A kind of unlocking method, device and electronic lockTechnical field
The present invention relates to door lock control field more particularly to a kind of unlocking methods, device and electronic lock.
Background technique
With gradualling mature for technology of Internet of things, intelligent door lock is applied to more and more families, office, retail shop etc.Place, to guarantee the safety of user.
Current intelligent door lock passes through setting unlocking code key, password, contactless card etc., when user inputs unlocking mostlyPassword, or the contactless card of unlocking is attached to the induction zone on door lock, after being verified, door lock can be turned on.If passwordOr the unlockings code key such as contactless card is stolen, appropriator using unlocking code key can opening door lock, lack for user identityVerifying, safety is poor.
Summary of the invention
The present invention provides a kind of unlocking method, device and electronic lock, can not identify user in the prior art to solveIdentity, unlocking code key are stolen the problem of influencing user security.
In a first aspect, the embodiment of the invention provides a kind of unlocking method, applied to the electronic gate for being provided with monitoring deviceLock, comprising:
Acquisition enters the posture feature of the target user of the monitoring range of the monitoring device;
Determine to include the first posture for being greater than first threshold with the matching degree of the posture feature in posture feature databaseWhen characteristic, the electronic lock is waken up;Wherein, it is stored in the posture feature database special including first postureLevy the posture feature data of the legitimate user including data;
Receive the first unlock instruction of target user's triggering being unlocked to the electronic lock after wake-up, instituteIt states and carries the first unlocking information in the first unlock instruction;
First unlocking information is verified, and opens the electronic lock after being verified.
In an optional implementation manner, the method also includes:
Determine do not include the first appearance for being greater than first threshold with the matching degree of the posture feature in posture feature databaseWhen state characteristic, the second unlock instruction of target user's triggering being unlocked to the electronic lock is received, it is describedThe second unlocking information is carried in second unlock instruction;
Second unlocking information is verified, and in the first preset duration after being verified, receives the meshThe third unlock instruction of user's triggering being unlocked to the electronic lock is marked, carries third solution in the third unlock instructionLock information;Wherein, second unlocking information is different from the third unlocking information;
The third unlocking information is verified, and opens the electronic lock after being verified.
In an optional implementation manner, first unlocking information, second unlocking information or the thirdUnlocking information includes any one or more in following information: unlocking pin, unlock finger print information, unlock induction card information,Unlock voiceprint, unlock iris information, unlock venous information, unlock facial information.
In an optional implementation manner, determine do not include matching with the posture feature in posture feature databaseWhen degree is greater than the first posture feature data of first threshold, the method also includes:
It monitors target user residence time in the monitoring range of the monitoring device and exceeds the second preset durationWhen, warning message is exported, the warning message, which is used to indicate around the electronic lock, illegal user occurs.
In an optional implementation manner, the method also includes:
Determine that the matching degree of the posture feature and the first posture feature data is greater than the first threshold and is less thanIt is including by the posture feature with the unmatched data of the first posture feature data when second threshold, with described firstPosture feature data are combined as the second posture feature data, are stored in the posture feature database.
Second aspect, the embodiment of the invention provides a kind of trippers, applied to the electronic gate for being provided with monitoring deviceLock, comprising:
Acquisition module, for acquiring the posture feature of the target user into the monitoring range of the monitoring device;
Processing module includes being greater than the first threshold with the matching degree of the posture feature for determining in posture feature databaseWhen the first posture feature data of value, the electronic lock is waken up;Wherein, it is stored in the posture feature database including instituteState the posture feature data of the legitimate user including the first posture feature data;
Receive the first unlock instruction of target user's triggering being unlocked to the electronic lock after wake-up, instituteIt states and carries the first unlocking information in the first unlock instruction;
First unlocking information is verified, and opens the electronic lock after being verified.
In an optional implementation manner, the processing module, is also used to:
Determine do not include the first appearance for being greater than first threshold with the matching degree of the posture feature in posture feature databaseWhen state characteristic, the second unlock instruction of target user's triggering being unlocked to the electronic lock is received, it is describedThe second unlocking information is carried in second unlock instruction;
Second unlocking information is verified, and in the first preset duration after being verified, receives the meshThe third unlock instruction of user's triggering being unlocked to the electronic lock is marked, carries third solution in the third unlock instructionLock information;Wherein, second unlocking information is different from the third unlocking information;
The third unlocking information is verified, and opens the electronic lock after being verified.
In a kind of optional implementation, first unlocking information, second unlocking information or the third solutionLock information includes any one or more in following information: unlocking pin, unlock finger print information, unlock induction card information, solutionLock voiceprint, unlock iris information, unlock venous information, unlock facial information.
In an optional implementation manner, the processing module in determining posture feature database do not include and instituteState posture feature matching degree be greater than first threshold the first posture feature data when, be specifically used for:
It monitors target user residence time in the monitoring range of the monitoring device and exceeds the second preset durationWhen, warning message is exported, the warning message, which is used to indicate around the electronic lock, illegal user occurs.
In an optional implementation manner, the processing module, is also used to:
Determine that the matching degree of the posture feature and the first posture feature data is greater than the first threshold and is less thanIt is including by the posture feature with the unmatched data of the first posture feature data when second threshold, with described firstPosture feature data are combined as the second posture feature data, are stored in the posture feature database.
The third aspect, the embodiment of the invention provides a kind of electronic locks, comprising: memory, for storing program instruction;Processor executes the above method according to the program instruction of acquisition for reading the program instruction stored in the memory.
Fourth aspect, the embodiment of the invention provides a kind of computer readable storage medium, the computer-readable storageMedia storage has computer instruction, when the computer instruction is run on computers, so that computer executes the above method.
Aforesaid way provided in an embodiment of the present invention is collecting the appearance into the target user of monitoring device monitoring rangeAfter state feature, identity is carried out to target user based on the posture feature database for being stored with legitimate user's posture feature data and is testedCard determines that target user is legitimate user, namely determines that in posture feature database include being greater than with the matching degree of posture featureDoor lock is just waken up after first posture feature data of first threshold, then in aforementioned first unlock instruction of target user's triggeringThe first unlocking information carried carries out being verified rear opening door lock.By verifying user identity, it can guarantee the key of door lockEven if being stolen, identity mismatch also fail to open door lock, effectively improves the safety of door lock.
Detailed description of the invention
Fig. 1 is a kind of flow diagram of unlocking method provided in an embodiment of the present invention;
Fig. 2 is a kind of structural block diagram of tripper provided in an embodiment of the present invention;
Fig. 3 is a kind of structural schematic diagram of electronic lock provided in an embodiment of the present invention;
Fig. 4 is a kind of flow diagram for updating posture feature database provided in an embodiment of the present invention.
Specific embodiment
To make the objectives, technical solutions, and advantages of the present invention clearer, below in conjunction with attached drawing to the present invention make intoIt is described in detail to one step, it is clear that the described embodiments are only some of the embodiments of the present invention, rather than whole implementationExample.Based on the embodiments of the present invention, obtained by those of ordinary skill in the art without making creative effortsAll other embodiment, shall fall within the protection scope of the present invention.
It should be noted that it is multiple involved in the present invention, refer to two or more."and/or", description association pairThe incidence relation of elephant, indicate may exist three kinds of relationships, for example, A and/or B, can indicate: individualism A, exist simultaneously A andThese three situations of B, individualism B.Character "/" typicallys represent the relationship that forward-backward correlation object is a kind of "or".Additionally, it should manageSolution, although may describe each data using term first, second etc. in embodiments of the present invention, these data be should not necessarily be limited byThese terms.These terms are only used to for each data being distinguished from each other out.
Current intelligent door lock passes through setting unlocking code key, password, contactless card etc., when user inputs unlocking mostlyPassword, or the contactless card of unlocking is attached to the induction zone on door lock, after being verified, door lock can be turned on.If passwordOr the unlockings code key such as contactless card is stolen, appropriator using unlocking code key can opening door lock, lack for user identityVerifying, safety is poor.
Based on this, the embodiment of the invention provides a kind of unlocking method, device and electronic locks, to solve the prior artIn can not identify user identity, unlocking code key stolen the problem of influencing user security.Wherein, method and apparatus are based on sameInventive concept, since the principle that method and apparatus solve the problems, such as is similar, the implementation of method and apparatus can with cross-reference,Overlaps will not be repeated.
To be carried out first to a kind of unlocking method disclosed in the embodiment of the present invention detailed convenient for understanding the present embodimentIt is thin to introduce.
Referring to Fig. 1, the embodiment of the invention provides a kind of unlocking method, this method is applied to be provided with the electricity of monitoring deviceCervical orifice of uterus lock, comprising:
Step S101, acquisition enter the posture feature of the target user of the monitoring range of monitoring device;
Wherein, monitoring device can be camera or laser radar etc., and posture feature includes walk posture feature, bodyThe features such as volume morphing feature height, fat or thin.
Step S102 determines to include be greater than first threshold with the matching degree of posture feature first in posture feature databaseWhen posture feature data, electronic lock is waken up.
Wherein, the posture that the legitimate user including the first posture feature data is stored in posture feature database is specialLevy data, the data in posture feature database can based on user to the relevant operation instruction that electronic lock trigger be added withModification, can also be added and be modified by the associated application terminal of electronic lock.In view of human body attitude feature, such as walkPosture feature can be slowly varying with the variation of human physiological functions, is determining that target user is based on posture feature databaseIt is no be legitimate user when, by setting first threshold carry out fuzzy matching, specifically, the first threshold can be set according to actual needsDetermine, such as expressed as a percentage 80%, is not limited herein.
Step S103 receives the first unlock instruction of target user's triggering being unlocked to the electronic lock after wake-up,The first unlocking information is carried in first unlock instruction;Step S104 verifies the first unlocking information, and after being verifiedOpen electronic lock.
Above-mentioned unlocking method provided in an embodiment of the present invention, it is special based on the posture for being stored with legitimate user's posture feature dataIt levies database and authentication is carried out to target user, determine that target user is legitimate user, namely determine posture feature databaseIn include with the matching degree of posture feature be greater than first threshold the first posture feature data after just wake up door lock, then to targetThe first unlocking information carried in aforementioned first unlock instruction of user's triggering is verified, and rear opening door lock is passed through.By testingUser identity is demonstrate,proved, even if can guarantee that the key of door lock is stolen, identity mismatch also fail to open door lock, effectively improves doorThe safety of lock.
Further, it is contemplated that when practical application, it is understood that there may be personal injury, the reasons such as sick cause posture feature occur compared withChange greatly, will appear the situation of posture feature identification mistake for legitimate user.In a kind of optional embodiment,The above method further include:
(1) determine do not include the first appearance for being greater than first threshold with the matching degree of posture feature in posture feature databaseWhen state characteristic, the second unlock instruction of target user's triggering being unlocked to electronic lock, the second unlock instruction are receivedThe second unlocking information of middle carrying.
(2) the second unlocking information is verified, and in the first preset duration after being verified, receives target and usesThe third unlock instruction of family triggering being unlocked to electronic lock, third unlocking information is carried in third unlock instruction;Wherein,Second unlocking information is different from third unlocking information.
(3) third unlocking information is verified, and opens electronic lock after being verified.
In the present embodiment, determine in posture feature database do not include being greater than first threshold with the matching degree of posture featureWhen the first posture feature data, user can successively two different unlocking informations of typing, and entry time interval is not more than twiceFirst preset duration, verifying pass through rear opening door lock.By the way of double verification, legitimate user is in injury, the originals such as sickWhen making posture feature identification mistake because causing posture feature that large change occurs, can also succeed opening door lock.Wherein,One preset duration can be set according to practical application, such as 30s, be not limited herein.
When it is implemented, above-mentioned first unlocking information, the second unlocking information or third unlocking information include following letterAny one or more in breath: unlocking pin, unlock finger print information, unlock induction card information, unlock voiceprint, unlock rainbowFilm information, unlock venous information (such as unlock refers to venous information), unlock facial information.
Further, in a kind of optional embodiment, do not include and posture feature when determining in posture feature databaseMatching degree be greater than first threshold the first posture feature data when, the above method further include:
Monitoring objective user in the monitoring range of monitoring device residence time exceed the second preset duration when, output reportAlert information, warning message, which is used to indicate around electronic lock, there is illegal user.
Wherein, the second preset duration can be set according to practical application, such as 15 minutes, be not limited herein.SpecificallyWhen implementation, output warning message be can be through sendings reports such as the warning device loudspeaker, the warning lamps that are arranged at electronic lockAlert signal can also export warning message to the associated monitoring device of electronic lock, and it is mechanical, electrical that monitoring device can be such as handThe terminal devices such as brain or plate, when monitor target user in the monitoring range of monitoring device residence time exceed secondIt, can be all by the way of wireless communication based on preset communication interface/wireless communication module in electronic lock when preset durationSuch as wifi, bluetooth, ZigBee, warning message is sent to aforementioned monitoring device, to notify to control the administrator of the monitoring deviceThere is illegal user around aforementioned electronic door lock in member, such as owner, residential property or policeman.When it is implemented, can be according toThe push object of the customized setting warning message of actual scene, namely control the management for receiving the monitoring device of warning messagePersonnel.
In the present embodiment, determine in posture feature database do not include being greater than first threshold with the matching degree of posture featureWhen the first posture feature data, the case where being continued to monitor around electronic lock by aforementioned monitoring device, when monitoring target userWhen residence time exceeds the second preset duration in the monitoring range of monitoring device, to administrative staff's output at monitoring deviceWarning message, the case where administrative staff capable of being allowed to understand around electronic lock in time.
Further, to improve the accuracy rate identified based on posture feature database to target user's posture feature, in one kindIn optional embodiment, the above method further include:
It, will when determining that the matching degree of posture feature and the first posture feature data is greater than first threshold and is less than second thresholdPosture feature include with the first unmatched data of posture feature data, be combined as the second appearance with the first posture feature dataState characteristic is stored in posture feature database.
When it is implemented, first threshold can be set as 80%, second threshold can be set as 100%, it is assumed that posture feature databaseIn include with the matching degree of the posture feature of target user be 83% the first posture feature data when, then by aforementioned posture featureIn with the data of the first posture feature data unmatched 17% be stored in posture feature database, optionally with the first posture featureData are combined as the second posture feature data, are stored in posture feature database, improve the number in posture feature databaseAccording to.In order to which human body attitude feature is slowly varying with the variation of human physiological functions, pass through self study update mode, Ye JishangThe mode for increasing the posture feature data for updating legitimate user into the unmatched data of small part is stated, posture feature number is timely updatedAccording to library, to improve the accuracy rate identified based on posture feature database to target user's posture feature.
The corresponding above method, the embodiment of the invention provides a kind of trippers, referring to fig. 2, monitor applied to being provided withThe electronic lock of device, comprising:
Acquisition module 201, for acquiring the posture feature for entering the target user of monitoring range of monitoring device;
Processing module 202 includes being greater than the first threshold with the matching degree of posture feature for determining in posture feature databaseWhen the first posture feature data of value, electronic lock is waken up;Wherein, it is stored in posture feature database including the first posture spyLevy the posture feature data of the legitimate user including data;Receive solving to the electronic lock after wake-up for target user's triggeringFirst unlock instruction of lock carries the first unlocking information in the first unlock instruction;First unlocking information is verified, and is being testedCard opens electronic lock after passing through.
Above-mentioned tripper provided in an embodiment of the present invention, processing module 202 are based on being stored with legitimate user's posture featureThe posture feature database of data matches the posture feature of the collected target user of acquisition module 201, determines targetUser is legitimate user, namely determines to include be greater than first threshold with the matching degree of posture feature the in posture feature databaseDoor lock is just waken up after one posture feature data, then to the first solution carried in aforementioned first unlock instruction of target user's triggeringLock information carries out being verified rear opening door lock.By verifying user identity, even if can guarantee that the key of door lock is stolen, bodyPart mismatches and also fail to open door lock, effectively improves the safety of door lock.
In a kind of optional embodiment, processing module 202 is also used to:
Determine do not include the first posture spy for being greater than first threshold with the matching degree of posture feature in posture feature databaseWhen levying data, the second unlock instruction of target user's triggering being unlocked to electronic lock is received, is taken in the second unlock instructionThe second unlocking information of band;
Second unlocking information is verified, and in the first preset duration after being verified, receives target user's touchingThe third unlock instruction of hair being unlocked to electronic lock carries third unlocking information in third unlock instruction;Wherein, secondUnlocking information is different from third unlocking information;
Third unlocking information is verified, and opens electronic lock after being verified.
In a kind of optional embodiment, aforementioned first unlocking information, the second unlocking information or third unlocking information are equalIncluding any one or more in following information: unlocking pin, unlock finger print information, unlock induction card information, unlock vocal printInformation, unlock iris information, unlock venous information, unlock facial information.
In a kind of optional embodiment, processing module 202 determines in posture feature database and does not include and posture is specialWhen the matching degree of sign is greater than the first posture feature data of first threshold, it is specifically used for:
Monitoring objective user in the monitoring range of monitoring device residence time exceed the second preset duration when, output reportAlert information, warning message, which is used to indicate around electronic lock, there is illegal user.
In a kind of optional embodiment, processing module 202 is also used to:
It, will when determining that the matching degree of posture feature and the first posture feature data is greater than first threshold and is less than second thresholdPosture feature include with the first unmatched data of posture feature data, be combined as the second appearance with the first posture feature dataState characteristic is stored in posture feature database;.
The corresponding above method, referring to Fig. 3, the embodiment of the invention provides a kind of electronic locks 300, comprising:
Communication interface 301, memory 302 and processor 303;
Wherein, the processor 303 is communicated by the communication interface 301 with other equipment, for example, other equipmentIt can be aforementioned monitoring device, processor 303 can send warning message to monitoring device by communication interface 301;Memory302, for storing program instruction;Processor 303, for calling the program instruction stored in the memory 302, according to acquisitionProgram execute the method in above-described embodiment.
In the embodiment of the present application, processor can be general processor, digital signal processor, specific integrated circuit,Field programmable gate array or other programmable logic device, discrete gate or transistor logic, discrete hardware components,It may be implemented or execute disclosed each method, step and the logic diagram in the embodiment of the present application.General processor can beMicroprocessor or any conventional processor etc..The step of method in conjunction with disclosed in the embodiment of the present application, can directly embodyExecute completion for hardware processor, or in processor hardware and software module combination execute completion.
In the embodiment of the present application, memory, for storing program instruction and the i.e. legitimate user of posture feature databasePosture feature data, correct unlocking information, such as: unlocking pin, unlock finger print information, unlock induction card information, unlock soundLine information, unlock iris information, unlock venous information, unlock facial information.In the embodiment of the present application, memory can be with right and wrongVolatile memory, such as hard disk (hard disk drive, HDD) or solid state hard disk (solid-state drive, SSD)Deng can also be volatile memory (volatile memory), such as random access memory (random-accessMemory, RAM).Memory, which can also be, can be used in carrying or store the desired journey with instruction or data structure formSequence code and can by any other medium of computer access, but not limited to this.Memory in the embodiment of the present application may be used alsoTo be circuit or other devices that arbitrarily can be realized store function, for storing program instruction and/or data.The application is realApply the specific connection medium not limited between above-mentioned communication interface, memory and processor in example, such as bus, bus can be withIt is divided into address bus, data/address bus, control bus etc..
For ease of understanding, for updating the process in attitude data library, referring to fig. 4, the embodiment of the invention provides one kindUpdate the flow diagram in attitude data library.The external structure of electronic lock 300, i.e. electronic lock are also illustrated in Fig. 4Monitoring device 401 and key cog region 402 are provided on 300, wherein monitoring device can be camera or laser radarDeng;Key cog region 402 includes at least any two kinds in following: combination disk, fingerprint identification area, contactless card cog region, vocal printCog region, iris recognition area, hand vein recognition area, face face recognition area, specifically, illustrating a kind of key knowledge in Fig. 4Other area 402, combination disk.
When there is target user in the monitoring range of the monitoring device 401 on electronic lock 300, electronic lock 300Monitoring device 401 acquires the posture feature of target user, the processor 303 being sent in electronic lock 300,303 base of processorThe posture feature data of the legitimate user stored in posture feature database in memory 302 and the posture feature of target userMatched, when include in posture feature database with the matching degree of the posture feature of target user be greater than first threshold (80%)The first posture feature data, such as include with the matching degree of the posture feature of target user in posture feature database be 83%The first posture feature data when, determine target user be legitimate user, by aforementioned posture feature with the first posture feature numberThe first posture feature data are combined to generate the second posture feature data according to the data of unmatched part (17%), by the second postureCharacteristic is stored in posture feature database, to update posture feature database.
In addition, in a kind of optional embodiment, can also construct with the associated Cloud Server of electronic lock 300, in advanceFirst by posture feature database, that is, legitimate user posture feature data, correct unlocking information, such as: unlocking pin, unlockFinger print information, unlock induction card information, unlock voiceprint, unlock iris information, unlock venous information, unlock facial information etc.It is stored in the Cloud Server.Based on this, processor 303 by monitoring device 401 monitored personnel close to electronic lock 300,Namely when in the monitoring range of entrance monitoring device 401, the posture feature of collector, before collected posture feature is passed throughIt states communication interface 301 and is sent to Cloud Server, by cloud service according to the legitimate user's of posture feature database purchase thereinPosture feature data are compared, to judge whether the personnel are legitimate user, if it is, waking up the key on door lockCog region is identified by rear opening door lock after the corresponding key of personnel's typing (that is, aforementioned first unlocking information);If noIt is then to start the timer connected to the processor set in preset timing unit either electronic lock in processor to start to countWhen, and a kind of key of reception staff's typing (that is, aforementioned second unlocking information) is identified by and is separated by the first preset duration againAfter the secondary another key (that is, aforementioned third unlocking information) for receiving personnel's typing is identified by, opening door lock;But when meterConstantly length reaches preset second level duration, does not receive the correct key of personnel's successively typing yet, and personnel are also monitoringDevice 401 stops in the range of capable of monitoring, determines that the personnel are unauthorized person, then passes through communication interface 301 to electronic gateLock 300 associated monitoring device output warning messages.In the present embodiment, communication interface 301 can be used communication withMonitoring device or Cloud Server are communicated.
Further, the embodiment of the invention provides a kind of computer readable storage medium, the computer readable storage mediumsIt is stored with computer instruction, when computer instruction is run on computers, so that computer executes the above method.
It should be understood by those skilled in the art that, embodiments herein can provide as method, system or computer programProduct.Therefore, complete hardware embodiment, complete software embodiment or reality combining software and hardware aspects can be used in the applicationApply the form of example.Moreover, it wherein includes the computer of computer usable program code that the application, which can be used in one or more,The computer program implemented in usable storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) producesThe form of product.
The application be referring to according to the present processes, equipment (system) and computer program product flow chart and/orBlock diagram describes.It should be understood that each process that can be realized by computer program instructions in flowchart and/or the block diagram and/orThe combination of process and/or box in box and flowchart and/or the block diagram.It can provide these computer program instructions to arriveGeneral purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices processor to generate oneMachine, so that being generated by the instruction that computer or the processor of other programmable data processing devices execute for realizing flowingThe device for the function of being specified in journey figure one process or multiple processes and/or block diagrams one box or multiple boxes.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing devices with spyDetermine in the computer-readable memory that mode works, so that it includes referring to that instruction stored in the computer readable memory, which generates,Enable the manufacture of device, the command device realize in one box of one or more flows of the flowchart and/or block diagram orThe function of being specified in multiple boxes.
These computer program instructions also can be loaded onto a computer or other programmable data processing device, so that countingSeries of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, thus in computer orThe instruction executed on other programmable devices is provided for realizing in one or more flows of the flowchart and/or block diagram oneThe step of function of being specified in a box or multiple boxes.
Although preferred embodiments of the present invention have been described, it is created once a person skilled in the art knows basicProperty concept, then additional changes and modifications may be made to these embodiments.So it includes excellent that the following claims are intended to be interpreted asIt selects embodiment and falls into all change and modification of the scope of the invention.
Obviously, those skilled in the art can carry out various modification and variations without departing from the essence of the application to the applicationMind and range.In this way, if these modifications and variations of the application belong to the range of the claim of this application and its equivalent technologiesWithin, then the application is also intended to include these modifications and variations.