CN106898071A - Without non-key smart lock platform and application method - Google Patents

Without non-key smart lock platform and application method Download PDF

Info

Publication number
CN106898071A
CN106898071A CN201710127112.7A CN201710127112A CN106898071A CN 106898071 A CN106898071 A CN 106898071A CN 201710127112 A CN201710127112 A CN 201710127112A CN 106898071 A CN106898071 A CN 106898071A
Authority
CN
China
Prior art keywords
module
key
lock
unlocking
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710127112.7A
Other languages
Chinese (zh)
Inventor
陶袁
任可欣
李彬
姜艳成
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jilin Normal University
Original Assignee
Jilin Normal University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jilin Normal University filed Critical Jilin Normal University
Priority to CN201710127112.7A priority Critical patent/CN106898071A/en
Publication of CN106898071A publication Critical patent/CN106898071A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00817Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00817Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed
    • G07C2009/00825Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed remotely by lines or wireless communication

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Lock And Its Accessories (AREA)
  • Telephone Function (AREA)

Abstract

The invention discloses one kind without non-key smart lock platform, the lock module I is responsible for the password setting of lock module I, addition legal key, deletes illegal key, receive client unlocking request, verification validated user, unlock;Key module II is responsible for the password setting of key module II, validated user verification, allows unlock request, request of being unlocked to the submission of lock module I to the submission of lock module I;The present invention can realize that unlocking person is not unlocked at the scene, realize without key unlocking, be user-friendly to;Realize being dynamically added or being deleted by the owner of smart lock the user for allowing to unlock, release the problem of the insecurity that current key can unlock forever.

Description

Without non-key smart lock platform and application method
Technical field
The present invention relates to smart lock field, and in particular to without non-key smart lock platform and application method.
Background technology
In daily life, lock has become protection personal property indispensable equipment safely, but current lock work Principle mandates must be inserted into supporting key in lock core and could unlock, and the key matched with lock core can be opened all the life This lock.The implementation of this unlocking not only brings great inconvenience, and brings some potential safety hazards to a certain extent. Such as:Forget band key, cannot just unlock;Once or key loss, in order to safety is accomplished by changing lock.
At present, cell-phone customer terminal application program is popularized very much, and these network technologies can not only exchange word, figure at any time The information such as piece or video, and can also at any time perform certain operations.
The content of the invention
The purpose of the present invention is to overcome the shortcomings of existing platform, there is provided a kind of without non-key smart lock platform and application method, The platform can overcome the shortcomings of that existing unlocking must could unlock supporting key insertion lock core, propose to pacify using on mobile phone After setting up network connection between the lock that dress client application, client and needs are opened, by the client-side program on mobile phone Unlocking order is assigned to lock, and the addition of the client of these mobile phones and to exit be dynamic.This realization fundamentally keeps away Exempt to unlock and must can open corresponding lock forever the inconvenience of the key insertion lock core supporting with lock and with supporting key is locked Bring it is dangerous the problems such as.
To achieve these goals, the present invention is adopted the following technical scheme that:
Without non-key smart lock platform, the platform includes lock module I and the two parts of key module II to one kind, and wherein lock module I is disposed In the lock core of lock, the pellet in existing lock core is replaced, be responsible for password setting, addition legal key, delete illegal key, receiving Client is unlocked asks, verifies validated user, unlocking etc.;Key module II is deployed on mobile phone, is responsible for password setting, legal use Family verifies, submits to allow to unlock to lock module I and ask, submit unlocking request etc. to lock module I;Lock module I and key module II Between by internet be connected.
The lock module I be responsible for password setting, addition legal key, delete illegal key, receive client unlock request, Verification validated user, unlock, as it is of the invention preferably, lock module I includes password setting module, adds new key module, conjunction Method key correction verification module, the illegal key module of deletion and unlocking module;
The password setting module is responsible for having bought the modification of smart lock cryptographic initialization, rightful owner authentication and password to new;
The new key module of addition is responsible for adding the user for allowing to unlock from rightful owner to lock module I;
The legal key correction verification module is responsible for receiving the unlocking request of client, verification submit to user that application unlocks whether be Legal unlocking user;
The illegal key module of deletion is responsible for deleting the current user for not allowing and unlocking from lock module I by rightful owner;
The unlocking module is responsible for performing unlocking operation;
The key module II be responsible for password setting, validated user verification, to the submission of lock module I allow unlock request, to locked mode Block I submit to unlock request, as it is of the invention preferably, key module II include password setting module, allow unlocking request module, Unlocking request module;
The password setting module is responsible for user's setting code, Modify password and the verification password of current key module II;
The request for allowing unlocking request module to be responsible for being allowed to the submission of lock module I unlocking;
The unlocking request module is responsible for submitting request of unlocking to lock module I;
The invention also discloses a kind of application method without non-key smart lock platform, the described method comprises the following steps:
Step one, smart lock is deployed on the door for needing lock, and by smart lock and network connection;
Step 2, the owner of smart lock set the password of management smart lock by the password setting module in lock module I;
Step 3, need out the user of smart lock that the client of key module II is disposed on mobile phone,
Step 4, user are set using the password of key module II by the password setting module in key module II, and passed through The unlocking request module that allows in key module II sends the request for allowing to unlock to lock module I;
Step 5, the owner of smart lock receive the request of step 4 by the new key module of addition in lock module I;
Step 6, the owner of smart lock delete the user for not allowing to unlock by the illegal key module of deletion in lock module I;
Whether step 7, user are to use key module II using the password setting module verification active user in key module II Validated user;
Step 8, the user of legal use key module II are carried by the unlocking request module in key module II to lock module I Hand over request of unlocking;
Legal key correction verification module in step 9, lock module I receives the unlocking request of step 8 submission, and to step 8 user Legal identity verified;
If the user identity of step 10, step 8 is legal, the unlocking module in lock module I performs unlocking operation;
Step 11, this operation terminate.
The present invention has the advantages that:
(1)It is of the present invention that unlocking order is mainly sent by the client application on mobile phone without non-key smart lock platform, Can realize that unlocking person is not unlocked at the scene, realize without key unlocking, be user-friendly to;
(2)It is of the present invention to realize being dynamically added or being deleted by the owner of smart lock the use for allowing to unlock without non-key smart lock platform Family, releases the problem of the insecurity that current key can unlock forever.
Brief description of the drawings
Fig. 1 is the system architecture diagram without non-key smart lock platform of the invention.
Fig. 2 is the application method flow chart without non-key smart lock platform of the invention.
Specific embodiment
To make technical scheme and advantage express more clearly, the present invention is remake below in conjunction with the accompanying drawings into One step is described in detail, but is not limited thereto, every technical solution of the present invention to be modified or equivalent, without deviating from Any modification or partial replacement of the spirit and scope of technical solution of the present invention, all should cover in protection scope of the present invention.
Without non-key smart lock platform, the platform includes lock module I and the two parts of key module II, wherein lock module I to one kind Be deployed in the lock core of lock, replace the pellet in existing lock core, be responsible for password setting, addition legal key, delete illegal key, Receive client unlocking request, verification validated user, unlocking etc.;Key module II is deployed on mobile phone, is responsible for password setting, is closed Method user verifies, submits to allow to unlock to lock module I and ask, submit unlocking request etc. to lock module I;Lock module I and key mould It is connected by internet between block II.
The lock module I be responsible for password setting, addition legal key, delete illegal key, receive client unlock request, Verification validated user, unlock, as it is of the invention preferably, lock module I includes password setting module, adds new key module, conjunction Method key correction verification module, the illegal key module of deletion and unlocking module;
The password setting module is responsible for having bought the modification of smart lock cryptographic initialization, rightful owner authentication and password to new;
The new key module of addition is responsible for adding the user for allowing to unlock from rightful owner to lock module I, for example, preserve user Cell-phone number;
The legal key correction verification module is responsible for receiving the unlocking request of client, verification submit to user that application unlocks whether be Legal unlocking user, such as by way of sending check code to unlocking user;
The illegal key module of deletion is responsible for deleting the current user for not allowing and unlocking from lock module I by rightful owner;
The unlocking module is responsible for performing unlocking operation, for example:Electrical motor driven lock drawback lock action;
The key module II be responsible for password setting, validated user verification, to the submission of lock module I allow unlock request, to locked mode Block I submit to unlock request, as it is of the invention preferably, key module II include password setting module, allow unlocking request module, Unlocking request module;
The password setting module is responsible for user's setting code, Modify password and the verification password of current key module II;
The request for allowing unlocking request module to be responsible for being allowed to the submission of lock module I unlocking;
The unlocking request module is responsible for submitting request of unlocking to lock module I;
The invention also discloses a kind of application method without non-key smart lock platform, the described method comprises the following steps:
Step one, smart lock is deployed on the door for needing lock, and by smart lock and network connection, for example:Connect with wifi in family Connect;
Step 2, the owner of smart lock set the password of management smart lock by the password setting module in lock module I;
Step 3, need out the user of smart lock that the client of key module II is disposed on mobile phone,
Step 4, user are set using the password of key module II by the password setting module in key module II, and passed through The unlocking request module that allows in key module II sends the request for allowing to unlock to lock module I;
Step 5, the owner of smart lock receive the request of step 4 by the new key module of addition in lock module I;
Step 6, the owner of smart lock delete the user for not allowing to unlock by the illegal key module of deletion in lock module I;
Whether step 7, user are to use key module II using the password setting module verification active user in key module II Validated user;
Step 8, the user of legal use key module II are carried by the unlocking request module in key module II to lock module I Hand over request of unlocking;
Legal key correction verification module in step 9, lock module I receives the unlocking request of step 8 submission, and to step 8 user Legal identity verified;
If the user identity of step 10, step 8 is legal, the unlocking module in lock module I performs unlocking operation;
Step 11, this operation terminate.

Claims (5)

1. one kind is without non-key smart lock platform, it is characterised in that:The platform includes lock module I and the two parts of key module II, its Middle lock module I is deployed in the lock core of lock, replaces the pellet in existing lock core, is responsible for password setting, addition legal key, is deleted Illegal key, receive client and unlock request, verification validated user, unlocking etc.;Key module II is deployed on mobile phone, is responsible for close Code is set, validated user is verified, unlocking request is allowed to the submission of lock module I, is asked to the submission unlocking of lock module I etc.;Lock module I It is connected by internet between key module II;
The lock module I is responsible for password setting, addition legal key, deletes illegal key, receives client unlocking request, verification Validated user, unlocking;The key module II is responsible for password setting, validated user verification, allows to unlock to the submission of lock module I and ask Ask, submit request of unlocking to lock module I.
2. a kind of without non-key smart lock platform according to claim 1, it is characterised in that:Lock module I includes password setting mould Block, the new key module of addition, legal key correction verification module, the illegal key module of deletion and unlocking module;Key module II includes Password setting module, allow unlocking request module, unlocking request module.
3. a kind of without non-key smart lock platform according to claim 2, it is characterised in that:
The password setting module is responsible for having bought the modification of smart lock cryptographic initialization, rightful owner authentication and password to new;
The new key module of addition is responsible for adding the user for allowing to unlock from rightful owner to lock module I;
The legal key correction verification module is responsible for receiving the unlocking request of client, verification submit to user that application unlocks whether be Legal unlocking user;
The illegal key module of deletion is responsible for deleting the current user for not allowing and unlocking from lock module I by rightful owner;
The unlocking module is responsible for performing unlocking operation.
4. a kind of without non-key smart lock platform according to claim 2, it is characterised in that:
The password setting module is responsible for user's setting code, Modify password and the verification password of current key module II;
The request for allowing unlocking request module to be responsible for being allowed to the submission of lock module I unlocking;
The unlocking request module is responsible for submitting request of unlocking to lock module I.
5. a kind of application method without non-key smart lock platform, the described method comprises the following steps:
Step one, smart lock is deployed on the door for needing lock, and by smart lock and network connection;
Step 2, the owner of smart lock set the password of management smart lock by the password setting module in lock module I;
Step 3, need out the user of smart lock that the client of key module II is disposed on mobile phone,
Step 4, user are set using the password of key module II by the password setting module in key module II, and passed through The unlocking request module that allows in key module II sends the request for allowing to unlock to lock module I;
Step 5, the owner of smart lock receive the request of step 4 by the new key module of addition in lock module I;
Step 6, the owner of smart lock delete the user for not allowing to unlock by the illegal key module of deletion in lock module I;
Whether step 7, user are to use key module II using the password setting module verification active user in key module II Validated user;
Step 8, the user of legal use key module II are carried by the unlocking request module in key module II to lock module I Hand over request of unlocking;
Legal key correction verification module in step 9, lock module I receives the unlocking request of step 8 submission, and to step 8 user Legal identity verified;
If the user identity of step 10, step 8 is legal, the unlocking module in lock module I performs unlocking operation;
Step 11, this operation terminate.
CN201710127112.7A 2017-03-06 2017-03-06 Without non-key smart lock platform and application method Pending CN106898071A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710127112.7A CN106898071A (en) 2017-03-06 2017-03-06 Without non-key smart lock platform and application method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710127112.7A CN106898071A (en) 2017-03-06 2017-03-06 Without non-key smart lock platform and application method

Publications (1)

Publication Number Publication Date
CN106898071A true CN106898071A (en) 2017-06-27

Family

ID=59185151

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710127112.7A Pending CN106898071A (en) 2017-03-06 2017-03-06 Without non-key smart lock platform and application method

Country Status (1)

Country Link
CN (1) CN106898071A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108898724A (en) * 2018-07-19 2018-11-27 重庆凯泽科技股份有限公司 Intelligent human-face identification lock

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2701124A1 (en) * 2012-08-21 2014-02-26 Bekey A/S Controlling access to a location
CN104282062A (en) * 2014-08-21 2015-01-14 厦门华数电力科技有限公司 Locking and unlocking method based on safe and intelligent lock system
CN105303670A (en) * 2015-12-04 2016-02-03 马孝康 Access control management method, device and system
CN205121680U (en) * 2015-11-24 2016-03-30 重庆理工大学 Bluetooth lock system based on intelligent terminal
CN205427982U (en) * 2015-10-28 2016-08-03 贺州学院 Access control system based on zigBee
CN106296922A (en) * 2016-08-12 2017-01-04 杭州聪灵科技有限公司 A kind of passive intelligent lock cylinder system and implementation method thereof

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2701124A1 (en) * 2012-08-21 2014-02-26 Bekey A/S Controlling access to a location
CN104282062A (en) * 2014-08-21 2015-01-14 厦门华数电力科技有限公司 Locking and unlocking method based on safe and intelligent lock system
CN205427982U (en) * 2015-10-28 2016-08-03 贺州学院 Access control system based on zigBee
CN205121680U (en) * 2015-11-24 2016-03-30 重庆理工大学 Bluetooth lock system based on intelligent terminal
CN105303670A (en) * 2015-12-04 2016-02-03 马孝康 Access control management method, device and system
CN106296922A (en) * 2016-08-12 2017-01-04 杭州聪灵科技有限公司 A kind of passive intelligent lock cylinder system and implementation method thereof

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108898724A (en) * 2018-07-19 2018-11-27 重庆凯泽科技股份有限公司 Intelligent human-face identification lock

Similar Documents

Publication Publication Date Title
US20120171992A1 (en) System and method for secure containment of sensitive financial information stored in a mobile communication terminal
CN101272242A (en) Mobile memory system and method based on network
CN102859966A (en) Wireless network authentication apparatus and methods
CN103237030A (en) Biological recognition-based user authentication method and system
WO2014048354A1 (en) Method, terminal and universal integrated circuit card (uicc) for realizing subscriber identity module (sim) card function in terminal
CN103733591B (en) Removable modules is tied to access terminal
CN104902074B (en) A kind of mobile phone information safety management method based on more permission modes
CN107979835A (en) A kind of eSIM cards and its management method
CN104202299A (en) System and method of identity authentication based on Bluetooth
CN107113613A (en) Server, mobile terminal, real-name network authentication system and method
CN103077357A (en) Method for storing private files
KR20130108442A (en) System and method for secure containment of sensitive financial information stored in a mobile communication terminal
CN106027530A (en) Instant message encryption system based on smartphone and implementation method thereof
CN106898071A (en) Without non-key smart lock platform and application method
CN101192921A (en) Share secret key management device
CN104579639B (en) The realization of multi-party collaborative authorization secret key and move the system of controlled in wireless with it
KR101482321B1 (en) Method for Substituting Password of Certificate by using Biometrics
CN101132277A (en) Biological authentication method
CN105812218A (en) Method for realizing multi-VPN-protocol application access, middleware and mobile terminal
EP3063920B1 (en) Method for setting up, via an intermediate entity, a secure session between a first and a second entity, and corresponding entities and computer program products
CN106385677A (en) Smartphone for carrying out safety communication in public network based on cloud management system
CN105812251A (en) Instant messaging encryption system based on domestic commercial cryptography algorithms and implementation method of instant messaging encryption system based on domestic commercial cryptography algorithms
CN102110218A (en) Mobile-phone-information-encryption-based authentication method
CN103905192B (en) A kind of encrypted authentication method, apparatus and system
CN101848228B (en) Method and system for authenticating computer terminal server ISP identity by using SIM cards

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20170627

WD01 Invention patent application deemed withdrawn after publication