CN115311766A - Intelligent lock control method, system and storage medium - Google Patents

Intelligent lock control method, system and storage medium Download PDF

Info

Publication number
CN115311766A
CN115311766A CN202210944798.XA CN202210944798A CN115311766A CN 115311766 A CN115311766 A CN 115311766A CN 202210944798 A CN202210944798 A CN 202210944798A CN 115311766 A CN115311766 A CN 115311766A
Authority
CN
China
Prior art keywords
data
preset
determining
condition
authentication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210944798.XA
Other languages
Chinese (zh)
Inventor
柯广川
陈鸿填
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Hutlon Technology Co Ltd
Foshan Hutlon Intelligent Technology Co Ltd
Original Assignee
Guangdong Hutlon Technology Co Ltd
Foshan Hutlon Intelligent Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Hutlon Technology Co Ltd, Foshan Hutlon Intelligent Technology Co Ltd filed Critical Guangdong Hutlon Technology Co Ltd
Priority to CN202210944798.XA priority Critical patent/CN115311766A/en
Publication of CN115311766A publication Critical patent/CN115311766A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00563Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys using personal physical data of the operator, e.g. finger prints, retinal images, voicepatterns
    • GPHYSICS
    • G08SIGNALLING
    • G08BSIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
    • G08B13/00Burglar, theft or intruder alarms
    • G08B13/02Mechanical actuation
    • G08B13/06Mechanical actuation by tampering with fastening

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The invention discloses an intelligent lock control method, an intelligent lock control system and a storage medium, which are applied to the technical field of safety management, can effectively reduce the system fault rate, improve the system stability and effectively improve the transportability. The method comprises the steps of obtaining driving data sent by a bottom layer; wherein the drive data is acquired by the underlying sensor; determining that the driving data meets a first preset condition, generating a preset mark and sending the preset mark to an upper layer; the upper layer carries out first preset control operation according to the preset mark; determining that the driving data meets a second preset condition, and executing emergency task operation; and acquiring feedback data of the upper layer, and executing second preset control operation according to the feedback data.

Description

Intelligent lock control method, system and storage medium
Technical Field
The invention relates to the technical field of safety management, in particular to an intelligent lock control method, an intelligent lock control system and a storage medium.
Background
The intelligent lock is an execution component for locking a door in the access control system, and has safety and convenience compared with a traditional door lock. With the development of embedded technology, the functions of the intelligent lock are more and more perfect, and the functions that can be realized are more and more. In the related art, the intelligent lock is mainly controlled by a coupling type or small operating system, but the complexity of the control mode architecture is gradually increased along with the increase of functions to be realized, so that faults are easy to occur, the system stability is poor, and the portability is low.
Disclosure of Invention
In order to solve at least one of the above technical problems, the present invention provides an intelligent lock control method, system and storage medium, which can effectively reduce the system failure rate, improve the system stability and effectively improve the portability.
On one hand, the embodiment of the invention provides an intelligent lock control method, which comprises the following steps:
acquiring drive data sent by a bottom layer; wherein the drive data is acquired by the underlying sensor;
determining that the driving data meets a first preset condition, generating a preset mark and sending the preset mark to an upper layer; the upper layer carries out first preset control operation according to the preset mark;
determining that the driving data meets a second preset condition, and executing emergency task operation;
and acquiring feedback data of the upper layer, and executing second preset control operation according to the feedback data.
The intelligent lock control method provided by the embodiment of the invention at least has the following beneficial effects: the embodiment first obtains the driving data sent by the bottom layer, and judges according to the driving data. And after determining that the driving data meets the first preset condition, generating a preset mark, and sending the preset mark to the upper layer so that the upper layer performs first preset control operation according to the preset mark. Meanwhile, when it is determined that the driving data satisfies the second preset condition, the urgent task operation is performed without reporting to an upper layer. In addition, in this embodiment, feedback data of the upper layer is obtained to execute a second preset control operation according to the feedback data, so as to form a control framework of the bottom layer, the intermediate layer and the upper layer, the driving data obtained by detecting the sensor of the bottom layer is preprocessed through the intermediate layer, and then a corresponding preset mark is generated according to the driving data meeting a first preset condition and sent to the upper layer, so that the upper layer performs the first preset control operation according to the corresponding preset mark, and meanwhile, the intermediate layer directly executes an emergency task operation and the second preset control operation, so that the intermediate layer can effectively connect each hierarchy in series, and the stability of the system is effectively improved. Moreover, each hierarchy can be modularized through a layered architecture, and the portability of the system can be effectively improved.
According to some embodiments of the invention, when performing the step of determining that the driving data satisfies a first preset condition and generating a preset flag, the method further comprises:
and determining that the driving data does not meet a first preset condition, and discarding the driving data.
According to some embodiments of the invention, the second preset condition comprises a tamper-proof alarm condition and a door false-close condition;
the step of determining that the driving data meets a second preset condition and executing an emergency task operation comprises the following steps:
determining that the driving data meets the anti-prying alarm condition, and executing anti-prying alarm operation;
or determining that the driving data meets the door virtual closing condition, and executing door virtual closing alarm operation.
According to some embodiments of the invention, the determining that the driving data satisfies a first preset condition and generating a preset flag includes:
determining that password authentication data is detected, and acquiring current password data; determining that the current password data meets a preset length condition, and setting a password authentication mark;
or, determining that fingerprint authentication data is detected, and acquiring the current fingerprint state; determining the current fingerprint state as an authentication state, and setting a fingerprint authentication mark;
or, determining that the card swiping authentication data is detected, and acquiring current card data; determining that the current card data meets a third preset condition, and setting a card swiping authentication mark; wherein the third preset condition comprises a card type and a card encryption condition.
According to some embodiments of the invention, the feedback data comprises authentication errors and authentication completions;
the executing a second preset control operation according to the feedback data includes:
determining that the authentication error times meet preset times, locking a system and detecting system locking time; determining that the system locking time meets a preset locking duration, unlocking the system and clearing a system locking mark;
or determining that the feedback data is detected to be authentication completion, controlling the LED indicator lamp to recover the initialization state and clearing the LED indicator mark.
According to some embodiments of the invention, the method further comprises:
and detecting preset system data, and performing third preset control operation according to the preset system data.
According to some embodiments of the invention, the preset system data comprises touch key data and restore key data;
and performing a third preset control operation according to the preset system data, wherein the third preset control operation comprises:
determining the preset key data as the touch key data, and executing corresponding preset key operation according to the touch key data; the touch key data comprise determination key data and cancellation key data, and the preset key operation comprises a confirmation operation and a cancellation operation;
or determining the preset key data as the recovery key data, exiting the middle layer task processing and performing system initialization.
According to some embodiments of the invention, the preset system data further comprises a system sleep flag;
the third preset control operation is performed according to the preset system data, and the method further includes:
and determining that the system sleep mark is detected, exiting the middle layer task processing and entering an upper layer sleep task.
On the other hand, an embodiment of the present invention further provides an intelligent lock control system, including:
at least one processor;
at least one memory for storing at least one program;
when the at least one program is executed by the at least one processor, the at least one processor is caused to implement the intelligent lock control method according to the above-described embodiment.
In another aspect, an embodiment of the present invention further provides a computer storage medium, in which a processor-executable program is stored, and the processor-executable program, when executed by the processor, is configured to implement the intelligent lock control method according to the above embodiment.
Drawings
FIG. 1 is a flow chart of an intelligent lock control method provided by an embodiment of the present invention;
FIG. 2 is a schematic block diagram of an intelligent lock control system provided by an embodiment of the present invention;
FIG. 3 is a schematic diagram of an intelligent lock control architecture provided by an embodiment of the present invention.
Detailed Description
The embodiments described in the embodiments of the present application should not be construed as limiting the present application, and all other embodiments that can be obtained by a person skilled in the art without making any inventive step shall fall within the scope of protection of the present application.
In the following description, reference is made to "some embodiments" which describe a subset of all possible embodiments, but it is understood that "some embodiments" may be the same subset or different subsets of all possible embodiments, and may be combined with each other without conflict.
Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this application belongs. The terminology used herein is for the purpose of describing embodiments of the present application only and is not intended to be limiting of the application.
The intelligent lock is an execution component for locking the door in the access control system. Compared with the traditional door lock, the door lock has better safety and convenience. For example, the intelligent lock can be unlocked and authenticated in a fingerprint authentication mode, a password authentication mode or a card swiping authentication mode, and the convenience and the user experience of the door lock can be effectively improved. With the development of embedded technology, the functions of the intelligent lock are gradually improved, and more functions can be realized. In the related art, the intelligent lock is mainly controlled and developed in a coupling mode or a small operating system mode. Along with the functions of the intelligent lock are more and more, the structure of the control mode is more and more complex, and therefore the problem that the intelligent lock is prone to faults, such as the problem that the intelligent lock is prone to crash, and the system stability is poor. In addition, the intelligent lock in the control mode is difficult to modularize in the development process, so the transplantation process is complex and the portability is low.
An embodiment of the invention provides an intelligent lock control method, an intelligent lock control system and a storage medium, which can effectively reduce the system fault rate, improve the system stability and effectively improve the portability. Referring to fig. 1, the method of the embodiment of the present invention includes, but is not limited to, step S110, step S120, step S130, and step S140.
Specifically, the method application process of the embodiment of the invention includes, but is not limited to, the following steps:
s110: and acquiring the driving data sent by the bottom layer. Wherein the drive data is acquired by the underlying sensor.
S120: and determining that the driving data meets a first preset condition, generating a preset mark and sending the preset mark to an upper layer. And the upper layer performs first preset control operation according to the preset mark.
S130: and determining that the driving data meets a second preset condition, and executing emergency task operation.
S140: and acquiring feedback data of the upper layer, and executing second preset control operation according to the feedback data.
In the working process of the embodiment, the embodiment first obtains the driving data sent by the bottom layer, and when it is determined that the driving data meets the first preset condition, generates the preset flag and sends the preset flag to the upper layer. And when the driving data is determined to meet the second preset condition, executing emergency task operation. Further, the present embodiment acquires feedback data of an upper layer, and performs a second preset control operation according to the feedback data. Specifically, referring to fig. 3, the present embodiment first performs hierarchical control on the system, including an upper layer 310, a middle layer 320, and a bottom layer 330. Wherein, various sensor drivers are disposed on the bottom layer 330. For example, a fingerprint serial driver, a card swiping SPI driver, a touch key driver, a memory I2C driver, an LED driver, a voice driver, and the like. The driving data of the present embodiment is acquired by the sensor of the bottom layer 330 and transmitted to the middle layer 320. Then, the middle layer 320 acquires the driving data transmitted by the bottom layer 330 and processes the driving data. And when the current data is determined to meet the first preset condition, generating a corresponding zone bit, namely generating a preset mark. Meanwhile, the middle layer 320 sends the generated flag bit to the upper layer 310, so that the upper layer 310 performs a corresponding control response, i.e., performs a first preset control operation, according to the flag bit. For example, when the bottom layer 330 detects the driving data for fingerprint authentication, the corresponding driving data is transmitted to the middle layer 320. After receiving the driving data of the fingerprint authentication, the middle layer 320 determines whether the fingerprint authentication is a legal operation, i.e., whether the fingerprint authentication satisfies a first preset condition. When it is determined that the fingerprint authentication driving data satisfies the first preset condition, a fingerprint authentication flag is generated and transmitted to the upper layer 310. After receiving the fingerprint authentication mark, the upper layer 310 performs corresponding fingerprint identification according to the fingerprint authentication mark. Further, when the middle layer 320 determines that the driving data satisfies the second preset condition, the urgent task operation is performed. In the smart lock application process, some emergency events, such as system locking or illegal action detection, etc., often occur. When the middle layer 320 determines that the illegal action exists currently according to the driving data, namely, determines that the driving data meets the second preset condition, the corresponding emergency task operation is executed. In this embodiment, after determining that the driving data meets the second preset condition, the middle layer 320 directly executes the corresponding emergency task operation without generating a corresponding flag bit and sending the flag bit to the upper layer 310, thereby effectively improving the execution efficiency of the system. In addition, the middle layer 320 improves the acquisition of the feedback data of the upper layer 310, thereby performing a second preset control operation according to the feedback data. After the upper layer 310 performs the first predetermined control operation according to the predetermined flag, corresponding data is fed back to the middle layer 320, for example, an execution state of the first predetermined control operation. The present embodiment performs the second preset control operation according to the feedback data by acquiring the feedback data of the upper layer 310. In this embodiment, in a layered framework mode, the bottom layer 330 and the upper layer 310 are connected in series through the middle layer 320, data detected by the bottom layer 330 is preprocessed through the middle layer 320, and a corresponding preset flag is generated according to the data meeting a first preset condition and sent to the upper layer 310 for processing. And some more urgent events or non-essential events are directly processed in the middle layer 320, so that the control architecture is clearer, more complex intelligent lock function control is distributed to each layer for execution, the problems that the traditional control architecture is more complex and system faults are easy to occur are solved, and the system stability is effectively improved. Meanwhile, the upper layer can be conveniently arranged in a modularized mode through the layered structure, only the bottom layer drive and the butt joint mark of the middle layer need to be changed in the transplanting process, and therefore the transportability of the system is effectively improved.
In some embodiments of the present invention, when performing the step of determining that the driving data satisfies the first preset condition and generating the preset flag, the intelligent lock control method provided in this embodiment further includes:
and determining that the driving data does not meet the first preset condition, and discarding the driving data.
In the present specific embodiment, when the intermediate layer determines that the drive data does not satisfy the first preset condition, the drive data is discarded. Specifically, when the driving data does not satisfy the first preset condition, the intermediate layer determines that the driving data is illegal data, and discards the driving data. At this time, the middle layer does not generate a corresponding preset flag, and does not transmit corresponding data to the upper layer. Illustratively, when the bottom layer detects fingerprint drive data, the fingerprint drive data is then sent to the middle layer. And after receiving the fingerprint driving data, the middle layer detects the fingerprint again. When the fingerprint detection is carried out again, when the corresponding fingerprint driving data cannot be detected, the fingerprint driving data is judged not to meet the first preset condition, namely the fingerprint driving data is illegal data, and the intermediate layer discards the fingerprint driving data. For example, when the user's finger is pressed to the position of the corresponding fingerprint detection module, the system is activated, and the bottom layer sends the detected fingerprint driving data to the middle layer. At this time, the middle layer performs first preset condition judgment on the fingerprint driving data, and the middle layer performs re-detection on the fingerprint driving data. And when the finger of the user leaves the corresponding detection position at the moment, the user does not want to perform fingerprint comparison, the detected fingerprint driving data is judged to be illegal data, the intermediate layer discards the fingerprint driving data, and the current detection is quitted.
In some embodiments of the invention, the second predetermined condition comprises a tamper-proof alarm condition and a door false-close condition. Accordingly, determining that the driving data satisfies the second preset condition, performing an emergency mission operation including, but not limited to:
and determining that the driving data meets the anti-prying alarm condition, and executing anti-prying alarm operation.
Or determining that the driving data meets the door virtual closing condition, and executing door virtual closing alarm operation.
In this embodiment, the second preset condition includes a prying-resistant alarm condition and a door virtual-closed condition, and when the driving data satisfies the prying-resistant alarm condition, the prying-resistant alarm operation is performed, and when the driving data satisfies the door virtual-closed condition, the door virtual-closed alarm operation is performed. Specifically, in the middle layer task processing process, the middle layer judges whether to trigger corresponding alarm processing according to data detected by the bottom layer driver. Illustratively, the present embodiment detects door closure status data through underlying sensors. For example, the door closed state is detected by a door magnetic sensor, an infrared sensor, or the like. The bottom layer then sends the corresponding door closed status data to the middle layer. The middle layer judges whether the door virtual closing condition is met or not according to door closing state data, namely driving data, sent by the bottom layer. And when the door closing state data are determined to meet the door virtual closing condition, executing door virtual closing alarm operation, such as triggering alarm voice or triggering LED light alarm. In addition, the driving data obtained by the detection of the bottom layer sensor in the embodiment may also include prying-resistant state data. For example, the pressure sensor arranged in the bottom layer detects the pressure applied to the door body, and the prying-resistant state data is obtained. And then sending the detected data to the middle layer for judgment. And when the detected prying-resistant state data meet the prying-resistant alarm condition, executing prying-resistant alarm operation by the middle layer.
In some embodiments of the present invention, determining that the driving data satisfies the first preset condition generates a preset flag, including but not limited to:
and determining that the password authentication data is detected, and acquiring the current password data. And determining that the current password data meets a preset length condition, and setting a password authentication mark.
Or determining that the fingerprint authentication data is detected, and acquiring the current fingerprint state. And determining that the current fingerprint state is an authentication state, and setting a fingerprint authentication mark.
Or determining that the card swiping authentication data is detected, and acquiring the current card data. And determining that the current card data meets a third preset condition, and setting a card swiping authentication mark. Wherein the third preset condition comprises a card type and a card encryption condition.
In this embodiment, the driving data detected by the bottom layer includes password authentication data, fingerprint authentication data, and card swiping authentication data. When the middle layer determines that the drive data detected by the bottom layer is password authentication data, current password data is acquired. And when the current password data is determined to meet the preset length condition, setting a password authentication mark. For example, the bottom layer detects the driving data and sends the driving data to the middle layer. When the middle layer determines that the detected driving data is password authentication data, current password data detected by the bottom layer, namely password data input by a current user, is obtained. And then the middle layer judges according to the acquired password, namely the current password data. And when the current password data is determined to meet the preset length condition, setting a corresponding password authentication mark and sending the password authentication mark to the upper layer. For example, the preset length condition of the cipher data may include the shortest number of characters and the longest number of characters of the cipher data. When the password data input by the current user, namely the current password data, is determined, the number of characters is larger than the preset shortest number of characters and smaller than the longest number of characters, the current password data is considered to be legal data, the middle layer is provided with a corresponding password authentication mark and sends the password authentication mark to the upper layer, so that the upper layer executes corresponding password authentication operation according to the password authentication mark. Otherwise, if the current password data does not meet the preset length condition, the current password data is regarded as illegal data, and the data is discarded. Meanwhile, when the intermediate layer determines that the detected driving data is fingerprint authentication data, the intermediate layer detects the current fingerprint state. And when the current fingerprint state is determined to be the authentication state, setting a fingerprint authentication mark. Specifically, after the intermediate layer determines that the fingerprint authentication data is detected, the intermediate layer confirms the current state of the fingerprint to relieve the false authentication of the non-authenticated user and reduce and improve the utilization rate of system resources. For example, when the user presses the fingerprint detection module with a finger to activate the system, the underlying driver acquires corresponding fingerprint authentication data. If the user removes his finger at this time, for example, the user does not want to use fingerprint authentication, no further authentication operation is required. Thus, after determining that the fingerprint authentication data is detected, the intermediate layer again detects whether the fingerprint is still present, i.e. acquires the current fingerprint status. When the current fingerprint state is determined to be the authentication state, namely the fingerprint detection module is determined to be capable of detecting the fingerprint, a corresponding fingerprint authentication mark is set so that the upper layer authenticates the fingerprint according to the fingerprint authentication mark.
Further, when the detected driving data is determined to be card swiping authentication data, the middle layer firstly acquires the current card data, and after the current card data is determined to meet a third preset condition, a card swiping authentication mark is set. Specifically, the third preset condition includes a card type and a card encryption condition. And after the intermediate layer obtains the data of the current card, namely the current card data, judging whether the current card data meets a third preset condition. For example, the present embodiment first determines whether the type of the card swiped is a preset card type according to the current card data. And then judging whether the encryption type of the card is a preset encryption type according to the current card data. And after the card type and the card encryption type are determined to meet the preset conditions, the current card swiping authentication data is considered to be legal data, and the middle layer sets a corresponding card swiping authentication mark and sends the legal data to the upper layer.
In some embodiments of the invention, the feedback data comprises authentication errors and authentication completion. Accordingly, a second preset control operation is performed based on the feedback data, including but not limited to:
determining that the authentication error times meet preset times, locking the system and detecting the locking time of the system; and determining that the system locking time meets the preset locking duration, unlocking the system and clearing the system locking mark.
Or determining that the feedback data is detected to be authentication completion, controlling the LED indicator light to recover the initialization state and clearing the LED indicator mark.
In this embodiment, the feedback data of the upper layer includes an authentication error and an authentication completion. And locking the system when the authentication error times are determined to meet the preset times. Meanwhile, the system locking time is detected. And after the system locking time is determined to meet the preset locking duration, unlocking the system and clearing the system locking mark. Specifically, when the data fed back by the upper layer is an authentication error, the number of times of the authentication error is counted. And when the times of the authentication errors meet the preset times, locking the system and setting a corresponding system locking mark. If an authentication event, such as fingerprint authentication data, password authentication data, etc., is detected at this time, and the system is in a locked state, the corresponding authentication data is discarded, and no corresponding judgment operation is performed. Further, after the system is locked, the middle layer detects the system locking time, namely, calculates the time of the system locking. And determining that the system locking time meets the preset locking duration, unlocking the system, and clearing the system locking mark. After the system is locked, the system can be unlocked only after a preset locking time period, and during the system locking period, the system does not execute authentication operation. However, when emergency events such as a prying-resistant alarm event and a door virtual closing event occur, the middle layer can execute corresponding emergency task operation so as to improve the safety of the system. In addition, when the authentication function is performed on the upper layer, an LED indication operation and an LED indication mark are provided, and the LED indication lamp needs to be restored to an initial state after the authentication is completed. In this embodiment, when it is determined that the feedback data is detected as the authentication completion, the LED indicator is controlled to return to the initial state, and the LED indicator is turned off. At the same time, the LED indicator is cleared.
In some embodiments of the present invention, the intelligent lock control method provided in this embodiment further includes, but is not limited to:
and detecting preset system data, and performing third preset control operation according to the preset system data.
In this embodiment, during the middle-layer task processing, the middle layer further detects the preset system data, and performs a third preset control operation according to the preset system data. Specifically, preset system data in the system, such as system initialization data, key data, and the like, is detected. In this embodiment, the middle layer performs a third preset operation according to the detected preset system data to complete task processing of the middle layer.
In some embodiments of the present invention, the preset system data includes touch key data and restore key data. Accordingly, a third predetermined control operation is performed according to the predetermined system data, including but not limited to:
and determining that the preset key data are touch key data, and executing corresponding preset key operation according to the touch key data. The touch key data comprises determination key data and cancellation key data, and the preset key operation comprises confirmation operation and cancellation operation.
Or determining the preset key data as recovery key data, exiting the middle layer task processing and performing system initialization.
In this embodiment, the preset system data includes touch key data and recovery key data. In particular, during the operation of the system, human-computer interaction is often required through touching the keys. In this embodiment, by detecting the preset system data, when it is determined that the preset key data is the touch key data, the corresponding preset key operation is executed according to the detected touch key data. The touch key data comprises determination key data and cancellation key data. Accordingly, the preset key operation includes a confirmation operation and a cancellation operation. For example, when the touch key data is determined to be the determination key data, the intermediate layer performs the determination operation according to a specific task processing situation. Or when the touch key data is determined to be the cancel key data, the middle layer executes cancel operation according to the specific task processing condition. Further, when the preset key data is determined to be the recovery key data, that is, the detected preset key data is the clear data key, the middle layer task processing is exited, and then the system initial processing is entered.
In some embodiments of the invention, the predetermined system data further comprises a system sleep flag. Correspondingly, the third preset control operation is performed according to the preset system data, which further includes but is not limited to:
and determining that the system sleep mark is detected, exiting the middle layer task processing and entering an upper layer sleep task.
In this embodiment, the preset system data further includes a system sleep flag. After the system is not operated for a long time, the system generates a system sleep flag. And after the middle layer determines that the system sleep mark is detected, the middle layer task processing is exited, and then the upper layer sleep task is entered. It should be noted that, when the system is in sleep, i.e. after entering the upper layer sleep task, the controller controlling the system will stop working. At this time, the bottom layer is required to detect corresponding driving data to trigger the wake-up system, such as fingerprint authentication data, password authentication data, and the like.
Referring to fig. 2, an embodiment of the present invention also provides an intelligent lock control system including:
at least one process 210.
At least one memory 220 for storing at least one program.
When the at least one program is executed by the at least one processor 210, the at least one processor 210 is caused to implement the intelligent lock control method as described in the above embodiments.
An embodiment of the present invention also provides a computer-readable storage medium storing computer-executable instructions for execution by one or more control processors, e.g., to perform the steps described in the above embodiments.
One of ordinary skill in the art will appreciate that all or some of the steps, systems, and methods disclosed above may be implemented as software, firmware, hardware, and suitable combinations thereof. Some or all of the physical components may be implemented as software executed by a processor, such as a central processing unit, digital signal processor, or microprocessor, or as hardware, or as an integrated circuit, such as an application specific integrated circuit. Such software may be distributed on computer readable media, which may include computer storage media (or non-transitory media) and communication media (or transitory media). The term computer storage media includes volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules or other data, as is well known to those of ordinary skill in the art. Computer storage media includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital Versatile Disks (DVD) or other optical disk storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and which can accessed by a computer. In addition, communication media typically embodies computer readable instructions, data structures, program modules or other data in a modulated data signal such as a carrier wave or other transport mechanism and includes any information delivery media as is well known to those skilled in the art.
While the preferred embodiments of the present invention have been described in detail, it will be understood by those skilled in the art that the foregoing and various other changes, omissions and deviations in the form and detail thereof may be made without departing from the scope of this invention.

Claims (10)

1. An intelligent lock control method is characterized by comprising the following steps:
acquiring drive data sent by a bottom layer; wherein the drive data is acquired by the underlying sensor;
determining that the driving data meets a first preset condition, generating a preset mark and sending the preset mark to an upper layer; the upper layer carries out first preset control operation according to the preset mark;
determining that the driving data meets a second preset condition, and executing emergency task operation;
and acquiring feedback data of the upper layer, and executing second preset control operation according to the feedback data.
2. The intelligent lock control method according to claim 1, wherein when the step of determining that the drive data satisfies a first preset condition and generating a preset flag is performed, the method further includes:
and determining that the driving data does not meet a first preset condition, and discarding the driving data.
3. The intelligent lock control method according to claim 1, wherein the second preset condition includes a prying-resistant alarm condition and a door virtual-closed condition;
the step of determining that the driving data meets a second preset condition and executing an emergency task operation comprises the following steps:
determining that the driving data meets the anti-prying alarm condition, and executing anti-prying alarm operation;
or determining that the driving data meets the door virtual closing condition, and executing door virtual closing alarm operation.
4. The intelligent lock control method according to claim 1, wherein the determining that the driving data satisfies a first preset condition and generating a preset flag includes:
determining that password authentication data is detected, and acquiring current password data; determining that the current password data meets a preset length condition, and setting a password authentication mark;
or, determining that fingerprint authentication data is detected, and acquiring the current fingerprint state; determining the current fingerprint state as an authentication state, and setting a fingerprint authentication mark;
or, determining that the card swiping authentication data is detected, and acquiring current card data; determining that the current card data meets a third preset condition, and setting a card swiping authentication mark; wherein the third preset condition comprises a card type and a card encryption condition.
5. The intelligent lock control method according to claim 1, wherein the feedback data includes an authentication error and an authentication completion;
the executing a second preset control operation according to the feedback data includes:
determining that the authentication error times meet preset times, locking a system and detecting system locking time; determining that the system locking time meets a preset locking duration, unlocking the system and clearing a system locking mark;
or determining that the feedback data is detected to be authentication completion, controlling the LED indicator lamp to recover the initialization state and clearing the LED indicator mark.
6. The intelligent lock control method according to claim 1, further comprising:
and detecting preset system data, and performing third preset control operation according to the preset system data.
7. The intelligent lock control method according to claim 6, wherein the preset system data includes touch key data and recovery key data;
and performing a third preset control operation according to the preset system data, wherein the third preset control operation comprises:
determining the preset key data as the touch key data, and executing corresponding preset key operation according to the touch key data; the touch key data comprise determination key data and cancellation key data, and the preset key operation comprises a confirmation operation and a cancellation operation;
or determining the preset key data as the recovery key data, exiting the middle layer task processing and performing system initialization.
8. The intelligent lock control method according to claim 6, wherein the preset system data further includes a system dormancy flag;
the third preset control operation is performed according to the preset system data, and the method further includes:
and determining that the system sleep mark is detected, exiting the middle layer task processing and entering an upper layer sleep task.
9. An intelligent lock control system, comprising:
at least one processor;
at least one memory for storing at least one program;
when executed by the at least one processor, the at least one program causes the at least one processor to implement the intelligent lock control method according to any one of claims 1 to 8.
10. A computer storage medium in which a processor-executable program is stored, wherein the processor-executable program, when executed by the processor, is for implementing the intelligent lock control method according to any one of claims 1 to 8.
CN202210944798.XA 2022-08-08 2022-08-08 Intelligent lock control method, system and storage medium Pending CN115311766A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210944798.XA CN115311766A (en) 2022-08-08 2022-08-08 Intelligent lock control method, system and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210944798.XA CN115311766A (en) 2022-08-08 2022-08-08 Intelligent lock control method, system and storage medium

Publications (1)

Publication Number Publication Date
CN115311766A true CN115311766A (en) 2022-11-08

Family

ID=83860305

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210944798.XA Pending CN115311766A (en) 2022-08-08 2022-08-08 Intelligent lock control method, system and storage medium

Country Status (1)

Country Link
CN (1) CN115311766A (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105243708A (en) * 2015-09-22 2016-01-13 中国船舶重工集团公司第七一八研究所 Intelligent lock internal hierarchical program and redundancy control framework
US20170017565A1 (en) * 2015-07-16 2017-01-19 Linkedin Corporation Hierarchical system-capability testing
CN107393069A (en) * 2017-07-17 2017-11-24 曹迪 Access control management method and system based on bluetooth MESH networking core technologies
CN108965297A (en) * 2018-07-18 2018-12-07 深圳旦倍科技有限公司 A kind of access control equipment management system
CN109983512A (en) * 2019-02-11 2019-07-05 深圳市汇顶科技股份有限公司 Data processing method, intelligent lock system and storage medium
CN112037491A (en) * 2020-06-10 2020-12-04 江苏方天电力技术有限公司 Intelligent security locking system based on wireless communication technology
CN112365634A (en) * 2020-10-14 2021-02-12 青岛海信智慧家居***股份有限公司 Method and device for pushing abnormal alarm based on intelligent door lock
US20210373982A1 (en) * 2020-05-28 2021-12-02 Arista Networks, Inc. Lock-free method of transmitting hierarchical collections through shared memory

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170017565A1 (en) * 2015-07-16 2017-01-19 Linkedin Corporation Hierarchical system-capability testing
CN105243708A (en) * 2015-09-22 2016-01-13 中国船舶重工集团公司第七一八研究所 Intelligent lock internal hierarchical program and redundancy control framework
CN107393069A (en) * 2017-07-17 2017-11-24 曹迪 Access control management method and system based on bluetooth MESH networking core technologies
CN108965297A (en) * 2018-07-18 2018-12-07 深圳旦倍科技有限公司 A kind of access control equipment management system
CN109983512A (en) * 2019-02-11 2019-07-05 深圳市汇顶科技股份有限公司 Data processing method, intelligent lock system and storage medium
US20210373982A1 (en) * 2020-05-28 2021-12-02 Arista Networks, Inc. Lock-free method of transmitting hierarchical collections through shared memory
CN112037491A (en) * 2020-06-10 2020-12-04 江苏方天电力技术有限公司 Intelligent security locking system based on wireless communication technology
CN112365634A (en) * 2020-10-14 2021-02-12 青岛海信智慧家居***股份有限公司 Method and device for pushing abnormal alarm based on intelligent door lock

Similar Documents

Publication Publication Date Title
US20210357488A1 (en) Fingerprint Recognition Method and Apparatus, and Touchscreen Terminal
CN104933337B (en) A kind of method and intelligent terminal for realizing unlocked by fingerprint
CN104392157B (en) Method and device for locking screen by using passwords
US7480805B1 (en) Method and system for identifying and processing an unauthorized access request
CN101551837B (en) Method for switching user accounts and computer
JP2005084991A (en) Terminal user monitoring system
CN107364423A (en) A kind of vehicle control system and control method based on fingerprint recognition
US11358566B2 (en) In-vehicle complex biometric authentication system and operation method thereof
CN108734838B (en) Intelligent lock with video-based biological feature verification device
US20210229633A1 (en) Biometric user authenticating keys for vehicles and methods of use
KR20160041432A (en) Alert method and system of fingerprint reader
CN109389709A (en) Unlocking control system and unlocking control method
WO2023193778A1 (en) Vehicle traveling control method and apparatus, and electronic device
CN109979047A (en) Multi net voting intelligent door lock control method, storage medium, controller and Fingerprint Lock
KR20220032191A (en) vehicle, and controlling method thereof
CN110223430A (en) A kind of control method of electronic lock, device and electronic lock
CN105023321A (en) Anti-hijacking smart lock and anti-hijacking method
CN110388138A (en) A kind of method, door-locking system and the door lock of automatically prompting user replacement unlocking pin
CN110194123A (en) Vehicle starting method and system, vehicle under a kind of no key status
CN115311766A (en) Intelligent lock control method, system and storage medium
CN106506843A (en) A kind of theft preventing method and mobile terminal
CN112102524A (en) Unlocking method and unlocking system
EP3757949B1 (en) Fingerprint module, fingerprint recognition system, control method, and smart lock
CN211479672U (en) Engineering equipment control system based on offline iris recognition and voice recognition
CN109063429B (en) Intelligent home security control system based on gestures and control method thereof

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination