CN104009845A - Wireless password access device and method - Google Patents
Wireless password access device and method Download PDFInfo
- Publication number
- CN104009845A CN104009845A CN201410187641.2A CN201410187641A CN104009845A CN 104009845 A CN104009845 A CN 104009845A CN 201410187641 A CN201410187641 A CN 201410187641A CN 104009845 A CN104009845 A CN 104009845A
- Authority
- CN
- China
- Prior art keywords
- access device
- external equipment
- wireless
- password
- microprocessor
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Abstract
The invention discloses a wireless password access device and method, and belongs to the technical field of digital authentication. The device comprises a microprocessor, a storage device, a wireless signal transmitting and receiving module, a position sensor and a prompting module. The storage device is used for recording bound external equipment and recording user names and passwords of websites or applications. The wireless signal transmitting and receiving module is used for carrying out data interaction with the external equipment. The position sensor is used for sensing the horizontal position and the vertical position of the device and transmitting the position information to the microprocessor. The prompting module is used for transmitting prompting signals under control of the microprocessor. The microprocessor is connected with the storage device, the wireless signal transmitting and receiving module, the position sensor and the prompting module. The device can store many groups of the user names/ passwords of users, the trouble of memorizing the user names/passwords is saved for the users, and convenience of identity authentication is improved. According to the wireless password access device and method, automatic login of the websites and the applications can be achieved, and the practicality value is high.
Description
Technical field
The invention belongs to digital identification authentication technical field, relate in particular to a kind of wireless cipher access device and method.
Background technology
Along with popularizing of the Internet, people use the behavior of computer or mobile terminal day by day frequent, and the operation that wherein needs username and password to login various websites (shopping website, forum, social networks etc.) almost occurs every day.General user, for safety, uses different username and passwords for different web sites.
Yet a plurality of username and passwords are that user record has been brought difficulty: if be recorded on paper, have the risk of losing; If be recorded in computer or mobile phone, there is the risk of illegally being stolen.
Generally speaking, the problem that existing coded access mode exists is mainly summed up as: convenience is low, poor stability, and versatility is low.
Summary of the invention
The object of the invention is: in order to overcome the deficiencies in the prior art, a kind of wireless cipher access device and method are provided, these apparatus and method are applicable to the external equipments such as Intelligent mobile equipment, common computer, can be by the automatic input of these apparatus and method completing user name and password when user's Website login or application.
Specifically, wireless cipher access device of the present invention is to adopt following technical scheme to realize, and comprises microprocessor, memory, wireless signal transmission and receiver module, position sensor, reminding module, wherein:
Memory is for recording the external equipment of binding and recording website or the user name and password of application;
Wireless signal transmission and receiver module are for carrying out data interaction with external equipment;
Position sensor is used for the horizontal and vertical position of induction installation and passes to microprocessor;
Reminding module for sending cue under the control of microprocessor;
Microprocessor is connected with memory, wireless signal transmission and receiver module, position sensor, reminding module respectively;
Wireless signal transmission and receiver module receive from the logging request of external equipment and turn to microprocessor to send; Microprocessor, after this logging request is responded, is resolved logging request and is passed through memory comparison information; If the external equipment information of having bound of memory record is consistent with the implementor name in logging request, simultaneous memory has recorded website to be logined or applied corresponding login username and password, microprocessor sends to wireless signal transmission and receiver module by the login username and the password that are recorded in memory; Wireless signal transmission and receiver module are received after login username and password the user name and password returning to external equipment.
Technique scheme is further characterized in that, described reminding module is buzzer, and described cue is the prompt tone that buzzer sends.
Technique scheme is further characterized in that, also comprises button, and described button is also for responding the logging request from external equipment.
Technique scheme is further characterized in that, it is characterized in that, described button is physical button or Touch control key.
Technique scheme is further characterized in that, the horizontal and vertical position calculation element of the device that microprocessor sends according to position sensor and the distance between external equipment.
Wireless cipher access method disclosed by the invention, utilizes above-mentioned wireless cipher access device to carry out wireless cipher access, comprises the following steps:
1) wireless cipher access device is bound by wireless signal transmission and receiver module and external equipment, and in the external equipment information of memory record binding;
2) the Password Management client modules on external equipment is registered the title of website to be logined or application and corresponding login username and password thereof, and the title of website to be logined or application and corresponding login username and password thereof are sent to wireless cipher access device, wireless cipher access device by above-mentioned information recording in memory;
3) when needs are externally on equipment when Website login or application, Password Management client modules on external equipment sends logging request to wireless cipher access device, and logging request comprises the implementor name of the external equipment that sends logging request, website to be logined or the title of application;
The wireless signal transmission of wireless cipher access device and receiver module are transmitted to microprocessor by logging request after receiving logging request;
4) microprocessor waits for that whether this logging request is by corresponding: as this logging request in setting-up time is responded, microprocessor is resolved logging request and passed through memory comparison information; Otherwise, microprocessor control reminding module sends cue prompting and resends logging request, if the logging request resending is not also responded or wireless cipher access device is not received the logging request resending, microprocessor is controlled reminding module and is sent cue prompting login failure, method ends;
If the external equipment information of having bound of memory record is consistent with the implementor name in logging request, simultaneous memory has recorded website to be logined or applied corresponding login username and password, microprocessor sends to the login username and the password that are recorded in memory wireless signal transmission and receiver module and by reminding module, sends cue prompting login license simultaneously; Otherwise reminding module sends cue prompting login failure under the control of microprocessor, and method ends;
Wireless signal transmission and receiver module are received after login username and password the Password Management client modules on the user name and password returning to external equipment;
5) Password Management client modules obtains after login username and password, automatically the login username of obtaining and password is input to the website of external equipment or applies log-in interface, realizes the automatic login of website or application.
Technique scheme is further characterized in that, in described step 4), if wireless cipher access device does not comprise button, the change in location by position sensor induction installation responds the logging request from external equipment, if wireless cipher access device comprises button, pass through button or pass through the change in location response of position sensor induction installation from the logging request of external equipment.
Technique scheme is further characterized in that, also comprises and is specially the alert step of looking for something:
A1) safe distance of wireless cipher access device and external equipment is set;
A2) when wireless cipher access device looking for something of receiving that Password Management client modules on external equipment sends to wireless cipher access device reported to the police request, by reminding module, sending cue prompting finds, position sensor is activated simultaneously, and constantly calculates the distance between wireless cipher access device and external equipment;
A3) as the distance between wireless cipher access device and external equipment has surpassed safe distance, by reminding module, send cue tip distance and report to the police.
Technique scheme is further characterized in that, when wireless cipher access device is not received from the relevant information of external equipment or request in setting-up time, wireless cipher access device enters low-power consumption resting state, when external equipment sends relevant information or request to wireless cipher access device, wireless cipher access device wakes up from low-power consumption resting state.
Beneficial effect of the present invention is as follows: apparatus of the present invention can be stored user and be organized user name/password more, has exempted the worry that user remembers username-password, has improved the convenience of authentication; Between apparatus of the present invention and bound terminal, there is mutual searching and distance alarm function, there is very strong fail safe; User can realize the automatic login of website, application by apparatus of the present invention and method thereof, has very strong practical value.
Accompanying drawing explanation
Fig. 1 is the structure chart of the wireless cipher access device of the embodiment of the present invention.
Fig. 2 is the flow chart of the wireless cipher storage means of the embodiment of the present invention.
Fig. 3 is the flow chart of the wireless cipher call method of the embodiment of the present invention.
Fig. 4 is the flow chart of the alarm method of looking for something of the embodiment of the present invention.
Embodiment
With reference to the accompanying drawings and in conjunction with example the present invention is described in further detail.
As shown in Figure 1, an embodiment of wireless cipher access device of the present invention, built-in wireless signal transmission and receiver module, specifically by following components, formed, comprising: printed circuit board (PCB) (pcb board), microprocessor, memory, wireless signal transmission and receiver module, position sensor, buzzer, battery, shell and acknowledgement key.The concrete function of each parts is as follows:
Pcb board is used for carrying microprocessor, memory, wireless signal transmission and receiver module, position sensor, buzzer and battery, to realize the electric interconnection between each components and parts.
Microprocessor is connected with memory, memory, wireless signal transmission and receiver module, position sensor and buzzer respectively, for the treatment of the logging request from Intelligent mobile equipment and the warning of looking for something.
Memory is for recording the Intelligent mobile equipment of binding and recording website or the user name and password of application (being password).
Wireless signal transmission and receiver module are for carrying out data interaction by wireless technology and Intelligent mobile equipment.
Position sensor is for the horizontal and vertical position of induction installation and pass to microprocessor, position that can judgment means by this positional information microprocessor whether change and calculation element and Intelligent mobile equipment between distance.
Buzzer for sending prompt tone under the control of microprocessor, as sent out, tick minor for pointing out login license, sending out and tick long for alarm prompt login failure, in the alarm mode of looking for something, can send out the minor that ticks for mutual searching, send out and tick long for distance alarm.Battery is used for providing electric power of equipment.Certainly, buzzer also can replace with the reminding module of other types, as electromagnetic shaker, warning light etc.
Each parts are all encapsulated in shell above, and acknowledgement key is arranged on shell, for responding the login behavior of website or application.Acknowledgement key can be physical button, can be also Touch control key.
In the present embodiment, microprocessor adopts the TMS470M of Texas Instrument, memory adopts Samsung 16M storage particle, wireless signal transmission and receiver module adopt the CSR8000 series bimodulus Bluetooth chip of CSR company, position sensor adopts the novel three-in-one position sensor of Everlight, buzzer adopts Piao Shi electronic buzzer, and battery adopts SONY CR2032 button cell.
Supporting as this device, is provided with Password Management client modules at Intelligent mobile equipment, and Intelligent mobile equipment is realized data interaction by this module and this device.
The principle that this device carries out device binding and login username and password storage is as follows: device is bound with Intelligent mobile equipment by wireless signal transmission and receiver module, the Intelligent mobile equipment information of binding at memory record; Before operative installations Website login or application, first the Password Management client modules on Intelligent mobile equipment is registered the title of website to be logined or application and corresponding login username and password thereof, and by Password Management client modules, above-mentioned information is sent to this device, install above-mentioned information recording in memory.
This device is realized website, application, and automatically the principle of login is as follows: when user need to be on Intelligent mobile equipment when Website login or application, can to this device, send logging request by the Password Management client modules on Intelligent mobile equipment, logging request comprises the implementor name of the Intelligent mobile equipment that sends logging request, website to be logined or the information such as title of application.Wireless signal transmission and the receiver module of device receive that the backward microprocessor of logging request passes on.Microprocessor waits for that whether this logging request is by corresponding, as this logging request is responded, microprocessor is resolved logging request and is passed through memory comparison information, otherwise, microprocessor control buzzer sends prompt tone prompting and resends logging request, if the logging request resending is not also responded or installs and do not receive the logging request resending, microprocessor is controlled buzzer and is sent prompt tone prompting login failure.If the Intelligent mobile equipment information of having bound of memory record is consistent with the implementor name in logging request, simultaneous memory has recorded website to be logined or applied corresponding login username and password, microprocessor sends to wireless signal transmission and receiver module by the login username and the password that are recorded in memory, by buzzer, send prompt tone prompting login license simultaneously, otherwise send prompt tone alarm prompt login failure by buzzer.Wireless signal transmission and receiver module return to username-password to the Password Management client modules on Intelligent mobile equipment after receiving login username and password.When Password Management client modules obtains after login username and password, automatically the login username of obtaining and password are input to website or application log-in interface, realize the automatic login of website or application.
When processing logging request, user can also can shake this device by directly responding logging request by the acknowledgement key on this device, thereby is changed and responded logging request by the position that microprocessor detects device.
This device principle of reporting to the police of looking for something is as follows: the safe distance that first this device and Intelligent mobile equipment are set.User can send to this device the request of reporting to the police of looking for something by the Password Management client modules on Intelligent mobile equipment.When device is received after this request, by buzzer, send prompt tone prompting user and find, with the position sensor of timer, be activated, and the continuous distance between calculation element and Intelligent mobile equipment.As the distance between device and Intelligent mobile equipment has surpassed safe distance, install and by buzzer, send prompt tone tip distance and report to the police.
This device has low-power consumption sleep mode to reduce power consumption, when not receiving in certain hour (as 60 seconds) while sending relevant information or request from Intelligent mobile equipment to this device, installs and automatically enters low-power consumption resting state.When Intelligent mobile equipment sends relevant information or request to this device, device can wake up from low-power consumption resting state automatically.
Below in conjunction with Fig. 2 ~ Fig. 4, said method principle is specifically described.
Fig. 2 has provided a kind of flow process of utilizing the present embodiment device to carry out password storage means, specific as follows:
Step 201: initialization operation;
Step 202: open Password Management client modules on Intelligent mobile equipment;
Step 203: device is bound with Intelligent mobile equipment;
Step 204: the title of registering A website or application on Password Management client modules;
Step 205: Intelligent mobile equipment is the user name and password to device storage A website or application by Password Management client modules;
Step 206: repeating step 204-step 205, completes the storage of the user name and password of many networkings station or application;
Step 207: the resident Intelligent mobile equipment internal memory of Password Management client modules;
Step 208: device standby 60 seconds, if again without the request of Password Management client modules, enter low-power consumption resting state;
Step 209: processing finishes.
Fig. 3 has provided a kind of flow process of utilizing the present embodiment device to carry out password call method, specific as follows:
Step 301: initialization operation;
Step 302: open A website or application login interface at Intelligent mobile equipment;
Step 303: activate by interface interchange or the Password Management client modules that resides in internal memory;
Step 304: Password Management client modules sends the logging request of calling A website or application to device;
Step 305: device wakes up from low-power consumption resting state automatically;
Step 306: user's agitating device or press acknowledgement key, response is from the website log request of client application, and returns to the user name and password;
Step 307: Password Management client modules obtains the user name and password of login A website or application;
Step 308: Password Management client modules is input to the username-password of obtaining A website or application log-in interface automatically, completes login;
Step 309: processing finishes.
Fig. 4 has provided a kind of flow process of utilizing the present embodiment device to look for something and report to the police, specific as follows:
Step 401: initialization operation;
Step 402: open Password Management client modules on Intelligent mobile equipment;
Step 403: the distance between its permission and Intelligent mobile equipment is set in Password Management client modules, as 10 meters;
Step 404: setting position inductor is activated;
Step 404: within the scope of signal coverage distance, select the warning function of looking for something in Password Management client modules, start the warning function of looking for something;
Step 405: device is sent out a short sound by buzzer and realized the function of looking for something;
Step 406: the distance when position sensor in device activates between the uninterrupted calculating of meeting and Intelligent mobile equipment;
Step 407: in the time surpassing safe distance, device is sent out a long sound by buzzer and realized distance alarm function;
Step 408: again select to look for something warning function in Password Management client modules, close the warning function of looking for something;
Step 409:60, within second as without from the request of Password Management client modules, installs and automatically enters low-power consumption park mode;
Step 410: processing finishes.
It is worth mentioning that, the Intelligent mobile equipment in above-mentioned explanation can replace with the external equipment of the other types such as common computer, and it is identical that it realizes principle.
Although the present invention with preferred embodiment openly as above, embodiment is not of the present invention for limiting.Without departing from the spirit and scope of the invention, any equivalence of doing changes or retouching, belongs to equally the present invention's protection range.Therefore should to take the application's the content that claim was defined be standard to protection scope of the present invention.
Claims (9)
1. a wireless cipher access device, is characterized in that: comprise microprocessor, memory, wireless signal transmission and receiver module, position sensor, reminding module, wherein:
Memory is for recording the external equipment of binding and recording website or the user name and password of application;
Wireless signal transmission and receiver module are for carrying out data interaction with external equipment;
Position sensor is used for the horizontal and vertical position of induction installation and passes to microprocessor;
Reminding module for sending cue under the control of microprocessor;
Microprocessor is connected with memory, wireless signal transmission and receiver module, position sensor, reminding module respectively;
Wireless signal transmission and receiver module receive from the logging request of external equipment and turn to microprocessor to send; Microprocessor, after this logging request is responded, is resolved logging request and is passed through memory comparison information; If the external equipment information of having bound of memory record is consistent with the implementor name in logging request, simultaneous memory has recorded website to be logined or applied corresponding login username and password, microprocessor sends to wireless signal transmission and receiver module by the login username and the password that are recorded in memory; Wireless signal transmission and receiver module are received after login username and password the user name and password returning to external equipment.
2. wireless cipher access device according to claim 1, is characterized in that, described reminding module is buzzer, and described cue is the prompt tone that buzzer sends.
3. wireless cipher access device according to claim 1 and 2, is characterized in that, also comprises button, and described button is also for responding the logging request from external equipment.
4. wireless cipher access device according to claim 3, is characterized in that, described button is physical button or Touch control key.
5. wireless cipher access device according to claim 1 and 2, is characterized in that, the horizontal and vertical position calculation element of the device that microprocessor sends according to position sensor and the distance between external equipment.
6. a wireless cipher access method, is characterized in that, utilizes the wireless cipher access device as described in as arbitrary in claim 1-5 to carry out wireless cipher access, comprises the following steps:
1) wireless cipher access device is bound by wireless signal transmission and receiver module and external equipment, and in the external equipment information of memory record binding;
2) the Password Management client modules on external equipment is registered the title of website to be logined or application and corresponding login username and password thereof, and the title of website to be logined or application and corresponding login username and password thereof are sent to wireless cipher access device, wireless cipher access device by above-mentioned information recording in memory;
3) when needs are externally on equipment when Website login or application, Password Management client modules on external equipment sends logging request to wireless cipher access device, and logging request comprises the implementor name of the external equipment that sends logging request, website to be logined or the title of application;
The wireless signal transmission of wireless cipher access device and receiver module are transmitted to microprocessor by logging request after receiving logging request;
4) microprocessor waits for that whether this logging request is by corresponding: as this logging request in setting-up time is responded, microprocessor is resolved logging request and passed through memory comparison information; Otherwise, microprocessor control reminding module sends cue prompting and resends logging request, if the logging request resending is not also responded or wireless cipher access device is not received the logging request resending, microprocessor is controlled reminding module and is sent cue prompting login failure, method ends;
If the external equipment information of having bound of memory record is consistent with the implementor name in logging request, simultaneous memory has recorded website to be logined or applied corresponding login username and password, microprocessor sends to the login username and the password that are recorded in memory wireless signal transmission and receiver module and by reminding module, sends cue prompting login license simultaneously; Otherwise reminding module sends cue prompting login failure under the control of microprocessor, and method ends;
Wireless signal transmission and receiver module are received after login username and password the Password Management client modules on the user name and password returning to external equipment;
5) Password Management client modules obtains after login username and password, automatically the login username of obtaining and password is input to the website of external equipment or applies log-in interface, realizes the automatic login of website or application.
7. wireless cipher access method according to claim 6, it is characterized in that, in described step 4), if wireless cipher access device does not comprise button, the change in location by position sensor induction installation responds the logging request from external equipment, if wireless cipher access device comprises button, pass through button or pass through the change in location response of position sensor induction installation from the logging request of external equipment.
8. wireless cipher access device method according to claim 7, is characterized in that, also comprises and is specially the alert step of looking for something:
A1) safe distance of wireless cipher access device and external equipment is set;
A2) when wireless cipher access device looking for something of receiving that Password Management client modules on external equipment sends to wireless cipher access device reported to the police request, by reminding module, sending cue prompting finds, position sensor is activated simultaneously, and constantly calculates the distance between wireless cipher access device and external equipment;
A3) as the distance between wireless cipher access device and external equipment has surpassed safe distance, by reminding module, send cue tip distance and report to the police.
9. according to the arbitrary described wireless cipher access device method of claim 6-8, it is characterized in that, when wireless cipher access device is not received from the relevant information of external equipment or request in setting-up time, wireless cipher access device enters low-power consumption resting state, when external equipment sends relevant information or request to wireless cipher access device, wireless cipher access device wakes up from low-power consumption resting state.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410187641.2A CN104009845A (en) | 2014-05-06 | 2014-05-06 | Wireless password access device and method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410187641.2A CN104009845A (en) | 2014-05-06 | 2014-05-06 | Wireless password access device and method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN104009845A true CN104009845A (en) | 2014-08-27 |
Family
ID=51370341
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410187641.2A Pending CN104009845A (en) | 2014-05-06 | 2014-05-06 | Wireless password access device and method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104009845A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105989257A (en) * | 2015-02-09 | 2016-10-05 | 深圳富泰宏精密工业有限公司 | System and method for automatically submitting user information |
CN106028332A (en) * | 2016-07-12 | 2016-10-12 | 北京小米移动软件有限公司 | Security authentication method and device |
CN106156549A (en) * | 2015-04-28 | 2016-11-23 | 阿里巴巴集团控股有限公司 | Application program authorization processing method and device |
CN108549808A (en) * | 2018-04-19 | 2018-09-18 | 北京华大智宝电子系统有限公司 | A kind of cipher management method and device |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN201142116Y (en) * | 2008-01-07 | 2008-10-29 | 林文献 | Loss-proof alarm device |
CN101400060A (en) * | 2007-06-15 | 2009-04-01 | 捷讯研究有限公司 | A method and devices for providing secure data backup from a mobile communication device to an external computing device |
EP2234028A1 (en) * | 2009-02-26 | 2010-09-29 | Research In Motion Limited | System and method of handling encrypted backup data |
CN203387525U (en) * | 2012-09-12 | 2014-01-08 | 上海滕维信息科技有限公司 | Multifunctional identity authentication apparatus |
-
2014
- 2014-05-06 CN CN201410187641.2A patent/CN104009845A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101400060A (en) * | 2007-06-15 | 2009-04-01 | 捷讯研究有限公司 | A method and devices for providing secure data backup from a mobile communication device to an external computing device |
CN201142116Y (en) * | 2008-01-07 | 2008-10-29 | 林文献 | Loss-proof alarm device |
EP2234028A1 (en) * | 2009-02-26 | 2010-09-29 | Research In Motion Limited | System and method of handling encrypted backup data |
CN203387525U (en) * | 2012-09-12 | 2014-01-08 | 上海滕维信息科技有限公司 | Multifunctional identity authentication apparatus |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105989257A (en) * | 2015-02-09 | 2016-10-05 | 深圳富泰宏精密工业有限公司 | System and method for automatically submitting user information |
CN106156549A (en) * | 2015-04-28 | 2016-11-23 | 阿里巴巴集团控股有限公司 | Application program authorization processing method and device |
CN106156549B (en) * | 2015-04-28 | 2019-12-06 | 阿里巴巴集团控股有限公司 | application program authorization processing method and device |
CN106028332A (en) * | 2016-07-12 | 2016-10-12 | 北京小米移动软件有限公司 | Security authentication method and device |
CN108549808A (en) * | 2018-04-19 | 2018-09-18 | 北京华大智宝电子系统有限公司 | A kind of cipher management method and device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11423723B2 (en) | Enhanced access control based on key proximity | |
US10448125B2 (en) | Methods of communicating identification information and a responsive command via short-range communications, and related devices | |
TWI621366B (en) | Security system device power management | |
EP3163852B1 (en) | Close-distance automatic unlocking method and system for mobile terminal | |
CN103975615A (en) | Login via near field communication with automatically generated login information | |
CN101814227A (en) | System and method for remote control of equipment based on Internet of things | |
CN104009845A (en) | Wireless password access device and method | |
CN103581441B (en) | Mobile terminal follows the trail of burglary-resisting system and method | |
GB2532305A (en) | Method for Configuring and controlling smart home products | |
CN103812534B (en) | information sharing method and system | |
CN103281357A (en) | Mobile remote control device, system and method of household equipment | |
Jiang et al. | Research and implementation of M2M smart home and security system | |
EP2974228B1 (en) | Methods of communicating identification information and a responsive command via short-range communications, and related devices | |
CN106788617B (en) | Intelligent Bluetooth beacon socket | |
CN105530222A (en) | Method for establishing connection among terminals, and device and system | |
CN203366463U (en) | Anti-theft system with real-time early warning function | |
CN203444541U (en) | Door lock monitoring system | |
CN205121853U (en) | Multifunctional remote controller | |
CN202627702U (en) | Intelligent lock | |
CN203181055U (en) | Household security and protection system | |
CN104881952A (en) | Remote alarm method utilizing hotspots | |
CN205354307U (en) | Wireless control device for internet -of -Things smart home | |
US20180041870A1 (en) | Detection Using NFC Open Circuit | |
CN204833646U (en) | Security alarm system | |
CN202475469U (en) | Intelligent household system supporting two access modes |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20140827 |