patents.google.com

CN115346295A - Door lock state collection method, medium and equipment based on identification analysis and block chain - Google Patents

  • ️Tue Nov 15 2022

Disclosure of Invention

The embodiment of the application provides a door lock state collection method, medium and equipment based on identification analysis and a block chain, and aims to solve the technical problems.

According to a first aspect of the embodiments of the present application, a method for collecting a state of a door lock based on identity resolution and a block chain is provided, and is applied to a security authentication service platform, where the method includes:

receiving an unlocking request forwarded by an active identification carrier deployed in an intelligent door lock; the unlocking request carries an industrial internet identifier of the terminal equipment associated with the intelligent door lock and a user image;

detecting whether any one of a plurality of preset gestures corresponding to the industrial Internet identification exists in the user image through a neural network model;

under the condition that a target preset gesture in the preset gestures exists in the user image, controlling the intelligent door lock to execute unlocking operation, and acquiring target state data of the intelligent door lock corresponding to the target preset gesture;

and sending the target state data to the terminal equipment.

In an optional example, the obtaining target state data of the intelligent door lock corresponding to the target predetermined gesture includes:

determining a target time period corresponding to the target preset gesture;

acquiring first state data of the intelligent door lock corresponding to the target time period;

determining a target state dimension corresponding to the target preset gesture;

acquiring second state data corresponding to the target state dimension from the first state data;

determining the target state data based on the second state data.

In one alternative example of this, the user may,

the method further comprises the following steps:

receiving state data of the intelligent door lock periodically reported by the active identification carrier;

locally storing the state data reported by the active identification carrier;

the acquiring of the target state data of the intelligent door lock corresponding to the target preset gesture comprises:

under the condition that the target state data are locally stored, acquiring the target state data from the local;

and under the condition that the target state data is not stored locally, sending a state data acquisition instruction to the active identification carrier according to the preset gesture, and determining the target state data based on the state data returned by the active identification carrier in response to the state data acquisition instruction.

In one alternative example of this, the user may,

after the target state data of the intelligent door lock corresponding to the target preset gesture is obtained, the method further comprises the following steps:

detecting abnormal data in the target state data;

adding an abnormal prompt mark for the abnormal data;

the sending the target state data to the terminal device includes:

and sending the target state data added with the abnormal prompt mark to the terminal equipment.

In an optional example, the sending the target status data to the terminal device includes:

determining a target verification algorithm corresponding to the target preset gesture;

determining a first target check value corresponding to the target state data by using the target check algorithm;

and sending the target state data and the first target check value to the terminal equipment together.

In an optional example, after the target state data corresponding to the target predetermined gesture of the smart door lock is obtained, the method further comprises:

and uploading the target state data to a block chain for storage.

According to a second aspect of the embodiments of the present application, there is provided a method for collecting a door lock state based on identity resolution and a block chain, which is applied to a terminal device associated with an intelligent door lock, the method including:

sending an unlocking request to an active identification carrier deployed in the intelligent door lock; the unlocking request carries an industrial internet identifier of the terminal equipment and a user image;

receiving target state data sent by a security authentication service platform under the condition that a target preset gesture exists in the user image; the target preset gesture is any one of a plurality of preset gestures corresponding to the industrial internet identification, and the target state data is state data of the intelligent door lock corresponding to the target preset gesture;

and outputting the target state data.

In one alternative example of this, the user may,

the receiving of the target state data sent by the security authentication service platform under the condition that the target preset gesture exists in the user image includes:

receiving target state data and a first target check value which are sent by a security authentication service platform under the condition that a target preset gesture exists in the user image;

the method further comprises the following steps:

verifying the target state data based on the first target verification value;

and if the verification of the target state data passes, executing the step of outputting the target state data.

According to a third aspect of embodiments of the present application, there is provided a computer storage medium having stored thereon a computer program which, when executed by a processor, performs the steps of the method according to the first or second aspect.

According to a fourth aspect of embodiments herein, there is provided an electronic device comprising memory for storing one or more programs, and one or more processors; the one or more programs, when executed by the one or more processors, implement the method of the first or second aspects as described above.

In the scheme provided by the embodiment of the application, the security authentication service platform can receive an unlocking request which is forwarded by an active identification carrier deployed in the intelligent door lock and carries an industrial internet identification and a user image, detect whether any one of a plurality of preset gestures corresponding to the industrial internet identification exists in the user image through a neural network model, control the intelligent door lock to execute unlocking operation if a target preset gesture of the plurality of preset gestures exists in the user image, acquire target state data of the intelligent door lock corresponding to the target preset gesture, and send the target state data to the terminal device. Therefore, the user only needs to make a specific gesture when initiating an unlocking request, namely corresponding state data can be provided for the user according to the user requirement while controlling the intelligent door lock to be unlocked, for example, when the user makes a preset gesture, the residual electric quantity information of the intelligent door lock can be provided for the user, and when the user makes another preset gesture, the opening and closing state information of the intelligent door lock can be provided for the user, so that the requirement that the user knows the state of the intelligent door lock under various conditions can be met.

Detailed Description

Referring to fig. 1, a flowchart of a method for collecting a status of a door lock based on identity resolution and a blockchain according to an embodiment of the present application is shown. As shown in fig. 1, the method is applied to a security authentication service platform, and includes

steps

110, 120, 130 and 140, which are described below.

Step

110, receiving an unlocking request forwarded by an active identification carrier deployed in an intelligent door lock; the unlocking request carries the industrial internet identification of the terminal equipment associated with the intelligent door lock and the user image.

It should be noted that the active identification carrier may be generally embedded in the industrial device, carries the industrial internet identification code and necessary security certificate, algorithm and key thereof, and has a networking communication function, and can actively initiate connection to the identification resolution service node or the identification data application platform, and the like, without being triggered by the identification read-write device. In this embodiment of the application, the active identifier carrier may be embedded in the smart door lock, the active identifier carrier may be a Universal Integrated Circuit Card (UICC), and the security authentication service platform may also be referred to as an active identifier carrier security authentication service platform. In addition, the terminal device associated with the smart door lock can be a mobile terminal such as a mobile phone and a tablet computer.

In the embodiment of the application, a user can initiate an unlocking request to the active identification carrier through the terminal equipment associated with the intelligent door lock, the unlocking request can carry the industrial internet identification of the terminal equipment, and the user image of the user is acquired in real time through the camera. After receiving the unlocking request from the terminal device, the active identification carrier can forward the unlocking request to the security authentication service platform, so that the security authentication service platform can receive the unlocking request.

And 120, detecting whether any one of a plurality of preset gestures corresponding to the industrial internet identification exists in the user image through the neural network model.

It should be noted that a plurality of corresponding predetermined gestures may be set in advance for the industrial internet identifier of the terminal device, and the plurality of predetermined gestures include, but are not limited to, an OK gesture, a fist making gesture, a five-finger opening gesture, and the like. In addition, a neural network model capable of detecting a predetermined gesture may be trained in advance, and the neural network model trained in advance may be a convolutional neural network model.

In

step

120, a user image may be extracted from the unlocking request and provided as an input to a pre-trained neural network model, so that the neural network model operates accordingly to determine whether any one of a plurality of predetermined gestures exists in the user image.

In an alternative example, the plurality of predetermined gestures are specifically 3 predetermined gestures, that is, a predetermined gesture 1, a predetermined gesture 2, and a predetermined gesture 3, and after the user image is provided as an input to the trained neural network model, the neural network model may output, through operation, a probability value P1 that the predetermined gesture 1 exists in the user image, a probability value P2 that the predetermined gesture 2 exists in the user image, and a probability value P3 that the predetermined gesture 3 exists in the user image.

Next, the probability values P1, P2, P3 may be compared with preset probability values (e.g., 0.7, 0.8, etc.), respectively. If the probability value P1, the probability value P2, and the probability value P3 are all less than or equal to the preset probability value, it may be determined that any one of the predetermined gesture 1, the predetermined gesture 2, and the predetermined gesture 3 does not exist in the user image. If only the probability value P2 of the probability values P1, P2, and P3 is greater than the preset probability value, it may be determined that the predetermined gesture 2 exists in the user image, and at this time, the predetermined gesture 2 may be used as a target predetermined gesture hereinafter.

And step 130, controlling the intelligent door lock to execute unlocking operation under the condition that a target preset gesture in a plurality of preset gestures exists in the user image, and acquiring target state data of the intelligent door lock corresponding to the target preset gesture.

Aiming at the condition that the target preset gesture exists in the user image, the safety certification service platform can send an unlocking instruction to the active identification carrier, so that the active identification carrier responds to the unlocking instruction and controls the intelligent door lock to execute unlocking operation.

For the situation that the target preset gesture exists in the user image, the security authentication service platform can also acquire target state data of the intelligent door lock corresponding to the target preset gesture, wherein the target state data includes but is not limited to the on-off state, the power state, the position state and the like of the intelligent door lock.

In one embodiment, acquiring target state data of the intelligent door lock corresponding to a target predetermined gesture includes:

determining a target time period corresponding to the target preset gesture;

acquiring first state data of the intelligent door lock corresponding to a target time period;

determining a target state dimension corresponding to a target preset gesture;

acquiring second state data corresponding to the target state dimension from the first state data;

based on the second state data, target state data is determined.

It should be noted that, a correspondence relationship between the predetermined gesture and the time period (for convenience of description, it is hereinafter referred to as a first correspondence relationship) may be set in advance, and a correspondence relationship between the predetermined gesture and the state dimension (for convenience of description, it is hereinafter referred to as a second correspondence relationship) may be set.

Alternatively, in the first correspondence, the predetermined gesture 1 may correspond to the last day, the predetermined gesture 2 may correspond to the last 1 week, and the predetermined gesture 3 may correspond to the last month.

Optionally, in the second corresponding relationship, the predetermined gesture 1 may correspond to a switch state dimension, the predetermined gesture 2 may correspond to a power state dimension, and the predetermined gesture 3 may correspond to a position state dimension.

In this embodiment, a target time period corresponding to the target predetermined gesture may be determined according to the first corresponding relationship, and first state data corresponding to the target time period may be acquired, where the first state data may be used to indicate states of the intelligent door lock in each state dimension in the target time period. Next, according to the second corresponding relationship, a target state dimension corresponding to the target predetermined gesture may be determined, and second state data corresponding to the target state dimension may be acquired from the first state data, where the second state data may be used to indicate a state of the smart door lock in the target state dimension in the target time period. The target state data may then be determined based on the second state data, for example, the second state data may be directly determined as the target state data, and for example, significantly erroneous data may be deleted from the second state data to obtain updated second state data, and the updated second state data may be determined as the target state data.

In the implementation mode, the target time period and the target state dimension corresponding to the target preset gesture are referred, and the target state data can be efficiently and quickly acquired.

In the above embodiment, the target state data may be acquired with reference to the target time period and the target state dimension at the same time, and in concrete implementation, the target state data may be acquired with reference to only the target time period or the target state dimension, for example, the first state data of the smart door lock corresponding to the target time period may be directly used as the target state data, and for example, the third state data of the smart door lock corresponding to the target state dimension may be directly used as the target state data.

In a further embodiment of the method according to the invention,

the method further comprises the following steps:

receiving state data of the intelligent door lock periodically reported by the active identification carrier;

locally storing state data reported by the active identification carrier;

acquiring target state data of the intelligent door lock corresponding to a target preset gesture, wherein the target state data comprises the following steps:

under the condition that target state data are locally stored, acquiring the target state data from the local;

and under the condition that target state data are not stored locally, sending a state data acquisition instruction to the active identification carrier according to a preset gesture, and generating the target state data based on the state data returned by the active identification carrier in response to the state data acquisition instruction.

Optionally, the active identification carrier may actively report the current state data of the intelligent door lock to the security authentication service platform every a preset time period from a certain time; the preset time period may be 5 seconds, 10 seconds, 30 seconds, 1 minute, 5 minutes, etc., which are not listed here.

After receiving the status data reported by the active identification carrier each time, the security authentication service platform may store the received status data locally, for example, store the received status data in a local power-down non-lost storage area, so that a large amount of status data may be stored in the security authentication service platform.

And then, under the condition that an unlocking request forwarded by the active identification carrier is received and a target preset gesture exists in a user image in the unlocking request, the security authentication service platform can traverse the locally stored state data to determine whether the target state data corresponding to the target preset gesture exists in the locally stored state data or not. If the determination result is that the target state data exists, the target state data can be directly acquired from the local. If the determination result is that the target state data does not exist, a state data acquisition instruction can be sent to the active identification carrier, and optionally, the state data acquisition instruction can carry a target state dimension and a target time period corresponding to the target preset gesture, so that the active identification carrier can return second state data to the security authentication service platform in response to the state data acquisition instruction, and the security authentication service platform can determine the target state data based on the second state data.

In this embodiment, the security authentication service platform may preferentially acquire the target state data from the local, and if the target state data cannot be acquired locally, the security authentication service platform may interact with the active identification carrier to acquire the target state data, which is beneficial to ensuring successful and rapid acquisition of the target state data.

Step

140, sending the target status data to the terminal device.

Optionally, the security authentication service platform may send the target state data ciphertext to the terminal device.

After receiving the target state data from the security authentication service platform, the terminal device may output the target state data, for example, the terminal device may display the target state data through a display screen, for example, the terminal device may convert the target state data into voice, and play the converted voice through a voice playing device, for example, the terminal device may send the target state data to a mailbox of a user.

After receiving the target state data from the security authentication service platform, the terminal device may further perform analysis processing on the target state data. For example, if the terminal device obtains the current remaining power of the intelligent door lock based on the target state data, and when the current remaining power of the intelligent door lock is less than a predetermined percentage (e.g., less than 10%), it may be determined that the current remaining power of the intelligent door lock is insufficient, at this time, the terminal device may estimate the remaining usage duration of the intelligent door lock, and output a door lock power shortage prompt message indicating the remaining usage duration in the form of voice, text, and the like, for example, output a text "still usable door lock for 36 days, please replace the battery or charge in time", so as to prompt the user to replace the battery of the intelligent door lock in time or charge the intelligent door lock in time. For another example, if the terminal device determines that the intelligent door lock is in the open state within the last period of time (for example, within the last half hour) based on the target state data, it may be determined that the intelligent door lock is in the abnormal open state, and at this time, the terminal device may output a door lock abnormality prompt message in the form of voice, text, or the like, so as to prompt the user to check whether the intelligent door lock is working normally in time.

In the embodiment of the application, the safety certification service platform can receive an unlocking request which is forwarded by an active identification carrier deployed in the intelligent door lock and carries an industrial internet identification and a user image, detect whether any one of a plurality of preset gestures corresponding to the industrial internet identification exists in the user image through a neural network model, control the intelligent door lock to execute unlocking operation if a target preset gesture in the plurality of preset gestures exists in the user image, acquire target state data of the intelligent door lock corresponding to the target preset gesture, and send the target state data to the terminal device. Therefore, the user only needs to make a specific gesture when initiating an unlocking request, namely corresponding state data can be provided for the user according to the user requirement while controlling the intelligent door lock to be unlocked, for example, when the user makes a preset gesture, the residual electric quantity information of the intelligent door lock can be provided for the user, and when the user makes another preset gesture, the opening and closing state information of the intelligent door lock can be provided for the user, so that the requirement that the user knows the state of the intelligent door lock under various conditions can be met.

Based on the embodiment shown in fig. 1, as shown in fig. 2, after

step

130, the method further comprises

step

132 and

step

134.

Step

132, detecting abnormal data in the target state data.

Assuming that the target state data includes first data, the first data is used to indicate that the remaining capacity of the intelligent door lock at time t1 is 5% (which is less than 10% of the predetermined percentage), and it should be ensured that the remaining capacity is greater than or equal to the predetermined percentage in the normal state of the intelligent door lock, obviously, the information indicated by the first data is inconsistent with the normal state, and therefore, it can be determined that the first data is abnormal data.

The target state data includes second data, the second data is used for indicating that the intelligent door lock is in an open state in the last half hour, and the intelligent door lock cannot be opened for a long time under a normal condition.

And step 134, adding an exception prompt mark to the exception data.

Alternatively, the abnormality indication mark may be in the form of characters, such as "0", "x", and the like.

Step

140, comprising

step

1401.

And 1401, sending the target state data with the abnormal data added with the abnormal prompt mark to the terminal equipment.

After receiving the target state data from the security authentication service platform, the terminal device can output the target state data, and due to the fact that the abnormal data in the target state data are added with the abnormal prompt marks, through the indication effect of the abnormal prompt marks, a user can quickly look up the abnormal data in the target state data and timely perform corresponding processing aiming at the abnormal conditions, so that normal and effective work of the intelligent door lock is guaranteed, for example, when the remaining electric quantity of the intelligent door lock is insufficient, a battery or a charging is timely replaced for the intelligent door lock.

Based on the embodiment shown in fig. 1, as shown in fig. 3,

step

140 includes:

and 1402, determining a target verification algorithm corresponding to the target preset gesture.

It should be noted that the correspondence between the predetermined gesture and the verification algorithm may be preset (for convenience of description, it is referred to as a third correspondence hereinafter).

Alternatively, in the third correspondence, the predetermined gesture 1 may correspond to a Cyclic Redundancy Check (CRC) algorithm, the predetermined gesture 2 may correspond to a parity algorithm, and the predetermined gesture 3 may correspond to a hash algorithm.

In

step

1402, a target verification algorithm corresponding to the target predetermined gesture may be determined according to the third corresponding relationship.

Step

1404, determining a first target check value corresponding to the target state data by using a target check algorithm.

In

step

1404, a target verification algorithm may be used to perform a verification operation on the target state data to obtain a first target verification value, for example, in the case that the target verification algorithm is a hash algorithm, the target state data may be subjected to a hash operation, and the obtained hash value is used as the first target verification value.

Step

1406, the target state data and the first target verification value are sent to the terminal device together.

In the embodiment of the application, a first target verification value is determined by using a target verification algorithm corresponding to a target preset gesture, and target state data and the first target verification value are sent to the terminal device together.

Specifically, the terminal device may perform a calibration operation on the received target calibration data by using a target calibration algorithm to obtain a second target calibration value, and compare the second target calibration value with the first target calibration value.

If the second target verification value is the same as the first target verification value, it may be determined that the verification of the received target status data passes, and no error occurs in the received target verification data during transmission, so that the terminal device may perform the step of outputting the received target status data.

If the second target identifier is different from the first target verification value, it may be determined that the received target status data is not verified, and the received target verification data is erroneous in the transmission process, so that the terminal device may not perform the step of outputting the received target status data, which may avoid providing erroneous status data to the user.

Therefore, in the embodiment of the application, the target state data and the first target check value are sent to the terminal device together, so that the correctness of the state data provided for the user by the terminal device is favorably ensured.

On the basis of the embodiment shown in fig. 1, as shown in fig. 4, after

step

130, the method further comprises

step

150.

And 150, uploading the target state data to a block chain for storage.

In the embodiment of the application, the security certification service platform can upload the target state data to the block chain for trusted certificate storage, so that the user can subsequently look up the target state data based on the block chain.

Referring to fig. 5, a flowchart of a method for collecting a door lock status based on identity resolution and a blockchain according to an embodiment of the present application is shown. As shown in fig. 5, the method is applied to a terminal device associated with an intelligent door lock, and includes

steps

510, 520 and 530.

Step

510, sending an unlocking request to an active identification carrier deployed in the intelligent door lock; the unlocking request carries the industrial Internet identification of the terminal equipment and the user image.

Step

520, receiving target state data sent by the security authentication service platform under the condition that a target preset gesture exists in the user image; the target preset gesture is any one of a plurality of preset gestures corresponding to the industrial internet identification, and the target state data is state data of the intelligent door lock corresponding to the target preset gesture.

Step

530, outputting the target state data.

In the embodiment of the application, the terminal device associated with the intelligent door lock can send the unlocking request carrying the industrial internet identification of the terminal device and the user image to the active identification carrier deployed in the intelligent door lock, the active identification carrier can forward the received unlocking request to the security authentication service platform, the security authentication service platform can send target state data of the intelligent door lock corresponding to the target preset gesture to the terminal device under the condition that the target preset gesture exists in the user image, and the terminal device can subsequently output the target state data. Therefore, the user only needs to make a specific gesture when initiating an unlocking request, namely corresponding state data can be provided for the user according to the user requirements while controlling the intelligent door lock to be unlocked, for example, when the user makes a preset gesture, the remaining power information of the intelligent door lock can be provided for the user, and when the user makes another preset gesture, the opening and closing state information of the intelligent door lock can be provided for the user, so that the requirement that the user knows the state of the intelligent door lock under various conditions can be met.

In one alternative example of this, the user may,

receiving target state data sent by a security authentication service platform under the condition that a target preset gesture exists in a user image, wherein the target state data comprises:

receiving target state data and a first target check value which are sent by a security authentication service platform under the condition that a target preset gesture exists in a user image;

the method further comprises the following steps:

checking the target state data based on the first target check value;

and executing the step of analyzing and processing the target state data when the verification of the target state data passes.

In the embodiment of the application, the security authentication service platform sends the target state data and the first target check value to the terminal device together under the condition that the target preset gesture exists in the user image, the terminal device can judge whether the received target state data is wrong in the transmission process based on the first target check value, and the correctness of the state data provided for the user by the terminal device is favorably ensured by utilizing the judgment result.

Based on the same inventive concept, an embodiment of the present application provides a computer storage medium, where a computer program is stored on the computer storage medium, and when the computer program is executed by a processor, the computer program implements the following steps:

receiving an unlocking request forwarded by an active identification carrier deployed in an intelligent door lock; the unlocking request carries an industrial internet identifier of the terminal equipment associated with the intelligent door lock and a user image;

detecting whether any one of a plurality of predetermined gestures corresponding to the industrial Internet identification exists in the user image through a neural network model;

under the condition that a target preset gesture in a plurality of preset gestures exists in a user image, controlling the intelligent door lock to execute unlocking operation, and acquiring target state data of the intelligent door lock corresponding to the target preset gesture;

and sending the target state data to the terminal equipment.

In an alternative example, the computer program when executed by the processor embodies the steps of:

determining a target time period corresponding to the target preset gesture;

acquiring first state data of the intelligent door lock corresponding to a target time period;

determining a target state dimension corresponding to a target preset gesture;

acquiring second state data corresponding to the target state dimension from the first state data;

based on the second state data, target state data is determined.

In one alternative example of this, the user may,

the computer program when executed by a processor further realizes the steps of:

receiving state data of the intelligent door lock periodically reported by the active identification carrier;

locally storing state data reported by the active identification carrier;

the computer program when executed by a processor embodies the steps of:

under the condition that target state data are locally stored, acquiring the target state data from the local;

and under the condition that the target state data is not stored locally, sending a state data acquisition instruction to the active identification carrier according to a preset gesture, and determining the target state data based on the state data returned by the active identification carrier in response to the state data acquisition instruction.

In one alternative example of this, the user may,

the computer program when executed by the processor further implements the steps of:

after target state data of the intelligent door lock corresponding to the target preset gesture are obtained, abnormal data in the target state data are detected;

adding an abnormal prompt mark for abnormal data;

the computer program when executed by a processor embodies the steps of:

and sending the target state data with the abnormal data added with the abnormal prompt mark to the terminal equipment.

In an alternative example, the computer program when executed by the processor embodies the steps of:

determining a target verification algorithm corresponding to the target preset gesture;

determining a first target check value corresponding to the target state data by using a target check algorithm;

and sending the target state data and the first target check value to the terminal equipment.

In an alternative example, the computer program when executed by the processor further implements the steps of:

and after the target state data of the intelligent door lock corresponding to the target preset gesture are obtained, uploading the target state data to the block chain for storage.

Based on the same inventive concept, an embodiment of the present application provides a computer storage medium, where a computer program is stored on the computer storage medium, and when the computer program is executed by a processor, the computer program implements the following steps:

sending an unlocking request to an active identification carrier deployed in the intelligent door lock; the unlocking request carries an industrial internet identifier of the terminal equipment and a user image;

receiving target state data sent by a security authentication service platform under the condition that a target preset gesture exists in a user image; the target preset gesture is any one of a plurality of preset gestures corresponding to the industrial internet identification, and the target state data is state data of the intelligent door lock corresponding to the target preset gesture;

and outputting the target state data.

In an alternative example, the computer program when executed by the processor embodies the steps of:

receiving target state data and a first target check value which are sent by a security authentication service platform under the condition that a target preset gesture exists in a user image;

the computer program when executed by the processor further implements the steps of:

checking the target state data based on the first target check value;

and if the verification of the target state data passes, executing the step of outputting the target state data.

Based on the same inventive concept, the present embodiment provides an electronic device, see fig. 6, comprising a

memory

601, a

processor

602, a

bus

603, and a computer program stored on the

memory

601 and executable on the

processor

602.

It should be noted that the electronic device may be a security authentication service platform or a terminal device associated with the intelligent door lock.

If the electronic device is a security authentication service platform, the

processor

602 implements the following steps when executing the computer program:

receiving an unlocking request forwarded by an active identification carrier deployed in an intelligent door lock; the unlocking request carries an industrial internet identifier of the terminal equipment associated with the intelligent door lock and a user image;

detecting whether any one of a plurality of preset gestures corresponding to the industrial internet identification exists in the user image through a neural network model;

under the condition that a target preset gesture in a plurality of preset gestures exists in a user image, controlling the intelligent door lock to execute unlocking operation, and acquiring target state data of the intelligent door lock corresponding to the target preset gesture;

and sending the target state data to the terminal equipment.

In an alternative example, the

processor

602, when executing the computer program, implements the following steps:

determining a target time period corresponding to the target preset gesture;

acquiring first state data of the intelligent door lock corresponding to a target time period;

determining a target state dimension corresponding to a target preset gesture;

acquiring second state data corresponding to the target state dimension from the first state data;

based on the second state data, target state data is determined.

In one alternative example of this, the user may,

the

processor

602, when executing the computer program, further performs the steps of:

receiving state data of the intelligent door lock periodically reported by the active identification carrier;

locally storing state data reported by the active identification carrier;

the following steps are specifically implemented when the

processor

602 executes the computer program:

under the condition that target state data are locally stored, acquiring the target state data from the local;

and under the condition that target state data are not stored locally, sending a state data acquisition instruction to the active identification carrier according to a preset gesture, and determining the target state data based on the state data returned by the active identification carrier in response to the state data acquisition instruction.

In one alternative example of this, the user may,

the

processor

602, when executing the computer program, further performs the steps of:

after target state data of the intelligent door lock corresponding to the target preset gesture are obtained, abnormal data in the target state data are detected;

adding an abnormal prompt mark for abnormal data;

the following steps are specifically implemented when the

processor

602 executes the computer program:

and sending the target state data with the abnormal data added with the abnormal prompt mark to the terminal equipment.

In an alternative example, the

processor

602, when executing the computer program, implements the following steps:

determining a target verification algorithm corresponding to the target preset gesture;

determining a first target check value corresponding to the target state data by using a target check algorithm;

and sending the target state data and the first target check value to the terminal equipment.

In an alternative example, the

processor

602, when executing the computer program, further performs the steps of:

and after the target state data of the intelligent door lock corresponding to the target preset gesture are obtained, uploading the target state data to the block chain for storage.

If the electronic device is a terminal device associated with the smart door lock, the

processor

602 implements the following steps when executing the computer program:

sending an unlocking request to an active identification carrier deployed in the intelligent door lock; the unlocking request carries an industrial internet identifier of the terminal equipment and a user image;

receiving target state data sent by a security authentication service platform under the condition that a target preset gesture exists in a user image; the target preset gesture is any one of a plurality of preset gestures corresponding to the industrial internet identification, and the target state data is state data of the intelligent door lock corresponding to the target preset gesture;

and outputting the target state data.

In an alternative example, the

processor

602, when executing the computer program, implements the following steps:

receiving target state data and a first target check value which are sent by a security authentication service platform under the condition that a target preset gesture exists in a user image;

the following steps are specifically implemented when the

processor

602 executes the computer program:

checking the target state data based on the first target check value;

and if the verification of the target state data passes, executing the step of outputting the target state data.

As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.

The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.

These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.

These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.

While the preferred embodiments of the present application have been described, additional variations and modifications in those embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims be interpreted as including the preferred embodiment and all changes and modifications that fall within the scope of the present application.

It will be apparent to those skilled in the art that various changes and modifications may be made in the present application without departing from the spirit and scope of the application. Thus, if such modifications and variations of the present application fall within the scope of the claims of the present application and their equivalents, the present application is intended to include such modifications and variations as well.