WO2021238121A1 - 一种智能锁具及其开锁认证方法和装置 - Google Patents

一种智能锁具及其开锁认证方法和装置 Download PDF

Info

Publication number
WO2021238121A1
WO2021238121A1 PCT/CN2020/132203 CN2020132203W WO2021238121A1 WO 2021238121 A1 WO2021238121 A1 WO 2021238121A1 CN 2020132203 W CN2020132203 W CN 2020132203W WO 2021238121 A1 WO2021238121 A1 WO 2021238121A1
Authority
WO
WIPO (PCT)
Prior art keywords
unlocking
working mode
information
smart lock
authentication
Prior art date
Application number
PCT/CN2020/132203
Other languages
English (en)
French (fr)
Inventor
戴志美
Original Assignee
歌尔股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 歌尔股份有限公司 filed Critical 歌尔股份有限公司
Publication of WO2021238121A1 publication Critical patent/WO2021238121A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00563Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys using personal physical data of the operator, e.g. finger prints, retinal images, voicepatterns

Definitions

  • the invention relates to the field of intelligent security, and in particular to an intelligent lock and an unlocking authentication method and device thereof.
  • the purpose of the present invention is to provide a smart lock and its unlocking authentication method and device to improve the safety of the smart lock, and while ensuring the safety of the smart lock in use, improve the flexibility of the use scene and enhance the user experience.
  • an unlocking authentication method for a smart lock including:
  • the working mode includes: a first-level safe working mode and a second-level safe working mode;
  • the unlocking information and the unlocking authorization information of the authenticated user terminal are acquired, and the unlocking authentication is performed according to the unlocking information and the unlocking authorization information; wherein, the unlocking information is The data collected by the unlocking collection device of the smart lock for unlocking;
  • the unlocking information is acquired, and the unlocking authentication is performed according to the unlocking information.
  • the working mode further includes a three-level safety working mode
  • the working mode after obtaining the unlock request and determining the current working mode, it further includes:
  • the unlocking operation is performed.
  • the method further includes:
  • the working mode further includes a four-level safety working mode
  • the working mode after obtaining the unlock request and determining the current working mode, it further includes:
  • the unlocking authorization information is acquired, and the unlocking authentication is performed according to the unlocking authorization information.
  • the acquiring unlocking information and the unlocking authorization information of the authenticated user terminal, and performing unlocking authentication according to the unlocking information and the unlocking authorization information includes:
  • the unlocking operation is not performed.
  • the sending an unlock authorization request to the authenticated user terminal via a wireless network includes:
  • the determining the current working mode includes:
  • the determining the current working mode includes:
  • the present invention also provides an unlocking authentication device for a smart lock, including:
  • the determining module is used to determine the current working mode after obtaining the unlock request; wherein, the working mode includes: a first-level safe working mode and a second-level safe working mode;
  • the first authentication module is configured to, if the current working mode is the first-level security working mode, obtain unlocking information and the unlocking authorization information of the authenticated user terminal, and perform unlocking authentication according to the unlocking information and the unlocking authorization information;
  • the unlocking information is data collected by the unlocking collection device of the smart lock for unlocking;
  • the second authentication module is configured to obtain unlocking information if the current working mode is the secondary safe working mode, and perform unlocking authentication according to the unlocking information.
  • the present invention also provides a smart lock, including: unlocking collection equipment, a memory, and a processor; wherein the unlocking collection device is used to collect unlocking information; the memory is used to store a computer program, and the processor is used to execute The computer program implements the steps of the unlocking authentication method of the smart lock according to any one of claims 1 to 8.
  • the unlocking authentication method of an intelligent lock includes: determining the current working mode after obtaining the unlocking request; wherein, the working mode includes: a first-level safe working mode and a second-class safe working mode; if the current working The mode is the first-level security working mode, the unlocking information and the unlocking authorization information of the authenticated user terminal are obtained, and the unlocking authentication is performed according to the unlocking information and the unlocking authorization information; among them, the unlocking information is collected by the unlocking collection device of the smart lock for unlocking Data; if the current working mode is the second-level security working mode, the unlocking information is obtained, and the unlocking authentication is performed according to the unlocking information;
  • the present invention performs unlock authentication according to the unlocking information and the unlocking authorization information of the authenticated user terminal when the smart lock is in the first-level safety working mode, so that user authorization is required for each unlocking, and the security is higher, and it is suitable for a longer time at home.
  • Unmanned use scene after obtaining the unlock request, determine the current working mode, so that the smart lock can complete the intelligent switch between the general use scene and the unmanned use scene for a long time, so as to ensure the safety of the smart lock while improving The flexibility of usage scenarios is improved, and the user experience is improved.
  • the present invention also provides an unlocking authentication device for a smart lock and the smart lock, which also has the above-mentioned beneficial effects.
  • FIG. 1 is a flowchart of a method for unlocking and authenticating a smart lock provided by an embodiment of the present invention
  • FIG. 2 is a flowchart of another method for unlocking and authenticating a smart lock provided by an embodiment of the present invention
  • FIG. 3 is a schematic block diagram of the structure of a smart lock provided by an embodiment of the present invention.
  • FIG. 4 is a schematic flowchart of another method for unlocking and authenticating a smart lock provided by an embodiment of the present invention.
  • Fig. 5 is a structural block diagram of an unlocking authentication device for a smart lock provided by an embodiment of the present invention.
  • Fig. 1 is a flowchart of a method for unlocking and authenticating a smart lock according to an embodiment of the present invention.
  • the method can include:
  • Step 101 After obtaining the unlock request, determine the current working mode; wherein the working mode includes: a first-level safe working mode and a second-level safe working mode.
  • the working mode in this step can be a working mode for unlocking and authentication of smart locks.
  • the working mode in this step can include safe working modes corresponding to different security levels, such as secondary safe work corresponding to normal security levels. Mode and the first-level safety working mode corresponding to the higher-level safety level.
  • the processor such as MCU, single-chip microcomputer
  • the processor determines the current working mode after obtaining the unlock request, so that the processor can select the unlocking authentication method corresponding to the security level according to the determined current working mode Perform unlock authentication, realize intelligent conversion of different security levels, and improve the flexibility of using smart locks.
  • the specific number and types of working modes in this step can be set by the designer according to practical scenarios and user needs.
  • the working mode can include the same security level as the smart locks on the market that are suitable for general use scenarios.
  • the secondary security work mode corresponding to the ordinary security level that is, the secure work mode that uses unlocking information such as passwords, voice and/or images for unlock authentication; and a higher level of security suitable for use in scenarios where no one is at home for a long time
  • the first-level security working mode corresponding to the level that is, the safe working mode that uses unlocking information and the unlocking authorization information of the authenticated user terminal for unlocking authentication.
  • the work mode can also include a three-level safety work mode corresponding to a lower security level that is suitable for use scenarios with a large flow of people (for example, there are family gatherings, or some business operations at home will have people coming and going from time to time every day, etc.), and/ Or it is suitable for a four-level security working mode corresponding to a lower security level that does not have a large flow of personnel and avoids multiple settings or leaks of unlocking information. This embodiment does not impose any restriction on this.
  • the specific method for the processor in the smart lock in this step to determine the current working mode can be set by the designer according to practical scenarios and user needs, such as smart locks
  • the processor of the smart lock in this step can determine the obtained selected working mode as the current working mode , That is, the user can select a working mode from multiple different working modes as the working mode of the smart lock at any time by authenticating the user terminal or the control device on the smart lock, that is, the current working mode determined in this step;
  • the processor in this step can determine the current working mode according to the preset smart switching rules; the different working modes of the smart lock are freely switched by the user and the processor
  • the processor can first determine whether the selected working mode is acquired, if the selected working mode is
  • the specific method for the above-mentioned processor to determine the current working mode according to the preset smart switching rule can be set by the designer or user according to practical scenarios and user needs, such as smart switching
  • the rule can be that the smart lock works in the first-level safety work mode by default.
  • the smart lock When the smart lock detects the short-term authorization instruction of the second-level safety work mode sent by the user through the authentication user terminal, it will be in a short time (that is, the first preset time period, For example, switch to the second-level safe working mode within 10 minutes), and then return to the first-level safe working mode; that is, this step may include determining whether the short-term of the second-level safe working mode sent by the authenticated user terminal is received within the first preset time period. Time authorization instruction; if it is, it is determined that the current working mode is the second-level safe working mode; if not, the current working mode is determined to be the first-level safety working mode.
  • the smart switching rule can also be that the smart lock works in the secondary safe working mode by default.
  • the smart lock When the smart lock detects that the unlocking operation has not been performed for a long time (ie the second preset time period, such as 24h), that is, the user has a longer period of time.
  • the smart lock can automatically switch to the first-level safety working mode; that is, this step can include determining whether the unlocking operation has been performed in the second preset time period; if it is, the current working mode is determined to be The second-level safe working mode; if not, the current working mode is determined to be the first-level safe working mode.
  • the working mode of the smart lock also includes the three-level safety working mode and/or the four-level safety working mode, on the basis of the above two smart switching rules, it may also include a certain fixed time period (that is, the third preset time period)
  • the working mode setting is that the time smart lock within the third preset time period switches to the corresponding working mode, and the time smart lock outside the third preset time period switches the working mode according to any of the above smart switching rules, such as
  • the working mode of the smart lock includes a first-level safe working mode, a second-level safe working mode and a third-level safe working mode.
  • the working mode corresponding to the third preset time period is the third-level safe working mode and the smart lock works in the second-level safe working mode by default
  • the processor may first determine whether it is currently in the third preset time period; if so, it is determined that the current working mode is a three-level safe working mode, that is, the working mode corresponding to the third preset time period is a third-level Safe working mode; if not, execute the step of determining whether the unlocking operation has been performed in the second preset time period before. This embodiment does not impose any restriction on this.
  • a step in which the processor of the smart lock obtains the unlock request may also be included.
  • the specific method for the processor of the smart lock to obtain the unlock request can be set by the designer according to the practical scene and user needs. For example, the processor can be pressed or touched when the preset button of the smart lock or the preset position of the touch screen is detected. Then, an unlock request is generated; the processor can also generate an unlock request after detecting the password entered by the user on the button or touch screen; the smart lock is equipped with personnel detection equipment (such as infrared detection equipment and cameras) for detecting people outside the door When the processor detects that someone outside the door or someone stays for a preset time (such as 30s), it can generate an unlock request.
  • This embodiment does not impose any restriction on this.
  • Step 102 If the current working mode is the first-level security working mode, obtain the unlocking information and the unlocking authorization information of the authenticated user terminal, and perform unlocking authentication according to the unlocking information and the unlocking authorization information; where the unlocking information is the unlocking collection of the smart lock Data collected by the device for unlocking.
  • this step can be to add the unlock authentication of the unlock authorization information sent by the authenticated user terminal on the basis of the conventional unlocking information for unlocking authentication when it is determined that the current working mode is the first-level security working mode.
  • the smart lock must be unlocked every time after being authorized by the authenticated user terminal. In this mode, no one can open the smart lock without authorization. The security is higher and it is more suitable for people who are not at home for a long time. scenes to be used.
  • the unlocking information in this step can be data collected by unlocking collection devices of the smart lock (such as buttons, touch screens, cameras, microphones, and short-range wireless receiving devices, etc.) for unlocking, that is, the data of the smart lock in the prior art Input information required for unlock authentication.
  • the specific content of the unlocking information can be set by the designer according to practical scenarios and user needs.
  • the unlocking information can include any one or more of a password, a voice, and an image.
  • the specific method for the processor to acquire the unlocking collection device of the smart lock to collect unlocking information can be set by the designer.
  • the processor can receive the smart lock.
  • the authenticated user terminal in this step may be a user terminal (such as a mobile phone) that has been paired and authenticated with the smart lock.
  • the unlocking authorization information in this step may be the information that the authentication user terminal sends to the smart lock whether the unlocking is allowed this time.
  • the unlocking authorization information may be an unlocking instruction or an unlocking prohibiting instruction.
  • the specific manner in which the processor obtains the unlock authorization information of the authenticated user terminal in this step can be set by the designer.
  • the processor can use a wireless transceiver device (such as a WIFI device) to send the unlock to the authenticated user terminal via a wireless network.
  • the processor can also use the wireless transceiver to send an unlocking authorization request to the authenticated user terminal while turning on the camera to send it to the authenticated user terminal
  • the current image data collected by the camera allows the user of the authenticated user terminal to view the current environment in front of the door, and determine whether the smart lock can be authorized to be opened according to whether the person in front of the door is a member of the family, and return the corresponding unlock authorization information.
  • the specific method for the processor to perform unlock authentication according to the unlocking information and unlocking authorization information in this step can be set by the designer.
  • the unlocking authentication can be performed based on the unlocking information first, and after the unlocking information is authenticated, the unlocking authorization is performed according to the unlocking authorization.
  • the information is unlocked and authenticated, and the unlocking operation is performed after the unlocking authorization information is passed.
  • the unlocking information and the unlocking authorization information can also be separately authenticated. After the unlocking information and the unlocking authorization information are both authenticated, the unlocking operation is performed. This embodiment does not impose any restriction on this.
  • the specific process of unlocking authentication based on the unlocking information and unlocking authorization information in this step can be set by the designer.
  • the same or similar method can be used as the unlocking authentication process of unlocking information in the prior art.
  • the unlocking information is authenticated for unlocking.
  • the voice recognition and voiceprint recognition of the unlocking voice command can be performed to determine whether the unlocking voice command is consistent with the preset It is assumed that the unlocking instruction and the preset voiceprint data are matched; if they are matched, then face recognition is performed on the image data to determine whether the face recognition result is a match; if the face recognition result is a match, it is determined that the unlocking information authentication is passed.
  • the unlocking authentication process of unlocking authorization information can be to determine whether the unlocking authorization information is an unlocking instruction; if the unlocking authorization information is an unlocking instruction, it is determined that the unlocking authorization information is authenticated; if the unlocking authorization information is not an unlocking instruction, that is, the unlocking authorization information is prohibited The unlocking instruction determines that the unlocking authorization information authentication is not passed.
  • Step 103 If the current working mode is the secondary safe working mode, obtain unlocking information, and perform unlocking authentication according to the unlocking information.
  • this step can be that when the current working mode is determined to be the second-level safety working mode, the smart lock uses the unlocking information input by the front door or self-collected unlocking information to perform regular unlocking authentication, avoiding general use scenarios The following avoids the joining of authenticated user terminals, reduces the number of authorizations for authenticated user terminals, and improves user experience.
  • the specific method for obtaining unlocking information in this step and performing unlocking authentication based on the unlocking information can be implemented in the same or similar manner as the unlocking information acquisition and unlocking authentication in step 102, and this embodiment does not do anything about it. limit.
  • this embodiment may also include the step of performing the unlocking operation if the current working mode is the three-level safety working mode, that is, the current When the working mode is a three-level safety working mode, the processor can automatically unlock the lock after obtaining the unlock request, avoiding frequent door opening by the user.
  • this embodiment may also include that if the current working mode is a four-level safety working mode, obtaining unlocking authorization information, and proceeding according to the unlocking authorization information Unlock authentication. That is, when the current working mode is the four-level security working mode, the processor can request to authenticate the unlocking authorization information of the user terminal and perform the unlocking authentication after obtaining the unlocking request each time, so that the user can directly pass the authentication of the user terminal when there is no one in the home.
  • the unlocking control of the smart lock is carried out to avoid the situation that outsiders need to know the password of the smart lock to enter the house, and each unlocking is controlled by the user of the authenticated user terminal, which improves the security.
  • the unlocking authentication is performed according to the unlocking information and the unlocking authorization information of the authenticated user terminal, so that the user's authorization is required for each unlocking, which is more secure and applicable.
  • FIG. 2 is a flowchart of another method for unlocking and authenticating a smart lock provided by an embodiment of the present invention.
  • the method can include:
  • Step 201 According to the infrared signal collected by the infrared detection device of the smart lock, it is judged whether someone stays outside the door for a preset time; if yes, go to step 202.
  • this step can be for the processor in the smart lock to use the infrared detection device (such as infrared sensor) to determine whether someone stays outside the door for a preset time, that is, to determine whether someone wants to enter the house; Whether someone stays outside the door for a preset time, an unlock request is automatically generated, and step 202 is entered for the next unlock authentication process.
  • the infrared detection device such as infrared sensor
  • the processor of the smart lock (such as the MCU in Figure 3) can determine whether the distance value corresponding to the infrared signal is less than the preset distance value for the preset time, so as to determine whether someone is staying outside the door.
  • Set time that is, when the duration that the distance value corresponding to the infrared signal is less than the preset distance value reaches the preset time, it is determined that someone stays outside the door for the preset time.
  • Step 202 Determine whether it is currently in the third preset time period; if so, determine that the current working mode is a three-level safety working mode, and go to step 203; if not, go to step 204.
  • the third preset time period in this embodiment may be a time period corresponding to a preset three-level safety working mode, such as 8:00 to 20:00 every day.
  • the working mode of the smart lock in this embodiment may include a first-level safe working mode, a second-level safe working mode, and a third-level safe working mode. That is to say, as shown in Figure 4, the purpose of this step can be to determine whether the current working mode is in the three-level safe working mode through this step when the third preset time period is set; if so, go directly to step 203 Perform unlocking operations. For example, when a user wants to hold a family gathering on a certain day, many people will visit frequently.
  • the smart lock can be set as the third preset time period from 8:00 to 12:00. Inside, any visitor can unlock the lock; if not, proceed to step 204 to determine whether the current working mode is the first-level safe working mode or the second-level safe working mode.
  • a step of judging whether a third preset time period is set may also be included, if yes, then go to this step; if not, then go directly to step 204.
  • this embodiment is shown as an example of the unlocking authentication method corresponding to different working modes that the processor of a smart lock of a smart lock automatically switches intelligently.
  • users can also be added.
  • the unlocking authentication process corresponding to different working modes can be switched at will.
  • this step it can also include the step of judging whether the selected working mode set by the user is stored; If not, enter this step; if yes, determine the selected work mode as the current work mode, and enter the corresponding steps for unlocking authentication.
  • step 203 when the working mode is selected as the three-level safety working mode, you can go to step 203; when the working mode is selected as the first-level safety working mode, you can go to step 205; when the working mode is selected as the second-level safety working mode, you can go to step 210.
  • Step 203 Perform an unlocking operation.
  • the processor of the smart lock can control the unlocking of the mechanical lock in the smart lock by performing an unlocking operation.
  • Step 204 Determine whether the unlocking operation has been performed in the second preset time period; if not, determine that the current working mode is the first-level safe working mode, and go to step 205; if yes, determine that the current working mode is the second-level safety working mode Safe working mode, and enter step 211;
  • this step can be to determine whether the home has been in an unmanned state for a long time according to whether the unlocking operation has been performed within the second preset time period (for example, 24h), so that the second preset time period No unlocking operation has been performed inside the house, that is, when the home is left unmanned for a long time, the current work mode is determined to be the first-level safe work mode to improve safety; thereby achieving the difference between the first-level safe work mode and the second-level safe work mode Smart switching.
  • the second preset time period for example, 24h
  • Step 205 Acquire the unlocking voice command collected by the microphone of the smart lock and the image data collected by the camera of the smart lock.
  • the smart lock in this embodiment can be provided with a microphone (mic) and a camera, so that the processor (MCU in Figure 3) determines that the current working mode is one In the safe working mode, the microphone is turned on to record the unlocking voice command (that is, audio data) spoken by the user, and the camera is turned on to take pictures to obtain image data.
  • the processor MCU in Figure 3
  • the processor controls the microphone and the camera to simultaneously collect the unlocking voice command and image data as an example. You can also collect the unlocking voice command or image data first, and the unlocking voice command or image data to be collected is authenticated. Later, another type of data is collected, and this embodiment does not impose any restriction on this.
  • Step 206 Perform voice recognition and voiceprint recognition on the unlocking voice command, and determine whether the unlocking voice command matches the preset unlocking command and preset voiceprint data; if not, go to step 207; if yes, go to step 208.
  • the purpose of this step may be that the processor performs voice recognition and voiceprint recognition on the unlocking voice command uttered by the user collected by the microphone. For example, assuming that the preset unlocking command is "unlock", the processor performs the unlocking voice command collected by the microphone Voice recognition and voiceprint recognition. If the voice-recognized unlocking voice command is an "unlock" command, and the voiceprint recognition result matches the pre-stored user's voiceprint data (that is, the preset voiceprint data), the unlocking is collected The voiceprint of the voice command is consistent with the stored voiceprint judgment (the same person).
  • step 207 Make sure that the unlocking voice command matches the preset unlocking command and preset voiceprint data; otherwise, confirm that the unlocking voice command does not match the preset unlocking command and preset data. Assuming that the voiceprint data are matched, you can go directly to step 207 without performing the unlocking operation to end this process, or you can use the display or speaker of the smart lock to output a message indicating that the unlocking voice command matching failed and go to step 207 to prompt the user to speak again Correct voice command for unlocking.
  • Step 207 No unlocking operation is performed.
  • this step may be that when the unlocking authentication is different, the processor does not perform the unlocking operation and ends this process.
  • Step 208 Perform face recognition on the image data to determine whether the face recognition result is a match; if yes, go to step 209; if not, go to step 207.
  • this step can be that the processor performs face recognition on the image data collected by the camera.
  • the face data in the collected image data is consistent with the pre-stored user's face data (the same person), it can be It is determined that the face recognition result is a match, and step 209 may be entered to obtain unlock authorization information.
  • the specific method for performing face recognition on the image data in this step can be implemented in the same or similar manner as the face recognition method in the prior art, and this embodiment does not impose any limitation on this.
  • Step 209 Send an unlock authorization request to the authenticated user terminal via the wireless network, and receive unlock authorization information corresponding to the unlock authorization request.
  • this step may also include determining whether the short-term unlock authorization instruction sent by the authenticated user terminal (the mobile phone in FIG. 4) is received within the first preset time period, that is, the user can
  • the authentication user terminal sends a short-time unlock authorization instruction to the smart lock to authorize the smart lock to perform the unlock operation after the unlock information is authenticated within the first preset time period.
  • the processor in this embodiment uses the wireless communication device to send an unlock authorization request to the authenticated user terminal via the wireless network, it can turn on the camera to collect the current environmental video (ie current image data) and send it to the authentication
  • the user terminal enables the user of the authenticated user terminal to view the current environment in front of the door, and determine whether the smart lock can be authorized to be opened according to whether the person in front of the door is a member of the family.
  • Step 210 Determine whether the unlocking authorization information is an unlocking instruction; if yes, go to step 203; if not, go to step 207.
  • the unlocking authorization information is an unlocking instruction
  • the unlocking information is authenticated consistently, it can prevent some criminals from taking pictures of the user secretly or unlocking the lock after recording.
  • Step 211 Acquire the unlocking voice command collected by the microphone of the smart lock and the image data collected by the camera of the smart lock.
  • Step 212 Perform voice recognition and voiceprint recognition on the unlocking voice command, and determine whether the unlocking voice command matches the preset unlocking command and the preset voiceprint data; if not, go to step 207; if yes, go to step 213.
  • Step 213 Perform face recognition on the image data to determine whether the face recognition result is a match; if yes, go to step 203; if not, go to step 207.
  • step 211 to step 213 are similar to step 205, step 206 and step 208, and will not be repeated here.
  • the working mode of the smart lock in this embodiment may include a two-level safety working mode of a normal security level, a first-level safety working mode of a higher level of security, and a three-level security of a relatively low level of security.
  • Operating mode The ordinary security level can be equal to the security level of smart locks on the market, and is suitable for general scenarios; the higher security level must be authorized by the authenticated user terminal each time before unlocking. In this mode, there is no authorization.
  • the smart lock cannot open the smart lock, and it has higher security and is more suitable for use in scenarios where there is no one at home for a long time; the lower security level is suitable for scenarios where there is a large flow of people (such as family gatherings or home business In some businesses, there will be people coming and going from time to time every day), when people visit frequently, just stay at the door for a while.
  • the smart lock can be opened automatically, and the user does not need to open the door frequently, making it more flexible to use.
  • the intelligent conversion of the working mode between the three security levels not only ensures safety, but also improves the flexibility of use.
  • the embodiment of the present invention enables the smart lock to be switched to different protection levels through the intelligent switching of the three working modes of the first-level safe working mode, the second-level safe working mode, and the third-level safe working mode of the smart lock.
  • the usage scenarios can be more flexible and the user experience can be improved.
  • FIG. 5 is a structural block diagram of an unlocking authentication device for a smart lock provided by an embodiment of the present invention.
  • the device may include:
  • the determining module 10 is used to determine the current working mode after obtaining the unlock request; wherein, the working mode includes: a first-level safe working mode and a second-level safe working mode;
  • the first authentication module 20 is configured to obtain unlocking information and unlocking authorization information of the authenticated user terminal if the current working mode is the first-level security working mode, and perform unlocking authentication according to the unlocking information and the unlocking authorization information; where the unlocking information is The data collected by the unlocking collection device of the smart lock for unlocking;
  • the second authentication module 30 is configured to obtain unlocking information if the current working mode is the secondary safe working mode, and perform unlocking authentication according to the unlocking information.
  • the device may also include:
  • the third authentication module is used to perform an unlocking operation if the current working mode is a three-level safety working mode.
  • the device may also include:
  • the request generation module is used for judging whether someone stays outside the door for a preset time according to the infrared signal collected by the infrared detection device of the smart lock; if it is, it generates an unlock request.
  • the device may also include:
  • the fourth authentication module is used for obtaining unlocking authorization information if the current working mode is a four-level security working mode, and performing unlocking authentication according to the unlocking authorization information.
  • the first authentication module 20 may include:
  • the acquiring sub-module is used to acquire the unlocking voice command collected by the microphone of the smart lock and the image data collected by the camera of the smart lock;
  • the voice sub-module is used to perform voice recognition and voiceprint recognition on the unlocking voice command, and determine whether the unlocking voice command matches the preset unlocking command and preset voiceprint data; if not, the unlocking operation is not performed;
  • the face sub-module is used to perform face recognition on the image data if they are matched, and judge whether the face recognition result is a match; if it is not a match, no unlock operation is performed;
  • the authorization request sub-module is configured to send an unlock authorization request to the authenticated user terminal through the wireless network if there is a match, and receive the unlock authorization information corresponding to the unlock authorization request;
  • the authorization judgment sub-module is used to judge whether the unlocking authorization information is an unlocking instruction; if it is not an unlocking instruction, the unlocking operation is not performed;
  • the unlocking sub-module is used to perform the unlocking operation if it is an unlocking command.
  • the authorization request sub-module may include:
  • the wireless request unit is used to send an unlock authorization request and the current image data collected by the camera of the smart lock to the authenticated user terminal via the wireless network.
  • the determining module 10 may include:
  • the first determining sub-module is used to determine whether the short-term authorization instruction of the second-level safe working mode sent by the authenticated user terminal is received within the first preset time period; if so, determine that the current working mode is the second-level safe working mode ; If not, it is determined that the current working mode is the first-level safe working mode.
  • the determining module 10 may include:
  • the second determining sub-module is used to determine whether the unlocking operation has been performed within the second preset time period; if so, the current working mode is determined to be the second-level safe working mode; if not, the current working mode is determined to be the first-level Safe working mode.
  • the embodiment of the present invention uses the first authentication module 20 to perform unlock authentication according to the unlocking information and the unlocking authorization information of the authenticated user terminal when the smart lock is in the first-level security working mode, so that user authorization is required for each unlocking. It has higher security and is suitable for use scenarios where there is no one at home for a long time; the determination module 10 determines the current working mode after obtaining the unlock request, so that the smart lock can complete general use scenarios and long-term unmanned use scenarios Intelligent switching, so as to ensure the safety of smart locks, at the same time, improve the flexibility of the use scene, and enhance the user experience.
  • the embodiment of the present invention also provides a smart lock, including: unlocking the collection device, a memory, and a processor; wherein the unlocking collection device is used to collect unlocking information; the memory is used to store a computer program, and the processor is used to execute the computer program.
  • a smart lock including: unlocking the collection device, a memory, and a processor; wherein the unlocking collection device is used to collect unlocking information; the memory is used to store a computer program, and the processor is used to execute the computer program.
  • the unlocking collection device in this embodiment may include a microphone for collecting unlocking voice instructions in the unlocking information and a camera for collecting image data in the unlocking information.
  • the unlocking collection device may also include a button or a touch screen for collecting the password in the unlocking information; the unlocking collection device may also include a short-range wireless receiving device that receives all or part of the unlocking information from the user terminal.
  • the smart lock in this embodiment may also include an infrared detection device for collecting infrared signals, so that the processor can generate an unlock request based on the collected infrared signals.
  • an embodiment of the present invention also provides a computer-readable storage medium, and a computer program is stored on the computer-readable storage medium.
  • the computer program is executed by a processor, the unlock authentication of the smart lock provided in any of the above embodiments is realized. Method steps.
  • the steps of the method or algorithm described in combination with the embodiments disclosed herein can be directly implemented by hardware, a software module executed by a processor, or a combination of the two.
  • the software module can be placed in random access memory (RAM), internal memory, read-only memory (ROM), electrically programmable ROM, electrically erasable programmable ROM, registers, hard disks, removable disks, CD-ROMs, or all areas in the technical field. Any other known storage media.

Abstract

一种智能锁具的开锁认证方法、装置及智能锁具,该方法包括:在获取开锁请求后,确定当前的工作模式(101);若当前的工作模式为一级安全工作模式,则获取解锁信息和认证用户终端的解锁授权信息,并根据解锁信息和解锁授权信息进行开锁认证;若当前的工作模式为二级安全工作模式,则获取解锁信息,并根据解锁信息进行开锁认证(102);通过根据解锁信息和认证用户终端的解锁授权信息进行开锁认证,使得每次开锁均需用户授权,安全性更高,适用于家中较长时间无人的使用场景;通过在获取开锁请求后,确定当前的工作模式,使智能锁具可以完成一般使用场景和长时间无人的使用场景的智能切换,从而提高使用场景的灵活性,提升用户体验。

Description

一种智能锁具及其开锁认证方法和装置
本申请要求于2020年5月25日提交中国专利局、申请号为202010449869.X、发明名称为“一种智能锁具及其开锁认证方法和装置”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本发明涉及智能安防领域,特别涉及一种智能锁具及其开锁认证方法和装置。
背景技术
当前市面上智能锁具的产品颇多,有指纹锁和密码锁,也有通过声纹识别或图像识别控制的智能锁,然而这些智能锁指纹锁、密码锁可以通过银粉方式破解,而声纹识别或者图像识别的智能锁除了存在可靠性方面的考虑之外,还可以通过复制的方式被破解,安全隐患仍然存在。
因此,如何能够提高智能锁具的安全性,且在保证智能锁具使用安全的同时,提高实用场景的灵活性,提升用户体验,是现今急需解决的问题。
发明内容
本发明的目的是提供一种智能锁具及其开锁认证方法和装置,以提高智能锁具的安全性,且保证智能锁具使用安全的同时,提高使用场景的灵活性,提升用户体验。
为解决上述技术问题,本发明提供一种智能锁具的开锁认证方法,包括:
在获取开锁请求后,确定当前的工作模式;其中,所述工作模式包括:一级安全工作模式和二级安全工作模式;
若当前的工作模式为所述一级安全工作模式,则获取解锁信息和认证用户终端的解锁授权信息,并根据所述解锁信息和所述解锁授权信息进行开锁 认证;其中,所述解锁信息为智能锁具的解锁采集设备采集的用于开锁的数据;
若当前的工作模式为所述二级安全工作模式,则获取解锁信息,并根据所述解锁信息进行开锁认证。
可选的,所述工作模式还包括三级安全工作模式时,所述在获取开锁请求后,确定当前的工作模式之后,还包括:
若当前的工作模式为三级安全工作模式,则执行开锁操作。
可选的,所述在获取开锁请求后,确定当前的工作模式之前,还包括:
根据所述智能锁具的红外检测设备采集的红外信号,判断门外是否有人停留预设时间;
若是,则生成所述开锁请求。
可选的,所述工作模式还包括四级安全工作模式时,所述在获取开锁请求后,确定当前的工作模式之后,还包括:
若当前的工作模式为四级安全工作模式,获取所述解锁授权信息,并根据所述解锁授权信息进行开锁认证。
可选的,所述获取解锁信息和认证用户终端的解锁授权信息,并根据所述解锁信息和所述解锁授权信息进行开锁认证,包括:
获取所述智能锁具的麦克风采集的开锁语音指令和所述智能锁具的摄像头采集的图像数据;
对所述开锁语音指令进行语音识别和声纹识别,判断所述开锁语音指令是否与预设开锁指令和预设声纹数据均匹配;
若否,则不执行所述开锁操作;
若是,则对所述图像数据进行人脸识别,判断人脸识别结果是否为匹配;
若不为匹配,则不执行所述开锁操作;
若为匹配,则通过无线网络向所述认证用户终端发送解锁授权请求,并接收所述解锁授权请求对应的解锁授权信息;
判断所述解锁授权信息是否为解锁指令;
若为所述解锁指令,则执行所述开锁操作;
若不为所述解锁指令,则不执行所述开锁操作。
可选的,所述通过无线网络向所述认证用户终端发送解锁授权请求,包 括:
通过无线网络向所述认证用户终端发送所述解锁授权请求和所述智能锁具的摄像头采集的当前图像数据。
可选的,所述确定当前的工作模式,包括:
判断前第一预设时间段内是否接收到所述认证用户终端发送的所述二级安全工作模式的短时授权指令;
若是,则确定当前的工作模式为所述二级安全工作模式;
若否,则确定当前的工作模式为所述一级安全工作模式。
可选的,所述确定当前的工作模式,包括:
判断前第二预设时间段内是否执行过所述开锁操作;
若是,则确定当前的工作模式为所述二级安全工作模式;
若否,则确定当前的工作模式为所述一级安全工作模式。
本发明还提供了一种智能锁具的开锁认证装置,包括:
确定模块,用于在获取开锁请求后,确定当前的工作模式;其中,所述工作模式包括:一级安全工作模式和二级安全工作模式;
第一认证模块,用于若当前的工作模式为所述一级安全工作模式,则获取解锁信息和认证用户终端的解锁授权信息,并根据所述解锁信息和所述解锁授权信息进行开锁认证;其中,所述解锁信息为智能锁具的解锁采集设备采集的用于开锁的数据;
第二认证模块,用于若当前的工作模式为所述二级安全工作模式,则获取解锁信息,并根据所述解锁信息进行开锁认证。
本发明还提供了一种智能锁具,包括:解锁采集设备、存储器和处理器;其中,所述解锁采集设备用于采集解锁信息;所述存储器,用于存储计算机程序,所述处理器用于执行所述计算机程序时实现如权利要求1至8任一项所述的智能锁具的开锁认证方法的步骤。
本发明所提供的一种智能锁具的开锁认证方法,包括:在获取开锁请求后,确定当前的工作模式;其中,工作模式包括:一级安全工作模式和二级安全工作模式;若当前的工作模式为一级安全工作模式,则获取解锁信息和认证用户终端的解锁授权信息,并根据解锁信息和解锁授权信息进行开锁认证;其中,解锁信息为智能锁具的解锁采集设备采集的用于开锁的数据;若 当前的工作模式为二级安全工作模式,则获取解锁信息,并根据解锁信息进行开锁认证;
可见,本发明通过智能锁具在一级安全工作模式时,根据解锁信息和认证用户终端的解锁授权信息进行开锁认证,使得每次开锁均需用户授权,安全性更高,适用于家中较长时间无人的使用场景;通过在获取开锁请求后,确定当前的工作模式,使智能锁具可以完成一般使用场景和长时间无人的使用场景的智能切换,从而在保证智能锁具使用安全的同时,提高了使用场景的灵活性,提升了用户体验。此外,本发明还提供了一种智能锁具的开锁认证装置及智能锁具,同样具有上述有益效果。
附图说明
为了更清楚地说明本发明实施例或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本发明的实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据提供的附图获得其他的附图。
图1为本发明实施例所提供的一种智能锁具的开锁认证方法的流程图;
图2为本发明实施例所提供的另一种智能锁具的开锁认证方法的流程图;
图3为本发明实施例所提供的一种智能锁具的结构示意框图;
图4为本发明实施例所提供的另一种智能锁具的开锁认证方法的流程示意图;
图5为本发明实施例所提供的一种智能锁具的开锁认证装置的结构框图。
具体实施方式
为使本发明实施例的目的、技术方案和优点更加清楚,下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。
请参考图1,图1为本发明实施例所提供的一种智能锁具的开锁认证方法 的流程图。该方法可以包括:
步骤101:在获取开锁请求后,确定当前的工作模式;其中,工作模式包括:一级安全工作模式和二级安全工作模式。
可以理解的是,本步骤中的工作模式可以为智能锁具进行解锁认证的工作模式,本步骤中的工作模式可以包含有不同安全级别对应的安全工作模式,如普通安全级别对应的二级安全工作模式和更高一级的安全级别对应的一级安全工作模式。本实施例中通过智能锁具中的处理器(如MCU,单片机)在获取开锁请求后,确定当前的工作模式,从而能够使处理器根据确定的当前的工作模式,选择对应安全级别的开锁认证方式进行开锁认证,实现不同安全级别的智能转换,提高智能锁具使用的灵活性。
具体的,对于本步骤中工作模式的具体数量和类型,可以由设计人员根据实用场景和用户需求自行设置,如工作模式可以包括适用于一般使用场景的与市面上的智能锁具的安全级别相同的普通安全级别对应的二级安全工作模式,即使用密码、语音和/或图像等解锁信息进行开锁认证的安全工作模式;以及适用于家中较长时间无人的使用场景的更高一级的安全级别对应的一级安全工作模式,即使用解锁信息和认证用户终端的解锁授权信息进行开锁认证的安全工作模式。工作模式还可以包括适用于人员流动较大的使用场景(比如有家庭聚会、或者家中经营某些业务会每天不定时有人员来往等)的较低安全级别对应的三级安全工作模式,和/或适用于人员流动不大且避免解锁信息的多次设置或泄露的较低安全级别对应的四级安全工作模式。本实施例对此不做任何限制。
对应的,对于本步骤中智能锁具中的处理器确定当前的工作模式的具体方式,即不同的工作模式之间的具体转换方式,可以由设计人员根据实用场景和用户需求自行设置,如智能锁具的不同的工作模式由用户通过认证用户终端或智能锁具上的控制设备(如按键或触摸屏)自行随意切换时,本步骤中智能锁具的处理器可以将获取的选择工作模式确定为当前的工作模式,即用户可以随时通过认证用户终端或智能锁具上的控制设备从多个不同的工作模式中选择一个工作模式作为之后智能锁具的工作模式,即本步骤中确定的当前的工作模式;智能锁具的不同的工作模式由智能锁具的处理器自行智能切换时,本步骤中处理器可以根据预设的智能切换规则,确定当前的工作模 式;智能锁具的不同的工作模式由用户自行随意切换和处理器自行智能切换时,本步骤中处理器可以先判断是否获取了选择工作模式,若获取了选择工作模式则将获取的选择工作模式确定为当前的工作模式,若未获取选择工作模式则根据预设的智能切换规则,确定当前的工作模式。本实施例对此不做任何限制。
具体的,对于上述处理器根据预设的智能切换规则,确定当前的工作模式的具体方式,即智能切换规则的具体设置,可以由设计人员或用户根据实用场景和用户需求自行设置,如智能切换规则可以为智能锁具默认工作在一级安全工作模式,当智能锁具检测到用户通过认证用户终端发送的二级安全工作模式的短时授权指令时,在短时间(即第一预设时间段,如10min)内切换到二级安全工作模式,之后再返回一级安全工作模式;即本步骤可以包括判断前第一预设时间段内是否接收到认证用户终端发送的二级安全工作模式的短时授权指令;若是,则确定当前的工作模式为二级安全工作模式;若否,则确定当前的工作模式为一级安全工作模式。智能切换规则也可以为智能锁具默认工作在二级安全工作模式,当智能锁具检测到较长时间(即第二预设时间段,如24h)内一直未执行过开锁操作,即用户较长一段时间都没有开关锁的操作时,智能锁具可以自动切换到一级安全工作模式;即本步骤可以包括判断前第二预设时间段内是否执行过开锁操作;若是,则确定当前的工作模式为二级安全工作模式;若否,则确定当前的工作模式为一级安全工作模式。智能锁具的工作模式还包括三级安全工作模式和/或四级安全工作模式时,在上述两种智能切换规则的基础上还可以包括某固定的时间段(即第三预设时间段)内的工作模式设置,即在第三预设时间段内的时间智能锁具切换到对应的工作模式,第三预设时间段外的时间智能锁具按上述任一智能切换规则进行工作模式的切换,如智能锁具的工作模式包括一级安全工作模式、二级安全工作模式和三级安全工作模式,第三预设时间段对应的工作模式为三级安全工作模式且智能锁具默认工作在二级安全工作模式时,本步骤中处理器可以先判断当前是否处于第三预设时间段;若是,则确定当前的工作模式为三级安全工作模式,即第三预设时间段对应的工作模式为三级安全工作模式;若否,则执行上述判断前第二预设时间段内是否执行过开锁操作的步骤。本实施例对此不做任何限制。
需要说明的是,本步骤之前还可以包括智能锁具的处理器获取开锁请求的步骤。对于智能锁具的处理器获取开锁请求的具体方式,可以由设计人员根据实用场景和用户需求自行设置,如处理器可以在检测到智能锁具的预设按键或触摸屏的预设位置被按动或触摸后,生成开锁请求;处理器也可以在检测到用户输入在按键或触摸屏输入的密码后,生成开锁请求;智能锁具设置有用于检测门外人员的人员检测设备(如红外检测设备和摄像头等)时,处理器还可以在检测到门外有人或有人停留预设时间(如30s)时,生成开锁请求。本实施例对此不做任何限制。
步骤102:若当前的工作模式为一级安全工作模式,则获取解锁信息和认证用户终端的解锁授权信息,并根据解锁信息和解锁授权信息进行开锁认证;其中,解锁信息为智能锁具的解锁采集设备采集的用于开锁的数据。
可以理解的是,本步骤的目的可以为在确定当前的工作模式为一级安全工作模式时,在常规的利用解锁信息进行开锁认证的基础上加入对认证用户终端发送的解锁授权信息的开锁认证,使智能锁具必须每次经过认证用户终端的授权之后才能开锁,在该模式下,没有经过授权时任何人都打不开智能锁具,安全性更高,更适用于家中较长时间无人的使用场景。
其中,本步骤中的解锁信息可以为之智能锁具的解锁采集设备(如按键、触摸屏、摄像头、麦克风和短距离无线接收设备等)采集的用于开锁的数据,即现有技术中智能锁具的开锁认证所需的输入信息。对于解锁信息的具体内容可以由设计人员根据实用场景和用户需求自行设置,如解锁信息可以包括密码、语音和图像中的任意一项或多项。
具体的,对于本步骤中处理器获取智能锁具的解锁采集设备采集解锁信息的具体方式,可以由设计人员自行设置,如解锁信息包括密码、开锁语音指令和图像数据时,处理器可以接收智能锁具的按键、IC读卡器或触摸屏采集的密码、智能锁具的麦克风采集的开锁语音指令和智能锁具的摄像头采集的图像数据;处理器也可以直接获取智能锁具的短距离无线接收设备(如蓝牙设备)接收的用户终端(如手机)发送的密码、开锁语音指令和图像数据。本实施例对此不做任何限制。
需要说明的是,本步骤中的认证用户终端可以为与智能锁具进行了配对认证的用户终端(如手机)。本步骤中的解锁授权信息可以为认证用户终端 向智能锁具发送的是否允许本次开锁的信息,如解锁授权信息可以为解锁指令或禁止解锁指令。具体的,对于本步骤中处理器获取认证用户终端的解锁授权信息的具体方式,可以由设计人员自行设置,如处理器可以利用无线收发设备(如WIFI设备)通过无线网络向认证用户终端发送解锁授权请求;并接收认证用户终端通过无线网络返回的解锁授权信息;智能锁具设置有摄像头时,处理器也可以利用无线收发设备向认证用户终端发送解锁授权请求的同时,打开摄像头向认证用户终端发送摄像头采集的当前图像数据,使认证用户终端的用户可以查看当前的门前的环境,并根据门前的人是否是家中成员,确定是否可以授权打开智能锁具,返回相应的解锁授权信息。
对应的,对于本步骤中处理器根据解锁信息和解锁授权信息进行开锁认证的具体方式,可以由设计人员自行设置,如可以先根据解锁信息进行开锁认证,解锁信息认证通过后,再根据解锁授权信息进行开锁认证,在解锁授权信息开锁认证通过后,执行开锁操作;也可以同时对解锁信息和解锁授权信息分别进行开锁认证,在解锁信息和解锁授权信息均认证通过后,执行开锁操作。本实施例对此不做任何限制。
对应的,对于本步骤中根据解锁信息和解锁授权信息进行开锁认证的具体过程,可以由设计人员自行设置,如可以采用与现有技术中的解锁信息的开锁认证过程相同或相似的方式,对解锁信息进行开锁认证,如解锁信息包括智能锁具的麦克风采集的开锁语音指令和智能锁具的摄像头采集的图像数据时,可以对开锁语音指令进行语音识别和声纹识别,判断开锁语音指令是否与预设开锁指令和预设声纹数据均匹配;若均匹配再对图像数据进行人脸识别,判断人脸识别结果是否为匹配;若人脸识别结果为匹配,则确定解锁信息认证通过。解锁授权信息的进行开锁认证过程可以为判断解锁授权信息是否为解锁指令;若解锁授权信息为解锁指令,则确定解锁授权信息认证通过;若解锁授权信息不为解锁指令,即解锁授权信息为禁止解锁指令,则确定解锁授权信息认证不通过。
步骤103:若当前的工作模式为二级安全工作模式,则获取解锁信息,并根据解锁信息进行开锁认证。
可以理解的是,本步骤的目的可以为在确定当前的工作模式为二级安全工作模式时,智能锁具利用门前人员输入或自行采集的解锁信息进行常规的 开锁认证,避免在一般的使用场景下避免认证用户终端的加入,减少认证用户终端的授权次数,提高用户体验。
具体的,对于本步骤中获取解锁信息,并根据解锁信息进行开锁认证的具体方式,可以采用与步骤102中解锁信息的获取和开锁认证相同或相似的方式实现,本实施例对此不做任何限制。
需要说明的是,本实施例中智能锁具的工作模式还包括三级安全工作模式时,本实施例还可以包括若当前的工作模式为三级安全工作模式,则执行开锁操作的步骤,即当前的工作模式为三级安全工作模式时,处理器可以在获取开锁请求后,自动开锁,避免了用户频繁的开门。
对应的,本实施例中智能锁具的工作模式还包括四级安全工作模式时,本实施例还可以包括若当前的工作模式为四级安全工作模式,获取解锁授权信息,并根据解锁授权信息进行开锁认证。即当前的工作模式为四级安全工作模式时,处理器可以在每次获取开锁请求后,请求认证用户终端的解锁授权信息并进行开锁认证,使用户家中无人时,可以直接通过认证用户终端进行智能锁具的开锁控制,避免外人需知道智能锁具的密码才能进屋的情况,且每次开锁均由认证用户终端的用户控制,提高了安全性。
本实施例中,本发明实施例通过智能锁具在一级安全工作模式时,根据解锁信息和认证用户终端的解锁授权信息进行开锁认证,使得每次开锁均需用户授权,安全性更高,适用于家中较长时间无人的使用场景;通过在获取开锁请求后,确定当前的工作模式,使智能锁具可以完成一般使用场景和长时间无人的使用场景的智能切换,从而在保证智能锁具使用安全的同时,提高了使用场景的灵活性,提升了用户体验。
请参考图2,图2为本发明实施例所提供的另一种智能锁具的开锁认证方法的流程图。该方法可以包括:
步骤201:根据智能锁具的红外检测设备采集的红外信号,判断门外是否有人停留预设时间;若是,则进入步骤202。
可以理解的是,本步骤的目的可以为智能锁具中的处理器利用设置的红外检测设备(如红外传感器)确定门外是否有人停留预设时间,即确定是否有人要进入到屋内;从而在确定门外是否有人停留预设时间后,自动生成开 锁请求,并进入到步骤202进行接下来的开锁认证过程。
具体的,本步骤中智能锁具的处理器(如图3中的MCU)可以通过判断红外信号对应的距离值小于预设距离值的持续时间是否达到预设时间,从而确定门外是否有人停留预设时间,即在红外信号对应的距离值小于预设距离值的持续时间达到预设时间时,确定门外有人停留预设时间。
对应的,对于本步骤中门外没有人停留预设时间的情况,可以直接结束本流程。
步骤202:判断当前是否处于第三预设时间段;若是,则确定当前的工作模式为三级安全工作模式,并进入步骤203;若否,则进入步骤204。
可以理解的是,本实施例中的第三预设时间段可以为预先设置的三级安全工作模式对应的时间段,如每天的8:00到20:00。本实施例中智能锁具的工作模式可以包括一级安全工作模式、二级安全工作模式和三级安全工作模式。也就是说,如图4所示,本步骤的目的可以为在设置了第三预设时间段时,通过本步骤判断当前的工作模式是否处于三级安全工作模式;若是,则直接进入步骤203执行开锁操作,比如当用户在某一天要举行家庭聚会时,会有很多人频繁的来访,此时可以将智能锁具8:00到12:00设置为第三预设时间段,在该时间段内,任何来访者都可以开锁;若否,则进入步骤204确定当前的工作模式是一级安全工作模式还是二级安全工作模式。
对应的,本步骤之前还可以包括判断是否设置了第三预设时间段的步骤,若是,则进入本步骤;若否,则可以直接进入步骤204。
需要说明的是,本实施例是以智能锁具的一种智能锁具的处理器自行智能切换的不同的工作模式对应的开锁认证方法为例进行的展示,在本实施例的基础上还可以加入用户通过认证用户终端或智能锁具上的控制设备(如按键或触摸屏)自行随意切换不同的工作模式对应的开锁认证过程,如本步骤之前还可以包括判断是否存储有用户设置的选择工作模式的步骤;若否,则进入本步骤;若是,则将选择工作模式确定为当前的工作模式,并进入对应的步骤进行开锁认证。如选择工作模式为三级安全工作模式时,可以进入到步骤203;选择工作模式为一级安全工作模式时,可以进入到步骤205;选择工作模式为二级安全工作模式时,可以进入到步骤210。
步骤203:执行开锁操作。
可以理解的是,本步骤可以为智能锁具的处理器通过执行开锁操作,控制智能锁具中的机械锁开锁。
步骤204:判断前第二预设时间段内是否执行过开锁操作;若否,则确定当前的工作模式为一级安全工作模式,并进入步骤205;若是,则确定当前的工作模式为二级安全工作模式,并进入步骤211;
可理解的是,本步骤的目的可以为通过前第二预设时间段(如24h)内是否执行过开锁操作,确定家中是否较长时间处于无人状态,从而在前第二预设时间段内未执行过开锁操作,即家中较长时间处于无人状态时,确定当前的工作模式为一级安全工作模式,提高安全性;从而实现一级安全工作模式和二级安全工作模式之间的智能切换。
步骤205:获取智能锁具的麦克风采集的开锁语音指令和智能锁具的摄像头采集的图像数据。
可以理解的是,如图3和图4所示,本实施例中的智能锁具可以设置有麦克风(mic)和摄像头,从而在处理器(如图3中的MCU)确定当前的工作模式为一级安全工作模式时打开麦克风录取用户说出的开锁语音指令(即音频数据),并打开摄像头拍照获取图像数据。
具体的,本实施例是以处理器控制麦克风和摄像头同时采集开锁语音指令和图像数据为例进行的展示,也可以先采集开锁语音指令或图像数据,待采集的开锁语音指令或图像数据认证通过后再采集另一种数据,本实施例对此不做任何限制。
步骤206:对开锁语音指令进行语音识别和声纹识别,判断开锁语音指令是否与预设开锁指令和预设声纹数据均匹配;若否,则进入步骤207;若是,则进入步骤208。
其中,本步骤的目的可以为处理器对麦克风采集的用户说出的开锁语音指令进行语音识别和声纹识别,例如假设预设开锁指令为“开锁”,处理器对麦克风采集的开锁语音指令进行语音识别和声纹识别,若语音识别到的开锁语音指令为“开锁”指令,且声纹识别的结果匹配到预先存储的用户的声纹数据(即预设声纹数据),即采集到开锁语音指令的声纹与存储的声纹判断一致(为同一人),确定开锁语音指令与预设开锁指令和预设声纹数据均匹配;否则,确定开锁语音指令不与预设开锁指令和预设声纹数据均匹配,可以直 接进入步骤207不执行开锁操作结束本次流程,也可以通过智能锁具的显示器或扬声器输出开锁语音指令匹配失败的提示信息并进入步骤207,以提示用户重新说出正确的开锁语音指令。
步骤207:不执行开锁操作。
具体的,本步骤的目的可以为在解锁认证不同的情况下,处理器不执行开锁操作,结束本次流程。
步骤208:对图像数据进行人脸识别,判断人脸识别结果是否为匹配;若是,则进入步骤209;若否,则进入步骤207。
其中,本步骤的目的可以为处理器对摄像头采集的图像数据进行人脸识别,当采集的图像数据中的人脸数据与预先存储的用户的人脸数据判断一致(为同一人)时,可以确定人脸识别结果为匹配,可以进入步骤209获取解锁授权信息。
具体的,对于本步骤中对图像数据进行人脸识别的具体方式,可以采用与现有技术中的人脸识别方法相同或相似的方式实现,本实施例对此不做任何限制。
步骤209:通过无线网络向认证用户终端发送解锁授权请求,并接收解锁授权请求对应的解锁授权信息。
具体的,如图4所示,本步骤之前还可以包括判断是否之前第一预设时间段内是否接收到认证用户终端(如图4中的手机)发送的短时开锁授权指令,即用户可以通过认证用户终端向智能锁具发送短时开锁授权指令,以在第一预设时间段内授权智能锁具在解锁信息认证通过便可以执行开锁操作。
对应的,如图4所示,本实施例中处理器利用无线通讯设备通过无线网络向认证用户终端发送解锁授权请求时,可以打开摄像头采集当前的环境录像(即当前图像数据)并发送到认证用户终端,使认证用户终端的用户可以查看当前的门前的环境,并根据门前的人是否是家中成员,判定是否可以授权打开智能锁具。
步骤210:判断解锁授权信息是否为解锁指令;若是,则进入步骤203;若否,则进入步骤207。
可以理解的是,本步骤通过判断解锁授权信息是否为解锁指令,确定用户是否通过认证用户终端授权智能锁具进行开锁操作,使得如果没有经过认 证用户终端的授权,智能锁具不会被任何人打开,即使解锁信息认证通过一致,由此可以防止有些不法分子对用户进行偷拍或者录音后进行开锁而导致的安全隐患。
步骤211:获取智能锁具的麦克风采集的开锁语音指令和智能锁具的摄像头采集的图像数据。
步骤212:对开锁语音指令进行语音识别和声纹识别,判断开锁语音指令是否与预设开锁指令和预设声纹数据均匹配;若否,则进入步骤207;若是,则进入步骤213。
步骤213:对图像数据进行人脸识别,判断人脸识别结果是否为匹配;若是,则进入步骤203;若否,则进入步骤207。
其中,步骤211至步骤213与步骤205、步骤206和步骤208相似,在此不再赘述。
可以理解的是,本实施例中通过智能锁具的工作模式可以包括普通安全级别的二级安全工作模式、更高一级的安全级别的一级安全工作模式和较为低级的安全级别的三级安全工作模式。普通安全级别可以等同于市面上的智能锁的安全级别,适用于一般场景;更高一级的安全级别,必须每次经过认证用户终端的授权之后才能开锁,在该模式下,没有经过授权任何人都打不开智能锁,安全性更高,更适用于家中较长时间无人的使用场景;较为低级的安全级别,适用于有人员流动较大的场景(比如有家庭聚会、或者家中经营某些业务会每天不定时有人员来往等),当有人频繁来访时,只要在门口停留些许时间。智能锁具可以自动打开,不需要用户在去频繁的开门,使用更为灵活。本实施例通过这三个安全级别之间的工作模式的智能转换既保证了安全性,又提高了使用灵活性。
本实施例中,本发明实施例通过智能锁具的一级安全工作模式、二级安全工作模式和三级安全工作模式这三种工作模式的智能切换,使智能锁具能够切换到不同的防护等级,能够在保证智能锁具的使用安全性的基础上,令使用场景更加灵活,提升用户体验。
请参考图5,图5为本发明实施例所提供的一种智能锁具的开锁认证装置的结构框图。该装置可以包括:
确定模块10,用于在获取开锁请求后,确定当前的工作模式;其中,工作模式包括:一级安全工作模式和二级安全工作模式;
第一认证模块20,用于若当前的工作模式为一级安全工作模式,则获取解锁信息和认证用户终端的解锁授权信息,并根据解锁信息和解锁授权信息进行开锁认证;其中,解锁信息为智能锁具的解锁采集设备采集的用于开锁的数据;
第二认证模块30,用于若当前的工作模式为二级安全工作模式,则获取解锁信息,并根据解锁信息进行开锁认证。
可选的,工作模式还包括三级安全工作模式时,该装置还可以包括:
第三认证模块,用于若当前的工作模式为三级安全工作模式,则执行开锁操作。
可选的,该装置还可以包括:
请求生成模块,用于根据智能锁具的红外检测设备采集的红外信号,判断门外是否有人停留预设时间;若是,则生成开锁请求。
可选的,工作模式还包括四级安全工作模式时,该装置还可以包括:
第四认证模块,用于若当前的工作模式为四级安全工作模式,获取解锁授权信息,并根据解锁授权信息进行开锁认证。
可选的,第一认证模块20,可以包括:
获取子模块,用于获取智能锁具的麦克风采集的开锁语音指令和智能锁具的摄像头采集的图像数据;
语音子模块,用于对开锁语音指令进行语音识别和声纹识别,判断开锁语音指令是否与预设开锁指令和预设声纹数据均匹配;若否,则不执行开锁操作;
人脸子模块,用于若均匹配,则对图像数据进行人脸识别,判断人脸识别结果是否为匹配;若不为匹配,则不执行开锁操作;
授权请求子模块,用于若为匹配,则通过无线网络向认证用户终端发送解锁授权请求,并接收解锁授权请求对应的解锁授权信息;
授权判断子模块,用于判断解锁授权信息是否为解锁指令;若不为解锁指令,则不执行开锁操作;
开锁子模块,用于若为解锁指令,则执行开锁操作。
可选的,授权请求子模块,可以包括:
无线请求单元,用于通过无线网络向认证用户终端发送解锁授权请求和智能锁具的摄像头采集的当前图像数据。
可选的,确定模块10,可以包括:
第一确定子模块,用于判断前第一预设时间段内是否接收到认证用户终端发送的二级安全工作模式的短时授权指令;若是,则确定当前的工作模式为二级安全工作模式;若否,则确定当前的工作模式为一级安全工作模式。
可选的,确定模块10,可以包括:
第二确定子模块,用于判断前第二预设时间段内是否执行过开锁操作;若是,则确定当前的工作模式为二级安全工作模式;若否,则确定当前的工作模式为一级安全工作模式。
本实施例中,本发明实施例通过第一认证模块20在智能锁具处于一级安全工作模式时,根据解锁信息和认证用户终端的解锁授权信息进行开锁认证,使得每次开锁均需用户授权,安全性更高,适用于家中较长时间无人的使用场景;通过确定模块10在获取开锁请求后,确定当前的工作模式,使智能锁具可以完成一般使用场景和长时间无人的使用场景的智能切换,从而在保证智能锁具使用安全的同时,提高了使用场景的灵活性,提升了用户体验。
本发明实施例还提供了一种智能锁具,包括:解锁采集设备、存储器和处理器;其中,解锁采集设备用于采集解锁信息;存储器,用于存储计算机程序,处理器用于执行计算机程序时实现如上述任一实施例所提供的智能锁具的开锁认证方法的步骤。
具体的,本实施例中的解锁采集设备可以包括用于采集解锁信息中的开锁语音指令的麦克风和用于采集解锁信息中的图像数据的摄像头。可选的,解锁采集设备也可以包括用于采集解锁信息中的密码的按键或触摸屏;解锁采集设备还可以包括从用户终端接收全部或部分解锁信息的短距离无线接收设备。
对应的,本实施例中智能锁具还可以包括红外检测设备,用于采集红外信号,使处理器可以根据采集的红外信号生成开锁请求。
此外,本发明实施例还提供了一种计算机可读存储介质,计算机可读存储介质上存储有计算机程序,计算机程序被处理器执行时实现如上述任一实施例所提供的智能锁具的开锁认证方法的步骤。
说明书中各个实施例采用递进的方式描述,每个实施例重点说明的都是与其他实施例的不同之处,各个实施例之间相同相似部分互相参见即可。对于实施例公开的装置、智能锁具和计算机可读存储介质而言,由于其与实施例公开的方法相对应,所以描述的比较简单,相关之处参见方法部分说明即可。
结合本文中所公开的实施例描述的方法或算法的步骤可以直接用硬件、处理器执行的软件模块,或者二者的结合来实施。软件模块可以置于随机存储器(RAM)、内存、只读存储器(ROM)、电可编程ROM、电可擦除可编程ROM、寄存器、硬盘、可移动磁盘、CD-ROM、或技术领域内所公知的任意其它形式的存储介质中。
以上对本发明所提供的一种智能锁具及其开锁认证方法和装置进行了详细介绍。本文中应用了具体个例对本发明的原理及实施方式进行了阐述,以上实施例的说明只是用于帮助理解本发明的方法及其核心思想。应当指出,对于本技术领域的普通技术人员来说,在不脱离本发明原理的前提下,还可以对本发明进行若干改进和修饰,这些改进和修饰也落入本发明权利要求的保护范围内。

Claims (10)

  1. 一种智能锁具的开锁认证方法,其特征在于,包括:
    在获取开锁请求后,确定当前的工作模式;其中,所述工作模式包括:一级安全工作模式和二级安全工作模式;
    若当前的工作模式为所述一级安全工作模式,则获取解锁信息和认证用户终端的解锁授权信息,并根据所述解锁信息和所述解锁授权信息进行开锁认证;其中,所述解锁信息为智能锁具的解锁采集设备采集的用于开锁的数据;
    若当前的工作模式为所述二级安全工作模式,则获取解锁信息,并根据所述解锁信息进行开锁认证。
  2. 根据权利要求1所述的智能锁具的开锁认证方法,其特征在于,所述工作模式还包括三级安全工作模式时,所述在获取开锁请求后,确定当前的工作模式之后,还包括:
    若当前的工作模式为三级安全工作模式,则执行开锁操作。
  3. 根据权利要求2所述的智能锁具的开锁认证方法,其特征在于,所述在获取开锁请求后,确定当前的工作模式之前,还包括:
    根据所述智能锁具的红外检测设备采集的红外信号,判断门外是否有人停留预设时间;
    若是,则生成所述开锁请求。
  4. 根据权利要求1所述的智能锁具的开锁认证方法,其特征在于,所述工作模式还包括四级安全工作模式时,所述在获取开锁请求后,确定当前的工作模式之后,还包括:
    若当前的工作模式为四级安全工作模式,获取所述解锁授权信息,并根据所述解锁授权信息进行开锁认证。
  5. 根据权利要求1所述的智能锁具的开锁认证方法,其特征在于,所述获取解锁信息和认证用户终端的解锁授权信息,并根据所述解锁信息和所述解锁授权信息进行开锁认证,包括:
    获取所述智能锁具的麦克风采集的开锁语音指令和所述智能锁具的摄像 头采集的图像数据;
    对所述开锁语音指令进行语音识别和声纹识别,判断所述开锁语音指令是否与预设开锁指令和预设声纹数据均匹配;
    若否,则不执行所述开锁操作;
    若是,则对所述图像数据进行人脸识别,判断人脸识别结果是否为匹配;
    若不为匹配,则不执行所述开锁操作;
    若为匹配,则通过无线网络向所述认证用户终端发送解锁授权请求,并接收所述解锁授权请求对应的解锁授权信息;
    判断所述解锁授权信息是否为解锁指令;
    若为所述解锁指令,则执行所述开锁操作;
    若不为所述解锁指令,则不执行所述开锁操作。
  6. 根据权利要求5所述的智能锁具的开锁认证方法,其特征在于,所述通过无线网络向所述认证用户终端发送解锁授权请求,包括:
    通过无线网络向所述认证用户终端发送所述解锁授权请求和所述智能锁具的摄像头采集的当前图像数据。
  7. 根据权利要求1至6任一项所述的智能锁具的开锁认证方法,其特征在于,所述确定当前的工作模式,包括:
    判断前第一预设时间段内是否接收到所述认证用户终端发送的所述二级安全工作模式的短时授权指令;
    若是,则确定当前的工作模式为所述二级安全工作模式;
    若否,则确定当前的工作模式为所述一级安全工作模式。
  8. 根据权利要求1至6任一项所述的智能锁具的开锁认证方法,其特征在于,所述确定当前的工作模式,包括:
    判断前第二预设时间段内是否执行过所述开锁操作;
    若是,则确定当前的工作模式为所述二级安全工作模式;
    若否,则确定当前的工作模式为所述一级安全工作模式。
  9. 一种智能锁具的开锁认证装置,其特征在于,包括:
    确定模块,用于在获取开锁请求后,确定当前的工作模式;其中,所述工作模式包括:一级安全工作模式和二级安全工作模式;
    第一认证模块,用于若当前的工作模式为所述一级安全工作模式,则获取解锁信息和认证用户终端的解锁授权信息,并根据所述解锁信息和所述解锁授权信息进行开锁认证;其中,所述解锁信息为智能锁具的解锁采集设备采集的用于开锁的数据;
    第二认证模块,用于若当前的工作模式为所述二级安全工作模式,则获取解锁信息,并根据所述解锁信息进行开锁认证。
  10. 一种智能锁具,其特征在于,包括:解锁采集设备、存储器和处理器;其中,所述解锁采集设备用于采集解锁信息;所述存储器,用于存储计算机程序,所述处理器用于执行所述计算机程序时实现如权利要求1至8任一项所述的智能锁具的开锁认证方法的步骤。
PCT/CN2020/132203 2020-05-25 2020-11-27 一种智能锁具及其开锁认证方法和装置 WO2021238121A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202010449869.X 2020-05-25
CN202010449869.XA CN111612950A (zh) 2020-05-25 2020-05-25 一种智能锁具及其开锁认证方法和装置

Publications (1)

Publication Number Publication Date
WO2021238121A1 true WO2021238121A1 (zh) 2021-12-02

Family

ID=72204307

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2020/132203 WO2021238121A1 (zh) 2020-05-25 2020-11-27 一种智能锁具及其开锁认证方法和装置

Country Status (2)

Country Link
CN (1) CN111612950A (zh)
WO (1) WO2021238121A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115314272A (zh) * 2022-07-29 2022-11-08 金邦达有限公司 一种智能门锁远程授权的方法

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111612950A (zh) * 2020-05-25 2020-09-01 歌尔科技有限公司 一种智能锁具及其开锁认证方法和装置
CN112164174A (zh) * 2020-09-17 2021-01-01 杭州海康威视系统技术有限公司 计算方法、通行控制方法、装置、电子设备及存储介质
CN112598827B (zh) * 2020-12-25 2023-01-20 北京智芯微电子科技有限公司 智能锁认证方法、安全芯片、智能锁及其管理系统
CN116710889A (zh) * 2020-12-30 2023-09-05 深圳市大疆创新科技有限公司 基于语音命令来操作装置的方法、设备和系统
CN112734999A (zh) * 2021-01-21 2021-04-30 珠海格力电器股份有限公司 一种数据处理方法、装置、系统、电子设备及存储介质
CN114694282A (zh) * 2022-03-11 2022-07-01 深圳市凯迪仕智能科技有限公司 一种基于智能锁的语音互动的方法及相关装置
CN114791999A (zh) * 2022-04-25 2022-07-26 云丁网络技术(北京)有限公司 一种智能终端的信息处理方法和系统
CN116665352B (zh) * 2023-05-30 2024-01-30 江苏日颖慧眼智能设备有限公司 一种门禁控制方法和系统

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2005336909A (ja) * 2004-05-28 2005-12-08 Mitsubishi Electric Corp 出入管理装置
CN105427413A (zh) * 2015-11-02 2016-03-23 北京奇虎科技有限公司 智能开锁方法和智能锁具
CN108510627A (zh) * 2018-03-27 2018-09-07 深圳市零度智控科技有限公司 门锁开锁方法、门锁及存储介质
CN110428530A (zh) * 2019-08-12 2019-11-08 珠海格力电器股份有限公司 一种智能门锁的控制方法、系统及智能门锁
US20190368227A1 (en) * 2018-06-05 2019-12-05 Isac Tabib Electric Door Lock Controller and Monitoring System and Method of Use
CN111612950A (zh) * 2020-05-25 2020-09-01 歌尔科技有限公司 一种智能锁具及其开锁认证方法和装置

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102568063A (zh) * 2011-12-14 2012-07-11 深圳市中联创新自控系统有限公司 一种门禁系统开门方法及门禁系统
CN103985176A (zh) * 2014-05-23 2014-08-13 四川华立德科技有限公司 无线可视电子门锁
JP2017193884A (ja) * 2016-04-21 2017-10-26 株式会社東海理化電機製作所 キーセキュリティ装置
CN107170083B (zh) * 2017-05-11 2019-08-09 广东汇泰龙科技有限公司 一种远程一键开锁的方法及系统、终端
US10210683B1 (en) * 2017-09-12 2019-02-19 International Business Machines Corporation Physical condition based intelligent house security system
CN108550209A (zh) * 2018-04-12 2018-09-18 广东汇泰龙科技有限公司 一种基于红外感应器与人脸锁的自动开门方法及系统
CN109801408A (zh) * 2018-12-06 2019-05-24 安徽凯川电力保护设备有限公司 一种用于机房的门禁管理方法

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2005336909A (ja) * 2004-05-28 2005-12-08 Mitsubishi Electric Corp 出入管理装置
CN105427413A (zh) * 2015-11-02 2016-03-23 北京奇虎科技有限公司 智能开锁方法和智能锁具
CN108510627A (zh) * 2018-03-27 2018-09-07 深圳市零度智控科技有限公司 门锁开锁方法、门锁及存储介质
US20190368227A1 (en) * 2018-06-05 2019-12-05 Isac Tabib Electric Door Lock Controller and Monitoring System and Method of Use
CN110428530A (zh) * 2019-08-12 2019-11-08 珠海格力电器股份有限公司 一种智能门锁的控制方法、系统及智能门锁
CN111612950A (zh) * 2020-05-25 2020-09-01 歌尔科技有限公司 一种智能锁具及其开锁认证方法和装置

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115314272A (zh) * 2022-07-29 2022-11-08 金邦达有限公司 一种智能门锁远程授权的方法

Also Published As

Publication number Publication date
CN111612950A (zh) 2020-09-01

Similar Documents

Publication Publication Date Title
WO2021238121A1 (zh) 一种智能锁具及其开锁认证方法和装置
KR102326174B1 (ko) 비콘 신호를 이용하여 도어 출입을 관리하기 위한 방법 및 시스템
US7272380B2 (en) User authentication method and apparatus
US9183683B2 (en) Method and system for access to secure resources
KR101218297B1 (ko) 전자 도어락 개폐 시스템 및 개폐방법
CN105427413A (zh) 智能开锁方法和智能锁具
WO2017031850A1 (zh) 用户身份验证方法、装置、系统及智能家居
WO2022156315A1 (zh) 门锁的控制方法、装置、门锁及存储介质
TW201527152A (zh) 身分認證系統及其方法
KR101931867B1 (ko) 모바일 단말기를 이용한 출입 관리시스템
KR101550206B1 (ko) 이중보안기능이 구비된 지정맥인식시스템 및 그 제어방법
KR102483794B1 (ko) 출입 관리 시스템 및 그 방법
WO2022142330A1 (zh) 一种身份认证方法及装置、电子设备和存储介质
KR100980807B1 (ko) 모바일 장치를 이용하여 획득한 생체정보를 이용하여출입문의 개폐관리를 하는 시스템 및 그 방법
WO2021017567A1 (zh) 门锁控制系统、方法、显示控制终端和门锁控制装置
JP2009100334A (ja) 訪問者応対装置、訪問者応対携帯端末、及びそのシステム
US20220319261A1 (en) Automatic Door Opening Systems and Methodolgies
KR20180062692A (ko) 출입문 개폐 통제 방법, 사용자 단말기, 도어락 장치 및 출입 보안 시스템
CN106572235A (zh) 一种手机的解锁方法、装置及终端
CN106535190A (zh) 网络连接方法及装置
KR20170024414A (ko) 스마트폰을 이용한 디지털 도어락 장치
KR20160010009A (ko) 원격 방문자 출입관리 시스템 및 방법
KR102108346B1 (ko) 시간제한 비밀번호를 이용한 도어락 잠금해제 방법 및 장치와 그 시스템
KR102397042B1 (ko) 출입 관리 시스템 및 그 방법
JP6662056B2 (ja) 認証システム、携帯情報装置、サーバー、および認証プログラム

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20937264

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 20937264

Country of ref document: EP

Kind code of ref document: A1