[go: up one dir, main page]

CN112819999A - Intelligent security system - Google Patents

Intelligent security system Download PDF

Info

Publication number
CN112819999A
CN112819999A CN202011619973.5A CN202011619973A CN112819999A CN 112819999 A CN112819999 A CN 112819999A CN 202011619973 A CN202011619973 A CN 202011619973A CN 112819999 A CN112819999 A CN 112819999A
Authority
CN
China
Prior art keywords
module
password
verification code
identification
visitor
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011619973.5A
Other languages
Chinese (zh)
Inventor
郭亚军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chongqing Fanghui Technology Co ltd
Original Assignee
Chongqing Fanghui Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chongqing Fanghui Technology Co ltd filed Critical Chongqing Fanghui Technology Co ltd
Priority to CN202011619973.5A priority Critical patent/CN112819999A/en
Publication of CN112819999A publication Critical patent/CN112819999A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00563Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys using personal physical data of the operator, e.g. finger prints, retinal images, voicepatterns
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The invention relates to the technical field of intelligent security and protection, and provides an intelligent security and protection system which comprises a storage module and a control module, wherein the storage module is pre-stored with a standard password; the input module is used for inputting the verification password; the identification module is used for identifying the input verification password according to a preset standard password, and if the verification password is identified to be the same as the standard password, the identification is successful; the control module controls the lock body to be opened when the identification is successful; the communication module is used for receiving the temporary verification code sent by the user terminal, and the storage module stores the temporary verification code; the input module is further used for inputting an access password, the identification module identifies the access password according to the temporary verification code, the control module controls the lock body to be opened when the access password is identified to be the same as the temporary verification code, and the storage module deletes the corresponding temporary verification code after the lock body is opened.

Description

Intelligent security system
Technical Field
The invention relates to the technical field of intelligent security, in particular to an intelligent security system.
Background
Due to the popularization and application of the internet of things technology, the security of cities evolves from a simple security protection system to an intelligent system in the past. With the emergence of intelligent security, the electronic coded lock has also replaced traditional mechanical type coded lock gradually. The electronic coded lock not only solves the problem of small code amount of a mechanical coded lock, but also greatly improves the unlocking efficiency. Moreover, with the appearance of the single chip microcomputer, an intelligent lock with intelligent control appears, and compared with an electronic coded lock, the intelligent lock has more authentication modes, is higher in reliability and is more intelligent.
Because the intelligent lock can be opened under the condition that the password is correctly input, the situation that the user is locked outdoors because the user forgets to carry the key can be avoided. Moreover, when the user is not at home and has a parent or a friend to visit, if the user wants to let the visitor enter the house and the like, the user only needs to inform the visitor of the password, and does not need to specially drive back to open the door or specially drive the visitor to take the key. For safety, after the visitor leaves, the user needs to change the password, so that the safety problem caused by the leakage of the password is avoided. However, although the method can ensure the visitor to successfully visit, for the user, the password needs to be replaced again after the visitor leaves, so the operation is cumbersome, and once the password is modified for too many times, the user is easy to be confused. When the password authentication fails due to the fact that the user wrongly remembers the password, in order to continue to use the password unlocking function, the user needs to reset the password after identity authentication, and the operation is more complicated.
Disclosure of Invention
The invention aims to provide an intelligent security system to solve the problem that in the prior art, the operation is complicated because a user needs to change the password of an intelligent lock again after informing the password to others.
The basic scheme provided by the invention is as follows: the intelligent security system comprises a lock body arranged on a door body;
the storage module is prestored with a standard password;
the input module is used for inputting the verification password;
the identification module is used for identifying the input verification password according to a preset standard password, and if the verification password is identified to be the same as the standard password, the identification is successful;
the control module controls the lock body to be opened when the identification is successful;
the communication module is used for receiving the temporary verification code sent by the user terminal, and the storage module stores the temporary verification code;
the input module is further used for inputting an access password, the identification module identifies the access password according to the temporary verification code, the control module controls the lock body to be opened when the access password is identified to be the same as the temporary verification code, and the storage module deletes the corresponding temporary verification code after the lock body is opened.
The principle and the beneficial effects of the basic scheme are as follows: when a visitor visits, if the visitor agrees to enter the house, a temporary verification code can be sent to the communication module through the user terminal of the visitor, then the visitor inputs an access password informed by the user through the input module, the identification module identifies the access password according to the temporary verification code, and when the temporary verification code is identified to be the same as the access password, the password verification is successful, the control module controls the lock body to be opened, so that the visitor can enter the house to wait for the user to return; compared with the intelligent lock in the prior art, the scheme 1. the verification performed when the visitor visits is the temporary verification performed according to the temporary verification code which is temporarily set, and is different from the verification password used by the user, so that the user does not need to change the password after the visitor leaves, and the password management operation is simplified;
2. after the current unlocking operation is carried out, the temporary verification code at this time can be deleted by the storage module, and the safety problem caused by repeated use of the temporary verification code can be avoided;
3. the set temporary verification code is invalid after being used once, so that the user only needs to inform the visitor of the corresponding access password, and does not need to remember the temporary verification code, thereby avoiding the situation that the user needs to remember too many passwords to record wrong passwords.
The first preferred scheme is as follows: preferably, the system further comprises an image acquisition module for acquiring image information of a visitor in front of the door body, and the communication module sends the image information to the user terminal. Has the advantages that: in the scheme, the image acquisition module is used for acquiring the image information of the visitor in front of the door body and sending the image information to the user terminal, and the user can confirm the identity of the visitor, so that the safety problem caused by the fact that the person with unknown identity enters the room is reduced.
The preferred scheme II is as follows: preferably, as a basic scheme, the temporary verification code is provided with a check bit, the storage module pre-stores the check code, the identification module further identifies the check bit of the temporary verification code, and the storage module stores the temporary verification code when the value of the check bit is identified to be the same as the check code. Has the advantages that: in view of the fact that the communication module cannot verify the authenticity of the temporary verification code sent by the user terminal, once the user terminal is operated by other people except the user and sends the temporary verification code, other people who are not permitted by the user may enter the room.
The preferable scheme is three: as the optimization of the basic scheme, the input module is also used for collecting the verification fingerprint of an operator, the storage module is preset with a standard fingerprint, the identification module identifies the verification fingerprint according to the standard fingerprint, and the control module controls the lock body to be opened when the verification fingerprint is identified to be the same as the standard fingerprint. Has the advantages that: still realize operator's fingerprint identification through the cooperation of input module and identification module in this scheme to verify current operator's identity, the operator only need type oneself and verify the fingerprint and can carry out authentication, verify that efficiency is higher.
The preferable scheme is four: preferably, as a first preferred scheme, the communication module is further configured to receive image acquisition start information, and after receiving the image acquisition start information, the control module controls the image acquisition module to start. Has the advantages that: in consideration of the fact that the image acquisition module does not need to work when no person visits, the communication module is used for receiving image acquisition starting information, and the control module controls the image acquisition module to be started after the image acquisition starting information is received, so that the power consumption of the image acquisition module is reduced.
The preferable scheme is five: preferably, in the fourth preferred embodiment, the image capturing module is further configured to capture an indoor image, and the communication module sends the indoor image to the user terminal. Has the advantages that: in this scheme, still set up image acquisition module and gather indoor image, communication module sends the indoor image of gathering for user terminal after, the user can know visitor's activity in the room according to indoor image, can know visitor to avoid visitor because unfamiliar with the indoor equipment problem that the maloperation appears.
The preferable scheme is six: preferably, as a first preferred scheme, the storage module further stores a time threshold, and further comprises a timing module, and when the access password is the same as the temporary verification code, the timing module starts timing to obtain a time value; the device also comprises a comparison module used for comparing the time value with the time threshold, and when the time value is equal to the time threshold, the storage module deletes the corresponding temporary verification code. Has the advantages that: considering that if the visitor is a group of people such as a decoration or maintenance worker, the visitor may frequently go in and out of the house in the decoration or maintenance process, and if the user needs to set the temporary verification code each time, the operation amount of the user is increased, in the scheme, the visitor can freely go in and out within a certain time period by using the cooperation of the time threshold and the timing module, and the user does not need to reset the temporary verification code each time, so that the operation amount of the user is reduced.
The preferable scheme is seven: preferably, the temporary verification code is provided with a start bit, the storage module stores a start standard code, the identification module further identifies the start bit of the temporary verification code, and the timing module starts when the identification module identifies that the value of the start bit is the same as the start standard code. Has the advantages that: in this scheme, only when the numerical value of interim identifying code start bit is the same with the start standard code, the timing module just can start, and current visitor just can freely come in and go out in the certain time, and the user just also can set for visitor's free time quantum of coming in and going out according to visitor's identity, has improved the intellectuality of lock.
The preferable scheme is eight: preferably, as a seventh preferred scheme, when the identification module identifies that the value of the start bit is the same as the start standard code, the storage module stores the image information of the visitor, when the comparison result shows that the time value is smaller than the time threshold and the input module inputs the access password again, the control module controls the image acquisition module to start, when the access password identification is successful, the control module further identifies the currently acquired image information of the visitor according to the stored image information of the visitor, and if the identification result shows that the image information of the current visitor is the same as the stored image information of the visitor, the control module controls the lock body to open. Has the advantages that: in order to avoid the situation that in the time quantum that can freely come in and go out, can come in and go out the room because other people know the access password in this scheme, when the access password is verified successfully, will pass through the mode of image contrast to the identity of present visitor and verify, only when discerning present visitor and visitor's identity before unanimity, the lock body just can be opened to the security has been improved.
Drawings
Fig. 1 is a block diagram of modules of a first embodiment of the intelligent security system of the present invention.
Detailed Description
The following is further detailed by way of specific embodiments:
example one
Substantially as shown in figure 1: the intelligent security system comprises a lock body arranged on a door body;
the storage module is prestored with a standard password, a check code and a standard fingerprint, the standard password is set to be a six-digit digital password set by a user in the embodiment, and the check code is a one-digit English password;
the system comprises an image acquisition module, a door body and a control module, wherein the image acquisition module is used for acquiring image information of a visitor in front of the door body and an indoor image;
the communication module is used for sending image information and indoor images to the user terminal and receiving a temporary verification code sent by the user terminal, the temporary verification code is provided with check bits, the temporary verification code is set to be seven passwords which comprise six digital passwords and one English password, and the seventh password is the check bit;
the input module is used for inputting a verification password and an access password, the corresponding correct verification password is also a six-digit password, the access password is a seven-digit password comprising six digits and one English digit, and the seventh password of the access password is set as a check code; the fingerprint verification module also collects the verification fingerprint of an operator, and the input module comprises a keyboard and a fingerprint collection unit;
the identification module is used for identifying the input verification password according to a preset standard password, and if the verification password is identified to be the same as the standard password, the identification is successful; identifying the check digit of the temporary verification code, storing the temporary verification code by the storage module when the value of the check digit is identified to be the same as the check code, and storing the corresponding temporary verification code by the storage module when the value of the seventh digit of the temporary verification code is identified to be X if the check code is set to be X; the access password is also identified according to the temporary verification code, and the identification is successful when the access password is identified to be the same as the temporary verification code; identifying the verification fingerprint according to the standard fingerprint, and successfully identifying when the verification fingerprint is the same as the standard fingerprint;
the control module controls the lock body to be opened when the identification is successful; after the lock body is opened, the storage module deletes the corresponding temporary verification code;
the communication module is also used for receiving image acquisition starting information, and the control module controls the image acquisition module to start after receiving the image acquisition starting information.
The specific implementation process is as follows: the standard password stored in the storage module is set to be a six-digit digital password, the standard fingerprint of the user is also stored, the user can be verified by inputting a verification password when the user returns home, and if the verification password is the same as the standard password, the control module controls the lock body to be opened, and the user can enter the room.
The user can also be through typing into the verification fingerprint of oneself to the fingerprint unit, and identification module relatively verifies fingerprint and standard fingerprint, and when discerning that to verify fingerprint and standard fingerprint the same, control module control lock body is opened.
When a user visits without being at home, when the user knows that someone visits, the user operates the user terminal to send image acquisition starting information, after the communication module receives the image acquisition starting information, the control module controls the image acquisition module to be started, the first camera starts to acquire the image information of the visitor in front of a door, then the communication module sends the acquired image information to the user terminal, the user can know the identity of the visitor by checking the image information, and if the user agrees that the current visitor enters a house, the user operates the user terminal to send a temporary verification code with seven numerical values, such as X, wherein the seventh bit is a check bit.
After the communication module receives the temporary verification code, the identification module identifies the check bit of the temporary verification code, namely identifies the seventh bit of the temporary verification code, and when the value X of the seventh bit is identified to be the same as the preset check code X, the storage module stores the corresponding temporary verification code.
And after the image acquisition module starts, install indoor second camera and gather indoor image, communication module still sends indoor image for user terminal, and the user then can know the indoor condition.
When the user sends the temporary verification code to the communication module, the user needs to inform the visitor of the temporary verification code. The visitor operates the input module to input the password informed by the user, namely the verification password, the identification module identifies the access password according to the stored temporary verification code, if the input access password is identical to the temporary verification code, namely the identification is successful, the control module controls the lock body to be opened, the visitor can enter the room, and after the lock body is opened, the storage module deletes the stored temporary verification code.
Example two
The difference from the first embodiment is that in the first embodiment, the storage module further stores a time threshold, and further includes a timing module, the temporary verification code is provided with a start bit, the storage module stores a start standard code, the identification module further identifies the start bit of the temporary verification code, when the identification module identifies that the value of the start bit is the same as the start standard code and the access password is the same as the temporary verification code, the timing module starts, and the timing module starts timing to obtain a time value; the device also comprises a comparison module used for comparing the time value with the time threshold, and when the time value is equal to the time threshold, the storage module deletes the corresponding temporary verification code.
When the identification module identifies that the value of the starting bit is the same as the starting standard code, the storage module stores image information of the visitor, when the comparison result shows that the time value is smaller than the time threshold value and the input module inputs the access password again, the control module controls the image acquisition module to start, when the identification of the access password is successful, the control module identifies the currently acquired image information of the visitor according to the stored image information of the visitor, and if the identification result shows that the image information of the current visitor is the same as the stored image information of the visitor, the control module controls the lock body to be opened.
Considering that for some special visiting people, such as a decorator at the room decoration time, the visiting may need to go out of the room for many times, and if the user needs to reset the temporary verification code every time the visiting people enters the room, much inconvenience is caused to the user, in this scheme, the storage module is further set to store a time threshold, and if the decoration takes three hours, the time threshold is three hours.
The temporary verification code is also provided with a starting bit, the storage module stores a starting standard code, and the starting standard code is set to be a symbol password! The temporary validation code in this embodiment is an eight-bit password! The first six bits are digital cipher, the seventh bit is cipher and the eighth bit is symbolic cipher.
After the visitor inputs the temporary verification code, the identification module further identifies the starting position of the temporary verification code, when the identification module identifies that the numerical value of the starting position is the same as the starting standard code, the storage module stores the image information of the visitor, and after the temporary verification code is successfully identified, the lock body is opened, and the visitor can enter the room.
Meanwhile, the timing module starts to time to obtain a time value, if the time value is less than three hours, the control module controls the image acquisition module to start when the input module inputs the access password again, the image information of the current visitor is acquired, when the access password is successfully identified, the identification module also identifies the image information of the current visitor and the image information of the visitor stored in the storage module, if the image information of the current visitor is identified to be the same as the image information of the stored visitor, the identification module indicates that the current visitor is a previous decorator, and at the moment, the control module controls the lock body to be opened, and the visitor can enter the room again.
The foregoing is merely an example of the present invention, and common general knowledge in the field of known specific structures and characteristics is not described herein in any greater extent than that known in the art at the filing date or prior to the priority date of the application, so that those skilled in the art can now appreciate that all of the above-described techniques in this field and have the ability to apply routine experimentation before this date can be combined with one or more of the present teachings to complete and implement the present invention, and that certain typical known structures or known methods do not pose any impediments to the implementation of the present invention by those skilled in the art. It should be noted that, for those skilled in the art, without departing from the structure of the present invention, several changes and modifications can be made, which should also be regarded as the protection scope of the present invention, and these will not affect the effect of the implementation of the present invention and the practicability of the patent. The scope of the claims of the present application shall be determined by the contents of the claims, and the description of the embodiments and the like in the specification shall be used to explain the contents of the claims.

Claims (9)

1. The intelligent security system comprises a lock body arranged on a door body;
the storage module is prestored with a standard password;
the input module is used for inputting the verification password;
the identification module is used for identifying an input verification password according to a preset standard password, and if the verification password is identified to be the same as the standard password, the identification is successful;
the control module controls the lock body to be opened when the identification is successful;
the method is characterized in that: the system also comprises a communication module used for receiving a temporary verification code sent by the user terminal, and the storage module stores the temporary verification code;
the input module is further used for inputting an access password, the identification module identifies the access password according to the temporary verification code, the control module controls the lock body to be opened when the access password is identified to be the same as the temporary verification code, and the storage module deletes the corresponding temporary verification code after the lock body is opened.
2. The intelligent security system of claim 1, wherein: the door body comprises a door body, and is characterized by also comprising an image acquisition module used for acquiring image information of a visitor in front of the door body, wherein the communication module sends the image information to the user terminal.
3. The intelligent security system of claim 1, wherein: the temporary verification code is provided with a check bit, the storage module is pre-stored with the check code, the identification module further identifies the check bit of the temporary verification code, and the storage module stores the temporary verification code when the value of the check bit is identified to be the same as the check code.
4. The intelligent security system of claim 1, wherein: the input module is further used for collecting a verification fingerprint of an operator, the storage module is preset with a standard fingerprint, the identification module identifies the verification fingerprint according to the standard fingerprint, and the control module controls the lock body to be opened when the verification fingerprint is identified to be the same as the standard fingerprint.
5. The intelligent security system of claim 2, wherein: the communication module is also used for receiving image acquisition starting information, and the control module controls the image acquisition module to start after the image acquisition starting information is received.
6. The intelligent security system of claim 5, wherein: the image acquisition module is also used for acquiring indoor images, and the communication module sends the indoor images to the user terminal.
7. The intelligent security system of claim 2, wherein: the storage module also stores a time threshold value and also comprises a timing module, and when the access password is compared to be the same as the temporary verification code, the timing module starts timing to obtain a time value;
the storage module is used for storing the corresponding temporary verification code, and the comparison module is used for comparing the time value with a time threshold value, and when the time value is equal to the time threshold value, the storage module deletes the corresponding temporary verification code.
8. The intelligent security system of claim 7, wherein: the temporary verification code is provided with a starting bit, the storage module stores a starting standard code, the identification module further identifies the starting bit of the temporary verification code, and the timing module starts when the value of the starting bit is identified to be the same as the starting standard code.
9. The intelligent security system of claim 8, wherein: when the identification module identifies that the value of the starting bit is the same as the starting standard code, the storage module stores the image information of the visitor, when the comparison result shows that the time value is smaller than the time threshold value and the input module inputs the access password again, the control module controls the image acquisition module to start, when the access password identification is successful, the control module identifies the currently acquired image information of the visitor according to the stored image information of the visitor, and if the identification result shows that the image information of the current visitor is the same as the stored image information of the visitor, the control module controls the lock body to be opened.
CN202011619973.5A 2020-12-31 2020-12-31 Intelligent security system Pending CN112819999A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011619973.5A CN112819999A (en) 2020-12-31 2020-12-31 Intelligent security system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011619973.5A CN112819999A (en) 2020-12-31 2020-12-31 Intelligent security system

Publications (1)

Publication Number Publication Date
CN112819999A true CN112819999A (en) 2021-05-18

Family

ID=75856002

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011619973.5A Pending CN112819999A (en) 2020-12-31 2020-12-31 Intelligent security system

Country Status (1)

Country Link
CN (1) CN112819999A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116978150A (en) * 2023-09-25 2023-10-31 杭州行至云起科技有限公司 Intelligent lock control method, device and system

Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2986817A3 (en) * 2012-02-10 2013-08-16 Olivier Jean Claude Lanvin Electronic lock device for main door of e.g. house, has push-button with temporary contact, and code acquisition unit arranged along with button of bell, where initial pressure of button allows button to be pressed for preset length of time
US20150213664A1 (en) * 2011-06-17 2015-07-30 Yikes Llc System and method for accessing a structure using directional antennas and a wireless token
CN105844744A (en) * 2016-03-21 2016-08-10 成都艾德沃传感技术有限公司 Password authentication method and password lock
CN106175182A (en) * 2016-07-26 2016-12-07 江西远大保险设备实业集团有限公司 A kind of Intelligent bullet cabinet of iris technology and preparation method thereof
CN206128872U (en) * 2016-10-13 2017-04-26 天津智目科技发展有限公司 Intelligent security door lock that dedicated visitor of being convenient for of security protection opened door
CN106652106A (en) * 2015-10-29 2017-05-10 中兴通讯股份有限公司 Door lock control method, device and terminal
CN106652105A (en) * 2015-10-28 2017-05-10 贺州学院 Access control system based on ZigBee
CN206283141U (en) * 2016-12-20 2017-06-27 内蒙古京隆发电有限责任公司 A kind of maintenance power box
CN107087147A (en) * 2017-06-13 2017-08-22 安徽讯桥信息科技有限公司 A kind of Intelligent building intercom system
CN107256582A (en) * 2017-05-19 2017-10-17 合肥荣事达电子电器集团有限公司 Intelligent lock system and its method for unlocking based on dynamic password
CN107886602A (en) * 2017-10-23 2018-04-06 深圳峰伊生物科技有限公司 A kind of method for unlocking and system
CN110874877A (en) * 2019-11-25 2020-03-10 山东圣点世纪科技有限公司 A finger vein dynamic combination lock
CN111009063A (en) * 2019-12-19 2020-04-14 江苏经贸职业技术学院 A face recognition access control security system

Patent Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150213664A1 (en) * 2011-06-17 2015-07-30 Yikes Llc System and method for accessing a structure using directional antennas and a wireless token
FR2986817A3 (en) * 2012-02-10 2013-08-16 Olivier Jean Claude Lanvin Electronic lock device for main door of e.g. house, has push-button with temporary contact, and code acquisition unit arranged along with button of bell, where initial pressure of button allows button to be pressed for preset length of time
CN106652105A (en) * 2015-10-28 2017-05-10 贺州学院 Access control system based on ZigBee
CN106652106A (en) * 2015-10-29 2017-05-10 中兴通讯股份有限公司 Door lock control method, device and terminal
CN105844744A (en) * 2016-03-21 2016-08-10 成都艾德沃传感技术有限公司 Password authentication method and password lock
CN106175182A (en) * 2016-07-26 2016-12-07 江西远大保险设备实业集团有限公司 A kind of Intelligent bullet cabinet of iris technology and preparation method thereof
CN206128872U (en) * 2016-10-13 2017-04-26 天津智目科技发展有限公司 Intelligent security door lock that dedicated visitor of being convenient for of security protection opened door
CN206283141U (en) * 2016-12-20 2017-06-27 内蒙古京隆发电有限责任公司 A kind of maintenance power box
CN107256582A (en) * 2017-05-19 2017-10-17 合肥荣事达电子电器集团有限公司 Intelligent lock system and its method for unlocking based on dynamic password
CN107087147A (en) * 2017-06-13 2017-08-22 安徽讯桥信息科技有限公司 A kind of Intelligent building intercom system
CN107886602A (en) * 2017-10-23 2018-04-06 深圳峰伊生物科技有限公司 A kind of method for unlocking and system
CN110874877A (en) * 2019-11-25 2020-03-10 山东圣点世纪科技有限公司 A finger vein dynamic combination lock
CN111009063A (en) * 2019-12-19 2020-04-14 江苏经贸职业技术学院 A face recognition access control security system

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116978150A (en) * 2023-09-25 2023-10-31 杭州行至云起科技有限公司 Intelligent lock control method, device and system
CN116978150B (en) * 2023-09-25 2024-01-05 杭州行至云起科技有限公司 Intelligent lock control method, device and system

Similar Documents

Publication Publication Date Title
CN108091011A (en) Method and system of the verification technique to equipment progress permission control is unified by the testimony of a witness
CN109712300A (en) A kind of unlocking system based on network identification card certification
CN104867214B (en) Door opening method and system based on sound wave identification
CN105279832A (en) Intelligent door lock system and control method thereof
CN104851164B (en) Intelligent lock with biological feature recognition function and control method thereof
CN109147104A (en) A kind of electronic lock and its verification method of double verification
Vamsi et al. Face recognition based door unlocking system using Raspberry Pi
JP7166061B2 (en) Face authentication system, face authentication server and face authentication method
CN104517338A (en) Remote door access control system based on wireless network and realization method of remote door access control system
CN105577925A (en) Biological features recognition-based emergency dialing method and device
WO2018014322A1 (en) Residential intelligent door lock system and control method thereof
CN112365635A (en) Intelligent door lock system based on motion analysis
CN111080868A (en) Temporary password setting and verifying method for intelligent door lock
CN106097490B (en) A kind of intelligent lock, the door-locking system and method for unlocking being made of lockset
CN107358693A (en) A kind of smart lock and method for unlocking
CN112819999A (en) Intelligent security system
CN110415422A (en) The method and system of quick authorization in offline Intelligent door lock capable of recognizing face
US11823512B1 (en) Smart access control system using an electronic card
CN104574615A (en) Electronic door lock control method and control device
CN109147108A (en) A kind of method and apparatus of entrance guard management
CN108460873A (en) A kind of wechat method for unlocking
CN114863592B (en) Wifi intelligent door lock remote unlocking method
CN214335806U (en) A smart door lock device based on Raspberry Pi
CN109671200B (en) Fingerprint identification lock system based on thing networking
CN114255536A (en) A face recognition smart lock identity feature registration and opening method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20210518

RJ01 Rejection of invention patent application after publication