Movatterモバイル変換


[0]ホーム

URL:


CN110288731A - Unlocking method and device and electronic door lock - Google Patents

Unlocking method and device and electronic door lock
Download PDF

Info

Publication number
CN110288731A
CN110288731ACN201910510295.XACN201910510295ACN110288731ACN 110288731 ACN110288731 ACN 110288731ACN 201910510295 ACN201910510295 ACN 201910510295ACN 110288731 ACN110288731 ACN 110288731A
Authority
CN
China
Prior art keywords
posture feature
unlock
information
unlocking
posture
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910510295.XA
Other languages
Chinese (zh)
Inventor
何文豪
杨苗
李绍斌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Gree Electric Appliances Inc of Zhuhai
Zhuhai Lianyun Technology Co Ltd
Original Assignee
Gree Electric Appliances Inc of Zhuhai
Zhuhai Lianyun Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Gree Electric Appliances Inc of Zhuhai, Zhuhai Lianyun Technology Co LtdfiledCriticalGree Electric Appliances Inc of Zhuhai
Priority to CN201910510295.XApriorityCriticalpatent/CN110288731A/en
Publication of CN110288731ApublicationCriticalpatent/CN110288731A/en
Pendinglegal-statusCriticalCurrent

Links

Classifications

Landscapes

Abstract

The invention provides an unlocking method, an unlocking device and an electronic door lock, which are used for solving the problems that the identity of a user cannot be identified and the safety of the user is influenced because an unlocking secret key is stolen in the prior art. The method is applied to an electronic door lock provided with a monitoring device, and firstly, the posture characteristics of a target user entering the monitoring range of the monitoring device are collected; then, when the attitude characteristic database is determined to contain first attitude characteristic data with the matching degree with the attitude characteristics larger than a first threshold value, the electronic door lock is awakened; the gesture feature database stores gesture feature data of legal users including first gesture feature data; further receiving a first unlocking instruction which is triggered by a target user and used for unlocking the awakened electronic door lock, wherein the first unlocking instruction carries first unlocking information; and verifying the first unlocking information, and unlocking the electronic door lock after the verification is passed.

Description

A kind of unlocking method, device and electronic lock
Technical field
The present invention relates to door lock control field more particularly to a kind of unlocking methods, device and electronic lock.
Background technique
With gradualling mature for technology of Internet of things, intelligent door lock is applied to more and more families, office, retail shop etc.Place, to guarantee the safety of user.
Current intelligent door lock passes through setting unlocking code key, password, contactless card etc., when user inputs unlocking mostlyPassword, or the contactless card of unlocking is attached to the induction zone on door lock, after being verified, door lock can be turned on.If passwordOr the unlockings code key such as contactless card is stolen, appropriator using unlocking code key can opening door lock, lack for user identityVerifying, safety is poor.
Summary of the invention
The present invention provides a kind of unlocking method, device and electronic lock, can not identify user in the prior art to solveIdentity, unlocking code key are stolen the problem of influencing user security.
In a first aspect, the embodiment of the invention provides a kind of unlocking method, applied to the electronic gate for being provided with monitoring deviceLock, comprising:
Acquisition enters the posture feature of the target user of the monitoring range of the monitoring device;
Determine to include the first posture for being greater than first threshold with the matching degree of the posture feature in posture feature databaseWhen characteristic, the electronic lock is waken up;Wherein, it is stored in the posture feature database special including first postureLevy the posture feature data of the legitimate user including data;
Receive the first unlock instruction of target user's triggering being unlocked to the electronic lock after wake-up, instituteIt states and carries the first unlocking information in the first unlock instruction;
First unlocking information is verified, and opens the electronic lock after being verified.
In an optional implementation manner, the method also includes:
Determine do not include the first appearance for being greater than first threshold with the matching degree of the posture feature in posture feature databaseWhen state characteristic, the second unlock instruction of target user's triggering being unlocked to the electronic lock is received, it is describedThe second unlocking information is carried in second unlock instruction;
Second unlocking information is verified, and in the first preset duration after being verified, receives the meshThe third unlock instruction of user's triggering being unlocked to the electronic lock is marked, carries third solution in the third unlock instructionLock information;Wherein, second unlocking information is different from the third unlocking information;
The third unlocking information is verified, and opens the electronic lock after being verified.
In an optional implementation manner, first unlocking information, second unlocking information or the thirdUnlocking information includes any one or more in following information: unlocking pin, unlock finger print information, unlock induction card information,Unlock voiceprint, unlock iris information, unlock venous information, unlock facial information.
In an optional implementation manner, determine do not include matching with the posture feature in posture feature databaseWhen degree is greater than the first posture feature data of first threshold, the method also includes:
It monitors target user residence time in the monitoring range of the monitoring device and exceeds the second preset durationWhen, warning message is exported, the warning message, which is used to indicate around the electronic lock, illegal user occurs.
In an optional implementation manner, the method also includes:
Determine that the matching degree of the posture feature and the first posture feature data is greater than the first threshold and is less thanIt is including by the posture feature with the unmatched data of the first posture feature data when second threshold, with described firstPosture feature data are combined as the second posture feature data, are stored in the posture feature database.
Second aspect, the embodiment of the invention provides a kind of trippers, applied to the electronic gate for being provided with monitoring deviceLock, comprising:
Acquisition module, for acquiring the posture feature of the target user into the monitoring range of the monitoring device;
Processing module includes being greater than the first threshold with the matching degree of the posture feature for determining in posture feature databaseWhen the first posture feature data of value, the electronic lock is waken up;Wherein, it is stored in the posture feature database including instituteState the posture feature data of the legitimate user including the first posture feature data;
Receive the first unlock instruction of target user's triggering being unlocked to the electronic lock after wake-up, instituteIt states and carries the first unlocking information in the first unlock instruction;
First unlocking information is verified, and opens the electronic lock after being verified.
In an optional implementation manner, the processing module, is also used to:
Determine do not include the first appearance for being greater than first threshold with the matching degree of the posture feature in posture feature databaseWhen state characteristic, the second unlock instruction of target user's triggering being unlocked to the electronic lock is received, it is describedThe second unlocking information is carried in second unlock instruction;
Second unlocking information is verified, and in the first preset duration after being verified, receives the meshThe third unlock instruction of user's triggering being unlocked to the electronic lock is marked, carries third solution in the third unlock instructionLock information;Wherein, second unlocking information is different from the third unlocking information;
The third unlocking information is verified, and opens the electronic lock after being verified.
In a kind of optional implementation, first unlocking information, second unlocking information or the third solutionLock information includes any one or more in following information: unlocking pin, unlock finger print information, unlock induction card information, solutionLock voiceprint, unlock iris information, unlock venous information, unlock facial information.
In an optional implementation manner, the processing module in determining posture feature database do not include and instituteState posture feature matching degree be greater than first threshold the first posture feature data when, be specifically used for:
It monitors target user residence time in the monitoring range of the monitoring device and exceeds the second preset durationWhen, warning message is exported, the warning message, which is used to indicate around the electronic lock, illegal user occurs.
In an optional implementation manner, the processing module, is also used to:
Determine that the matching degree of the posture feature and the first posture feature data is greater than the first threshold and is less thanIt is including by the posture feature with the unmatched data of the first posture feature data when second threshold, with described firstPosture feature data are combined as the second posture feature data, are stored in the posture feature database.
The third aspect, the embodiment of the invention provides a kind of electronic locks, comprising: memory, for storing program instruction;Processor executes the above method according to the program instruction of acquisition for reading the program instruction stored in the memory.
Fourth aspect, the embodiment of the invention provides a kind of computer readable storage medium, the computer-readable storageMedia storage has computer instruction, when the computer instruction is run on computers, so that computer executes the above method.
Aforesaid way provided in an embodiment of the present invention is collecting the appearance into the target user of monitoring device monitoring rangeAfter state feature, identity is carried out to target user based on the posture feature database for being stored with legitimate user's posture feature data and is testedCard determines that target user is legitimate user, namely determines that in posture feature database include being greater than with the matching degree of posture featureDoor lock is just waken up after first posture feature data of first threshold, then in aforementioned first unlock instruction of target user's triggeringThe first unlocking information carried carries out being verified rear opening door lock.By verifying user identity, it can guarantee the key of door lockEven if being stolen, identity mismatch also fail to open door lock, effectively improves the safety of door lock.
Detailed description of the invention
Fig. 1 is a kind of flow diagram of unlocking method provided in an embodiment of the present invention;
Fig. 2 is a kind of structural block diagram of tripper provided in an embodiment of the present invention;
Fig. 3 is a kind of structural schematic diagram of electronic lock provided in an embodiment of the present invention;
Fig. 4 is a kind of flow diagram for updating posture feature database provided in an embodiment of the present invention.
Specific embodiment
To make the objectives, technical solutions, and advantages of the present invention clearer, below in conjunction with attached drawing to the present invention make intoIt is described in detail to one step, it is clear that the described embodiments are only some of the embodiments of the present invention, rather than whole implementationExample.Based on the embodiments of the present invention, obtained by those of ordinary skill in the art without making creative effortsAll other embodiment, shall fall within the protection scope of the present invention.
It should be noted that it is multiple involved in the present invention, refer to two or more."and/or", description association pairThe incidence relation of elephant, indicate may exist three kinds of relationships, for example, A and/or B, can indicate: individualism A, exist simultaneously A andThese three situations of B, individualism B.Character "/" typicallys represent the relationship that forward-backward correlation object is a kind of "or".Additionally, it should manageSolution, although may describe each data using term first, second etc. in embodiments of the present invention, these data be should not necessarily be limited byThese terms.These terms are only used to for each data being distinguished from each other out.
Current intelligent door lock passes through setting unlocking code key, password, contactless card etc., when user inputs unlocking mostlyPassword, or the contactless card of unlocking is attached to the induction zone on door lock, after being verified, door lock can be turned on.If passwordOr the unlockings code key such as contactless card is stolen, appropriator using unlocking code key can opening door lock, lack for user identityVerifying, safety is poor.
Based on this, the embodiment of the invention provides a kind of unlocking method, device and electronic locks, to solve the prior artIn can not identify user identity, unlocking code key stolen the problem of influencing user security.Wherein, method and apparatus are based on sameInventive concept, since the principle that method and apparatus solve the problems, such as is similar, the implementation of method and apparatus can with cross-reference,Overlaps will not be repeated.
To be carried out first to a kind of unlocking method disclosed in the embodiment of the present invention detailed convenient for understanding the present embodimentIt is thin to introduce.
Referring to Fig. 1, the embodiment of the invention provides a kind of unlocking method, this method is applied to be provided with the electricity of monitoring deviceCervical orifice of uterus lock, comprising:
Step S101, acquisition enter the posture feature of the target user of the monitoring range of monitoring device;
Wherein, monitoring device can be camera or laser radar etc., and posture feature includes walk posture feature, bodyThe features such as volume morphing feature height, fat or thin.
Step S102 determines to include be greater than first threshold with the matching degree of posture feature first in posture feature databaseWhen posture feature data, electronic lock is waken up.
Wherein, the posture that the legitimate user including the first posture feature data is stored in posture feature database is specialLevy data, the data in posture feature database can based on user to the relevant operation instruction that electronic lock trigger be added withModification, can also be added and be modified by the associated application terminal of electronic lock.In view of human body attitude feature, such as walkPosture feature can be slowly varying with the variation of human physiological functions, is determining that target user is based on posture feature databaseIt is no be legitimate user when, by setting first threshold carry out fuzzy matching, specifically, the first threshold can be set according to actual needsDetermine, such as expressed as a percentage 80%, is not limited herein.
Step S103 receives the first unlock instruction of target user's triggering being unlocked to the electronic lock after wake-up,The first unlocking information is carried in first unlock instruction;Step S104 verifies the first unlocking information, and after being verifiedOpen electronic lock.
Above-mentioned unlocking method provided in an embodiment of the present invention, it is special based on the posture for being stored with legitimate user's posture feature dataIt levies database and authentication is carried out to target user, determine that target user is legitimate user, namely determine posture feature databaseIn include with the matching degree of posture feature be greater than first threshold the first posture feature data after just wake up door lock, then to targetThe first unlocking information carried in aforementioned first unlock instruction of user's triggering is verified, and rear opening door lock is passed through.By testingUser identity is demonstrate,proved, even if can guarantee that the key of door lock is stolen, identity mismatch also fail to open door lock, effectively improves doorThe safety of lock.
Further, it is contemplated that when practical application, it is understood that there may be personal injury, the reasons such as sick cause posture feature occur compared withChange greatly, will appear the situation of posture feature identification mistake for legitimate user.In a kind of optional embodiment,The above method further include:
(1) determine do not include the first appearance for being greater than first threshold with the matching degree of posture feature in posture feature databaseWhen state characteristic, the second unlock instruction of target user's triggering being unlocked to electronic lock, the second unlock instruction are receivedThe second unlocking information of middle carrying.
(2) the second unlocking information is verified, and in the first preset duration after being verified, receives target and usesThe third unlock instruction of family triggering being unlocked to electronic lock, third unlocking information is carried in third unlock instruction;Wherein,Second unlocking information is different from third unlocking information.
(3) third unlocking information is verified, and opens electronic lock after being verified.
In the present embodiment, determine in posture feature database do not include being greater than first threshold with the matching degree of posture featureWhen the first posture feature data, user can successively two different unlocking informations of typing, and entry time interval is not more than twiceFirst preset duration, verifying pass through rear opening door lock.By the way of double verification, legitimate user is in injury, the originals such as sickWhen making posture feature identification mistake because causing posture feature that large change occurs, can also succeed opening door lock.Wherein,One preset duration can be set according to practical application, such as 30s, be not limited herein.
When it is implemented, above-mentioned first unlocking information, the second unlocking information or third unlocking information include following letterAny one or more in breath: unlocking pin, unlock finger print information, unlock induction card information, unlock voiceprint, unlock rainbowFilm information, unlock venous information (such as unlock refers to venous information), unlock facial information.
Further, in a kind of optional embodiment, do not include and posture feature when determining in posture feature databaseMatching degree be greater than first threshold the first posture feature data when, the above method further include:
Monitoring objective user in the monitoring range of monitoring device residence time exceed the second preset duration when, output reportAlert information, warning message, which is used to indicate around electronic lock, there is illegal user.
Wherein, the second preset duration can be set according to practical application, such as 15 minutes, be not limited herein.SpecificallyWhen implementation, output warning message be can be through sendings reports such as the warning device loudspeaker, the warning lamps that are arranged at electronic lockAlert signal can also export warning message to the associated monitoring device of electronic lock, and it is mechanical, electrical that monitoring device can be such as handThe terminal devices such as brain or plate, when monitor target user in the monitoring range of monitoring device residence time exceed secondIt, can be all by the way of wireless communication based on preset communication interface/wireless communication module in electronic lock when preset durationSuch as wifi, bluetooth, ZigBee, warning message is sent to aforementioned monitoring device, to notify to control the administrator of the monitoring deviceThere is illegal user around aforementioned electronic door lock in member, such as owner, residential property or policeman.When it is implemented, can be according toThe push object of the customized setting warning message of actual scene, namely control the management for receiving the monitoring device of warning messagePersonnel.
In the present embodiment, determine in posture feature database do not include being greater than first threshold with the matching degree of posture featureWhen the first posture feature data, the case where being continued to monitor around electronic lock by aforementioned monitoring device, when monitoring target userWhen residence time exceeds the second preset duration in the monitoring range of monitoring device, to administrative staff's output at monitoring deviceWarning message, the case where administrative staff capable of being allowed to understand around electronic lock in time.
Further, to improve the accuracy rate identified based on posture feature database to target user's posture feature, in one kindIn optional embodiment, the above method further include:
It, will when determining that the matching degree of posture feature and the first posture feature data is greater than first threshold and is less than second thresholdPosture feature include with the first unmatched data of posture feature data, be combined as the second appearance with the first posture feature dataState characteristic is stored in posture feature database.
When it is implemented, first threshold can be set as 80%, second threshold can be set as 100%, it is assumed that posture feature databaseIn include with the matching degree of the posture feature of target user be 83% the first posture feature data when, then by aforementioned posture featureIn with the data of the first posture feature data unmatched 17% be stored in posture feature database, optionally with the first posture featureData are combined as the second posture feature data, are stored in posture feature database, improve the number in posture feature databaseAccording to.In order to which human body attitude feature is slowly varying with the variation of human physiological functions, pass through self study update mode, Ye JishangThe mode for increasing the posture feature data for updating legitimate user into the unmatched data of small part is stated, posture feature number is timely updatedAccording to library, to improve the accuracy rate identified based on posture feature database to target user's posture feature.
The corresponding above method, the embodiment of the invention provides a kind of trippers, referring to fig. 2, monitor applied to being provided withThe electronic lock of device, comprising:
Acquisition module 201, for acquiring the posture feature for entering the target user of monitoring range of monitoring device;
Processing module 202 includes being greater than the first threshold with the matching degree of posture feature for determining in posture feature databaseWhen the first posture feature data of value, electronic lock is waken up;Wherein, it is stored in posture feature database including the first posture spyLevy the posture feature data of the legitimate user including data;Receive solving to the electronic lock after wake-up for target user's triggeringFirst unlock instruction of lock carries the first unlocking information in the first unlock instruction;First unlocking information is verified, and is being testedCard opens electronic lock after passing through.
Above-mentioned tripper provided in an embodiment of the present invention, processing module 202 are based on being stored with legitimate user's posture featureThe posture feature database of data matches the posture feature of the collected target user of acquisition module 201, determines targetUser is legitimate user, namely determines to include be greater than first threshold with the matching degree of posture feature the in posture feature databaseDoor lock is just waken up after one posture feature data, then to the first solution carried in aforementioned first unlock instruction of target user's triggeringLock information carries out being verified rear opening door lock.By verifying user identity, even if can guarantee that the key of door lock is stolen, bodyPart mismatches and also fail to open door lock, effectively improves the safety of door lock.
In a kind of optional embodiment, processing module 202 is also used to:
Determine do not include the first posture spy for being greater than first threshold with the matching degree of posture feature in posture feature databaseWhen levying data, the second unlock instruction of target user's triggering being unlocked to electronic lock is received, is taken in the second unlock instructionThe second unlocking information of band;
Second unlocking information is verified, and in the first preset duration after being verified, receives target user's touchingThe third unlock instruction of hair being unlocked to electronic lock carries third unlocking information in third unlock instruction;Wherein, secondUnlocking information is different from third unlocking information;
Third unlocking information is verified, and opens electronic lock after being verified.
In a kind of optional embodiment, aforementioned first unlocking information, the second unlocking information or third unlocking information are equalIncluding any one or more in following information: unlocking pin, unlock finger print information, unlock induction card information, unlock vocal printInformation, unlock iris information, unlock venous information, unlock facial information.
In a kind of optional embodiment, processing module 202 determines in posture feature database and does not include and posture is specialWhen the matching degree of sign is greater than the first posture feature data of first threshold, it is specifically used for:
Monitoring objective user in the monitoring range of monitoring device residence time exceed the second preset duration when, output reportAlert information, warning message, which is used to indicate around electronic lock, there is illegal user.
In a kind of optional embodiment, processing module 202 is also used to:
It, will when determining that the matching degree of posture feature and the first posture feature data is greater than first threshold and is less than second thresholdPosture feature include with the first unmatched data of posture feature data, be combined as the second appearance with the first posture feature dataState characteristic is stored in posture feature database;.
The corresponding above method, referring to Fig. 3, the embodiment of the invention provides a kind of electronic locks 300, comprising:
Communication interface 301, memory 302 and processor 303;
Wherein, the processor 303 is communicated by the communication interface 301 with other equipment, for example, other equipmentIt can be aforementioned monitoring device, processor 303 can send warning message to monitoring device by communication interface 301;Memory302, for storing program instruction;Processor 303, for calling the program instruction stored in the memory 302, according to acquisitionProgram execute the method in above-described embodiment.
In the embodiment of the present application, processor can be general processor, digital signal processor, specific integrated circuit,Field programmable gate array or other programmable logic device, discrete gate or transistor logic, discrete hardware components,It may be implemented or execute disclosed each method, step and the logic diagram in the embodiment of the present application.General processor can beMicroprocessor or any conventional processor etc..The step of method in conjunction with disclosed in the embodiment of the present application, can directly embodyExecute completion for hardware processor, or in processor hardware and software module combination execute completion.
In the embodiment of the present application, memory, for storing program instruction and the i.e. legitimate user of posture feature databasePosture feature data, correct unlocking information, such as: unlocking pin, unlock finger print information, unlock induction card information, unlock soundLine information, unlock iris information, unlock venous information, unlock facial information.In the embodiment of the present application, memory can be with right and wrongVolatile memory, such as hard disk (hard disk drive, HDD) or solid state hard disk (solid-state drive, SSD)Deng can also be volatile memory (volatile memory), such as random access memory (random-accessMemory, RAM).Memory, which can also be, can be used in carrying or store the desired journey with instruction or data structure formSequence code and can by any other medium of computer access, but not limited to this.Memory in the embodiment of the present application may be used alsoTo be circuit or other devices that arbitrarily can be realized store function, for storing program instruction and/or data.The application is realApply the specific connection medium not limited between above-mentioned communication interface, memory and processor in example, such as bus, bus can be withIt is divided into address bus, data/address bus, control bus etc..
For ease of understanding, for updating the process in attitude data library, referring to fig. 4, the embodiment of the invention provides one kindUpdate the flow diagram in attitude data library.The external structure of electronic lock 300, i.e. electronic lock are also illustrated in Fig. 4Monitoring device 401 and key cog region 402 are provided on 300, wherein monitoring device can be camera or laser radarDeng;Key cog region 402 includes at least any two kinds in following: combination disk, fingerprint identification area, contactless card cog region, vocal printCog region, iris recognition area, hand vein recognition area, face face recognition area, specifically, illustrating a kind of key knowledge in Fig. 4Other area 402, combination disk.
When there is target user in the monitoring range of the monitoring device 401 on electronic lock 300, electronic lock 300Monitoring device 401 acquires the posture feature of target user, the processor 303 being sent in electronic lock 300,303 base of processorThe posture feature data of the legitimate user stored in posture feature database in memory 302 and the posture feature of target userMatched, when include in posture feature database with the matching degree of the posture feature of target user be greater than first threshold (80%)The first posture feature data, such as include with the matching degree of the posture feature of target user in posture feature database be 83%The first posture feature data when, determine target user be legitimate user, by aforementioned posture feature with the first posture feature numberThe first posture feature data are combined to generate the second posture feature data according to the data of unmatched part (17%), by the second postureCharacteristic is stored in posture feature database, to update posture feature database.
In addition, in a kind of optional embodiment, can also construct with the associated Cloud Server of electronic lock 300, in advanceFirst by posture feature database, that is, legitimate user posture feature data, correct unlocking information, such as: unlocking pin, unlockFinger print information, unlock induction card information, unlock voiceprint, unlock iris information, unlock venous information, unlock facial information etc.It is stored in the Cloud Server.Based on this, processor 303 by monitoring device 401 monitored personnel close to electronic lock 300,Namely when in the monitoring range of entrance monitoring device 401, the posture feature of collector, before collected posture feature is passed throughIt states communication interface 301 and is sent to Cloud Server, by cloud service according to the legitimate user's of posture feature database purchase thereinPosture feature data are compared, to judge whether the personnel are legitimate user, if it is, waking up the key on door lockCog region is identified by rear opening door lock after the corresponding key of personnel's typing (that is, aforementioned first unlocking information);If noIt is then to start the timer connected to the processor set in preset timing unit either electronic lock in processor to start to countWhen, and a kind of key of reception staff's typing (that is, aforementioned second unlocking information) is identified by and is separated by the first preset duration againAfter the secondary another key (that is, aforementioned third unlocking information) for receiving personnel's typing is identified by, opening door lock;But when meterConstantly length reaches preset second level duration, does not receive the correct key of personnel's successively typing yet, and personnel are also monitoringDevice 401 stops in the range of capable of monitoring, determines that the personnel are unauthorized person, then passes through communication interface 301 to electronic gateLock 300 associated monitoring device output warning messages.In the present embodiment, communication interface 301 can be used communication withMonitoring device or Cloud Server are communicated.
Further, the embodiment of the invention provides a kind of computer readable storage medium, the computer readable storage mediumsIt is stored with computer instruction, when computer instruction is run on computers, so that computer executes the above method.
It should be understood by those skilled in the art that, embodiments herein can provide as method, system or computer programProduct.Therefore, complete hardware embodiment, complete software embodiment or reality combining software and hardware aspects can be used in the applicationApply the form of example.Moreover, it wherein includes the computer of computer usable program code that the application, which can be used in one or more,The computer program implemented in usable storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) producesThe form of product.
The application be referring to according to the present processes, equipment (system) and computer program product flow chart and/orBlock diagram describes.It should be understood that each process that can be realized by computer program instructions in flowchart and/or the block diagram and/orThe combination of process and/or box in box and flowchart and/or the block diagram.It can provide these computer program instructions to arriveGeneral purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices processor to generate oneMachine, so that being generated by the instruction that computer or the processor of other programmable data processing devices execute for realizing flowingThe device for the function of being specified in journey figure one process or multiple processes and/or block diagrams one box or multiple boxes.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing devices with spyDetermine in the computer-readable memory that mode works, so that it includes referring to that instruction stored in the computer readable memory, which generates,Enable the manufacture of device, the command device realize in one box of one or more flows of the flowchart and/or block diagram orThe function of being specified in multiple boxes.
These computer program instructions also can be loaded onto a computer or other programmable data processing device, so that countingSeries of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, thus in computer orThe instruction executed on other programmable devices is provided for realizing in one or more flows of the flowchart and/or block diagram oneThe step of function of being specified in a box or multiple boxes.
Although preferred embodiments of the present invention have been described, it is created once a person skilled in the art knows basicProperty concept, then additional changes and modifications may be made to these embodiments.So it includes excellent that the following claims are intended to be interpreted asIt selects embodiment and falls into all change and modification of the scope of the invention.
Obviously, those skilled in the art can carry out various modification and variations without departing from the essence of the application to the applicationMind and range.In this way, if these modifications and variations of the application belong to the range of the claim of this application and its equivalent technologiesWithin, then the application is also intended to include these modifications and variations.

Claims (12)

CN201910510295.XA2019-06-132019-06-13Unlocking method and device and electronic door lockPendingCN110288731A (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CN201910510295.XACN110288731A (en)2019-06-132019-06-13Unlocking method and device and electronic door lock

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN201910510295.XACN110288731A (en)2019-06-132019-06-13Unlocking method and device and electronic door lock

Publications (1)

Publication NumberPublication Date
CN110288731Atrue CN110288731A (en)2019-09-27

Family

ID=68005314

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN201910510295.XAPendingCN110288731A (en)2019-06-132019-06-13Unlocking method and device and electronic door lock

Country Status (1)

CountryLink
CN (1)CN110288731A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN111750919A (en)*2020-07-022020-10-09陕西师范大学 Identification method and device using multi-axis sensor and accelerometer
CN112991600A (en)*2021-03-262021-06-18杭州海康威视数字技术股份有限公司Method, device, system and equipment for enabling vehicle to exit parking lot
CN114999846A (en)*2022-06-282022-09-02国网河北省电力有限公司邯郸供电分公司Intelligent reclosing circuit breaker and control method thereof
CN117037340A (en)*2023-09-062023-11-10东莞市安邦德智能锁具科技有限公司Intelligent lock control system based on data identification

Citations (7)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20120319814A1 (en)*2011-06-142012-12-20International Business Machines CorporationOpening management through gait detection
CN104270253A (en)*2014-10-212015-01-07中国建设银行股份有限公司Method, devices and system for user identity authentication
CN105155971A (en)*2015-08-212015-12-16汪澜Automatic door opening system based on gait recognition
CN105787440A (en)*2015-11-102016-07-20深圳市商汤科技有限公司Security protection management method and system based on face features and gait features
CN107134026A (en)*2017-04-192017-09-05上海斐讯数据通信技术有限公司A kind of entrance guard controlling method and system
CN109035530A (en)*2018-08-232018-12-18广东汇泰龙科技有限公司A kind of method for unlocking based on cloud lock-step state identifying system, system
US20190066415A1 (en)*2017-08-282019-02-28Timetec Holding Sdn BhdMobile-based access control system

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20120319814A1 (en)*2011-06-142012-12-20International Business Machines CorporationOpening management through gait detection
CN104270253A (en)*2014-10-212015-01-07中国建设银行股份有限公司Method, devices and system for user identity authentication
CN105155971A (en)*2015-08-212015-12-16汪澜Automatic door opening system based on gait recognition
CN105787440A (en)*2015-11-102016-07-20深圳市商汤科技有限公司Security protection management method and system based on face features and gait features
CN107134026A (en)*2017-04-192017-09-05上海斐讯数据通信技术有限公司A kind of entrance guard controlling method and system
US20190066415A1 (en)*2017-08-282019-02-28Timetec Holding Sdn BhdMobile-based access control system
CN109035530A (en)*2018-08-232018-12-18广东汇泰龙科技有限公司A kind of method for unlocking based on cloud lock-step state identifying system, system

Cited By (5)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN111750919A (en)*2020-07-022020-10-09陕西师范大学 Identification method and device using multi-axis sensor and accelerometer
CN112991600A (en)*2021-03-262021-06-18杭州海康威视数字技术股份有限公司Method, device, system and equipment for enabling vehicle to exit parking lot
CN114999846A (en)*2022-06-282022-09-02国网河北省电力有限公司邯郸供电分公司Intelligent reclosing circuit breaker and control method thereof
CN117037340A (en)*2023-09-062023-11-10东莞市安邦德智能锁具科技有限公司Intelligent lock control system based on data identification
CN117037340B (en)*2023-09-062024-04-12东莞市安邦德智能锁具科技有限公司Intelligent lock control system based on data identification

Similar Documents

PublicationPublication DateTitle
US11417159B2 (en)Methods and systems for controlling a smart lock
CN103324909B (en)Facial feature detection
CN110288731A (en)Unlocking method and device and electronic door lock
US9800570B1 (en)Method of persistent authentication with disablement upon removal of a wearable device
CN108711209A (en)dynamic password generation and verification method and system
CN111538970B (en) A cloud platform system based on intelligent Internet of things
CN107408167A (en)Perform the seamless certification of user
CN104809773A (en)Entrance guard control method, entrance guard control apparatus, and entrance guard system
US10037419B2 (en)System, method, and apparatus for personal identification
CN206522020U (en)A kind of intelligent door lock and system
CN104346550B (en)A kind of information processing method and a kind of electronic equipment
CN109461241A (en)A kind of face and fingerprint identification entrance guard system control method
Okubanjo et al.Development of a hybrid radio frequency identification (RFID) and biometric based library management system
CN110223430A (en)Control method and device of electronic door lock and electronic door lock
CN109461237A (en)Intelligent door lock device and method for reminding message thereof
CN106355684B (en)Control method, the device and system of controlled plant
Zamir et al.Secure electronic voting machine using biometric authentication
CN109801409A (en)Voice method for unlocking, electronic equipment
CN109712291A (en)Open method, device and the server of electronic gate
CN110415406A (en)A kind of double nets are mutual to monitor security intelligent door lock system for speech recognition
CN110120114A (en)A kind of human body recognition method based on access control system, system and storage medium
CN112002075A (en) An information processing method and device for improving the security of a locker
CN216957057U (en)Access control device based on two-dimensional code scanning
CN114140925B (en)Intelligent access control system and method based on multiple authentication modes
CN210442852U (en)Fingerprint access control system

Legal Events

DateCodeTitleDescription
PB01Publication
PB01Publication
SE01Entry into force of request for substantive examination
SE01Entry into force of request for substantive examination
RJ01Rejection of invention patent application after publication
RJ01Rejection of invention patent application after publication

Application publication date:20190927


[8]ページ先頭

©2009-2025 Movatter.jp