CN104091376B - Intelligent lock control method and apparatus thereof - Google Patents

Intelligent lock control method and apparatus thereof Download PDF

Info

Publication number
CN104091376B
CN104091376B CN201410268572.8A CN201410268572A CN104091376B CN 104091376 B CN104091376 B CN 104091376B CN 201410268572 A CN201410268572 A CN 201410268572A CN 104091376 B CN104091376 B CN 104091376B
Authority
CN
China
Prior art keywords
key
smart lock
terminal
sent
verified
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201410268572.8A
Other languages
Chinese (zh)
Other versions
CN104091376A (en
Inventor
张晓丹
马百鸣
王巍
余明阳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xiaomi Inc
Original Assignee
Xiaomi Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xiaomi Inc filed Critical Xiaomi Inc
Priority to CN201410268572.8A priority Critical patent/CN104091376B/en
Publication of CN104091376A publication Critical patent/CN104091376A/en
Application granted granted Critical
Publication of CN104091376B publication Critical patent/CN104091376B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Lock And Its Accessories (AREA)

Abstract

The invention discloses an intelligent lock control method and an apparatus thereof, and belongs to the terminal application field. The method comprises the following steps: obtaining verification information of a user when a first terminal is positioned in a preset range of an intelligent lock; and sending the verification information to the intelligent lock used for verifying the identity of the user according to the verification information, and executing an unlocking operation when the user passes through the verification. The method and the apparatus enable a door to be not opened by anyone when a visitor visits, and provide convenience for residents and visitors.

Description

Smart lock controls method and apparatus
Technical field
It relates to terminal applies field, more particularly, to a kind of smart lock control method and apparatus.
Background technology
Typically open the lock being arranged on door at present using key, key is the entity that metal is moulded, key passes through lines Suit the work completing switch lock.Corresponding one to four key of next lock of normal condition, the people holding key can open the door, The artificial visitor then needing key when having visitor opens the door, and resident family and visitor are inconvenient.
Content of the invention
In order to overcome the artificial visitor then needing key present in correlation technique when having visitor to open the door, user The all inconvenient problem with visitor, the disclosure provides a kind of smart lock to control method and apparatus.Described technical scheme is as follows:
According to the embodiment of the present disclosure in a first aspect, providing a kind of smart lock control method, methods described includes:
When first terminal is located in the set point of smart lock, obtain the checking information of user;
Described checking information is sent to described smart lock, described smart lock is used for according to the checking of described checking information The identity of user, executes unlocking operation when described user passes through checking;
The described checking information obtaining user, including:
Output input key dialog box;
The key to be verified of receiving user's input, described key to be verified is to be sent to described first eventually according to second terminal The setting key at end obtains;
Described described checking information is sent to described smart lock, including:
Described key to be verified is sent to described smart lock, described smart lock is used for being sent to using described second terminal The key to be verified described in described setting key authentication of described smart lock, when described key to be verified is identical with described setting key Shi Zhihang unlocking operation;
Methods described also includes:
Authorization message is sent to described smart lock, described authorization message includes terminal iidentification, described smart lock is used for working as When receiving the setting key that the other-end in addition to described first terminal sends, according to described terminal iidentification judges, other are whole The setting key that end sends whether effectively, when the mark of described other-end is identical with described terminal iidentification, judge described in its The setting key that his terminal sends is effective.
In a kind of possible implementation of the disclosure, methods described also includes:
Setting key is sent to third terminal, described third terminal is used for being located at setting of smart lock when described third terminal When determining in scope, key to be verified is sent to described smart lock, described key to be verified is to send according to described first terminal Obtain to the described setting key of described third terminal;
Described setting key is sent to described smart lock, described smart lock is used for using described in described setting key authentication The key described to be verified that third terminal sends, the execution when described key to be verified is identical with described setting key is unlocked and is grasped Make.
In the alternatively possible implementation of the disclosure, methods described also includes:
Setting time is sent to described smart lock, described smart lock is used for setting with described in reception using described setting time The time difference put between key and the described key to be verified of reception is compared, when described time difference is less than or equal to described setting Time, and execute unlocking operation when described key to be verified is identical with described setting key.
According to the second aspect of the embodiment of the present disclosure, provide a kind of smart lock control device, described device includes:
Acquisition module, during for being located in the set point of smart lock, obtains the checking information of user when first terminal;
Sending module, for described checking information is sent to described smart lock, described smart lock is used for being tested according to described The identity of user described in card Information Authentication, executes unlocking operation when described user passes through checking;
Described acquisition module includes:
Output unit, for output input key dialog box;
Input block, for the key to be verified of receiving user's input, described key to be verified is to be sent out according to second terminal That gives described first terminal arranges what key obtained;
Described sending module is used for,
Described key to be verified is sent to described smart lock, described smart lock is used for being sent to using described second terminal The key to be verified described in described setting key authentication of described smart lock, when described key to be verified is identical with described setting key Shi Zhihang unlocking operation;
Described sending module is additionally operable to,
Authorization message is sent to described smart lock, described authorization message includes terminal iidentification, described smart lock is used for working as When receiving the setting key that the other-end in addition to described first terminal sends, according to described terminal iidentification judges, other are whole The setting key that end sends whether effectively, when the mark of described other-end is identical with described terminal iidentification, judge described in its The setting key that his terminal sends is effective.
In a kind of possible implementation of the disclosure, described sending module is additionally operable to,
Setting key is sent to third terminal, described third terminal is used for being located at setting of smart lock when described third terminal When determining in scope, key to be verified is sent to described smart lock, described key to be verified is to send according to described first terminal Obtain to the described setting key of described third terminal;
Described setting key is sent to described smart lock, described smart lock is used for using described in described setting key authentication The key described to be verified that third terminal sends, the execution when described key to be verified is identical with described setting key is unlocked and is grasped Make.
In the alternatively possible implementation of the disclosure, described sending module is additionally operable to,
Setting time is sent to described smart lock, described smart lock is used for setting with described in reception using described setting time The time difference put between key and the described key to be verified of reception is compared, when described time difference is less than or equal to described setting Time, and execute unlocking operation when described key to be verified is identical with described setting key.
According to the third aspect of the embodiment of the present disclosure, provide a kind of smart lock control device, described device includes:
Processor;
For storing the memorizer of processor executable;
Wherein, described processor is configured to:
When first terminal is located in the set point of smart lock, obtain the checking information of user;
Described checking information is sent to described smart lock, described smart lock is used for according to the checking of described checking information The identity of user, executes unlocking operation when described user passes through checking;
The described checking information obtaining user, including:
Output input key dialog box;
The key to be verified of receiving user's input, described key to be verified is to be sent to described first eventually according to second terminal The setting key at end obtains;
Described described checking information is sent to described smart lock, including:
Described key to be verified is sent to described smart lock, described smart lock is used for being sent to using described second terminal The key to be verified described in described setting key authentication of described smart lock, when described key to be verified is identical with described setting key Shi Zhihang unlocking operation;
Described processor is additionally configured to:
Authorization message is sent to described smart lock, described authorization message includes terminal iidentification, described smart lock is used for working as When receiving the setting key that the other-end in addition to described first terminal sends, according to described terminal iidentification judges, other are whole The setting key that end sends whether effectively, when the mark of described other-end is identical with described terminal iidentification, judge described in its The setting key that his terminal sends is effective.
The technical scheme that embodiment of the disclosure provides can include following beneficial effect:By being located at intelligence when first terminal When in the set point that can lock, obtain the checking information of user, and checking information is sent to smart lock, smart lock is used for basis Checking information verifies the identity of user, executes unlocking operation when user passes through checking, does not therefore need when having visitor There is artificial visitor to open the door, be resident family and visitor provides conveniently simultaneously.
It should be appreciated that above general description and detailed description hereinafter are only exemplary and explanatory, not The disclosure can be limited.
Brief description
Accompanying drawing herein is merged in description and constitutes the part of this specification, shows the enforcement meeting the present invention Example, and be used for explaining the principle of the present invention together with description.
Fig. 1 is the application scenario diagram of the smart lock control method according to an exemplary embodiment;
Fig. 2 is a kind of flow chart of the smart lock control method according to an exemplary embodiment;
Fig. 3 is the flow chart of another kind of smart lock control method according to an exemplary embodiment;
Fig. 4 is that the output according to an exemplary embodiment inputs terminal interface figure during key dialog box;
Fig. 5 is a kind of block diagram of the smart lock control device according to an exemplary embodiment;
Fig. 6 a is the block diagram of another kind of smart lock control device according to an exemplary embodiment;
Fig. 6 b is the block diagram of another kind of smart lock control device according to an exemplary embodiment;
Fig. 7 is a kind of block diagram of the smart lock control device according to an exemplary embodiment.
Specific embodiment
Here will in detail exemplary embodiment be illustrated, its example is illustrated in the accompanying drawings.Explained below is related to During accompanying drawing, unless otherwise indicated, the same numbers in different accompanying drawings represent same or analogous key element.Following exemplary embodiment Described in embodiment do not represent all embodiments consistent with the present invention.On the contrary, they be only with such as appended The example of the consistent apparatus and method of some aspects being described in detail in claims, the present invention.
Fig. 1 is the application scenario diagram of the smart lock control method according to an exemplary embodiment, as shown in figure 1, should Application scenarios include dweller 1, smart lock 2 and visitor 3.Dweller 1 and visitor 3 all hold terminal 4, and this terminal 4 can be intelligent handss The smart machines such as machine, panel computer, bracelet.Terminal 4 three that terminal 4 that dweller 1 holds, smart lock 2, visitor 3 hold is two-by-two Connect.
Furthermore it is also possible to be this smart lock 2 configuration server 5, terminal 4 that this server 5 is held with dweller 1 respectively, intelligence 2 connections can be locked, the data transfer between the terminal 4 held for dweller 1 and smart lock 2.
The terminal 4 that dweller 1 holds can be communicated by the terminal 4 that radio communication is held with network and smart lock 2, visitor 3, This radio communication can use arbitrary communication standard or agreement, including but not limited to GSM (Global System of Mobile Communication, global system for mobile communications), (General Packet Radio Service, general packet is no for GPRS Line service), CDMA (Code Division Multiple Access, CDMA), WCDMA (Wideband Code Division Multiple Access, WCDMA), LTE (Long Term Evolution, Long Term Evolution), electronics Mail, SMS (Short Messaging Service, Short Message Service) etc..Between the terminal 4 that smart lock 2 and visitor 3 hold Can be communicated using the data connection approach such as bluetooth, wifi (Wireless Fidelity, Wireless Fidelity).
It is to be appreciated that the device category shown in Fig. 1, annexation and connected mode are only for example, the disclosure is not It is limited to this.
Fig. 2 is a kind of flow chart of the smart lock control method according to an exemplary embodiment, as shown in Fig. 2 should Smart lock control method is applied in first terminal, comprises the following steps.
In step S101, when first terminal is located in the set point of smart lock, obtain the checking information of user.
In the present embodiment, checking information can be key or image.When checking information is for key, first Terminal can be terminal that visitor holds or the terminal that dweller holds.When checking information is for image, first terminal one As the terminal held for dweller.
In step s 102, checking information is sent to smart lock, smart lock is used for verifying user's according to checking information Identity, executes unlocking operation when user passes through checking.
When the embodiment of the present disclosure is by being located in the set point of smart lock, obtain the checking letter of user when first terminal Breath, and checking information is sent to smart lock, smart lock is used for verifying the identity of user according to checking information, when user passes through to test Execute unlocking operation during card, do not need someone to be visitor's enabling therefore when having visitor.
Fig. 3 is the flow chart of another kind of smart lock control method according to an exemplary embodiment, as shown in figure 3, This smart lock control method is applied in first terminal, and checking information is key, comprises the following steps.
In step s 201, when first terminal is located in the set point of smart lock, output input key dialog box.
In actual applications, set point can determine according to the effective communication distance between terminal and smart lock.For example, Bluetooth communication is directly adopted, then set point is centered on smart lock, 8m is the circle of radius between terminal and smart lock Domain;NFC (Near Field Communication, near field communication (NFC)) is directly adopted to lead between terminal and smart lock Letter, then set point is the region with lock touching;Adopt wifi to access same WLAN between terminal and smart lock, then set Determine the overlay area that scope is this WLAN.
Fig. 4 is terminal interface figure during output input key dialog box, is only for example, the disclosure is not restricted to this.
In step S202, the key to be verified of receiving user's input, key to be verified is to be sent to according to second terminal The setting key of first terminal obtains.
In actual applications, when the terminal that first terminal is held for visitor, the terminal that second terminal is held for dweller.
The terminal that dweller holds can be divided into two kinds:Super keepe and common management administrator.Super keepe can will be awarded Power information is sent to smart lock, and authorization message includes terminal iidentification, and smart lock ought receive the other-end in addition to super keepe During the setting key sending, can judge whether the setting key that other-end sends is effective according to terminal iidentification;Super management Setting key can also be sent to smart lock by member, and smart lock can be using setting other in addition to super keepe of key authentication The key to be verified that terminal sends, executes unlocking operation when key to be verified is identical with setting key.Common management administrator is only So that setting key is sent to smart lock, so that smart lock is sent out using setting other-end in addition to super keepe for the key authentication The key to be verified sending, executes unlocking operation when key to be verified is identical with setting key.That is, authorization message is used for Common management administrator is arranged on smart lock, key is used for verifying that the key that terminal sends provides foundation for smart lock.
Each smart lock be generally fitted provided with an initial password (similar to the original key of every mechanical lock, only one Individual, and the key of subsequently all enablings both is from original key), initial password is sent to after smart lock terminal, if It is proved to be successful, smart lock will be corresponding with super keepe by the mark sending the terminal of initial password, makes the end that this identifies End have super keepe authority (by authorization message and key be sent to smart lock can, similar to bitting).Certainly, Initial password is typically fairly simple, so after being proved to be successful, terminal can change initial password, to avoid initial password easily to break Solution and the insecurity revealed and cause.
The terminal with super keepe authority sends after authorization message to smart lock, and smart lock can will wrap in authorization message The mark of the terminal including is corresponding with common management administrator, and making these terminals identifying have the authority of common management administrator (can will be close Key is sent to smart lock).
So when the terminal that first terminal is held for dweller, two kinds of situations can be divided into:
The first, when first terminal is for common management administrator, second terminal is super keepe.
Second, when first terminal is for super keepe, second terminal is the supplier of smart lock, now arranges key Initial password for smart lock.
When the terminal that first terminal is held for visitor, setting key generally has the restriction of use time (similar to joining One finishing key, only within the specific time effectively), such as send in a day that setting key starts from second terminal.? That is, first terminal just can open smart lock using setting key only within the time limiting, and exceedes the time of restriction, the Even if a terminal has setting key, it is sent to smart lock as key to be verified, nor opens smart lock.
When the terminal that first terminal is held for dweller, the restriction of setting key usually not use time.That is, First terminal any time can open smart lock using setting key.
It is to be appreciated that by execution step S201-S202 successively, you can realize being located at setting of smart lock when first terminal When determining in scope, obtain the checking information of user.
In step S203, key to be verified is sent to smart lock, smart lock is used for being sent to intelligence using second terminal The setting key authentication key to be verified that can lock, executes unlocking operation when key to be verified is identical with setting key.
It is to be appreciated that passing through execution step S203, you can realize for checking information being sent to smart lock, smart lock is used for Verify the identity of user according to checking information, execute unlocking operation when user passes through checking.
After first terminal first time passes through the checking of smart lock, terminal can arrange the transmission mould of key to be verified Formula, sending mode includes automatic connection mode and manual input mode.When sending mode is for automatic connection mode, first terminal The key of user's input for the first time can be recorded, when first terminal is set up with smart lock again and is connected it is not necessary to input key again, Directly the key of record is sent to smart lock.When sending mode is for manual input mode, first terminal will not record user The key of input, when first terminal is connected with smart lock foundation every time, user is required for inputting a secondary key and is sent to intelligence Lock.
In a kind of implementation of the present embodiment, the method can also include:
Setting key is sent to third terminal, third terminal is used for being located in the set point of smart lock when third terminal When, key to be verified is sent to smart lock, key to be verified is the setting key being sent to third terminal according to first terminal Obtain;
Setting key is sent to smart lock, smart lock is used for be verified using setting key authentication third terminal transmission Key, executes unlocking operation when key to be verified is identical with setting card key.
It is to be appreciated that in this kind of implementation, first terminal is generally the terminal that dweller holds, and has super management Member or the authority of common management administrator, third terminal can be for during terminal that visitor holds or the terminal held of dweller.
First terminal can be sent to smart lock and visitor simultaneously or successively by setting secret key remote.Key can be with word Presented in symbol string, the sending method of key can be by the Internet it is also possible to pass through cordless communication network, the disclosure is to this It is not restricted.For example, key can be sent to smart lock and by JICQs such as short message, rice chats by first terminal Three terminals.
In this kind of implementation, the method can also include:
Setting time is sent to smart lock, smart lock is used for be tested with reception with reception setting key using setting time Time difference between card key is compared, and when this time difference is less than or equal to setting time, and key to be verified is close with setting Unlocking operation is executed when key is identical.
It is to be appreciated that effective time is set by the user of first terminal.Be provided by the effect time can make key have Effective property, in effective time, visitor can be used for multiple times this key and open the door, and exceed effective time, then this key loses automatically Effect, improves the safety of smart lock.
In this kind of implementation, the method can also include:
Authorization message is sent to smart lock, authorization message includes terminal iidentification, smart lock receives except first eventually for working as During the setting key that the other-end outside end sends, judge whether the setting key that other-end sends has according to terminal iidentification Effect.
It is to be appreciated that in this kind of implementation, first terminal is generally super keepe, due to super keepe one As only one of which, common management administrator is used as by authorization terminal, can to share the control work to smart lock for the super keepe, And the quantity of common management administrator can be increased according to practical situation and reduce, user experience is good.
In actual applications, door, after execution unlocking operation, can be pushed open, Consumer's Experience is good by smart lock.Then in inspection When measuring door and shutting, illustrate that visitor or dweller come into, now automatically lock cuts out, prevent undelegated stranger from entering Enter, improve the safety of smart lock.In addition, when the opening time of smart lock reaches setting time, smart lock can be carried out Report to the police, play the effect reminding dweller and visitor, further increase the safety of smart lock.Wherein, setting time can be by Manager sets, such as 10 minutes.Report to the police can be one or more of in the following manner:Send sound, light prompting, Xiang Guan The terminal of reason person sends information.And when smart lock is opened not by the mode (comparing key) of checking, smart lock also may be used To be reported to the police.Wherein, the mode of warning can be one or more of in the following manner:Send sound, light prompting, Xiang Guan The terminal of reason person sends information, dials the police emergency number.
In other exemplary embodiments of the invention, checking information can be image.By being located at setting of smart lock when first terminal When determining in scope, the image of collection user, realize, when first terminal is located in the set point of smart lock, obtaining testing of user Card information;By the image of user is sent to smart lock, smart lock is used for the image using the image authentication user prestoring, when Execute unlocking operation when the image of user is identical with the image prestoring, realize for checking information being sent to smart lock, smart lock is used In the identity verifying user according to checking information, execute unlocking operation when user passes through checking.
It is to be appreciated that above-mentioned implementation is generally directed to the situation of the terminal that first terminal is held for dweller, due to living The terminal that visitor holds opens smart lock with can not being subject to time restriction, and the security requirement of the terminal therefore dweller held is relatively Height, opens smart lock by the way of the image of Real-time Collection user, and the user that can be prevented effectively from non-first terminal uses The situation that one terminal opens smart lock occurs, safe.And visitor is typically rarely employed smart lock, now using having timeliness The key of property, is defined to the use time of visitor, while being applied to the feature that visitor is rarely employed smart lock, Improve the safety of smart lock, and cost is relatively low.
When the embodiment of the present disclosure is by being located in the set point of smart lock, obtain the checking letter of user when first terminal Breath, and checking information is sent to smart lock, smart lock is used for verifying the identity of user according to checking information, when user passes through to test Execute unlocking operation during card, do not need someone to be visitor's enabling therefore when having visitor.And, key have ageing, In effective time, visitor can be used for multiple times this key and open the door, and exceed effective time, then this key ceases to be in force automatically, and improves The safety of smart lock.
Fig. 5 is a kind of block diagram of the smart lock control device according to an exemplary embodiment, and this device is applied to In one terminal.With reference to Fig. 5, this device includes acquisition module 301 and sending module 302.
When this acquisition module 301 is configured as first terminal and is located in the set point of smart lock, obtain the testing of user Card information.
This sending module 302 is configured to for checking information to be sent to smart lock, and smart lock is used for being tested according to checking information The identity of card user, executes unlocking operation when user passes through checking.
In the present embodiment, checking information can be key or image.When checking information is for key, first Terminal can be terminal that visitor holds or the terminal that dweller holds.When checking information is for image, first terminal one As the terminal held for dweller.
When the embodiment of the present disclosure is by being located in the set point of smart lock, obtain the checking letter of user when first terminal Breath, and checking information is sent to smart lock, smart lock is used for verifying the identity of user according to checking information, when user passes through to test Execute unlocking operation during card, do not need someone to be visitor's enabling therefore when having visitor.
Fig. 6 is the block diagram of another kind of smart lock control device according to an exemplary embodiment, and this device is applied to In first terminal.Reference picture 6a and Fig. 6 b, this device includes acquisition module 401 and sending module 402.
When this acquisition module 401 is configured as first terminal and is located in the set point of smart lock, obtain the testing of user Card information.
This sending module 402 is configured to for checking information to be sent to smart lock, and smart lock is used for being tested according to checking information The identity of card user, executes unlocking operation when user passes through checking.
In the present embodiment, checking information can be key or image.When checking information is for key, first Terminal can be terminal that visitor holds or the terminal that dweller holds.When checking information is for image, first terminal is The terminal that dweller holds.
In a kind of implementation of the present embodiment, checking information is key, reference picture 6a, and this acquisition module 401 is permissible Including output unit 4011 and input block 4012.
This output unit 4011 is configured to output input key dialog box.
This input block 4012 is configured to the key to be verified of receiving user's input, and key to be verified is according to second eventually The setting key being sent to first terminal is held to obtain.
In this kind of implementation, this sending module 402 is configured to for key to be verified to be sent to smart lock, smart lock For being sent to the setting key authentication key to be verified of smart lock using second terminal, when key to be verified and setting key phase Execute unlocking operation simultaneously.
In another kind of implementation of the present embodiment, checking information is image, reference picture 6b, and this acquisition module 401 can To include collecting unit 4013.
This collecting unit 4013 is configured to gather the image of user.
In this kind of implementation, this sending module 402 is configured to for the image of user to be sent to smart lock, smart lock For the image using the image authentication user prestoring, execute unlocking operation when the image of user is identical with the image prestoring.
In another implementation of the present embodiment, this sending module 402 can be additionally configured to send out setting key Give third terminal, third terminal is used for, when third terminal is located in the set point of smart lock, key to be verified being sent To smart lock, key to be verified is to be obtained according to the setting key that first terminal is sent to third terminal;Key will be arranged send out Give smart lock, smart lock be used for using setting key authentication third terminal send key to be verified, when key to be verified with Unlocking operation is executed when setting key is identical.
In this kind of implementation, this sending module 402 can be additionally configured to for setting time to be sent to smart lock, intelligence Can lock for being compared using the time difference between setting time and reception setting key and reception key to be verified, when this Between difference be less than or equal to setting time, and key to be verified with setting key identical when execution unlocking operation.
In this kind of implementation, this sending module 402 can be additionally configured to for authorization message to be sent to smart lock, awards Power information includes terminal iidentification, and smart lock is used for when receiving the setting key of the transmission of the other-end in addition to first terminal, root Judge whether the setting key that other-end sends is effective according to terminal iidentification.
When the embodiment of the present disclosure is by being located in the set point of smart lock, obtain the checking letter of user when first terminal Breath, and checking information is sent to smart lock, smart lock is used for verifying the identity of user according to checking information, when user passes through to test Execute unlocking operation during card, do not need someone to be visitor's enabling therefore when having visitor.And, key have ageing, In effective time, visitor can be used for multiple times this key and open the door, and exceed effective time, then this key ceases to be in force automatically, and improves The safety of smart lock.
With regard to the device in above-described embodiment, wherein the concrete mode of modules execution operation is in relevant the method Embodiment in be described in detail, explanation will be not set forth in detail herein.
Fig. 7 is a kind of block diagram of the smart lock control device 800 according to an exemplary embodiment.For example, device 800 Can be mobile phone, computer, digital broadcast terminal, messaging devices, game console, tablet device, armarium, Body-building equipment, personal digital assistant etc..
With reference to Fig. 7, device 800 can include following one or more assemblies:Process assembly 802, memorizer 804, power supply Assembly 806, multimedia groupware 808, audio-frequency assembly 810, the interface 812 of I/O (Input/Output, input/output), sensor Assembly 814, and communication component 816.
The integrated operation of the usual control device 800 of process assembly 802, such as with display, call, data communication, phase Machine operation and record operate associated operation.Treatment element 802 can include one or more processors 820 and refer to execute Order, to complete all or part of step of above-mentioned method.Additionally, process assembly 802 can include one or more modules, just Interaction between process assembly 802 and other assemblies.For example, processing component 802 can include multi-media module, many to facilitate Interaction between media component 808 and process assembly 802.
Memorizer 804 is configured to store various types of data to support the operation in equipment 800.The showing of these data Example includes the instruction for any application program of operation or method on device 800, contact data, telephone book data, disappears Breath, picture, video etc..Memorizer 804 can be by any kind of volatibility or non-volatile memory device or their group Close and realize, such as SRAM (Static Random Access Memory, static RAM), EEPROM (Electrically Erasable Programmable Read-Only Memory, the read-only storage of electrically erasable Device), EPROM (Erasable Programmable Read Only Memory, Erasable Programmable Read Only Memory EPROM), PROM (Programmable Read-Only Memory, programmable read only memory), (Read-Only Memory read-only deposits ROM Reservoir), magnetic memory, flash memory, disk or CD.
Electric power assembly 806 provides electric power for the various assemblies of device 800.Electric power assembly 806 can include power management system System, one or more power supplys, and other generate, manage and distribute, with for device 800, the assembly that electric power is associated.
Multimedia groupware 808 includes the screen of one output interface of offer between this device 800 and user.At some In embodiment, screen can include LCD (Liquid Crystal Display, liquid crystal display) and TP (Touch Panel, Touch panel).If screen includes touch panel, screen may be implemented as touch screen, to receive the input letter from user Number.Touch panel includes one or more touch sensors with the gesture on sensing touch, slip and touch panel.This touch passes Sensor can not only sensing touch or sliding action border, but also during lasting related to this touch or slide of detection Between and pressure.In certain embodiments, multimedia groupware 808 includes a front-facing camera and/or post-positioned pick-up head.Work as equipment 800 are in operator scheme, and during as screening-mode or video mode, front-facing camera and/or post-positioned pick-up head can receive outside Multi-medium data.Each front-facing camera and post-positioned pick-up head can be the optical lens system of a fixation or have focal length And optical zoom ability.
Audio-frequency assembly 810 is configured to output and/or input audio signal.For example, audio-frequency assembly 810 includes a MIC (Microphone, mike), when device 800 is in operator scheme, such as call model, logging mode and speech recognition mode When, mike is configured to receive external audio signal.The audio signal being received can be further stored in memorizer 804 Or send via communication component 816.In certain embodiments, audio-frequency assembly 810 also includes a speaker, for exporting audio frequency Signal.
, for providing interface between process assembly 802 and peripheral interface module, above-mentioned peripheral interface module can for I/O interface 812 To be keyboard, click wheel, button etc..These buttons may include but be not limited to:Home button, volume button, start button and lock Determine button.
Sensor cluster 814 includes one or more sensors, for providing the state of various aspects to comment for device 800 Estimate.For example, sensor cluster 814 can detect/the closed mode of opening of equipment 800, the relative localization of assembly, such as this group Part is the display of device 800 and keypad, and sensor cluster 814 can be with detection means 800 or 800 1 assemblies of device Position change, user is presence or absence of with what device 800 contacted, the temperature of device 800 orientation or acceleration/deceleration and device 800 Degree change.Sensor cluster 814 can include proximity transducer, is configured to detect when not having any physical contact attached The presence of nearly object.Sensor cluster 814 can also include optical sensor, such as CMOS (Complementary Metal Oxide Semiconductor, complementary metal oxide semiconductors (CMOS)) or CCD (Charge-coupled Device, charge coupled cell) Imageing sensor, for using in imaging applications.In certain embodiments, this sensor cluster 814 can also include accelerating Degree sensor, gyro sensor, Magnetic Sensor, pressure transducer or temperature sensor.
Communication component 816 is configured to facilitate the communication of wired or wireless way between device 800 and other equipment.Device 800 can access the wireless network based on communication standard, such as WiFi (Wireless Fidelity, adopting wireless fidelity technology), 2G (Second Generation mobile communication technology, second filial generation mobile communication technology) or 3G (3rd Generation mobile communication technology, third generation mobile technology), or they Combination.In one exemplary embodiment, communication component 816 receives via broadcast channel and is derived from the wide of external broadcasting management system Broadcast signal or broadcast related information.In one exemplary embodiment, this communication component 816 also includes NFC (Near Field Communication, near-field communication) module, to promote junction service.For example, RFID (Radio can be based in NFC module Frequency Identification, RF identification) technology, IrDA (Infrared Data Association, infrared number According to association) technology, UWB (Ultra Wideband, ultra broadband) technology, BT (Blue Tooth, bluetooth) technology and other technologies To realize.
In the exemplary embodiment, device 800 can be by one or more ASIC (Application Specific Integrated Circuit, application specific integrated circuit), (Digital Signal Processing, at digital signal for DSP Reason device), DSPD (Digital Signal Processing Device, digital signal processing appts), PLD (Programmable Logic Device, PLD), FPGA (Field-Programmable Gate Array, field programmable gate array), controller, microcontroller, microprocessor or other electronic components realize, for execution State method.
In the exemplary embodiment, a kind of non-transitorycomputer readable storage medium including instruction, example are additionally provided As included the memorizer 804 instructing, above-mentioned instruction can be executed by the processor 820 of device 800 to complete said method.For example, This non-transitorycomputer readable storage medium can be ROM, RAM (Ramdom Access Memory, random access memory Device), CD-ROM (Compact Disc Read-Only Memory, compact disc read-only memory), tape, floppy disk and light data deposit Storage equipment etc..
A kind of non-transitorycomputer readable storage medium, when the instruction in this storage medium is by the computing device of terminal When so that terminal can execute a kind of smart lock control method, the method includes:
When first terminal is located in the set point of smart lock, obtain the checking information of user;
Checking information is sent to smart lock, smart lock is used for verifying the identity of user according to checking information, when user is led to Cross execution unlocking operation during checking.
Those skilled in the art, after considering description and putting into practice invention disclosed herein, will readily occur to its of the present invention Its embodiment.The application is intended to any modification, purposes or the adaptations of the present invention, these modifications, purposes or Person's adaptations are followed the general principle of the present invention and are included the undocumented common knowledge in the art of the disclosure Or conventional techniques.Description and embodiments are considered only as exemplary, and true scope and spirit of the invention are by following Claim is pointed out.
It is described above and precision architecture illustrated in the accompanying drawings it should be appreciated that the invention is not limited in, and And various modifications and changes can carried out without departing from the scope.The scope of the present invention only to be limited by appended claim.

Claims (7)

1. a kind of smart lock control method is it is characterised in that methods described includes:
When first terminal is located in the set point of smart lock, obtain the checking information of user;
Described checking information is sent to described smart lock, described smart lock is used for verifying described user according to described checking information Identity, when described user pass through checking when execute unlocking operation;
The described checking information obtaining user, including:
Output input key dialog box;
The key to be verified of receiving user's input, described key to be verified is to be sent to described first terminal according to second terminal Setting key obtains;
Described described checking information is sent to described smart lock, including:
Described key to be verified is sent to described smart lock, described smart lock is described for being sent to using described second terminal The key to be verified described in described setting key authentication of smart lock, holds when described key to be verified is identical with described setting key Row unlocking operation;
Methods described also includes:
Authorization message is sent to described smart lock, described authorization message includes terminal iidentification, described smart lock receives for working as During the setting key that the other-end in addition to described first terminal sends, judge that described other-end is sent out according to described terminal iidentification Effectively whether, when the mark of described other-end is identical with described terminal iidentification, described in judgement, other are whole for the setting key sending The setting key that end sends is effective.
2. method according to claim 1 is it is characterised in that methods described also includes:
Setting key is sent to third terminal, described third terminal is used for being located at the setting model of smart lock when described third terminal When enclosing interior, key to be verified is sent to described smart lock, described key to be verified is to be sent to institute according to described first terminal State what the described setting key of third terminal obtained;
Described setting key is sent to described smart lock, described smart lock is used for using the 3rd described in described setting key authentication The key described to be verified that terminal sends, executes unlocking operation when described key to be verified is identical with described setting key.
3. method according to claim 2 is it is characterised in that methods described also includes:
Setting time is sent to described smart lock, described smart lock is used for close using the setting described with reception of described setting time Key and the time difference receiving between described key to be verified are compared, when described time difference is less than or equal to described setting Between, and execute unlocking operation when described key to be verified is identical with described setting key.
4. a kind of smart lock control device is it is characterised in that described device includes:
Acquisition module, during for being located in the set point of smart lock, obtains the checking information of user when first terminal;
Sending module, for described checking information is sent to described smart lock, described smart lock is used for according to described checking letter Breath verifies the identity of described user, executes unlocking operation when described user passes through checking;
Described acquisition module includes:
Output unit, for output input key dialog box;
Input block, for the key to be verified of receiving user's input, described key to be verified is to be sent to according to second terminal The setting key of described first terminal obtains;
Described sending module is used for,
Described key to be verified is sent to described smart lock, described smart lock is described for being sent to using described second terminal The key to be verified described in described setting key authentication of smart lock, holds when described key to be verified is identical with described setting key Row unlocking operation;
Described sending module is additionally operable to,
Authorization message is sent to described smart lock, described authorization message includes terminal iidentification, described smart lock receives for working as During the setting key that the other-end in addition to described first terminal sends, judge that described other-end is sent out according to described terminal iidentification Effectively whether, when the mark of described other-end is identical with described terminal iidentification, described in judgement, other are whole for the setting key sending The setting key that end sends is effective.
5. device according to claim 4 is it is characterised in that described sending module is additionally operable to,
Setting key is sent to third terminal, described third terminal is used for being located at the setting model of smart lock when described third terminal When enclosing interior, key to be verified is sent to described smart lock, described key to be verified is to be sent to institute according to described first terminal State what the described setting key of third terminal obtained;
Described setting key is sent to described smart lock, described smart lock is used for using the 3rd described in described setting key authentication The key described to be verified that terminal sends, executes unlocking operation when described key to be verified is identical with described setting key.
6. device according to claim 5 is it is characterised in that described sending module is additionally operable to,
Setting time is sent to described smart lock, described smart lock is used for close using the setting described with reception of described setting time Key and the time difference receiving between described key to be verified are compared, when described time difference is less than or equal to described setting Between, and execute unlocking operation when described key to be verified is identical with described setting key.
7. a kind of smart lock control device is it is characterised in that described device includes:
Processor;
For storing the memorizer of processor executable;
Wherein, described processor is configured to:
When first terminal is located in the set point of smart lock, obtain the checking information of user;
Described checking information is sent to described smart lock, described smart lock is used for verifying described user according to described checking information Identity, when described user pass through checking when execute unlocking operation;
The described checking information obtaining user, including:
Output input key dialog box;
The key to be verified of receiving user's input, described key to be verified is to be sent to described first terminal according to second terminal Setting key obtains;
Described described checking information is sent to described smart lock, including:
Described key to be verified is sent to described smart lock, described smart lock is described for being sent to using described second terminal The key to be verified described in described setting key authentication of smart lock, holds when described key to be verified is identical with described setting key Row unlocking operation;
Described processor is additionally configured to:
Authorization message is sent to described smart lock, described authorization message includes terminal iidentification, described smart lock receives for working as During the setting key that the other-end in addition to described first terminal sends, judge that described other-end is sent out according to described terminal iidentification Effectively whether, when the mark of described other-end is identical with described terminal iidentification, described in judgement, other are whole for the setting key sending The setting key that end sends is effective.
CN201410268572.8A 2014-06-16 2014-06-16 Intelligent lock control method and apparatus thereof Active CN104091376B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410268572.8A CN104091376B (en) 2014-06-16 2014-06-16 Intelligent lock control method and apparatus thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410268572.8A CN104091376B (en) 2014-06-16 2014-06-16 Intelligent lock control method and apparatus thereof

Publications (2)

Publication Number Publication Date
CN104091376A CN104091376A (en) 2014-10-08
CN104091376B true CN104091376B (en) 2017-02-08

Family

ID=51639090

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410268572.8A Active CN104091376B (en) 2014-06-16 2014-06-16 Intelligent lock control method and apparatus thereof

Country Status (1)

Country Link
CN (1) CN104091376B (en)

Families Citing this family (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104601331B (en) * 2014-12-26 2018-05-08 深圳市科陆电子科技股份有限公司 Charging pile monitor control system and method
CN106157394A (en) * 2015-04-24 2016-11-23 胡飞虎 Community's networked door access control system and community based on this system access method
CN107093228B (en) 2016-02-17 2020-09-01 腾讯科技(深圳)有限公司 Authorization method, device and system applied to electronic lock
CN106097494A (en) * 2016-06-03 2016-11-09 北京小米移动软件有限公司 The method for unlocking of smart lock and device
CN106127888B (en) * 2016-06-14 2019-06-11 天津宅美智能科技有限公司 Intelligent lock operation method and smart lock operating system
CN106355717A (en) * 2016-09-05 2017-01-25 惠州Tcl移动通信有限公司 Mobile terminal unlocking method and system based on fingerprint recognition and NFC (near field communication)
CN109215178A (en) * 2017-07-04 2019-01-15 华为技术有限公司 Method for generating cipher code, device, storage medium, electronic lock, server and terminal
CN107967732A (en) * 2017-10-31 2018-04-27 美的智慧家居科技有限公司 Intelligent door lock and voice method for burn-recording
CN108022349A (en) * 2017-12-22 2018-05-11 北京小米移动软件有限公司 Information input method, equipment, smart lock and storage medium
CN108416874A (en) * 2018-01-18 2018-08-17 新开普电子股份有限公司 A kind of quick authentication access control system based on recognition of face
CN110415392B (en) * 2018-04-27 2023-12-12 开利公司 Entry control system based on early posture
CN108932779A (en) * 2018-07-17 2018-12-04 叶春林 Prevent Household door lock by pirate of the open or the mode of exception
CN109243018B (en) * 2018-08-23 2021-12-28 杭州立为科技有限公司 Automatic encryption method between intelligent lock control system modules, intelligent lock and storage medium
CN109191649B (en) * 2018-10-26 2021-01-29 珠海格力电器股份有限公司 Method and device for sharing control authority of intelligent door lock
CN109448203A (en) * 2018-12-26 2019-03-08 江苏亨通问天量子信息研究院有限公司 Control method, device, system and the smart lock of smart lock
CN113611020A (en) * 2021-08-31 2021-11-05 龙芯中科(金华)技术有限公司 Intelligent lock control method, device and equipment
CN113888779A (en) * 2021-09-29 2022-01-04 广东好太太智能家居有限公司 User authority management method, system and device based on intelligent lock and storage medium
CN114973457A (en) * 2022-04-15 2022-08-30 北京国泰网信科技有限公司 Intelligent lock system

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101630422A (en) * 2009-08-31 2010-01-20 天津工业大学 Intelligent electronic access control system
EP2207147A1 (en) * 2009-01-02 2010-07-14 Johnson Controls Technology Company System for causing garage door opener to open garage door and method
CN101833826A (en) * 2009-03-13 2010-09-15 上海永久自行车有限公司 Vehicle rental system and vehicle rental method thereof
CN102262793A (en) * 2010-05-26 2011-11-30 中兴通讯股份有限公司 Entrance guard control method and entrance guard control system
CN103236094A (en) * 2013-03-29 2013-08-07 东莞宇龙通信科技有限公司 Door control system and method of unlocking door control equipment by mobile terminal

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102864984B (en) * 2012-09-19 2015-04-08 重庆和航科技股份有限公司 Smart door lock, unlocking system and unlocking method
CN203361799U (en) * 2013-05-22 2013-12-25 荀亮 Lock with wireless communication element

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2207147A1 (en) * 2009-01-02 2010-07-14 Johnson Controls Technology Company System for causing garage door opener to open garage door and method
CN101833826A (en) * 2009-03-13 2010-09-15 上海永久自行车有限公司 Vehicle rental system and vehicle rental method thereof
CN101630422A (en) * 2009-08-31 2010-01-20 天津工业大学 Intelligent electronic access control system
CN102262793A (en) * 2010-05-26 2011-11-30 中兴通讯股份有限公司 Entrance guard control method and entrance guard control system
CN103236094A (en) * 2013-03-29 2013-08-07 东莞宇龙通信科技有限公司 Door control system and method of unlocking door control equipment by mobile terminal

Also Published As

Publication number Publication date
CN104091376A (en) 2014-10-08

Similar Documents

Publication Publication Date Title
CN104091376B (en) Intelligent lock control method and apparatus thereof
CN109493488A (en) Smart card authentication method, smart lock, smart card, system and device
CN106302762A (en) Smart machine binding method and device
CN106453245B (en) Verify the method and device of identity
CN104503688A (en) Intelligent hardware device control achieving method and device
CN106104601A (en) Virtual card Activiation method and device
CN106097494A (en) The method for unlocking of smart lock and device
CN104933351A (en) Information security processing method and information security processing device
CN105246138A (en) Control method and device of Internet-of-things device
CN109407528A (en) Safety access method, device, server and storage medium
CN105847243A (en) Method and device for accessing smart camera
CN104484593B (en) terminal verification method and device
CN105550568A (en) Mobile terminal data protection method and apparatus
CN104507034A (en) Equipment connecting method, device and terminal equipment
CN104468581B (en) The method and device of login application program
CN105471890A (en) Unlocking method based on wearable device, apparatus and system
CN105392141A (en) Device control method and device
CN106446653A (en) Application authority management method and device and electronic equipment
CN106375096A (en) Short message verification method and device
TW202101392A (en) Access control method and device, electronic device and storage medium
CN104158665A (en) Method and device of verification
CN106600768A (en) Intelligent door lock authentication method, device and terminal
CN106127062A (en) unlocking method and device
CN106060027A (en) Methods, devices, equipment and systems for verification based on verification codes
CN106488450A (en) Connect the method and device of wireless network

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant