CN104091376B - Intelligent lock control method and apparatus thereof - Google Patents
Intelligent lock control method and apparatus thereof Download PDFInfo
- Publication number
- CN104091376B CN104091376B CN201410268572.8A CN201410268572A CN104091376B CN 104091376 B CN104091376 B CN 104091376B CN 201410268572 A CN201410268572 A CN 201410268572A CN 104091376 B CN104091376 B CN 104091376B
- Authority
- CN
- China
- Prior art keywords
- key
- smart lock
- terminal
- sent
- verified
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Landscapes
- Lock And Its Accessories (AREA)
Abstract
The invention discloses an intelligent lock control method and an apparatus thereof, and belongs to the terminal application field. The method comprises the following steps: obtaining verification information of a user when a first terminal is positioned in a preset range of an intelligent lock; and sending the verification information to the intelligent lock used for verifying the identity of the user according to the verification information, and executing an unlocking operation when the user passes through the verification. The method and the apparatus enable a door to be not opened by anyone when a visitor visits, and provide convenience for residents and visitors.
Description
Technical field
It relates to terminal applies field, more particularly, to a kind of smart lock control method and apparatus.
Background technology
Typically open the lock being arranged on door at present using key, key is the entity that metal is moulded, key passes through lines
Suit the work completing switch lock.Corresponding one to four key of next lock of normal condition, the people holding key can open the door,
The artificial visitor then needing key when having visitor opens the door, and resident family and visitor are inconvenient.
Content of the invention
In order to overcome the artificial visitor then needing key present in correlation technique when having visitor to open the door, user
The all inconvenient problem with visitor, the disclosure provides a kind of smart lock to control method and apparatus.Described technical scheme is as follows:
According to the embodiment of the present disclosure in a first aspect, providing a kind of smart lock control method, methods described includes:
When first terminal is located in the set point of smart lock, obtain the checking information of user;
Described checking information is sent to described smart lock, described smart lock is used for according to the checking of described checking information
The identity of user, executes unlocking operation when described user passes through checking;
The described checking information obtaining user, including:
Output input key dialog box;
The key to be verified of receiving user's input, described key to be verified is to be sent to described first eventually according to second terminal
The setting key at end obtains;
Described described checking information is sent to described smart lock, including:
Described key to be verified is sent to described smart lock, described smart lock is used for being sent to using described second terminal
The key to be verified described in described setting key authentication of described smart lock, when described key to be verified is identical with described setting key
Shi Zhihang unlocking operation;
Methods described also includes:
Authorization message is sent to described smart lock, described authorization message includes terminal iidentification, described smart lock is used for working as
When receiving the setting key that the other-end in addition to described first terminal sends, according to described terminal iidentification judges, other are whole
The setting key that end sends whether effectively, when the mark of described other-end is identical with described terminal iidentification, judge described in its
The setting key that his terminal sends is effective.
In a kind of possible implementation of the disclosure, methods described also includes:
Setting key is sent to third terminal, described third terminal is used for being located at setting of smart lock when described third terminal
When determining in scope, key to be verified is sent to described smart lock, described key to be verified is to send according to described first terminal
Obtain to the described setting key of described third terminal;
Described setting key is sent to described smart lock, described smart lock is used for using described in described setting key authentication
The key described to be verified that third terminal sends, the execution when described key to be verified is identical with described setting key is unlocked and is grasped
Make.
In the alternatively possible implementation of the disclosure, methods described also includes:
Setting time is sent to described smart lock, described smart lock is used for setting with described in reception using described setting time
The time difference put between key and the described key to be verified of reception is compared, when described time difference is less than or equal to described setting
Time, and execute unlocking operation when described key to be verified is identical with described setting key.
According to the second aspect of the embodiment of the present disclosure, provide a kind of smart lock control device, described device includes:
Acquisition module, during for being located in the set point of smart lock, obtains the checking information of user when first terminal;
Sending module, for described checking information is sent to described smart lock, described smart lock is used for being tested according to described
The identity of user described in card Information Authentication, executes unlocking operation when described user passes through checking;
Described acquisition module includes:
Output unit, for output input key dialog box;
Input block, for the key to be verified of receiving user's input, described key to be verified is to be sent out according to second terminal
That gives described first terminal arranges what key obtained;
Described sending module is used for,
Described key to be verified is sent to described smart lock, described smart lock is used for being sent to using described second terminal
The key to be verified described in described setting key authentication of described smart lock, when described key to be verified is identical with described setting key
Shi Zhihang unlocking operation;
Described sending module is additionally operable to,
Authorization message is sent to described smart lock, described authorization message includes terminal iidentification, described smart lock is used for working as
When receiving the setting key that the other-end in addition to described first terminal sends, according to described terminal iidentification judges, other are whole
The setting key that end sends whether effectively, when the mark of described other-end is identical with described terminal iidentification, judge described in its
The setting key that his terminal sends is effective.
In a kind of possible implementation of the disclosure, described sending module is additionally operable to,
Setting key is sent to third terminal, described third terminal is used for being located at setting of smart lock when described third terminal
When determining in scope, key to be verified is sent to described smart lock, described key to be verified is to send according to described first terminal
Obtain to the described setting key of described third terminal;
Described setting key is sent to described smart lock, described smart lock is used for using described in described setting key authentication
The key described to be verified that third terminal sends, the execution when described key to be verified is identical with described setting key is unlocked and is grasped
Make.
In the alternatively possible implementation of the disclosure, described sending module is additionally operable to,
Setting time is sent to described smart lock, described smart lock is used for setting with described in reception using described setting time
The time difference put between key and the described key to be verified of reception is compared, when described time difference is less than or equal to described setting
Time, and execute unlocking operation when described key to be verified is identical with described setting key.
According to the third aspect of the embodiment of the present disclosure, provide a kind of smart lock control device, described device includes:
Processor;
For storing the memorizer of processor executable;
Wherein, described processor is configured to:
When first terminal is located in the set point of smart lock, obtain the checking information of user;
Described checking information is sent to described smart lock, described smart lock is used for according to the checking of described checking information
The identity of user, executes unlocking operation when described user passes through checking;
The described checking information obtaining user, including:
Output input key dialog box;
The key to be verified of receiving user's input, described key to be verified is to be sent to described first eventually according to second terminal
The setting key at end obtains;
Described described checking information is sent to described smart lock, including:
Described key to be verified is sent to described smart lock, described smart lock is used for being sent to using described second terminal
The key to be verified described in described setting key authentication of described smart lock, when described key to be verified is identical with described setting key
Shi Zhihang unlocking operation;
Described processor is additionally configured to:
Authorization message is sent to described smart lock, described authorization message includes terminal iidentification, described smart lock is used for working as
When receiving the setting key that the other-end in addition to described first terminal sends, according to described terminal iidentification judges, other are whole
The setting key that end sends whether effectively, when the mark of described other-end is identical with described terminal iidentification, judge described in its
The setting key that his terminal sends is effective.
The technical scheme that embodiment of the disclosure provides can include following beneficial effect:By being located at intelligence when first terminal
When in the set point that can lock, obtain the checking information of user, and checking information is sent to smart lock, smart lock is used for basis
Checking information verifies the identity of user, executes unlocking operation when user passes through checking, does not therefore need when having visitor
There is artificial visitor to open the door, be resident family and visitor provides conveniently simultaneously.
It should be appreciated that above general description and detailed description hereinafter are only exemplary and explanatory, not
The disclosure can be limited.
Brief description
Accompanying drawing herein is merged in description and constitutes the part of this specification, shows the enforcement meeting the present invention
Example, and be used for explaining the principle of the present invention together with description.
Fig. 1 is the application scenario diagram of the smart lock control method according to an exemplary embodiment;
Fig. 2 is a kind of flow chart of the smart lock control method according to an exemplary embodiment;
Fig. 3 is the flow chart of another kind of smart lock control method according to an exemplary embodiment;
Fig. 4 is that the output according to an exemplary embodiment inputs terminal interface figure during key dialog box;
Fig. 5 is a kind of block diagram of the smart lock control device according to an exemplary embodiment;
Fig. 6 a is the block diagram of another kind of smart lock control device according to an exemplary embodiment;
Fig. 6 b is the block diagram of another kind of smart lock control device according to an exemplary embodiment;
Fig. 7 is a kind of block diagram of the smart lock control device according to an exemplary embodiment.
Specific embodiment
Here will in detail exemplary embodiment be illustrated, its example is illustrated in the accompanying drawings.Explained below is related to
During accompanying drawing, unless otherwise indicated, the same numbers in different accompanying drawings represent same or analogous key element.Following exemplary embodiment
Described in embodiment do not represent all embodiments consistent with the present invention.On the contrary, they be only with such as appended
The example of the consistent apparatus and method of some aspects being described in detail in claims, the present invention.
Fig. 1 is the application scenario diagram of the smart lock control method according to an exemplary embodiment, as shown in figure 1, should
Application scenarios include dweller 1, smart lock 2 and visitor 3.Dweller 1 and visitor 3 all hold terminal 4, and this terminal 4 can be intelligent handss
The smart machines such as machine, panel computer, bracelet.Terminal 4 three that terminal 4 that dweller 1 holds, smart lock 2, visitor 3 hold is two-by-two
Connect.
Furthermore it is also possible to be this smart lock 2 configuration server 5, terminal 4 that this server 5 is held with dweller 1 respectively, intelligence
2 connections can be locked, the data transfer between the terminal 4 held for dweller 1 and smart lock 2.
The terminal 4 that dweller 1 holds can be communicated by the terminal 4 that radio communication is held with network and smart lock 2, visitor 3,
This radio communication can use arbitrary communication standard or agreement, including but not limited to GSM (Global System of Mobile
Communication, global system for mobile communications), (General Packet Radio Service, general packet is no for GPRS
Line service), CDMA (Code Division Multiple Access, CDMA), WCDMA (Wideband Code
Division Multiple Access, WCDMA), LTE (Long Term Evolution, Long Term Evolution), electronics
Mail, SMS (Short Messaging Service, Short Message Service) etc..Between the terminal 4 that smart lock 2 and visitor 3 hold
Can be communicated using the data connection approach such as bluetooth, wifi (Wireless Fidelity, Wireless Fidelity).
It is to be appreciated that the device category shown in Fig. 1, annexation and connected mode are only for example, the disclosure is not
It is limited to this.
Fig. 2 is a kind of flow chart of the smart lock control method according to an exemplary embodiment, as shown in Fig. 2 should
Smart lock control method is applied in first terminal, comprises the following steps.
In step S101, when first terminal is located in the set point of smart lock, obtain the checking information of user.
In the present embodiment, checking information can be key or image.When checking information is for key, first
Terminal can be terminal that visitor holds or the terminal that dweller holds.When checking information is for image, first terminal one
As the terminal held for dweller.
In step s 102, checking information is sent to smart lock, smart lock is used for verifying user's according to checking information
Identity, executes unlocking operation when user passes through checking.
When the embodiment of the present disclosure is by being located in the set point of smart lock, obtain the checking letter of user when first terminal
Breath, and checking information is sent to smart lock, smart lock is used for verifying the identity of user according to checking information, when user passes through to test
Execute unlocking operation during card, do not need someone to be visitor's enabling therefore when having visitor.
Fig. 3 is the flow chart of another kind of smart lock control method according to an exemplary embodiment, as shown in figure 3,
This smart lock control method is applied in first terminal, and checking information is key, comprises the following steps.
In step s 201, when first terminal is located in the set point of smart lock, output input key dialog box.
In actual applications, set point can determine according to the effective communication distance between terminal and smart lock.For example,
Bluetooth communication is directly adopted, then set point is centered on smart lock, 8m is the circle of radius between terminal and smart lock
Domain;NFC (Near Field Communication, near field communication (NFC)) is directly adopted to lead between terminal and smart lock
Letter, then set point is the region with lock touching;Adopt wifi to access same WLAN between terminal and smart lock, then set
Determine the overlay area that scope is this WLAN.
Fig. 4 is terminal interface figure during output input key dialog box, is only for example, the disclosure is not restricted to this.
In step S202, the key to be verified of receiving user's input, key to be verified is to be sent to according to second terminal
The setting key of first terminal obtains.
In actual applications, when the terminal that first terminal is held for visitor, the terminal that second terminal is held for dweller.
The terminal that dweller holds can be divided into two kinds:Super keepe and common management administrator.Super keepe can will be awarded
Power information is sent to smart lock, and authorization message includes terminal iidentification, and smart lock ought receive the other-end in addition to super keepe
During the setting key sending, can judge whether the setting key that other-end sends is effective according to terminal iidentification;Super management
Setting key can also be sent to smart lock by member, and smart lock can be using setting other in addition to super keepe of key authentication
The key to be verified that terminal sends, executes unlocking operation when key to be verified is identical with setting key.Common management administrator is only
So that setting key is sent to smart lock, so that smart lock is sent out using setting other-end in addition to super keepe for the key authentication
The key to be verified sending, executes unlocking operation when key to be verified is identical with setting key.That is, authorization message is used for
Common management administrator is arranged on smart lock, key is used for verifying that the key that terminal sends provides foundation for smart lock.
Each smart lock be generally fitted provided with an initial password (similar to the original key of every mechanical lock, only one
Individual, and the key of subsequently all enablings both is from original key), initial password is sent to after smart lock terminal, if
It is proved to be successful, smart lock will be corresponding with super keepe by the mark sending the terminal of initial password, makes the end that this identifies
End have super keepe authority (by authorization message and key be sent to smart lock can, similar to bitting).Certainly,
Initial password is typically fairly simple, so after being proved to be successful, terminal can change initial password, to avoid initial password easily to break
Solution and the insecurity revealed and cause.
The terminal with super keepe authority sends after authorization message to smart lock, and smart lock can will wrap in authorization message
The mark of the terminal including is corresponding with common management administrator, and making these terminals identifying have the authority of common management administrator (can will be close
Key is sent to smart lock).
So when the terminal that first terminal is held for dweller, two kinds of situations can be divided into:
The first, when first terminal is for common management administrator, second terminal is super keepe.
Second, when first terminal is for super keepe, second terminal is the supplier of smart lock, now arranges key
Initial password for smart lock.
When the terminal that first terminal is held for visitor, setting key generally has the restriction of use time (similar to joining
One finishing key, only within the specific time effectively), such as send in a day that setting key starts from second terminal.?
That is, first terminal just can open smart lock using setting key only within the time limiting, and exceedes the time of restriction, the
Even if a terminal has setting key, it is sent to smart lock as key to be verified, nor opens smart lock.
When the terminal that first terminal is held for dweller, the restriction of setting key usually not use time.That is,
First terminal any time can open smart lock using setting key.
It is to be appreciated that by execution step S201-S202 successively, you can realize being located at setting of smart lock when first terminal
When determining in scope, obtain the checking information of user.
In step S203, key to be verified is sent to smart lock, smart lock is used for being sent to intelligence using second terminal
The setting key authentication key to be verified that can lock, executes unlocking operation when key to be verified is identical with setting key.
It is to be appreciated that passing through execution step S203, you can realize for checking information being sent to smart lock, smart lock is used for
Verify the identity of user according to checking information, execute unlocking operation when user passes through checking.
After first terminal first time passes through the checking of smart lock, terminal can arrange the transmission mould of key to be verified
Formula, sending mode includes automatic connection mode and manual input mode.When sending mode is for automatic connection mode, first terminal
The key of user's input for the first time can be recorded, when first terminal is set up with smart lock again and is connected it is not necessary to input key again,
Directly the key of record is sent to smart lock.When sending mode is for manual input mode, first terminal will not record user
The key of input, when first terminal is connected with smart lock foundation every time, user is required for inputting a secondary key and is sent to intelligence
Lock.
In a kind of implementation of the present embodiment, the method can also include:
Setting key is sent to third terminal, third terminal is used for being located in the set point of smart lock when third terminal
When, key to be verified is sent to smart lock, key to be verified is the setting key being sent to third terminal according to first terminal
Obtain;
Setting key is sent to smart lock, smart lock is used for be verified using setting key authentication third terminal transmission
Key, executes unlocking operation when key to be verified is identical with setting card key.
It is to be appreciated that in this kind of implementation, first terminal is generally the terminal that dweller holds, and has super management
Member or the authority of common management administrator, third terminal can be for during terminal that visitor holds or the terminal held of dweller.
First terminal can be sent to smart lock and visitor simultaneously or successively by setting secret key remote.Key can be with word
Presented in symbol string, the sending method of key can be by the Internet it is also possible to pass through cordless communication network, the disclosure is to this
It is not restricted.For example, key can be sent to smart lock and by JICQs such as short message, rice chats by first terminal
Three terminals.
In this kind of implementation, the method can also include:
Setting time is sent to smart lock, smart lock is used for be tested with reception with reception setting key using setting time
Time difference between card key is compared, and when this time difference is less than or equal to setting time, and key to be verified is close with setting
Unlocking operation is executed when key is identical.
It is to be appreciated that effective time is set by the user of first terminal.Be provided by the effect time can make key have
Effective property, in effective time, visitor can be used for multiple times this key and open the door, and exceed effective time, then this key loses automatically
Effect, improves the safety of smart lock.
In this kind of implementation, the method can also include:
Authorization message is sent to smart lock, authorization message includes terminal iidentification, smart lock receives except first eventually for working as
During the setting key that the other-end outside end sends, judge whether the setting key that other-end sends has according to terminal iidentification
Effect.
It is to be appreciated that in this kind of implementation, first terminal is generally super keepe, due to super keepe one
As only one of which, common management administrator is used as by authorization terminal, can to share the control work to smart lock for the super keepe,
And the quantity of common management administrator can be increased according to practical situation and reduce, user experience is good.
In actual applications, door, after execution unlocking operation, can be pushed open, Consumer's Experience is good by smart lock.Then in inspection
When measuring door and shutting, illustrate that visitor or dweller come into, now automatically lock cuts out, prevent undelegated stranger from entering
Enter, improve the safety of smart lock.In addition, when the opening time of smart lock reaches setting time, smart lock can be carried out
Report to the police, play the effect reminding dweller and visitor, further increase the safety of smart lock.Wherein, setting time can be by
Manager sets, such as 10 minutes.Report to the police can be one or more of in the following manner:Send sound, light prompting, Xiang Guan
The terminal of reason person sends information.And when smart lock is opened not by the mode (comparing key) of checking, smart lock also may be used
To be reported to the police.Wherein, the mode of warning can be one or more of in the following manner:Send sound, light prompting, Xiang Guan
The terminal of reason person sends information, dials the police emergency number.
In other exemplary embodiments of the invention, checking information can be image.By being located at setting of smart lock when first terminal
When determining in scope, the image of collection user, realize, when first terminal is located in the set point of smart lock, obtaining testing of user
Card information;By the image of user is sent to smart lock, smart lock is used for the image using the image authentication user prestoring, when
Execute unlocking operation when the image of user is identical with the image prestoring, realize for checking information being sent to smart lock, smart lock is used
In the identity verifying user according to checking information, execute unlocking operation when user passes through checking.
It is to be appreciated that above-mentioned implementation is generally directed to the situation of the terminal that first terminal is held for dweller, due to living
The terminal that visitor holds opens smart lock with can not being subject to time restriction, and the security requirement of the terminal therefore dweller held is relatively
Height, opens smart lock by the way of the image of Real-time Collection user, and the user that can be prevented effectively from non-first terminal uses
The situation that one terminal opens smart lock occurs, safe.And visitor is typically rarely employed smart lock, now using having timeliness
The key of property, is defined to the use time of visitor, while being applied to the feature that visitor is rarely employed smart lock,
Improve the safety of smart lock, and cost is relatively low.
When the embodiment of the present disclosure is by being located in the set point of smart lock, obtain the checking letter of user when first terminal
Breath, and checking information is sent to smart lock, smart lock is used for verifying the identity of user according to checking information, when user passes through to test
Execute unlocking operation during card, do not need someone to be visitor's enabling therefore when having visitor.And, key have ageing,
In effective time, visitor can be used for multiple times this key and open the door, and exceed effective time, then this key ceases to be in force automatically, and improves
The safety of smart lock.
Fig. 5 is a kind of block diagram of the smart lock control device according to an exemplary embodiment, and this device is applied to
In one terminal.With reference to Fig. 5, this device includes acquisition module 301 and sending module 302.
When this acquisition module 301 is configured as first terminal and is located in the set point of smart lock, obtain the testing of user
Card information.
This sending module 302 is configured to for checking information to be sent to smart lock, and smart lock is used for being tested according to checking information
The identity of card user, executes unlocking operation when user passes through checking.
In the present embodiment, checking information can be key or image.When checking information is for key, first
Terminal can be terminal that visitor holds or the terminal that dweller holds.When checking information is for image, first terminal one
As the terminal held for dweller.
When the embodiment of the present disclosure is by being located in the set point of smart lock, obtain the checking letter of user when first terminal
Breath, and checking information is sent to smart lock, smart lock is used for verifying the identity of user according to checking information, when user passes through to test
Execute unlocking operation during card, do not need someone to be visitor's enabling therefore when having visitor.
Fig. 6 is the block diagram of another kind of smart lock control device according to an exemplary embodiment, and this device is applied to
In first terminal.Reference picture 6a and Fig. 6 b, this device includes acquisition module 401 and sending module 402.
When this acquisition module 401 is configured as first terminal and is located in the set point of smart lock, obtain the testing of user
Card information.
This sending module 402 is configured to for checking information to be sent to smart lock, and smart lock is used for being tested according to checking information
The identity of card user, executes unlocking operation when user passes through checking.
In the present embodiment, checking information can be key or image.When checking information is for key, first
Terminal can be terminal that visitor holds or the terminal that dweller holds.When checking information is for image, first terminal is
The terminal that dweller holds.
In a kind of implementation of the present embodiment, checking information is key, reference picture 6a, and this acquisition module 401 is permissible
Including output unit 4011 and input block 4012.
This output unit 4011 is configured to output input key dialog box.
This input block 4012 is configured to the key to be verified of receiving user's input, and key to be verified is according to second eventually
The setting key being sent to first terminal is held to obtain.
In this kind of implementation, this sending module 402 is configured to for key to be verified to be sent to smart lock, smart lock
For being sent to the setting key authentication key to be verified of smart lock using second terminal, when key to be verified and setting key phase
Execute unlocking operation simultaneously.
In another kind of implementation of the present embodiment, checking information is image, reference picture 6b, and this acquisition module 401 can
To include collecting unit 4013.
This collecting unit 4013 is configured to gather the image of user.
In this kind of implementation, this sending module 402 is configured to for the image of user to be sent to smart lock, smart lock
For the image using the image authentication user prestoring, execute unlocking operation when the image of user is identical with the image prestoring.
In another implementation of the present embodiment, this sending module 402 can be additionally configured to send out setting key
Give third terminal, third terminal is used for, when third terminal is located in the set point of smart lock, key to be verified being sent
To smart lock, key to be verified is to be obtained according to the setting key that first terminal is sent to third terminal;Key will be arranged send out
Give smart lock, smart lock be used for using setting key authentication third terminal send key to be verified, when key to be verified with
Unlocking operation is executed when setting key is identical.
In this kind of implementation, this sending module 402 can be additionally configured to for setting time to be sent to smart lock, intelligence
Can lock for being compared using the time difference between setting time and reception setting key and reception key to be verified, when this
Between difference be less than or equal to setting time, and key to be verified with setting key identical when execution unlocking operation.
In this kind of implementation, this sending module 402 can be additionally configured to for authorization message to be sent to smart lock, awards
Power information includes terminal iidentification, and smart lock is used for when receiving the setting key of the transmission of the other-end in addition to first terminal, root
Judge whether the setting key that other-end sends is effective according to terminal iidentification.
When the embodiment of the present disclosure is by being located in the set point of smart lock, obtain the checking letter of user when first terminal
Breath, and checking information is sent to smart lock, smart lock is used for verifying the identity of user according to checking information, when user passes through to test
Execute unlocking operation during card, do not need someone to be visitor's enabling therefore when having visitor.And, key have ageing,
In effective time, visitor can be used for multiple times this key and open the door, and exceed effective time, then this key ceases to be in force automatically, and improves
The safety of smart lock.
With regard to the device in above-described embodiment, wherein the concrete mode of modules execution operation is in relevant the method
Embodiment in be described in detail, explanation will be not set forth in detail herein.
Fig. 7 is a kind of block diagram of the smart lock control device 800 according to an exemplary embodiment.For example, device 800
Can be mobile phone, computer, digital broadcast terminal, messaging devices, game console, tablet device, armarium,
Body-building equipment, personal digital assistant etc..
With reference to Fig. 7, device 800 can include following one or more assemblies:Process assembly 802, memorizer 804, power supply
Assembly 806, multimedia groupware 808, audio-frequency assembly 810, the interface 812 of I/O (Input/Output, input/output), sensor
Assembly 814, and communication component 816.
The integrated operation of the usual control device 800 of process assembly 802, such as with display, call, data communication, phase
Machine operation and record operate associated operation.Treatment element 802 can include one or more processors 820 and refer to execute
Order, to complete all or part of step of above-mentioned method.Additionally, process assembly 802 can include one or more modules, just
Interaction between process assembly 802 and other assemblies.For example, processing component 802 can include multi-media module, many to facilitate
Interaction between media component 808 and process assembly 802.
Memorizer 804 is configured to store various types of data to support the operation in equipment 800.The showing of these data
Example includes the instruction for any application program of operation or method on device 800, contact data, telephone book data, disappears
Breath, picture, video etc..Memorizer 804 can be by any kind of volatibility or non-volatile memory device or their group
Close and realize, such as SRAM (Static Random Access Memory, static RAM), EEPROM
(Electrically Erasable Programmable Read-Only Memory, the read-only storage of electrically erasable
Device), EPROM (Erasable Programmable Read Only Memory, Erasable Programmable Read Only Memory EPROM), PROM
(Programmable Read-Only Memory, programmable read only memory), (Read-Only Memory read-only deposits ROM
Reservoir), magnetic memory, flash memory, disk or CD.
Electric power assembly 806 provides electric power for the various assemblies of device 800.Electric power assembly 806 can include power management system
System, one or more power supplys, and other generate, manage and distribute, with for device 800, the assembly that electric power is associated.
Multimedia groupware 808 includes the screen of one output interface of offer between this device 800 and user.At some
In embodiment, screen can include LCD (Liquid Crystal Display, liquid crystal display) and TP (Touch Panel,
Touch panel).If screen includes touch panel, screen may be implemented as touch screen, to receive the input letter from user
Number.Touch panel includes one or more touch sensors with the gesture on sensing touch, slip and touch panel.This touch passes
Sensor can not only sensing touch or sliding action border, but also during lasting related to this touch or slide of detection
Between and pressure.In certain embodiments, multimedia groupware 808 includes a front-facing camera and/or post-positioned pick-up head.Work as equipment
800 are in operator scheme, and during as screening-mode or video mode, front-facing camera and/or post-positioned pick-up head can receive outside
Multi-medium data.Each front-facing camera and post-positioned pick-up head can be the optical lens system of a fixation or have focal length
And optical zoom ability.
Audio-frequency assembly 810 is configured to output and/or input audio signal.For example, audio-frequency assembly 810 includes a MIC
(Microphone, mike), when device 800 is in operator scheme, such as call model, logging mode and speech recognition mode
When, mike is configured to receive external audio signal.The audio signal being received can be further stored in memorizer 804
Or send via communication component 816.In certain embodiments, audio-frequency assembly 810 also includes a speaker, for exporting audio frequency
Signal.
, for providing interface between process assembly 802 and peripheral interface module, above-mentioned peripheral interface module can for I/O interface 812
To be keyboard, click wheel, button etc..These buttons may include but be not limited to:Home button, volume button, start button and lock
Determine button.
Sensor cluster 814 includes one or more sensors, for providing the state of various aspects to comment for device 800
Estimate.For example, sensor cluster 814 can detect/the closed mode of opening of equipment 800, the relative localization of assembly, such as this group
Part is the display of device 800 and keypad, and sensor cluster 814 can be with detection means 800 or 800 1 assemblies of device
Position change, user is presence or absence of with what device 800 contacted, the temperature of device 800 orientation or acceleration/deceleration and device 800
Degree change.Sensor cluster 814 can include proximity transducer, is configured to detect when not having any physical contact attached
The presence of nearly object.Sensor cluster 814 can also include optical sensor, such as CMOS (Complementary Metal Oxide
Semiconductor, complementary metal oxide semiconductors (CMOS)) or CCD (Charge-coupled Device, charge coupled cell)
Imageing sensor, for using in imaging applications.In certain embodiments, this sensor cluster 814 can also include accelerating
Degree sensor, gyro sensor, Magnetic Sensor, pressure transducer or temperature sensor.
Communication component 816 is configured to facilitate the communication of wired or wireless way between device 800 and other equipment.Device
800 can access the wireless network based on communication standard, such as WiFi (Wireless Fidelity, adopting wireless fidelity technology), 2G
(Second Generation mobile communication technology, second filial generation mobile communication technology) or 3G
(3rd Generation mobile communication technology, third generation mobile technology), or they
Combination.In one exemplary embodiment, communication component 816 receives via broadcast channel and is derived from the wide of external broadcasting management system
Broadcast signal or broadcast related information.In one exemplary embodiment, this communication component 816 also includes NFC (Near Field
Communication, near-field communication) module, to promote junction service.For example, RFID (Radio can be based in NFC module
Frequency Identification, RF identification) technology, IrDA (Infrared Data Association, infrared number
According to association) technology, UWB (Ultra Wideband, ultra broadband) technology, BT (Blue Tooth, bluetooth) technology and other technologies
To realize.
In the exemplary embodiment, device 800 can be by one or more ASIC (Application Specific
Integrated Circuit, application specific integrated circuit), (Digital Signal Processing, at digital signal for DSP
Reason device), DSPD (Digital Signal Processing Device, digital signal processing appts), PLD
(Programmable Logic Device, PLD), FPGA (Field-Programmable Gate
Array, field programmable gate array), controller, microcontroller, microprocessor or other electronic components realize, for execution
State method.
In the exemplary embodiment, a kind of non-transitorycomputer readable storage medium including instruction, example are additionally provided
As included the memorizer 804 instructing, above-mentioned instruction can be executed by the processor 820 of device 800 to complete said method.For example,
This non-transitorycomputer readable storage medium can be ROM, RAM (Ramdom Access Memory, random access memory
Device), CD-ROM (Compact Disc Read-Only Memory, compact disc read-only memory), tape, floppy disk and light data deposit
Storage equipment etc..
A kind of non-transitorycomputer readable storage medium, when the instruction in this storage medium is by the computing device of terminal
When so that terminal can execute a kind of smart lock control method, the method includes:
When first terminal is located in the set point of smart lock, obtain the checking information of user;
Checking information is sent to smart lock, smart lock is used for verifying the identity of user according to checking information, when user is led to
Cross execution unlocking operation during checking.
Those skilled in the art, after considering description and putting into practice invention disclosed herein, will readily occur to its of the present invention
Its embodiment.The application is intended to any modification, purposes or the adaptations of the present invention, these modifications, purposes or
Person's adaptations are followed the general principle of the present invention and are included the undocumented common knowledge in the art of the disclosure
Or conventional techniques.Description and embodiments are considered only as exemplary, and true scope and spirit of the invention are by following
Claim is pointed out.
It is described above and precision architecture illustrated in the accompanying drawings it should be appreciated that the invention is not limited in, and
And various modifications and changes can carried out without departing from the scope.The scope of the present invention only to be limited by appended claim.
Claims (7)
1. a kind of smart lock control method is it is characterised in that methods described includes:
When first terminal is located in the set point of smart lock, obtain the checking information of user;
Described checking information is sent to described smart lock, described smart lock is used for verifying described user according to described checking information
Identity, when described user pass through checking when execute unlocking operation;
The described checking information obtaining user, including:
Output input key dialog box;
The key to be verified of receiving user's input, described key to be verified is to be sent to described first terminal according to second terminal
Setting key obtains;
Described described checking information is sent to described smart lock, including:
Described key to be verified is sent to described smart lock, described smart lock is described for being sent to using described second terminal
The key to be verified described in described setting key authentication of smart lock, holds when described key to be verified is identical with described setting key
Row unlocking operation;
Methods described also includes:
Authorization message is sent to described smart lock, described authorization message includes terminal iidentification, described smart lock receives for working as
During the setting key that the other-end in addition to described first terminal sends, judge that described other-end is sent out according to described terminal iidentification
Effectively whether, when the mark of described other-end is identical with described terminal iidentification, described in judgement, other are whole for the setting key sending
The setting key that end sends is effective.
2. method according to claim 1 is it is characterised in that methods described also includes:
Setting key is sent to third terminal, described third terminal is used for being located at the setting model of smart lock when described third terminal
When enclosing interior, key to be verified is sent to described smart lock, described key to be verified is to be sent to institute according to described first terminal
State what the described setting key of third terminal obtained;
Described setting key is sent to described smart lock, described smart lock is used for using the 3rd described in described setting key authentication
The key described to be verified that terminal sends, executes unlocking operation when described key to be verified is identical with described setting key.
3. method according to claim 2 is it is characterised in that methods described also includes:
Setting time is sent to described smart lock, described smart lock is used for close using the setting described with reception of described setting time
Key and the time difference receiving between described key to be verified are compared, when described time difference is less than or equal to described setting
Between, and execute unlocking operation when described key to be verified is identical with described setting key.
4. a kind of smart lock control device is it is characterised in that described device includes:
Acquisition module, during for being located in the set point of smart lock, obtains the checking information of user when first terminal;
Sending module, for described checking information is sent to described smart lock, described smart lock is used for according to described checking letter
Breath verifies the identity of described user, executes unlocking operation when described user passes through checking;
Described acquisition module includes:
Output unit, for output input key dialog box;
Input block, for the key to be verified of receiving user's input, described key to be verified is to be sent to according to second terminal
The setting key of described first terminal obtains;
Described sending module is used for,
Described key to be verified is sent to described smart lock, described smart lock is described for being sent to using described second terminal
The key to be verified described in described setting key authentication of smart lock, holds when described key to be verified is identical with described setting key
Row unlocking operation;
Described sending module is additionally operable to,
Authorization message is sent to described smart lock, described authorization message includes terminal iidentification, described smart lock receives for working as
During the setting key that the other-end in addition to described first terminal sends, judge that described other-end is sent out according to described terminal iidentification
Effectively whether, when the mark of described other-end is identical with described terminal iidentification, described in judgement, other are whole for the setting key sending
The setting key that end sends is effective.
5. device according to claim 4 is it is characterised in that described sending module is additionally operable to,
Setting key is sent to third terminal, described third terminal is used for being located at the setting model of smart lock when described third terminal
When enclosing interior, key to be verified is sent to described smart lock, described key to be verified is to be sent to institute according to described first terminal
State what the described setting key of third terminal obtained;
Described setting key is sent to described smart lock, described smart lock is used for using the 3rd described in described setting key authentication
The key described to be verified that terminal sends, executes unlocking operation when described key to be verified is identical with described setting key.
6. device according to claim 5 is it is characterised in that described sending module is additionally operable to,
Setting time is sent to described smart lock, described smart lock is used for close using the setting described with reception of described setting time
Key and the time difference receiving between described key to be verified are compared, when described time difference is less than or equal to described setting
Between, and execute unlocking operation when described key to be verified is identical with described setting key.
7. a kind of smart lock control device is it is characterised in that described device includes:
Processor;
For storing the memorizer of processor executable;
Wherein, described processor is configured to:
When first terminal is located in the set point of smart lock, obtain the checking information of user;
Described checking information is sent to described smart lock, described smart lock is used for verifying described user according to described checking information
Identity, when described user pass through checking when execute unlocking operation;
The described checking information obtaining user, including:
Output input key dialog box;
The key to be verified of receiving user's input, described key to be verified is to be sent to described first terminal according to second terminal
Setting key obtains;
Described described checking information is sent to described smart lock, including:
Described key to be verified is sent to described smart lock, described smart lock is described for being sent to using described second terminal
The key to be verified described in described setting key authentication of smart lock, holds when described key to be verified is identical with described setting key
Row unlocking operation;
Described processor is additionally configured to:
Authorization message is sent to described smart lock, described authorization message includes terminal iidentification, described smart lock receives for working as
During the setting key that the other-end in addition to described first terminal sends, judge that described other-end is sent out according to described terminal iidentification
Effectively whether, when the mark of described other-end is identical with described terminal iidentification, described in judgement, other are whole for the setting key sending
The setting key that end sends is effective.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410268572.8A CN104091376B (en) | 2014-06-16 | 2014-06-16 | Intelligent lock control method and apparatus thereof |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410268572.8A CN104091376B (en) | 2014-06-16 | 2014-06-16 | Intelligent lock control method and apparatus thereof |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104091376A CN104091376A (en) | 2014-10-08 |
CN104091376B true CN104091376B (en) | 2017-02-08 |
Family
ID=51639090
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410268572.8A Active CN104091376B (en) | 2014-06-16 | 2014-06-16 | Intelligent lock control method and apparatus thereof |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104091376B (en) |
Families Citing this family (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104601331B (en) * | 2014-12-26 | 2018-05-08 | 深圳市科陆电子科技股份有限公司 | Charging pile monitor control system and method |
CN106157394A (en) * | 2015-04-24 | 2016-11-23 | 胡飞虎 | Community's networked door access control system and community based on this system access method |
CN107093228B (en) | 2016-02-17 | 2020-09-01 | 腾讯科技(深圳)有限公司 | Authorization method, device and system applied to electronic lock |
CN106097494A (en) * | 2016-06-03 | 2016-11-09 | 北京小米移动软件有限公司 | The method for unlocking of smart lock and device |
CN106127888B (en) * | 2016-06-14 | 2019-06-11 | 天津宅美智能科技有限公司 | Intelligent lock operation method and smart lock operating system |
CN106355717A (en) * | 2016-09-05 | 2017-01-25 | 惠州Tcl移动通信有限公司 | Mobile terminal unlocking method and system based on fingerprint recognition and NFC (near field communication) |
CN109215178A (en) * | 2017-07-04 | 2019-01-15 | 华为技术有限公司 | Method for generating cipher code, device, storage medium, electronic lock, server and terminal |
CN107967732A (en) * | 2017-10-31 | 2018-04-27 | 美的智慧家居科技有限公司 | Intelligent door lock and voice method for burn-recording |
CN108022349A (en) * | 2017-12-22 | 2018-05-11 | 北京小米移动软件有限公司 | Information input method, equipment, smart lock and storage medium |
CN108416874A (en) * | 2018-01-18 | 2018-08-17 | 新开普电子股份有限公司 | A kind of quick authentication access control system based on recognition of face |
CN110415392B (en) * | 2018-04-27 | 2023-12-12 | 开利公司 | Entry control system based on early posture |
CN108932779A (en) * | 2018-07-17 | 2018-12-04 | 叶春林 | Prevent Household door lock by pirate of the open or the mode of exception |
CN109243018B (en) * | 2018-08-23 | 2021-12-28 | 杭州立为科技有限公司 | Automatic encryption method between intelligent lock control system modules, intelligent lock and storage medium |
CN109191649B (en) * | 2018-10-26 | 2021-01-29 | 珠海格力电器股份有限公司 | Method and device for sharing control authority of intelligent door lock |
CN109448203A (en) * | 2018-12-26 | 2019-03-08 | 江苏亨通问天量子信息研究院有限公司 | Control method, device, system and the smart lock of smart lock |
CN113611020A (en) * | 2021-08-31 | 2021-11-05 | 龙芯中科(金华)技术有限公司 | Intelligent lock control method, device and equipment |
CN113888779A (en) * | 2021-09-29 | 2022-01-04 | 广东好太太智能家居有限公司 | User authority management method, system and device based on intelligent lock and storage medium |
CN114973457A (en) * | 2022-04-15 | 2022-08-30 | 北京国泰网信科技有限公司 | Intelligent lock system |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101630422A (en) * | 2009-08-31 | 2010-01-20 | 天津工业大学 | Intelligent electronic access control system |
EP2207147A1 (en) * | 2009-01-02 | 2010-07-14 | Johnson Controls Technology Company | System for causing garage door opener to open garage door and method |
CN101833826A (en) * | 2009-03-13 | 2010-09-15 | 上海永久自行车有限公司 | Vehicle rental system and vehicle rental method thereof |
CN102262793A (en) * | 2010-05-26 | 2011-11-30 | 中兴通讯股份有限公司 | Entrance guard control method and entrance guard control system |
CN103236094A (en) * | 2013-03-29 | 2013-08-07 | 东莞宇龙通信科技有限公司 | Door control system and method of unlocking door control equipment by mobile terminal |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102864984B (en) * | 2012-09-19 | 2015-04-08 | 重庆和航科技股份有限公司 | Smart door lock, unlocking system and unlocking method |
CN203361799U (en) * | 2013-05-22 | 2013-12-25 | 荀亮 | Lock with wireless communication element |
-
2014
- 2014-06-16 CN CN201410268572.8A patent/CN104091376B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2207147A1 (en) * | 2009-01-02 | 2010-07-14 | Johnson Controls Technology Company | System for causing garage door opener to open garage door and method |
CN101833826A (en) * | 2009-03-13 | 2010-09-15 | 上海永久自行车有限公司 | Vehicle rental system and vehicle rental method thereof |
CN101630422A (en) * | 2009-08-31 | 2010-01-20 | 天津工业大学 | Intelligent electronic access control system |
CN102262793A (en) * | 2010-05-26 | 2011-11-30 | 中兴通讯股份有限公司 | Entrance guard control method and entrance guard control system |
CN103236094A (en) * | 2013-03-29 | 2013-08-07 | 东莞宇龙通信科技有限公司 | Door control system and method of unlocking door control equipment by mobile terminal |
Also Published As
Publication number | Publication date |
---|---|
CN104091376A (en) | 2014-10-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104091376B (en) | Intelligent lock control method and apparatus thereof | |
CN109493488A (en) | Smart card authentication method, smart lock, smart card, system and device | |
CN106302762A (en) | Smart machine binding method and device | |
CN106453245B (en) | Verify the method and device of identity | |
CN104503688A (en) | Intelligent hardware device control achieving method and device | |
CN106104601A (en) | Virtual card Activiation method and device | |
CN106097494A (en) | The method for unlocking of smart lock and device | |
CN104933351A (en) | Information security processing method and information security processing device | |
CN105246138A (en) | Control method and device of Internet-of-things device | |
CN109407528A (en) | Safety access method, device, server and storage medium | |
CN105847243A (en) | Method and device for accessing smart camera | |
CN104484593B (en) | terminal verification method and device | |
CN105550568A (en) | Mobile terminal data protection method and apparatus | |
CN104507034A (en) | Equipment connecting method, device and terminal equipment | |
CN104468581B (en) | The method and device of login application program | |
CN105471890A (en) | Unlocking method based on wearable device, apparatus and system | |
CN105392141A (en) | Device control method and device | |
CN106446653A (en) | Application authority management method and device and electronic equipment | |
CN106375096A (en) | Short message verification method and device | |
TW202101392A (en) | Access control method and device, electronic device and storage medium | |
CN104158665A (en) | Method and device of verification | |
CN106600768A (en) | Intelligent door lock authentication method, device and terminal | |
CN106127062A (en) | unlocking method and device | |
CN106060027A (en) | Methods, devices, equipment and systems for verification based on verification codes | |
CN106488450A (en) | Connect the method and device of wireless network |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant |