Disclosure of Invention
In order to improve the realization effect of non-inductive passing, the application provides a millimeter wave and Bluetooth-based intelligent lock non-inductive passing method and system.
In a first aspect, the application provides an intelligent lock non-inductive passing method based on millimeter waves and Bluetooth, which adopts the following technical scheme:
an intelligent lock non-inductive passing method based on millimeter waves and Bluetooth comprises the following steps:
Marking a trigger object and entering a low-power consumption standby mode after being triggered based on millimeter waves under a first boundary;
performing low-frequency trigger verification at a first distance based on the millimeter waves in the low-power consumption standby mode, and marking the trigger object after the low-frequency trigger verification is passed so as to obtain a target object;
marking the target object and entering a high-frequency tracking mode after being triggered based on millimeter waves under a second boundary;
performing high-frequency triggering verification at a second distance based on the millimeter waves in the high-frequency tracking mode, and marking the target object as an effective object after the verification is passed;
After being triggered based on the millimeter waves under a third boundary, waking up Bluetooth and judging whether the signal source position of the effective object is matched with a position condition;
When the two-way authentication is matched, the two-way authentication is connected with the effective object based on Bluetooth and is performed, and after the two-way authentication is completed, the pass certificate is acquired and checked;
and after the verification is finished, sending a pass instruction based on the pass certificate to finish the pass action.
In some of these embodiments, the low frequency trigger verification includes physiological feature verification and motion profile verification, the high frequency trigger verification includes motion profile verification, and in particular,
And (3) physiological characteristic verification:
Acquiring a reflected signal of the millimeter wave, analyzing the frequency corresponding to the reflected signal, and judging whether the frequency belongs to a first frequency range corresponding to breath detection and/or a second frequency range corresponding to heartbeat detection;
and (3) verifying a motion trail:
Taking the position of the triggering object when the first boundary is triggered and the position of the target object when the second boundary is triggered as a first starting point and a second starting point respectively;
acquiring time delay of the millimeter wave transmitting signals and corresponding reflected signals transmitted periodically to calculate real-time distances, acquiring Doppler frequency shift corresponding to the reflected signals to calculate real-time speed, and acquiring time differences or phase differences of the reflected signals reaching different antennas to calculate real-time angles;
Respectively calculating real-time position data corresponding to the first starting point and the second starting point based on the real-time distance, the real-time speed and the real-time angle;
fitting a plurality of continuous real-time position data based on time sequence to respectively obtain motion tracks corresponding to the trigger object and the target object;
And analyzing whether the motion trail is in a continuous approaching state or not based on the motion trail.
In some of these embodiments, the low-frequency trigger verification at the first distance based on the millimeter wave in the low-power standby mode further includes the steps of:
when the physiological characteristic verification is not passed, not performing the motion trail verification and switching the low-power consumption standby mode to a low-power consumption sleep mode;
When the physiological characteristic verification passes and the motion trail is not in the continuous approaching state, entering a correction waiting of a preset time period, and recording the final coordinate position of the motion trail when the correction waiting is not in the continuous approaching state after overtime, taking the final coordinate position as a new first starting point and waiting for next motion trail verification again.
In some of these embodiments, performing high frequency trigger verification at a second distance based on the millimeter wave in the high frequency tracking mode further includes the steps of:
and when the motion trail is not in the continuous approaching state, entering a correction waiting for a preset time period, and when the correction waiting is not in the continuous approaching state after overtime, recording the final coordinate position of the motion trail as a new second starting point and waiting for next motion trail verification again.
In some of these embodiments, waking up bluetooth and determining whether the signal source location of the active object matches a location condition includes the steps of:
After waking up Bluetooth, switching the unidirectional antennas respectively calibrated in and out of the door into working states, and respectively acquiring RSSI values corresponding to the two unidirectional antennas after being connected with broadcast signals of the effective objects;
defining that the position condition is matched when the absolute value of the difference value of the RSSI values is larger than a first preset value and the minimum value of the two RSSI values is larger than a second preset value;
And determining that the signal source position is in or out of a door based on the difference value of the RSSI values, and determining door opening and closing actions based on the difference value change of the RSSI values.
In some embodiments, the method and the device for connecting with the effective object based on bluetooth and performing two-way authentication when matching, and acquiring and verifying the pass credential after the two-way authentication is completed, comprising the following steps:
acquiring a connection request sent by the effective object and responding in a preset time;
Acquiring an MAC address corresponding to the effective object, verifying whether the MAC address belongs to a registration address, and carrying out handshake authentication and sending a scanning request after verification is passed;
and acquiring the pass certificate in the information response packet sent by the effective object in a passive response manner after handshake authentication in a preset time, and performing identity verification, wherein when the identity verification is not passed in the preset times, the Bluetooth connection is disconnected.
In some of these embodiments, the method further comprises the steps of:
when the number of the effective objects is larger than the number of the pass certificates, judging whether the effective objects are in a peer scene or not based on the motion trail of each effective object;
if yes, corresponding passing actions are carried out based on the passing certificates;
if not, defining an abnormal object by the effective object without the pass certificate, and carrying out pass early warning processing based on the acquired number of the MAC addresses.
In some embodiments, the traffic early warning processing is performed based on the acquired number of the MAC addresses, and specifically includes the following steps:
when the number of the acquired MAC addresses is equal to the number of the effective objects, judging the signal source positions of the abnormal objects;
if the signal source position is outside a door, corresponding passing actions are carried out, and the MAC addresses corresponding to the abnormal objects are marked abnormally;
if the signal source position is in the door, carrying out exception marking on the MAC address corresponding to each exception object;
when the abnormal mark is detected, limiting the passing action and giving an alarm;
And when the number of the acquired MAC addresses is smaller than the number of the valid objects, invalidating the current pass credential to limit the pass action and giving an alarm.
In some of these embodiments, the method further comprises the steps of:
When the number of the acquired MAC addresses is larger than the number of the effective objects and the number of the currently acquired pass certificates is equal to the number of the effective objects, starting a system self-check to update millimeter wave frequency band parameters;
After the system self-checking, if the number of the effective objects is unchanged, registering the MAC address which does not contain the pass certificate, completing handshake authentication, generating the pass certificate and issuing the pass certificate.
In a second aspect, the application provides an intelligent lock non-inductive passing system based on millimeter waves and Bluetooth, which adopts the following technical scheme:
an intelligent lock non-inductive passing system based on millimeter waves and Bluetooth is used for realizing the method.
The technical scheme provided by the embodiment of the application has the following technical effects:
(1) Judging whether the object outside the intelligent lock is effective or not through the grading verification blue of different distance ranges, and reducing the increase of energy consumption caused by false awakening of a system by non-human or other objects;
(2) The working states of millimeter waves and Bluetooth are converted based on the judging results of different distance ranges, and dormancy is performed when no person or intelligent terminal can pass verification, so that the working energy consumption of equipment is saved;
(3) Long-distance object detection and advanced passing authority authentication are realized through the combination of millimeter waves and Bluetooth, and when an object moves to the intelligent lock, the intelligent lock can directly perform non-inductive passing, so that the passing time is saved.
Detailed Description
The present application will be described and illustrated with reference to the accompanying drawings and examples for a clearer understanding of the objects, technical solutions and advantages of the present application. However, it will be apparent to one of ordinary skill in the art that the present application may be practiced without these specific details. In some instances, well known methods, procedures, systems, components, and/or circuits have been described at a high-level so as not to obscure aspects of the present application with unnecessary description. It will be apparent to those having ordinary skill in the art that various changes can be made to the disclosed embodiments of the application and that the general principles defined herein may be applied to other embodiments and applications without departing from the spirit and scope of the application. Thus, the present application is not limited to the embodiments shown, but is to be accorded the widest scope consistent with the scope of the application as claimed.
The description of these embodiments is provided to assist understanding of the present invention, but is not intended to limit the present invention. In addition, the technical features of the embodiments of the present invention described below may be combined with each other as long as they do not collide with each other.
In the description of the present application, a number means one or more, a number means two or more, and greater than, less than, exceeding, etc. are understood to not include the present number, and above, below, within, etc. are understood to include the present number. The description of the first and second is only for the purpose of distinguishing between technical features and should not be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated or implicitly indicating the precedence of the technical features indicated.
In the description of the present application, the descriptions of the terms "one embodiment," "some embodiments," "illustrative embodiments," "examples," "specific examples," or "some examples," etc., mean that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the present application. In this specification, schematic line representations of the above terms do not necessarily refer to the same embodiments or examples. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples.
The application mainly fuses the ranging and direction finding based on low-power consumption millimeter wave with 2.4G Bluetooth, and is realized by a 24GHz millimeter wave radar chip, a Bluetooth 5.3 chip and a main control module.
The millimeter wave radar sends out millimeter waves to perform pre-detection within a certain distance, the Bluetooth chip performs verification of the pass certificate based on the acquired Bluetooth connection condition, and the main control module performs corresponding processing analysis on the millimeter wave chip and each data acquired by the Bluetooth chip.
As shown in fig. 1, the embodiment of the application discloses an intelligent lock non-inductive passing method based on millimeter waves and bluetooth, which comprises the following steps:
the method comprises the steps of firstly carrying out classified detection through a millimeter wave radar, wherein the classified standard is carried out based on different detection distances, the core of the millimeter wave classified detection is to judge the legitimacy of a monitored object according to target information detected by the radar, and dynamically adjust the response strategy of a door lock according to the legitimacy, and dynamically control the power consumption.
And S100, marking a trigger object and entering a low-power consumption standby mode after being triggered based on millimeter waves under a first boundary.
First, a boundary of a large distance range is defined, which is characterized by the distance between the desired detection location and the millimeter wave radar.
When a certain object is detected on the first boundary of a larger distance based on the millimeter wave reflection signal, the detection chip corresponding to the millimeter wave is converted into a low-power consumption standby mode from a sleep state, so that the millimeter wave chip enters the low-power consumption standby state only when the object enters a certain range to perform subsequent detection work, and the standby power consumption of the door lock is reduced.
The first boundary is represented in the embodiment of the present application as a circular detection boundary with a distance of 8 meters from the millimeter wave radar.
And S200, performing low-frequency trigger verification at a first distance based on millimeter waves in a low-power consumption standby mode, and marking a trigger object after the low-frequency trigger verification is passed to obtain a target object.
In a range within a larger distance, the millimeter wave radar is kept in a low-frequency scanning state, in this state, the main control chip analyzes and processes data information corresponding to the reflected signal acquired by the millimeter wave chip, and performs low-frequency triggering verification, and the verification is mainly used for judging whether a triggering object is a person or not and whether specific motion logic of the triggering object accords with a state of approaching an intelligent door lock or not.
When the verification is passed, the trigger object is further marked as a target object to perform a verification test of the next range.
In the embodiment of the application, the first distance is 6-8 meters.
And S300, marking the target object and entering a high-frequency tracking mode after being triggered based on millimeter waves under the second boundary.
In a medium-distance boundary, whether the object is triggered by the target object is judged based on millimeter waves, when the object is triggered, the target object is considered to have moved further from the first area to a second boundary, and the second boundary is smaller than the first boundary, so that the object is considered to be closer to the door lock.
At this time, the millimeter wave radar is switched to a high-frequency tracking mode to improve the detection accuracy so as to further analyze the motion state of the target and analyze the passing tendency.
In an embodiment of the present application, the second boundary is 4 meters.
S400, performing high-frequency triggering verification at a second distance based on millimeter waves in a high-frequency tracking mode, and marking the target object as an effective object after the verification is passed.
In the high-frequency tracking mode, the millimeter wave radar enters a full-load working state, the motion trail of the target object is further obtained through high-frequency scanning, and whether the target object is continuously close to the intelligent door lock position or not is analyzed.
After passing the verification, marking the target object as a valid object, wherein the valid object is characterized in that the detected object accords with the combination of 'person' and 'approaching intelligent door lock' and 'having passing tendency', and the passing voucher of the object is considered to be required to be acquired in advance to perform door opening action before the passing object arrives so as to realize non-inductive passing.
S500, after being triggered based on millimeter waves under the third boundary, the Bluetooth is awakened, and whether the signal source position of the effective object is matched with the position condition is judged.
When the object is further detected to move to a third boundary closer to the intelligent door lock by the millimeter wave reflected signal, in order to realize non-inductive passing, the Bluetooth chip in a sleep state needs to be awakened, the Bluetooth chip is scanned to acquire a broadcast signal correspondingly sent by the intelligent terminal of the object so as to realize Bluetooth connection, and whether the Bluetooth connection is matched with the position condition is verified based on the signal source position of the detected Bluetooth signal.
The matching position condition is further characterized in that the position of the object is judged to be in a position where the door can be opened and passed, so that the situations that the Bluetooth signal detection precision is limited and the door is opened too early or too late are reduced.
The third boundary is 1 meter in the embodiment of the application, and the intelligent terminal is characterized as a product with a Bluetooth function, such as a mobile phone, an intelligent watch and the like carried by a user.
And S600, connecting with the effective object based on Bluetooth and performing two-way authentication when the effective object is matched, and acquiring and checking the pass certificate after the two-way authentication is completed.
And after the signal source position is matched with the position condition, further carrying out bidirectional identity authentication on the intelligent terminal of the effective object and the Bluetooth chip, after the bidirectional authentication is passed, issuing the self-stored pass certificate to the Bluetooth chip by the intelligent terminal, and after the pass certificate is acquired by the Bluetooth chip, further carrying out validity verification on the pass certificate by combining the pass certificate with a connection response packet of the intelligent terminal.
And S700, after the verification is completed, a pass instruction is sent based on the pass certificate so as to complete the pass action.
And when the verification is passed, the main control module controls the intelligent door lock to be opened so as to complete the non-inductive passing action.
Through the steps, firstly, hierarchical detection is carried out based on millimeter waves to respectively carry out low-power consumption standby state switching and effective object identification step by step based on physiological information verification, movement trend verification and the like, when a user is detected to continuously approach to a certain range from a door lock, bluetooth is awakened to carry out Bluetooth connection and authentication with an intelligent terminal of the effective object in advance, meanwhile, a pass certificate corresponding to the effective object is obtained in advance, and door opening action is carried out based on the pass certificate, so that non-inductive passing is realized.
The mode that millimeter wave and bluetooth combine can not receive environmental parameter's such as temperature, humidity, illumination influence, detection analysis in the great distance scope of time can be based on the characteristic of millimeter wave simultaneously in order to reduce the latency of response, through long distance detection in order to switch the sleep-operating condition of millimeter wave chip and bluetooth chip in order to reduce the consumption cost of continuous operation.
In other embodiments, the low frequency trigger verification includes physiological feature verification and motion profile verification, the high frequency trigger verification includes motion profile verification, and in particular,
And (3) physiological characteristic verification:
and acquiring a reflected signal of the millimeter wave, analyzing the frequency corresponding to the reflected signal, and judging whether the frequency belongs to a first frequency range corresponding to breath detection and/or a second frequency range corresponding to heartbeat detection.
First, physiological characteristics of the human body such as heartbeat and respiration can realize distinction between humans and other animals in a range.
When a human breathes, the chest can periodically move up and down, and after the millimeter wave signals emitted by the low-power millimeter wave sensor breathe on a moving human body, the reflected signals can have characteristic changes related to the breathing frequency, and the breathing frequency of an adult is generally 12-20 times/min, which corresponds to the frequency range of 0.2-0.33 Hz.
Meanwhile, when the millimeter wave sensor is sensitive enough in accuracy, the heart beat with smaller body micro-motion amplitude can be captured as well, the heart beat frequency is generally 60-100 times/min, and then the corresponding frequency range is 1-1.67Hz.
When the first frequency range corresponding to respiration and/or the second frequency range corresponding to heartbeat exist in the reflected signal detected by the sensor of the millimeter wave chip, whether the object corresponding to the reflected signal is a human or not can be judged, so that the reflected signal is distinguished from other animals.
And (3) verifying a motion trail:
The position of the triggering object when the first boundary is triggered and the position of the target object when the second boundary is triggered are respectively used as a first starting point and a second starting point.
After detecting objects in the first and second boundaries, the first detected target object on the different boundary is assigned a unique identifier, such as an ID number.
Meanwhile, the position of the target detected for the first time on the boundary corresponding to different distance ranges is used as the starting point of the subsequent movement track, and the position is specifically defined as a first starting point and a second starting point respectively.
The time delay of the millimeter wave transmitted periodically and the time delay of the corresponding reflected signal are acquired to calculate the real-time distance, the Doppler frequency shift corresponding to the reflected signal is acquired to calculate the real-time speed, and the time difference or the phase difference of the reflected signal reaching different antennas is acquired to calculate the real-time angle.
The millimeter wave radar periodically transmits millimeter wave signals, and receives echo signals reflected from a target object by using a plurality of receiving antennas of the millimeter wave radar. The position information of the target object is continuously detected over time, and the latest position of the target is updated according to the new detection data.
The position information comprises distance, speed and angle, and the latest position of the target can be obtained after the three data are specifically processed.
Millimeter wave radar emits millimeter wave signals, and the signals are reflected back to be received by a receiving antenna after encountering an object.
Then first the time delay between the reflected signal and the received signal is measuredAccording to the formula: The real-time distance between the object and the radar can be calculated. Wherein c is characterized by the speed of light.
According to the doppler effect, when an object moves, the reflected signal will generate a doppler shift fd, then according to the formula: The velocity component of the object in the direction of the radar's line of sight, i.e. the real-time velocity, can be calculated, wherein,Characterized by wavelength.
By using a multi-antenna matrix, the real-time angle of an object relative to the radar is determined by measuring the time difference or phase difference of signals reaching different antennas and adopting an arrival angle estimation algorithm, such as a phase interferometry.
And respectively calculating real-time position data corresponding to the first starting point and the second starting point based on the real-time distance, the real-time speed and the real-time angle.
Continuously detecting real-time distance, real-time speed and real-time angle of the object at different times to judge real-time position data when the current object moves based on the first starting point or the second starting point.
Fitting a plurality of continuous real-time position data based on time sequence to obtain motion tracks corresponding to the trigger object and the target object respectively.
Based on a series of continuously detected target position data at different times, a Kalman filtering algorithm is adopted to carry out track fitting on each position data, and the data is processed in a smoothing mode to obtain an accurate running track.
Analysis of whether to be based on motion trail in a continuous approach state.
Judging whether the object continuously moves towards the intelligent lock or not according to the motion trail of the object, and judging that the object continuously moves towards the intelligent lock within the verification range, and when the motion trail is in a continuous approaching state, the object is considered to continuously walk forward of the door from a long distance, and then the object is considered to have a passing trend.
Meanwhile, before the calculation of the real-time position, after the echo signal of the millimeter wave is obtained, the following preprocessing steps are needed:
Amplifying and filtering, namely amplifying the received weak echo signals, removing noise and interference signals through a filter, and improving the signal quality.
Analog-to-digital conversion, converting the analog echo signal to a digital signal for subsequent digital signal processing.
Meanwhile, after the running track is obtained, the real-time updated movement trend data (including information such as target ID, timestamp, position, speed, angle and the like) also needs to be stored in a local cache or database.
When the detected object is at the first distance (6-8 m), the verification needs to be performed as physiological characteristic verification and motion trail verification, namely whether the object is human is mainly judged, and whether the motion tendency of the object faces the intelligent lock is further judged. And when the detected object is at the second distance (3-4 meters), further judging whether the movement trend of the detected object towards the intelligent lock is continuous or not.
In other embodiments, the low frequency trigger verification at the first distance based on millimeter waves in the low power standby mode further comprises the steps of:
And S210, when the physiological characteristic verification is not passed, not performing motion trail verification and switching the low-power consumption standby mode into a low-power consumption sleep mode.
When the physiological characteristic verification is not passed, the triggering object is not a human, possibly a static object or other animals, so that the verification of the motion trail is not performed any more, and the low-power-consumption standby state of the millimeter wave chip is directly switched to the low-power-consumption sleep state again, so that the running power consumption of the millimeter wave chip and the corresponding antenna is reduced.
S220, when the physiological characteristic verification passes and the motion trail is not in a continuous approaching state, entering a correction waiting of a preset time period, and when the correction waiting is not in the continuous approaching state after overtime, recording the final coordinate position of the motion trail as a new first starting point and waiting for next motion trail verification again.
When the movement trend of the triggering object is found to be no longer matched with the continuous approaching state after the physiological characteristics pass, the movement track is verified, and the situation that the object stops after moving a certain distance to the intelligent lock, the object passes through the intelligent lock and has no passing intention and the like exists can exist, wherein the movement track is represented as a period of time, the actual position is not changed, or the distance between the actual position and the intelligent lock is prolonged and the like.
At this time, a wait for a certain period of time is first performed at the moment when the object is detected not to be in the continuous approaching state, so as to detect whether the object can be restored to the continuous approaching state or not, and in the embodiment of the present application, the correction waiting time is 2s.
If the object in 2s is restored to the continuous approaching state, the subsequent real-time position of the object is continuously detected to update the motion trail, if the object in 2s is not restored to the continuous approaching state, the last coordinate position of the triggering object in the tracking is recorded, and the current motion trail generation is stopped. When the subsequent triggering object moves again and is in a continuous approaching state, the last recorded position of the object is used as a first starting point to restart the next movement track tracking and verification.
In other embodiments, the high frequency trigger verification at the second distance based on millimeter waves in the high frequency tracking mode further comprises the steps of:
And S410, when the motion trail is not in a continuous approaching state, entering a correction waiting for a preset time period, and when the motion trail is not in the continuous approaching state after the correction waiting is overtime, recording the final coordinate position of the motion trail as a new second starting point and waiting for next motion trail verification again.
The high frequency trigger verification at the second distance is the same as the low frequency trigger verification at the first distance.
When the high-frequency trigger verification at the second distance passes, and the target object continuously moves to the intelligent lock position and reaches the third boundary, the Bluetooth is awakened to scan, and a scanning request message is sent to the interested broadcasting equipment to acquire more scanning response data, such as detailed capability information, service list, address and the like of the mobile equipment. Thus, the Bluetooth equipment is prevented from being in a scanning broadcast state for a long time, and the working energy consumption is saved. Meanwhile, when the Bluetooth data packet is analyzed and verified at a third boundary which is a certain distance away from the intelligent lock, the process does not need to connect devices, the connection time of a communication link is saved, and long-time waiting is needed after a user reaches the position of the intelligent lock.
In other embodiments, waking up bluetooth and determining whether the signal source location of the active object matches a location condition includes the steps of:
s510, after waking up Bluetooth, switching the unidirectional antennas respectively calibrated into the inside and the outside of the door into working states, and after connecting with the broadcast signals of the effective objects, respectively acquiring RSSI values corresponding to the two unidirectional antennas.
The Bluetooth chip corresponds to two 2.4G directional antennas, meanwhile, the directional antennas are also in butt joint with the wireless switch module, and when the wireless switch module detects that an effective object walks to a third boundary based on millimeter waves, the wireless switch module receives an instruction of the main control module so as to enable the directional antennas to be converted into a working state.
The directional antennas are connected with the low-power consumption Bluetooth chip, and meanwhile, the receiving directions of the two directional antennas are opposite and perpendicular to the installation plane, namely, one directional antenna faces outwards and the other directional antenna faces inwards.
The positions of the two directional antennas are first calibrated to determine which antenna corresponds to the direction inside the door and which antenna corresponds to the direction outside the door.
The Bluetooth chip performs time-sharing multi-line scanning to acquire the Bluetooth MAC address of the mobile device in a certain range currently for Bluetooth connection, and after connection is successful, RSSI values corresponding to the two directional antennas are respectively acquired.
The RSSI value is a received signal strength indication value, and is used for measuring the strength of a wireless signal, and is expressed by using dBm with a negative number as a unit, wherein the smaller the value after the negative number is, the stronger the signal is, and the weaker the signal is otherwise. It is mainly related to the distance between the signal source and the antenna, the closer the distance, the higher the signal strength.
The two directional antennas face the inside and the outside of the door respectively, so that the distances between the two directional antennas and the effective object are different based on a certain position of the effective object, the detected RSSI values are necessarily different, and the position condition of the effective object can be judged and the specific position and door opening and closing mode can be determined according to the difference.
S520, defining as a matching position condition when the absolute value of the difference between the RSSI values is greater than a first preset value and the minimum value of both RSSI values is greater than a second preset value.
First, the first requirement when the location condition is satisfied is that the absolute value of the difference between the two RSSI values is greater than a first preset value, the magnitude of which is 20db in the present application, and can be adjusted according to the actual scenario.
The difference is characterized by the difference of the corresponding antenna signal strength when the user is in the preset range (1 meter) before the intelligent lock, and when the user is out of the range, the RSSI values detected by the two directional antennas are weak because the distance from the two directional antennas is far and the signal range of the Bluetooth signals is short, and the absolute value of the difference is usually smaller than 20db.
Secondly, the second requirement is that the RSSI values can fluctuate within a certain range, so that in order to ensure that the timing antenna can accurately judge the situation that the user approaches the intelligent lock, the two RSSI values are respectively more than-54 db, and the second preset value can be adjusted according to the actual situation.
If any one of the RSSI values is less than-54 db, it considers that the signal strength received by the antenna is too low, the object at this time may be too far from the smart lock location, which is not within a reasonable range where door opening can be performed.
If either of the above two conditions is not satisfied, the condition for subsequent pass credential verification is considered to be not satisfied, and then the RSSI value corresponding to the signal source needs to be continuously detected and calculated until both conditions are matched.
S530, determining that the signal source position is in or out of the door based on the difference value of the RSSI values, and determining the door opening and closing action based on the difference value change of the RSSI values.
Meanwhile, the RSSI value is different due to the fact that the distances between different positions and the two directional antennas with different directions are different, and therefore whether a signal source is particularly located inside or outside a door can be determined based on the difference value.
When the RSSI value of the directional antenna facing outward of the door is greater than the RSSI value of the directional antenna facing inward of the door, the signal source is considered to be closer to the antenna facing outward of the door, so it is determined that the effective object is outside of the door.
When the RSSI value of the directional antenna facing inside the door is greater than the RSSI value of the directional antenna facing outside the door, the signal source is considered to be closer to the antenna inside the door, so it is determined that the effective object is inside the door.
Meanwhile, the change of two RSSI values corresponding to the same signal source is continuously detected, when the RSSI value of the signal source facing outwards is larger than the RSSI value facing inwards, the effective object is considered to be positioned outwards and the door is opened, when the difference value is smaller and smaller, the change is 0, and the difference value is smaller and smaller again from 0 until the RSSI value facing inwards is larger than the RSSI value facing outwards, the effective object is considered to be finished entering the door, and therefore door closing action is performed.
In other embodiments, the method for connecting with the effective object based on Bluetooth and performing two-way authentication during matching, acquiring the pass certificate and checking after the two-way authentication is completed comprises the following steps:
S610, obtaining a connection request sent by the effective object and responding in a preset time.
When no trigger is on the third boundary, the Bluetooth chip is in a deep sleep state and the device scanning broadcast is turned off, and when triggered, the Bluetooth chip cancels the deep sleep state and turns on the device scanning to acquire a connection request sent by the intelligent device of the effective object.
The bluetooth chip enters a deep sleep state again when no connection request is scanned within 2 s. And when the connection request is scanned, the Bluetooth chip needs to answer within a certain time.
The process is that the intelligent terminal authenticates the response of the Bluetooth chip, and when the Bluetooth chip of the intelligent lock does not give a response for a long time, the connection is disconnected.
S620, the MAC address corresponding to the effective object is obtained, whether the MAC address belongs to the registration address is verified, and after verification is passed, handshake authentication is carried out and a scanning request is sent out.
And acquiring an MAC address given in a connection request sent by the intelligent terminal of the effective object, and judging whether the MAC address is a registration address, wherein the registration address is characterized in that the Bluetooth address of the intelligent terminal is bound and authenticated with the intelligent lock, for example, a resident of a cell is registered in an in-out list of the intelligent lock before entering into a residence.
If the authentication belongs to the primary authentication, the object is characterized as meeting the primary authentication of the access identity, and the authentication belongs to the authentication of the intelligent lock terminal to the user.
After the verification is passed, handshake authentication is performed based on a handshake protocol, the validity of the equipment is determined, and meanwhile, the Bluetooth chip sends out a scanning request.
The connection is disconnected when the bluetooth chip receives a connection request but fails to receive a handshake authentication protocol.
S630, acquiring a pass certificate in an information response packet sent by the effective object in a passive response manner after handshake authentication in a preset time, and performing identity verification, wherein when the identity verification is not passed in the preset times, the Bluetooth connection is disconnected.
After the Bluetooth chip scans the broadcasting packet of the effective object, the intelligent terminal waits for a scanning request to carry out passive response, replies an information response packet containing more detailed information, and the information response packet contains a pass certificate for carrying out pass authority authentication.
When the pass certificate is not received for a long time, the Bluetooth chip is disconnected and waits for reconnection authentication.
The Bluetooth chip verifies the authenticity, the validity, the time stamp and the like of the pass certificate, when the pass certificate passes, the unlocking/opening action is performed based on the pass certificate, when the pass certificate fails, the verification is performed again until the pass number is more than 3 preset times, then error response is performed, the error response is issued to the intelligent terminal for a user to check, and the current Bluetooth connection is disconnected.
In other embodiments, the method further comprises the steps of:
S800, when the number of the effective objects is larger than the number of the pass certificates, judging whether the effective objects are in the same-row scene or not based on the motion trail of each effective object.
In some cases, a scenario may occur where the number of valid objects is greater than the number of pass credentials, in which case there may be a situation where, for example, a resident in a cell enters with other non-resident co-workers.
Then it is necessary to determine whether the motion trajectories of the valid objects are the same, and the objects with the pass certificates and the objects without the pass certificates should keep the same motion trajectories in the same scene, and the positions of the two objects at each time point are closer to each other, so that the objects can be considered to belong to the pass scene.
And when the motion trajectories of a plurality of effective objects are more different and the real-time positions of all the time points are far different, the method does not accord with the scene of the same row.
And S810, if so, performing corresponding passing actions based on the passing credentials.
When meeting the same-line scene, the corresponding passing action can be performed based on the existing passing credentials, so that the objects of the same line with the user with the passing credentials can pass.
S820, if not, defining an abnormal object by the effective object without the pass certificate, and performing pass early warning processing based on the number of the acquired MAC addresses.
When not in the peer scenario, then the valid object for which no pass credential exists is defined as an anomalous object and further processed based on the number of specific MAC addresses.
The method for judging the valid user to which the pass certificate belongs comprises the steps of firstly obtaining the motion trail of each valid object to infer the distance between the current valid object and the intelligent lock, simultaneously, inferring the position of each signal source by combining the intensity of a plurality of RSSI values received by the directional antenna, and combining the inferred position with the position of the motion trail to judge which valid object is the object corresponding to the pass certificate.
In other embodiments, the traffic pre-warning process is performed based on the number of acquired MAC addresses, and specifically includes the following steps:
S821, when the number of acquired MAC addresses is equal to the number of valid objects, determining the signal source position of each abnormal object.
S822, if the signal source position is outside the door, corresponding passing actions are carried out, and the MAC addresses corresponding to the abnormal objects are marked abnormally.
S823, if the signal source position is in the door, the MAC addresses corresponding to the different objects are marked with the abnormality.
When the number of the obtained MAC addresses is equal to the number of the effective objects, the number of people in the range is consistent with the number of the intelligent terminals, in this case, the positions of the effective objects are judged first, if the abnormal objects are out of the door, the abnormal objects are characterized as the abnormal objects want to pass through and enter the door, and meanwhile, if other effective objects with pass-through certificates possibly exist outside the door, if the door opening action is not performed, some passable objects cannot pass through, the experience is affected, so that the pass-through action is performed, but the MAC addresses corresponding to the abnormal objects are required to be marked abnormally.
When the abnormal object is in the door, the MAC address of the abnormal object is directly marked with the abnormality.
Wherein, limit the traffic action and send out the warning when detecting the unusual mark. That is, an abnormal object located outside the door can enter the door but cannot be opened when the door is subsequently taken out, and at the same time, the abnormal object originally located inside the door cannot be opened. And after detecting the unusual object, bluetooth chip can trigger main control chip and report to the police to remind the managers to carry out the security verification.
Therefore, the non-inductive passing influence of the objects with pass certificates outside the gate can be reduced, and abnormal objects can be limited in the gate to improve the safety.
S824, when the number of the acquired MAC addresses is smaller than the number of the valid objects, the current pass credential is invalidated to limit the pass action and give an alarm.
In other situations, if the number of the MAC addresses is smaller than the number of the effective objects, it is indicated that some of the effective objects cannot acquire the bluetooth addresses because they do not carry the intelligent terminal, and in this case, since the abnormal marks cannot be issued to the MAC addresses of the abnormal objects, in order to ensure security, the passing behavior of all the effective objects is limited, and an alarm is issued, and the manager waits for the manager to resume passing after performing authentication on the abnormal objects.
In other embodiments, the method further comprises the steps of:
s900, when the number of the acquired MAC addresses is larger than the number of the effective objects and the number of the currently acquired pass certificates is equal to the number of the effective objects, starting system self-checking to update millimeter wave frequency band parameters.
When the number of pass credentials detected by the system is equal to the number of valid objects, if other MAC addresses are also detected to cause the number of all MAC addresses to be greater than the number of valid objects, there may be a scenario where more than one intelligent terminal is carried by the user, such as the user carrying one cell phone and one smart watch.
At this time, since the number of pass certificates is the same as the number of valid objects, it can be determined that each valid object has a pass certificate and meets the pass condition.
In this case, the system will perform self-checking to determine whether there is a signal processing error such as millimeter wave transmission and reception, and update the millimeter wave frequency band parameter to improve the detection accuracy.
S910, if the number of the effective objects is unchanged after the system self-checking, the MAC address which does not contain the effective credentials is registered, handshake authentication is completed, and the pass credentials are generated for issuing.
When the system is still unchanged after self-checking, the millimeter wave chip and the radar are characterized as not having abnormal faults, and the Bluetooth chip can conduct supplementary authentication of the pass certificates to issue new pass certificates to the MAC address which does not contain the pass certificates at present, so that the pass certificates of a plurality of intelligent terminals of an effective pass object are shared while the non-inductive pass is realized.
The application also discloses an intelligent lock non-inductive passing system based on millimeter waves and Bluetooth, which is used for realizing the method.
The implementation principle is as follows:
Firstly, hierarchical detection is carried out based on millimeter waves to respectively carry out low-power consumption standby state switching and effective object identification step by step based on physiological information verification, movement trend verification and the like, when a user is detected to continuously approach to a certain range of a distance door lock, bluetooth is awakened to carry out Bluetooth connection and authentication with an intelligent terminal of the effective object in advance, meanwhile, a pass certificate corresponding to the effective object is obtained in advance, and door opening action is carried out based on the pass certificate, so that non-inductive passing is realized.
It should be understood that, although the steps in the flowcharts of the figures are shown in order as indicated by the arrows, these steps are not necessarily performed in order as indicated by the arrows. The steps are not strictly limited in order and may be performed in other orders, unless explicitly stated herein.
The above embodiments are not intended to limit the scope of the application, so that the equivalent changes of the structure, shape and principle of the application are covered by the scope of the application.