预设验证信息,则确定目标用户当前不可能执行开锁操作。
在一种可能的实施方式中,判断模块503,用于获得开锁针对的目标房间内的当前的环境图像信息;根据当前的环境图像信息,判断目标用户当前是否位于目标房间之内;以及若位于目标房间之内,则确定目标用户当前不可能执行开锁操作。
前述的解锁方法的实施例涉及的各步骤的所有相关内容均可以援引到本公开实施例中的解锁装置所对应的功能模块的功能描述,在此不再赘述。
本公开实施例中对模块的划分是示意性的,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,另外,在本公开各个实施例中的各功能模块可以集成在一个处理器中,也可以是单独物理存在,也可以两个或两个以上模块集成在一个模块中。上述集成的模块既可以采用硬件的形式实现,也可以采用软件功能模块的形式实现。
基于同一发明构思,本公开实施例提供一种门锁,请参见图6所示,该门锁包括至少一个处理器601,以及与至少一个处理器连接的存储器602,本公开实施例中不限定处理器601与存储器602之间的具体连接介质,图6中是以处理器601和存储器602之间通过总线600连接为例,总线600在图6中以粗线表示,其它部件之间的连接方式,仅是进行示意性说明,并不引以为限。总线600可以分为地址总线、数据总线、控制总线等,为便于表示,图6中仅用一条粗线表示,但并不表示仅有一根总线或一种类型的总线。另外,该门锁还可以包括无线通信模块603,该无线通信模块也可以通过总线600与处理器601和存储器602连接,并且能够根据存储器602的储存信息进行匹配,判断目标用户是否可能进行解锁操作。
在本公开实施例中,存储器602存储有可被至少一个处理器601执行的指令,至少一个处理器601通过执行存储器602存储的指令,可以执行前述的解锁方法中所包括的步骤。
其中,处理器601是门锁的控制中心,可以利用各种接口和线路连接整个门锁的各个部分,通过运行或执行存储在存储器602内的指令以及调用存储在存储器602内的数据,门锁的各种功能和处理数据,从而对门锁进行整体监控。
可选的,处理器601可包括一个或多个处理单元,处理器601可集成应用处理器和调 制解调处理器,其中,应用处理器主要处理操作系统、用户界面和应用程序等,调制解调处理器主要处理无线通信。可以理解的是,上述调制解调处理器也可以不集成到处理器601中。在一些实施例中,处理器601和存储器602可以在同一芯片上实现,在一些实施例中,它们也可以在独立的芯片上分别实现。
处理器601可以是通用处理器,例如中央处理器(CPU)、数字信号处理器、专用集成电路、现场可编程门阵列或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件,可以实现或者执行本公开实施例中公开的各方法、步骤及逻辑框图。通用处理器可以是微处理器或者任何常规的处理器等。结合本公开实施例所公开的方法的步骤可以直接体现为硬件处理器执行完成,或者用处理器中的硬件及软件模块组合执行完成。
存储器602作为一种非易失性计算机可读存储介质,可用于存储非易失性软件程序、非易失性计算机可执行程序以及模块。存储器602可以包括至少一种类型的存储介质,例如可以包括闪存、硬盘、多媒体卡、卡型存储器、随机访问存储器(Random Access Memory,RAM)、静态随机访问存储器(Static Random Access Memory,SRAM)、可编程只读存储器(Programmable Read Only Memory,PROM)、只读存储器(Read Only Memory,ROM)、带电可擦除可编程只读存储器(Electrically Erasable Programmable Read-Only Memory,EEPROM)、磁性存储器、磁盘、光盘等等。存储器602是能够用于携带或存储具有指令或数据结构形式的期望的程序代码并能够由计算机存取的任何其他介质,但不限于此。本公开实施例中的存储器602还可以是电路或者其它任意能够实现存储功能的装置,用于存储程序指令和/或数据。
通过对处理器601进行设计编程,可以将前述实施例中介绍的解锁方法所对应的代码固化到芯片内,从而使芯片在运行时能够执行前述的解锁方法的步骤,如何对处理器601进行设计编程为本领域技术人员所公知的技术,这里不再赘述。
基于同一发明构思,本公开实施例还提供一种非瞬时性可读存储介质,该存储介质存储有计算机指令,当该计算机指令在计算机上运行时,使得计算机执行如前述的解锁方法的步骤。
在一些可能的实施方式中,本公开提供的解锁方法的各个方面还可以实现为一种程序产品的形式,其包括程序代码,当所述程序产品在解锁设备上运行时,所述程序代码用于使该解锁设备执行本说明书上述描述的根据本公开各种示例性实施方式的解锁方法中的步骤。
本领域内的技术人员应明白,本公开的实施例可提供为方法、系统、或计算机程序产品。因此,本公开可采用完全硬件实施例、完全软件实施例、或结合软件和硬件方面的实 施例的形式。而且,本公开可采用在一个或多个其中包含有计算机可用程序代码的计算机可用存储介质(包括但不限于磁盘存储器和光学存储器等)上实施的计算机程序产品的形式。
本领域内的技术人员应明白,本公开的实施例可提供为方法、系统、或计算机程序产品。因此,本公开可采用完全硬件实施例、完全软件实施例、或结合软件和硬件方面的实施例的形式。而且,本公开可采用在一个或多个其中包含有计算机可用程序代码的计算机可用存储介质(包括但不限于磁盘存储器和光学存储器等)上实施的计算机程序产品的形式。
本公开是参照根据本公开实施例的方法、设备(系统)、和计算机程序产品的流程图和/或方框图来描述的。应理解可由计算机程序指令实现流程图和/或方框图中的每一流程和/或方框、以及流程图和/或方框图中的流程和/或方框的结合。可提供这些计算机程序指令到通用计算机、专用计算机、嵌入式处理机或其他可编程数据处理设备的处理器以产生一个机器,使得通过计算机或其他可编程数据处理设备的处理器执行的指令产生用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的装置。
这些计算机程序指令也可存储在能引导计算机或其他可编程数据处理设备以特定方式工作的计算机可读存储器中,使得存储在该计算机可读存储器中的指令产生包括指令装置的制造品,该指令装置实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能。
这些计算机程序指令也可装载到计算机或其他可编程数据处理设备上,使得在计算机或其他可编程设备上执行一系列操作步骤以产生计算机实现的处理,从而在计算机或其他可编程设备上执行的指令提供用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的步骤。
显然,本领域的技术人员可以对本公开进行各种改动和变型而不脱离本公开的精神和范围。这样,倘若本公开的这些修改和变型属于本公开权利要求及其等同技术的范围之内,则本公开也意图包含这些改动和变型在内。

Claims (10)

  1. 一种解锁方法,所述方法包括:
    采集待验证生物特征信息;
    将所述待验证生物特征信息与预设生物特征信息进行匹配,以确定所述待验证生物特征信息对应的目标用户是否具有开锁权限;其中,若匹配成功则表明所述目标用户具有开锁权限;
    在所述目标用户具有开锁权限时,判断所述目标用户当前是否可能执行开锁操作;
    若所述目标用户当前不可能执行开锁操作,则拒绝解锁。
  2. 如权利要求1所述的方法,其中,判断所述目标用户当前是否可能执行开锁操作,包括:
    获得所述目标用户的状态参考信息;
    根据所述状态参考信息,判断所述目标用户当前是否处于睡眠状态;
    若处于所述睡眠状态,则确定所述目标用户当前不可能执行开锁操作。
  3. 如权利要求2所述的方法,其中,根据所述状态参考信息,判断所述目标用户当前是否处于睡眠状态,包括:
    在所述状态参考信息为所述目标用户的心率信息时,根据所述心率信息表征的心率值判断所述目标用户当前是否处于睡眠状态;或者,
    在所述状态参考信息为所述目标用户的用户图像信息时,根据所述用户图像信息表征的姿势或动作判断所述目标用户当前是否处于睡眠状态。
  4. 如权利要求1所述的方法,其中,确定所述目标用户当前是否可能执行开锁操作,包括:
    获得与所述目标用户对应的终端设备发送的当前位置信息;
    根据所述当前位置信息,判断所述目标用户当前所处的位置是否在预设距离之外;
    若在所述预设距离之外,则确定所述目标用户当前不可能执行开锁操作。
  5. 如权利要求4所述的方法,所述方法还包括:
    若在所述预设距离之内,向所述终端设备发送开锁验证指示,其中,所述开锁验证指示用于指示所述终端设备反馈预设验证信息;
    若未接收所述终端设备发送的所述预设验证信息,则确定所述目标用户当前不可能执行开锁操作。
  6. 如权利要求1所述的方法,其中,确定所述目标用户当前是否可能执行开锁操作,包括:
    获得开锁针对的目标房间内的当前的环境图像信息;
    根据所述当前的环境图像信息,判断所述目标用户当前是否位于所述目标房间之内;
    若位于所述目标房间之内,则确定所述目标用户当前不可能执行开锁操作。
  7. 一种解锁装置,解锁装置包括:
    采集模块,用于采集待验证生物特征信息;
    确定模块,用于将所述待验证生物特征信息与预设生物特征信息进行匹配,以确定所述待验证生物特征信息对应的目标用户是否具有开锁权限;其中,若匹配成功则表明所述目标用户具有开锁权限;
    判断模块,用于在所述目标用户具有开锁权限时,判断所述目标用户当前是否可能执行开锁操作;
    处理模块,用于若所述目标用户当前不可能执行开锁操作,则拒绝解锁。
  8. 如权利要求7所述的装置,其中,所述判断模块用于:
    获得所述目标用户的状态参考信息;
    根据所述状态参考信息,判断所述目标用户当前是否处于睡眠状态;
    若处于所述睡眠状态,则确定所述目标用户当前不可能执行开锁操作。
  9. 一种门锁,所述门锁包括:
    存储器,用于存储程序指令;
    处理器,用于调用所述存储器中存储的程序指令,按照获得的程序指令执行权利要求1-6任一所述的方法包括的步骤;
    无线通信模块,用于获得目标用户的状态参考信息、位置信息、目标房间图像信息。
  10. 一种非瞬时性计算机可读存储介质,所述存储介质存储有计算机可执行指令,所述计算机可执行指令用于使计算机执行权利要求1-6任一所述的方法包括的步骤。
PCT/CN2019/101055 2018-10-19 2019-08-16 解锁方法、装置和门锁 WO2020078094A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201811222821.4 2018-10-19
CN201811222821.4A CN109410398A (zh) 2018-10-19 2018-10-19 一种解锁方法、装置、门锁及存储介质

Publications (1)

Publication Number Publication Date
WO2020078094A1 true WO2020078094A1 (zh) 2020-04-23

Family

ID=65467889

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/101055 WO2020078094A1 (zh) 2018-10-19 2019-08-16 解锁方法、装置和门锁

Country Status (2)

Country Link
CN (1) CN109410398A (zh)
WO (1) WO2020078094A1 (zh)

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109410398A (zh) * 2018-10-19 2019-03-01 珠海格力电器股份有限公司 一种解锁方法、装置、门锁及存储介质
CN110505295B (zh) * 2019-08-20 2022-04-29 创新先进技术有限公司 一种解锁信息设置方法、装置及设备
CN111259787B (zh) * 2020-01-15 2022-09-06 杭州市第一人民医院 开锁方法、装置、计算机设备和存储介质
CN111462363A (zh) * 2020-04-13 2020-07-28 昆山伊莱智能软件科技有限公司 一种基于人脸识别的智能门锁装置系统
CN112261632B (zh) * 2020-10-10 2024-03-12 深圳市锐尔觅移动通信有限公司 设备解锁方法、装置、控制系统以及计算机可读介质
CN112184968A (zh) * 2020-10-16 2021-01-05 云南电网有限责任公司丽江供电局 一种配电网箱智能锁具控制方法及装置
CN112381972B (zh) * 2020-11-10 2022-08-19 珠海优特电力科技股份有限公司 作业位置的确认方法及装置、存储介质、电子装置
CN117062000A (zh) * 2022-05-06 2023-11-14 华为技术有限公司 一种通信控制方法及通信装置

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2015078529A (ja) * 2013-10-17 2015-04-23 株式会社ケイナイン 電子錠管理システム
CN105872255A (zh) * 2016-05-31 2016-08-17 努比亚技术有限公司 一种实现快捷解锁的设备及方法
CN107391993A (zh) * 2017-07-27 2017-11-24 深圳市泰衡诺科技有限公司 一种基于智能终端的指纹解锁方法及指纹解锁系统
CN107633573A (zh) * 2017-07-28 2018-01-26 移康智能科技(上海)股份有限公司 一种智能门锁的开锁方法及智能门锁
CN107845165A (zh) * 2017-08-31 2018-03-27 郑州云海信息技术有限公司 一种服务器机柜门控制方法、装置及终端
CN108614437A (zh) * 2018-04-12 2018-10-02 广东汇泰龙科技有限公司 一种双摄像头云锁与家具电器的联动方法及系统
CN109410398A (zh) * 2018-10-19 2019-03-01 珠海格力电器股份有限公司 一种解锁方法、装置、门锁及存储介质

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103177494A (zh) * 2013-03-26 2013-06-26 姬志刚 非正常状态下的开门者不能开启的门禁系统
CN104916010A (zh) * 2014-03-13 2015-09-16 北京弘天智达科技有限公司 移动设备的控制系统和穿戴式控制设备
JP6827918B2 (ja) * 2014-06-11 2021-02-10 ヴェリディウム アイピー リミテッド 生体情報に基づいて、ユーザの車両へのアクセスを容易にするためのシステムと方法
CN105303670A (zh) * 2015-12-04 2016-02-03 马孝康 门禁管理方法、装置及系统
CN105976464A (zh) * 2016-04-29 2016-09-28 宇龙计算机通信科技(深圳)有限公司 一种门禁锁控制方法、装置及终端
CN106296916A (zh) * 2016-08-08 2017-01-04 京东方科技集团股份有限公司 一种门禁控制方法及装置
CN206657411U (zh) * 2017-04-07 2017-11-21 周廷云 智能门锁系统

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2015078529A (ja) * 2013-10-17 2015-04-23 株式会社ケイナイン 電子錠管理システム
CN105872255A (zh) * 2016-05-31 2016-08-17 努比亚技术有限公司 一种实现快捷解锁的设备及方法
CN107391993A (zh) * 2017-07-27 2017-11-24 深圳市泰衡诺科技有限公司 一种基于智能终端的指纹解锁方法及指纹解锁系统
CN107633573A (zh) * 2017-07-28 2018-01-26 移康智能科技(上海)股份有限公司 一种智能门锁的开锁方法及智能门锁
CN107845165A (zh) * 2017-08-31 2018-03-27 郑州云海信息技术有限公司 一种服务器机柜门控制方法、装置及终端
CN108614437A (zh) * 2018-04-12 2018-10-02 广东汇泰龙科技有限公司 一种双摄像头云锁与家具电器的联动方法及系统
CN109410398A (zh) * 2018-10-19 2019-03-01 珠海格力电器股份有限公司 一种解锁方法、装置、门锁及存储介质

Also Published As

Publication number Publication date
CN109410398A (zh) 2019-03-01

Similar Documents

Publication Publication Date Title
WO2020078094A1 (zh) 解锁方法、装置和门锁
KR102038851B1 (ko) 신원들을 검증하기 위한 방법 및 시스템
WO2017113380A1 (zh) 一种指纹识别的方法、装置及触摸屏终端
US10635054B2 (en) Authentication system and method thereof
US9183683B2 (en) Method and system for access to secure resources
US9258301B2 (en) Advanced authentication techniques
US10063541B2 (en) User authentication method and electronic device performing user authentication
EP2083398A1 (en) Biometric Smart Card for Mobile Devices
CN108076426A (zh) 终端追踪方法、装置、存储介质及终端设备
EP1980049A1 (en) Wireless authentication
US20160350761A1 (en) Method and Apparatus for Managing Reference Templates for User Authentication Using Behaviometrics
WO2015065749A1 (en) Attempted security breach remediation
CN108804006A (zh) 用于可穿戴设备的解锁方法、装置、设备和存储介质
CN108154017A (zh) 一种基于智能终端的密码验证方法及密码验证系统
CN111241566A (zh) 保单管理方法、电子装置、计算机设备及存储介质
US20220414194A1 (en) Method and system for user authentication
Sanchez-Reillo et al. Strengths, weaknesses and recommendations in implementing biometrics in mobile devices
CN106295285B (zh) 一种信息处理方法及电子设备
CN104866744B (zh) 一种信息处理方法及电子设备
US20240073207A1 (en) User authentication
KR102303258B1 (ko) 생체인식을 이용한 프로그램 접근제어 관리 방법
KR20180089944A (ko) 심박 신호를 이용한 인증 시스템 및 방법
US20240202300A1 (en) Vehicle-mounted system and operation method thereof
WO2022237550A1 (zh) 一种防止隐私泄露的门禁认证方法、装置及系统
WO2022237546A1 (zh) 一种可变生物特征的可脱机认证方法、设备及系统

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19873454

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 19873454

Country of ref document: EP

Kind code of ref document: A1