CN115311766A - Intelligent lock control method, system and storage medium - Google Patents
Intelligent lock control method, system and storage medium Download PDFInfo
- Publication number
- CN115311766A CN115311766A CN202210944798.XA CN202210944798A CN115311766A CN 115311766 A CN115311766 A CN 115311766A CN 202210944798 A CN202210944798 A CN 202210944798A CN 115311766 A CN115311766 A CN 115311766A
- Authority
- CN
- China
- Prior art keywords
- data
- preset
- determining
- condition
- authentication
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00563—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys using personal physical data of the operator, e.g. finger prints, retinal images, voicepatterns
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B13/00—Burglar, theft or intruder alarms
- G08B13/02—Mechanical actuation
- G08B13/06—Mechanical actuation by tampering with fastening
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Lock And Its Accessories (AREA)
Abstract
The invention discloses an intelligent lock control method, an intelligent lock control system and a storage medium, which are applied to the technical field of safety management, can effectively reduce the system fault rate, improve the system stability and effectively improve the transportability. The method comprises the steps of obtaining driving data sent by a bottom layer; wherein the drive data is acquired by the underlying sensor; determining that the driving data meets a first preset condition, generating a preset mark and sending the preset mark to an upper layer; the upper layer carries out first preset control operation according to the preset mark; determining that the driving data meets a second preset condition, and executing emergency task operation; and acquiring feedback data of the upper layer, and executing second preset control operation according to the feedback data.
Description
Technical Field
The invention relates to the technical field of safety management, in particular to an intelligent lock control method, an intelligent lock control system and a storage medium.
Background
The intelligent lock is an execution component for locking a door in the access control system, and has safety and convenience compared with a traditional door lock. With the development of embedded technology, the functions of the intelligent lock are more and more perfect, and the functions that can be realized are more and more. In the related art, the intelligent lock is mainly controlled by a coupling type or small operating system, but the complexity of the control mode architecture is gradually increased along with the increase of functions to be realized, so that faults are easy to occur, the system stability is poor, and the portability is low.
Disclosure of Invention
In order to solve at least one of the above technical problems, the present invention provides an intelligent lock control method, system and storage medium, which can effectively reduce the system failure rate, improve the system stability and effectively improve the portability.
On one hand, the embodiment of the invention provides an intelligent lock control method, which comprises the following steps:
acquiring drive data sent by a bottom layer; wherein the drive data is acquired by the underlying sensor;
determining that the driving data meets a first preset condition, generating a preset mark and sending the preset mark to an upper layer; the upper layer carries out first preset control operation according to the preset mark;
determining that the driving data meets a second preset condition, and executing emergency task operation;
and acquiring feedback data of the upper layer, and executing second preset control operation according to the feedback data.
The intelligent lock control method provided by the embodiment of the invention at least has the following beneficial effects: the embodiment first obtains the driving data sent by the bottom layer, and judges according to the driving data. And after determining that the driving data meets the first preset condition, generating a preset mark, and sending the preset mark to the upper layer so that the upper layer performs first preset control operation according to the preset mark. Meanwhile, when it is determined that the driving data satisfies the second preset condition, the urgent task operation is performed without reporting to an upper layer. In addition, in this embodiment, feedback data of the upper layer is obtained to execute a second preset control operation according to the feedback data, so as to form a control framework of the bottom layer, the intermediate layer and the upper layer, the driving data obtained by detecting the sensor of the bottom layer is preprocessed through the intermediate layer, and then a corresponding preset mark is generated according to the driving data meeting a first preset condition and sent to the upper layer, so that the upper layer performs the first preset control operation according to the corresponding preset mark, and meanwhile, the intermediate layer directly executes an emergency task operation and the second preset control operation, so that the intermediate layer can effectively connect each hierarchy in series, and the stability of the system is effectively improved. Moreover, each hierarchy can be modularized through a layered architecture, and the portability of the system can be effectively improved.
According to some embodiments of the invention, when performing the step of determining that the driving data satisfies a first preset condition and generating a preset flag, the method further comprises:
and determining that the driving data does not meet a first preset condition, and discarding the driving data.
According to some embodiments of the invention, the second preset condition comprises a tamper-proof alarm condition and a door false-close condition;
the step of determining that the driving data meets a second preset condition and executing an emergency task operation comprises the following steps:
determining that the driving data meets the anti-prying alarm condition, and executing anti-prying alarm operation;
or determining that the driving data meets the door virtual closing condition, and executing door virtual closing alarm operation.
According to some embodiments of the invention, the determining that the driving data satisfies a first preset condition and generating a preset flag includes:
determining that password authentication data is detected, and acquiring current password data; determining that the current password data meets a preset length condition, and setting a password authentication mark;
or, determining that fingerprint authentication data is detected, and acquiring the current fingerprint state; determining the current fingerprint state as an authentication state, and setting a fingerprint authentication mark;
or, determining that the card swiping authentication data is detected, and acquiring current card data; determining that the current card data meets a third preset condition, and setting a card swiping authentication mark; wherein the third preset condition comprises a card type and a card encryption condition.
According to some embodiments of the invention, the feedback data comprises authentication errors and authentication completions;
the executing a second preset control operation according to the feedback data includes:
determining that the authentication error times meet preset times, locking a system and detecting system locking time; determining that the system locking time meets a preset locking duration, unlocking the system and clearing a system locking mark;
or determining that the feedback data is detected to be authentication completion, controlling the LED indicator lamp to recover the initialization state and clearing the LED indicator mark.
According to some embodiments of the invention, the method further comprises:
and detecting preset system data, and performing third preset control operation according to the preset system data.
According to some embodiments of the invention, the preset system data comprises touch key data and restore key data;
and performing a third preset control operation according to the preset system data, wherein the third preset control operation comprises:
determining the preset key data as the touch key data, and executing corresponding preset key operation according to the touch key data; the touch key data comprise determination key data and cancellation key data, and the preset key operation comprises a confirmation operation and a cancellation operation;
or determining the preset key data as the recovery key data, exiting the middle layer task processing and performing system initialization.
According to some embodiments of the invention, the preset system data further comprises a system sleep flag;
the third preset control operation is performed according to the preset system data, and the method further includes:
and determining that the system sleep mark is detected, exiting the middle layer task processing and entering an upper layer sleep task.
On the other hand, an embodiment of the present invention further provides an intelligent lock control system, including:
at least one processor;
at least one memory for storing at least one program;
when the at least one program is executed by the at least one processor, the at least one processor is caused to implement the intelligent lock control method according to the above-described embodiment.
In another aspect, an embodiment of the present invention further provides a computer storage medium, in which a processor-executable program is stored, and the processor-executable program, when executed by the processor, is configured to implement the intelligent lock control method according to the above embodiment.
Drawings
FIG. 1 is a flow chart of an intelligent lock control method provided by an embodiment of the present invention;
FIG. 2 is a schematic block diagram of an intelligent lock control system provided by an embodiment of the present invention;
FIG. 3 is a schematic diagram of an intelligent lock control architecture provided by an embodiment of the present invention.
Detailed Description
The embodiments described in the embodiments of the present application should not be construed as limiting the present application, and all other embodiments that can be obtained by a person skilled in the art without making any inventive step shall fall within the scope of protection of the present application.
In the following description, reference is made to "some embodiments" which describe a subset of all possible embodiments, but it is understood that "some embodiments" may be the same subset or different subsets of all possible embodiments, and may be combined with each other without conflict.
Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this application belongs. The terminology used herein is for the purpose of describing embodiments of the present application only and is not intended to be limiting of the application.
The intelligent lock is an execution component for locking the door in the access control system. Compared with the traditional door lock, the door lock has better safety and convenience. For example, the intelligent lock can be unlocked and authenticated in a fingerprint authentication mode, a password authentication mode or a card swiping authentication mode, and the convenience and the user experience of the door lock can be effectively improved. With the development of embedded technology, the functions of the intelligent lock are gradually improved, and more functions can be realized. In the related art, the intelligent lock is mainly controlled and developed in a coupling mode or a small operating system mode. Along with the functions of the intelligent lock are more and more, the structure of the control mode is more and more complex, and therefore the problem that the intelligent lock is prone to faults, such as the problem that the intelligent lock is prone to crash, and the system stability is poor. In addition, the intelligent lock in the control mode is difficult to modularize in the development process, so the transplantation process is complex and the portability is low.
An embodiment of the invention provides an intelligent lock control method, an intelligent lock control system and a storage medium, which can effectively reduce the system fault rate, improve the system stability and effectively improve the portability. Referring to fig. 1, the method of the embodiment of the present invention includes, but is not limited to, step S110, step S120, step S130, and step S140.
Specifically, the method application process of the embodiment of the invention includes, but is not limited to, the following steps:
s110: and acquiring the driving data sent by the bottom layer. Wherein the drive data is acquired by the underlying sensor.
S120: and determining that the driving data meets a first preset condition, generating a preset mark and sending the preset mark to an upper layer. And the upper layer performs first preset control operation according to the preset mark.
S130: and determining that the driving data meets a second preset condition, and executing emergency task operation.
S140: and acquiring feedback data of the upper layer, and executing second preset control operation according to the feedback data.
In the working process of the embodiment, the embodiment first obtains the driving data sent by the bottom layer, and when it is determined that the driving data meets the first preset condition, generates the preset flag and sends the preset flag to the upper layer. And when the driving data is determined to meet the second preset condition, executing emergency task operation. Further, the present embodiment acquires feedback data of an upper layer, and performs a second preset control operation according to the feedback data. Specifically, referring to fig. 3, the present embodiment first performs hierarchical control on the system, including an upper layer 310, a middle layer 320, and a bottom layer 330. Wherein, various sensor drivers are disposed on the bottom layer 330. For example, a fingerprint serial driver, a card swiping SPI driver, a touch key driver, a memory I2C driver, an LED driver, a voice driver, and the like. The driving data of the present embodiment is acquired by the sensor of the bottom layer 330 and transmitted to the middle layer 320. Then, the middle layer 320 acquires the driving data transmitted by the bottom layer 330 and processes the driving data. And when the current data is determined to meet the first preset condition, generating a corresponding zone bit, namely generating a preset mark. Meanwhile, the middle layer 320 sends the generated flag bit to the upper layer 310, so that the upper layer 310 performs a corresponding control response, i.e., performs a first preset control operation, according to the flag bit. For example, when the bottom layer 330 detects the driving data for fingerprint authentication, the corresponding driving data is transmitted to the middle layer 320. After receiving the driving data of the fingerprint authentication, the middle layer 320 determines whether the fingerprint authentication is a legal operation, i.e., whether the fingerprint authentication satisfies a first preset condition. When it is determined that the fingerprint authentication driving data satisfies the first preset condition, a fingerprint authentication flag is generated and transmitted to the upper layer 310. After receiving the fingerprint authentication mark, the upper layer 310 performs corresponding fingerprint identification according to the fingerprint authentication mark. Further, when the middle layer 320 determines that the driving data satisfies the second preset condition, the urgent task operation is performed. In the smart lock application process, some emergency events, such as system locking or illegal action detection, etc., often occur. When the middle layer 320 determines that the illegal action exists currently according to the driving data, namely, determines that the driving data meets the second preset condition, the corresponding emergency task operation is executed. In this embodiment, after determining that the driving data meets the second preset condition, the middle layer 320 directly executes the corresponding emergency task operation without generating a corresponding flag bit and sending the flag bit to the upper layer 310, thereby effectively improving the execution efficiency of the system. In addition, the middle layer 320 improves the acquisition of the feedback data of the upper layer 310, thereby performing a second preset control operation according to the feedback data. After the upper layer 310 performs the first predetermined control operation according to the predetermined flag, corresponding data is fed back to the middle layer 320, for example, an execution state of the first predetermined control operation. The present embodiment performs the second preset control operation according to the feedback data by acquiring the feedback data of the upper layer 310. In this embodiment, in a layered framework mode, the bottom layer 330 and the upper layer 310 are connected in series through the middle layer 320, data detected by the bottom layer 330 is preprocessed through the middle layer 320, and a corresponding preset flag is generated according to the data meeting a first preset condition and sent to the upper layer 310 for processing. And some more urgent events or non-essential events are directly processed in the middle layer 320, so that the control architecture is clearer, more complex intelligent lock function control is distributed to each layer for execution, the problems that the traditional control architecture is more complex and system faults are easy to occur are solved, and the system stability is effectively improved. Meanwhile, the upper layer can be conveniently arranged in a modularized mode through the layered structure, only the bottom layer drive and the butt joint mark of the middle layer need to be changed in the transplanting process, and therefore the transportability of the system is effectively improved.
In some embodiments of the present invention, when performing the step of determining that the driving data satisfies the first preset condition and generating the preset flag, the intelligent lock control method provided in this embodiment further includes:
and determining that the driving data does not meet the first preset condition, and discarding the driving data.
In the present specific embodiment, when the intermediate layer determines that the drive data does not satisfy the first preset condition, the drive data is discarded. Specifically, when the driving data does not satisfy the first preset condition, the intermediate layer determines that the driving data is illegal data, and discards the driving data. At this time, the middle layer does not generate a corresponding preset flag, and does not transmit corresponding data to the upper layer. Illustratively, when the bottom layer detects fingerprint drive data, the fingerprint drive data is then sent to the middle layer. And after receiving the fingerprint driving data, the middle layer detects the fingerprint again. When the fingerprint detection is carried out again, when the corresponding fingerprint driving data cannot be detected, the fingerprint driving data is judged not to meet the first preset condition, namely the fingerprint driving data is illegal data, and the intermediate layer discards the fingerprint driving data. For example, when the user's finger is pressed to the position of the corresponding fingerprint detection module, the system is activated, and the bottom layer sends the detected fingerprint driving data to the middle layer. At this time, the middle layer performs first preset condition judgment on the fingerprint driving data, and the middle layer performs re-detection on the fingerprint driving data. And when the finger of the user leaves the corresponding detection position at the moment, the user does not want to perform fingerprint comparison, the detected fingerprint driving data is judged to be illegal data, the intermediate layer discards the fingerprint driving data, and the current detection is quitted.
In some embodiments of the invention, the second predetermined condition comprises a tamper-proof alarm condition and a door false-close condition. Accordingly, determining that the driving data satisfies the second preset condition, performing an emergency mission operation including, but not limited to:
and determining that the driving data meets the anti-prying alarm condition, and executing anti-prying alarm operation.
Or determining that the driving data meets the door virtual closing condition, and executing door virtual closing alarm operation.
In this embodiment, the second preset condition includes a prying-resistant alarm condition and a door virtual-closed condition, and when the driving data satisfies the prying-resistant alarm condition, the prying-resistant alarm operation is performed, and when the driving data satisfies the door virtual-closed condition, the door virtual-closed alarm operation is performed. Specifically, in the middle layer task processing process, the middle layer judges whether to trigger corresponding alarm processing according to data detected by the bottom layer driver. Illustratively, the present embodiment detects door closure status data through underlying sensors. For example, the door closed state is detected by a door magnetic sensor, an infrared sensor, or the like. The bottom layer then sends the corresponding door closed status data to the middle layer. The middle layer judges whether the door virtual closing condition is met or not according to door closing state data, namely driving data, sent by the bottom layer. And when the door closing state data are determined to meet the door virtual closing condition, executing door virtual closing alarm operation, such as triggering alarm voice or triggering LED light alarm. In addition, the driving data obtained by the detection of the bottom layer sensor in the embodiment may also include prying-resistant state data. For example, the pressure sensor arranged in the bottom layer detects the pressure applied to the door body, and the prying-resistant state data is obtained. And then sending the detected data to the middle layer for judgment. And when the detected prying-resistant state data meet the prying-resistant alarm condition, executing prying-resistant alarm operation by the middle layer.
In some embodiments of the present invention, determining that the driving data satisfies the first preset condition generates a preset flag, including but not limited to:
and determining that the password authentication data is detected, and acquiring the current password data. And determining that the current password data meets a preset length condition, and setting a password authentication mark.
Or determining that the fingerprint authentication data is detected, and acquiring the current fingerprint state. And determining that the current fingerprint state is an authentication state, and setting a fingerprint authentication mark.
Or determining that the card swiping authentication data is detected, and acquiring the current card data. And determining that the current card data meets a third preset condition, and setting a card swiping authentication mark. Wherein the third preset condition comprises a card type and a card encryption condition.
In this embodiment, the driving data detected by the bottom layer includes password authentication data, fingerprint authentication data, and card swiping authentication data. When the middle layer determines that the drive data detected by the bottom layer is password authentication data, current password data is acquired. And when the current password data is determined to meet the preset length condition, setting a password authentication mark. For example, the bottom layer detects the driving data and sends the driving data to the middle layer. When the middle layer determines that the detected driving data is password authentication data, current password data detected by the bottom layer, namely password data input by a current user, is obtained. And then the middle layer judges according to the acquired password, namely the current password data. And when the current password data is determined to meet the preset length condition, setting a corresponding password authentication mark and sending the password authentication mark to the upper layer. For example, the preset length condition of the cipher data may include the shortest number of characters and the longest number of characters of the cipher data. When the password data input by the current user, namely the current password data, is determined, the number of characters is larger than the preset shortest number of characters and smaller than the longest number of characters, the current password data is considered to be legal data, the middle layer is provided with a corresponding password authentication mark and sends the password authentication mark to the upper layer, so that the upper layer executes corresponding password authentication operation according to the password authentication mark. Otherwise, if the current password data does not meet the preset length condition, the current password data is regarded as illegal data, and the data is discarded. Meanwhile, when the intermediate layer determines that the detected driving data is fingerprint authentication data, the intermediate layer detects the current fingerprint state. And when the current fingerprint state is determined to be the authentication state, setting a fingerprint authentication mark. Specifically, after the intermediate layer determines that the fingerprint authentication data is detected, the intermediate layer confirms the current state of the fingerprint to relieve the false authentication of the non-authenticated user and reduce and improve the utilization rate of system resources. For example, when the user presses the fingerprint detection module with a finger to activate the system, the underlying driver acquires corresponding fingerprint authentication data. If the user removes his finger at this time, for example, the user does not want to use fingerprint authentication, no further authentication operation is required. Thus, after determining that the fingerprint authentication data is detected, the intermediate layer again detects whether the fingerprint is still present, i.e. acquires the current fingerprint status. When the current fingerprint state is determined to be the authentication state, namely the fingerprint detection module is determined to be capable of detecting the fingerprint, a corresponding fingerprint authentication mark is set so that the upper layer authenticates the fingerprint according to the fingerprint authentication mark.
Further, when the detected driving data is determined to be card swiping authentication data, the middle layer firstly acquires the current card data, and after the current card data is determined to meet a third preset condition, a card swiping authentication mark is set. Specifically, the third preset condition includes a card type and a card encryption condition. And after the intermediate layer obtains the data of the current card, namely the current card data, judging whether the current card data meets a third preset condition. For example, the present embodiment first determines whether the type of the card swiped is a preset card type according to the current card data. And then judging whether the encryption type of the card is a preset encryption type according to the current card data. And after the card type and the card encryption type are determined to meet the preset conditions, the current card swiping authentication data is considered to be legal data, and the middle layer sets a corresponding card swiping authentication mark and sends the legal data to the upper layer.
In some embodiments of the invention, the feedback data comprises authentication errors and authentication completion. Accordingly, a second preset control operation is performed based on the feedback data, including but not limited to:
determining that the authentication error times meet preset times, locking the system and detecting the locking time of the system; and determining that the system locking time meets the preset locking duration, unlocking the system and clearing the system locking mark.
Or determining that the feedback data is detected to be authentication completion, controlling the LED indicator light to recover the initialization state and clearing the LED indicator mark.
In this embodiment, the feedback data of the upper layer includes an authentication error and an authentication completion. And locking the system when the authentication error times are determined to meet the preset times. Meanwhile, the system locking time is detected. And after the system locking time is determined to meet the preset locking duration, unlocking the system and clearing the system locking mark. Specifically, when the data fed back by the upper layer is an authentication error, the number of times of the authentication error is counted. And when the times of the authentication errors meet the preset times, locking the system and setting a corresponding system locking mark. If an authentication event, such as fingerprint authentication data, password authentication data, etc., is detected at this time, and the system is in a locked state, the corresponding authentication data is discarded, and no corresponding judgment operation is performed. Further, after the system is locked, the middle layer detects the system locking time, namely, calculates the time of the system locking. And determining that the system locking time meets the preset locking duration, unlocking the system, and clearing the system locking mark. After the system is locked, the system can be unlocked only after a preset locking time period, and during the system locking period, the system does not execute authentication operation. However, when emergency events such as a prying-resistant alarm event and a door virtual closing event occur, the middle layer can execute corresponding emergency task operation so as to improve the safety of the system. In addition, when the authentication function is performed on the upper layer, an LED indication operation and an LED indication mark are provided, and the LED indication lamp needs to be restored to an initial state after the authentication is completed. In this embodiment, when it is determined that the feedback data is detected as the authentication completion, the LED indicator is controlled to return to the initial state, and the LED indicator is turned off. At the same time, the LED indicator is cleared.
In some embodiments of the present invention, the intelligent lock control method provided in this embodiment further includes, but is not limited to:
and detecting preset system data, and performing third preset control operation according to the preset system data.
In this embodiment, during the middle-layer task processing, the middle layer further detects the preset system data, and performs a third preset control operation according to the preset system data. Specifically, preset system data in the system, such as system initialization data, key data, and the like, is detected. In this embodiment, the middle layer performs a third preset operation according to the detected preset system data to complete task processing of the middle layer.
In some embodiments of the present invention, the preset system data includes touch key data and restore key data. Accordingly, a third predetermined control operation is performed according to the predetermined system data, including but not limited to:
and determining that the preset key data are touch key data, and executing corresponding preset key operation according to the touch key data. The touch key data comprises determination key data and cancellation key data, and the preset key operation comprises confirmation operation and cancellation operation.
Or determining the preset key data as recovery key data, exiting the middle layer task processing and performing system initialization.
In this embodiment, the preset system data includes touch key data and recovery key data. In particular, during the operation of the system, human-computer interaction is often required through touching the keys. In this embodiment, by detecting the preset system data, when it is determined that the preset key data is the touch key data, the corresponding preset key operation is executed according to the detected touch key data. The touch key data comprises determination key data and cancellation key data. Accordingly, the preset key operation includes a confirmation operation and a cancellation operation. For example, when the touch key data is determined to be the determination key data, the intermediate layer performs the determination operation according to a specific task processing situation. Or when the touch key data is determined to be the cancel key data, the middle layer executes cancel operation according to the specific task processing condition. Further, when the preset key data is determined to be the recovery key data, that is, the detected preset key data is the clear data key, the middle layer task processing is exited, and then the system initial processing is entered.
In some embodiments of the invention, the predetermined system data further comprises a system sleep flag. Correspondingly, the third preset control operation is performed according to the preset system data, which further includes but is not limited to:
and determining that the system sleep mark is detected, exiting the middle layer task processing and entering an upper layer sleep task.
In this embodiment, the preset system data further includes a system sleep flag. After the system is not operated for a long time, the system generates a system sleep flag. And after the middle layer determines that the system sleep mark is detected, the middle layer task processing is exited, and then the upper layer sleep task is entered. It should be noted that, when the system is in sleep, i.e. after entering the upper layer sleep task, the controller controlling the system will stop working. At this time, the bottom layer is required to detect corresponding driving data to trigger the wake-up system, such as fingerprint authentication data, password authentication data, and the like.
Referring to fig. 2, an embodiment of the present invention also provides an intelligent lock control system including:
at least one process 210.
At least one memory 220 for storing at least one program.
When the at least one program is executed by the at least one processor 210, the at least one processor 210 is caused to implement the intelligent lock control method as described in the above embodiments.
An embodiment of the present invention also provides a computer-readable storage medium storing computer-executable instructions for execution by one or more control processors, e.g., to perform the steps described in the above embodiments.
One of ordinary skill in the art will appreciate that all or some of the steps, systems, and methods disclosed above may be implemented as software, firmware, hardware, and suitable combinations thereof. Some or all of the physical components may be implemented as software executed by a processor, such as a central processing unit, digital signal processor, or microprocessor, or as hardware, or as an integrated circuit, such as an application specific integrated circuit. Such software may be distributed on computer readable media, which may include computer storage media (or non-transitory media) and communication media (or transitory media). The term computer storage media includes volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules or other data, as is well known to those of ordinary skill in the art. Computer storage media includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital Versatile Disks (DVD) or other optical disk storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and which can accessed by a computer. In addition, communication media typically embodies computer readable instructions, data structures, program modules or other data in a modulated data signal such as a carrier wave or other transport mechanism and includes any information delivery media as is well known to those skilled in the art.
While the preferred embodiments of the present invention have been described in detail, it will be understood by those skilled in the art that the foregoing and various other changes, omissions and deviations in the form and detail thereof may be made without departing from the scope of this invention.
Claims (10)
1. An intelligent lock control method is characterized by comprising the following steps:
acquiring drive data sent by a bottom layer; wherein the drive data is acquired by the underlying sensor;
determining that the driving data meets a first preset condition, generating a preset mark and sending the preset mark to an upper layer; the upper layer carries out first preset control operation according to the preset mark;
determining that the driving data meets a second preset condition, and executing emergency task operation;
and acquiring feedback data of the upper layer, and executing second preset control operation according to the feedback data.
2. The intelligent lock control method according to claim 1, wherein when the step of determining that the drive data satisfies a first preset condition and generating a preset flag is performed, the method further includes:
and determining that the driving data does not meet a first preset condition, and discarding the driving data.
3. The intelligent lock control method according to claim 1, wherein the second preset condition includes a prying-resistant alarm condition and a door virtual-closed condition;
the step of determining that the driving data meets a second preset condition and executing an emergency task operation comprises the following steps:
determining that the driving data meets the anti-prying alarm condition, and executing anti-prying alarm operation;
or determining that the driving data meets the door virtual closing condition, and executing door virtual closing alarm operation.
4. The intelligent lock control method according to claim 1, wherein the determining that the driving data satisfies a first preset condition and generating a preset flag includes:
determining that password authentication data is detected, and acquiring current password data; determining that the current password data meets a preset length condition, and setting a password authentication mark;
or, determining that fingerprint authentication data is detected, and acquiring the current fingerprint state; determining the current fingerprint state as an authentication state, and setting a fingerprint authentication mark;
or, determining that the card swiping authentication data is detected, and acquiring current card data; determining that the current card data meets a third preset condition, and setting a card swiping authentication mark; wherein the third preset condition comprises a card type and a card encryption condition.
5. The intelligent lock control method according to claim 1, wherein the feedback data includes an authentication error and an authentication completion;
the executing a second preset control operation according to the feedback data includes:
determining that the authentication error times meet preset times, locking a system and detecting system locking time; determining that the system locking time meets a preset locking duration, unlocking the system and clearing a system locking mark;
or determining that the feedback data is detected to be authentication completion, controlling the LED indicator lamp to recover the initialization state and clearing the LED indicator mark.
6. The intelligent lock control method according to claim 1, further comprising:
and detecting preset system data, and performing third preset control operation according to the preset system data.
7. The intelligent lock control method according to claim 6, wherein the preset system data includes touch key data and recovery key data;
and performing a third preset control operation according to the preset system data, wherein the third preset control operation comprises:
determining the preset key data as the touch key data, and executing corresponding preset key operation according to the touch key data; the touch key data comprise determination key data and cancellation key data, and the preset key operation comprises a confirmation operation and a cancellation operation;
or determining the preset key data as the recovery key data, exiting the middle layer task processing and performing system initialization.
8. The intelligent lock control method according to claim 6, wherein the preset system data further includes a system dormancy flag;
the third preset control operation is performed according to the preset system data, and the method further includes:
and determining that the system sleep mark is detected, exiting the middle layer task processing and entering an upper layer sleep task.
9. An intelligent lock control system, comprising:
at least one processor;
at least one memory for storing at least one program;
when executed by the at least one processor, the at least one program causes the at least one processor to implement the intelligent lock control method according to any one of claims 1 to 8.
10. A computer storage medium in which a processor-executable program is stored, wherein the processor-executable program, when executed by the processor, is for implementing the intelligent lock control method according to any one of claims 1 to 8.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210944798.XA CN115311766A (en) | 2022-08-08 | 2022-08-08 | Intelligent lock control method, system and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210944798.XA CN115311766A (en) | 2022-08-08 | 2022-08-08 | Intelligent lock control method, system and storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN115311766A true CN115311766A (en) | 2022-11-08 |
Family
ID=83860305
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210944798.XA Pending CN115311766A (en) | 2022-08-08 | 2022-08-08 | Intelligent lock control method, system and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN115311766A (en) |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105243708A (en) * | 2015-09-22 | 2016-01-13 | 中国船舶重工集团公司第七一八研究所 | Intelligent lock internal hierarchical program and redundancy control framework |
US20170017565A1 (en) * | 2015-07-16 | 2017-01-19 | Linkedin Corporation | Hierarchical system-capability testing |
CN107393069A (en) * | 2017-07-17 | 2017-11-24 | 曹迪 | Access control management method and system based on bluetooth MESH networking core technologies |
CN108965297A (en) * | 2018-07-18 | 2018-12-07 | 深圳旦倍科技有限公司 | A kind of access control equipment management system |
CN109983512A (en) * | 2019-02-11 | 2019-07-05 | 深圳市汇顶科技股份有限公司 | Data processing method, intelligent lock system and storage medium |
CN112037491A (en) * | 2020-06-10 | 2020-12-04 | 江苏方天电力技术有限公司 | Intelligent security locking system based on wireless communication technology |
CN112365634A (en) * | 2020-10-14 | 2021-02-12 | 青岛海信智慧家居***股份有限公司 | Method and device for pushing abnormal alarm based on intelligent door lock |
US20210373982A1 (en) * | 2020-05-28 | 2021-12-02 | Arista Networks, Inc. | Lock-free method of transmitting hierarchical collections through shared memory |
-
2022
- 2022-08-08 CN CN202210944798.XA patent/CN115311766A/en active Pending
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20170017565A1 (en) * | 2015-07-16 | 2017-01-19 | Linkedin Corporation | Hierarchical system-capability testing |
CN105243708A (en) * | 2015-09-22 | 2016-01-13 | 中国船舶重工集团公司第七一八研究所 | Intelligent lock internal hierarchical program and redundancy control framework |
CN107393069A (en) * | 2017-07-17 | 2017-11-24 | 曹迪 | Access control management method and system based on bluetooth MESH networking core technologies |
CN108965297A (en) * | 2018-07-18 | 2018-12-07 | 深圳旦倍科技有限公司 | A kind of access control equipment management system |
CN109983512A (en) * | 2019-02-11 | 2019-07-05 | 深圳市汇顶科技股份有限公司 | Data processing method, intelligent lock system and storage medium |
US20210373982A1 (en) * | 2020-05-28 | 2021-12-02 | Arista Networks, Inc. | Lock-free method of transmitting hierarchical collections through shared memory |
CN112037491A (en) * | 2020-06-10 | 2020-12-04 | 江苏方天电力技术有限公司 | Intelligent security locking system based on wireless communication technology |
CN112365634A (en) * | 2020-10-14 | 2021-02-12 | 青岛海信智慧家居***股份有限公司 | Method and device for pushing abnormal alarm based on intelligent door lock |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20210357488A1 (en) | Fingerprint Recognition Method and Apparatus, and Touchscreen Terminal | |
CN104933337B (en) | A kind of method and intelligent terminal for realizing unlocked by fingerprint | |
CN104392157B (en) | Method and device for locking screen by using passwords | |
US7480805B1 (en) | Method and system for identifying and processing an unauthorized access request | |
CN101551837B (en) | Method for switching user accounts and computer | |
JP2005084991A (en) | Terminal user monitoring system | |
CN107364423A (en) | A kind of vehicle control system and control method based on fingerprint recognition | |
US11358566B2 (en) | In-vehicle complex biometric authentication system and operation method thereof | |
CN108734838B (en) | Intelligent lock with video-based biological feature verification device | |
US20210229633A1 (en) | Biometric user authenticating keys for vehicles and methods of use | |
KR20160041432A (en) | Alert method and system of fingerprint reader | |
CN109389709A (en) | Unlocking control system and unlocking control method | |
WO2023193778A1 (en) | Vehicle traveling control method and apparatus, and electronic device | |
CN109979047A (en) | Multi net voting intelligent door lock control method, storage medium, controller and Fingerprint Lock | |
KR20220032191A (en) | vehicle, and controlling method thereof | |
CN110223430A (en) | A kind of control method of electronic lock, device and electronic lock | |
CN105023321A (en) | Anti-hijacking smart lock and anti-hijacking method | |
CN110388138A (en) | A kind of method, door-locking system and the door lock of automatically prompting user replacement unlocking pin | |
CN110194123A (en) | Vehicle starting method and system, vehicle under a kind of no key status | |
CN115311766A (en) | Intelligent lock control method, system and storage medium | |
CN106506843A (en) | A kind of theft preventing method and mobile terminal | |
CN112102524A (en) | Unlocking method and unlocking system | |
EP3757949B1 (en) | Fingerprint module, fingerprint recognition system, control method, and smart lock | |
CN211479672U (en) | Engineering equipment control system based on offline iris recognition and voice recognition | |
CN109063429B (en) | Intelligent home security control system based on gestures and control method thereof |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |