CN107886602B - Method for unlocking and sharing house and system for unlocking and sharing house - Google Patents

Method for unlocking and sharing house and system for unlocking and sharing house Download PDF

Info

Publication number
CN107886602B
CN107886602B CN201710990154.3A CN201710990154A CN107886602B CN 107886602 B CN107886602 B CN 107886602B CN 201710990154 A CN201710990154 A CN 201710990154A CN 107886602 B CN107886602 B CN 107886602B
Authority
CN
China
Prior art keywords
electronic lock
information
server
terminal
unlocking
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710990154.3A
Other languages
Chinese (zh)
Other versions
CN107886602A (en
Inventor
卓聪杰
陈映锋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Dongguan Yungu Photoelectric Technology Co., Ltd.
Original Assignee
Dongguan Yungu Photoelectric Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Dongguan Yungu Photoelectric Technology Co ltd filed Critical Dongguan Yungu Photoelectric Technology Co ltd
Priority to CN201710990154.3A priority Critical patent/CN107886602B/en
Publication of CN107886602A publication Critical patent/CN107886602A/en
Application granted granted Critical
Publication of CN107886602B publication Critical patent/CN107886602B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C1/00Registering, indicating or recording the time of events or elapsed time, e.g. time-recorders for work people
    • G07C1/32Time-recording locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00817Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00817Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed
    • G07C2009/00825Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed remotely by lines or wireless communication

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Lock And Its Accessories (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention is suitable for the technical field of sharing management, in particular to an unlocking and house sharing method and an unlocking and house sharing system, which are applied among terminals, servers and electronic locks, and the method comprises the following steps: the terminal sends an unlocking request to the server, wherein the unlocking request comprises an identity of the electronic lock and login information of a user; the method comprises the steps that a server receives an unlocking request, acquires password information corresponding to an identity of an electronic lock, and sends a timing instruction to the electronic lock, wherein the timing instruction comprises effective time of the password information; the electronic lock starts timing after receiving the timing instruction, and performs unlocking action when receiving the password information within the effective time. Therefore, time-limited keyless unlocking of the shared resource with the electronic lock is realized, the service time of the shared resource is effectively controlled, and the sharing efficiency is improved.

Description

Method for unlocking and sharing house and system for unlocking and sharing house
Technical Field
The invention belongs to the technical field of sharing management, and particularly relates to a method for unlocking and sharing a house and a system for unlocking and sharing the house.
Background
At present, a house owner rents houses to guests in a short time, and the house owner is a new industry. Such a house renting mode is called "daily house renting" by everyone. In the traditional house renting market, the renting time of renters generally ranges from half a year to several years, and the daily renting time is shortened, so that one-day renting service is provided, namely, the renting form of daily rent calculation is adopted. In recent years, a large number of "day renting rooms" have appeared in busy areas such as tourist spots, stations, and school peripheries in the central areas of various large cities. The 'daily renting house' is deeply favored by people needing house use at zero hour due to the flexible renting time.
However, at present, the door lock of the 'rental day' needs to be opened by a conventional key, so the homeowner needs to contact the tenant and stipulate when and where the two parties will deliver the door opening key of the rental house, and the homeowner needs to stipulate when the rental house expires and withdraw the key with the tenant, which is time-consuming and also brings inconvenience. Therefore, how to realize the keyless door lock of the rented house and enable the house owner to conveniently and quickly rent the rented house to the tenant in the appointed renting period is a problem which needs to be considered.
Disclosure of Invention
In view of the above, the invention provides a method for unlocking and sharing a house and a system for unlocking and sharing a house, and aims to solve the problem that a homeowner is time-consuming and inconvenient to rent a house due to the fact that an effective keyless time-limited unlocking method cannot be provided in the prior art.
The embodiment of the invention provides a method for unlocking and sharing a house, which comprises the following steps:
the terminal sends an unlocking request to the server, wherein the unlocking request comprises the identity of the electronic lock and the login information of the user. The server receives the unlocking request, acquires the password information corresponding to the identity of the electronic lock, and sends the timing instruction to the electronic lock, wherein the timing instruction comprises the effective time of the password information. The electronic lock starts timing after receiving the timing instruction, and performs unlocking action when receiving the password information within the effective time.
Further, the step of the terminal sending the unlocking request to the server comprises: the terminal scans the two-dimensional code on the electronic lock to acquire the identity of the electronic lock.
Further, the server obtaining the password information corresponding to the identity of the electronic lock previously comprises: and judging whether the electronic lock is in a bound state. And if the electronic lock is in the bound state, sending a binding failure prompt message to the terminal. And if the electronic lock is not in the bound state, binding the user and the electronic lock, and then entering a step of acquiring password information corresponding to the identity of the electronic lock.
Further, before determining whether the electronic lock is in the bound state, the method further includes: and the server verifies the user according to the login information of the user and judges whether the verification passes or not. And if the verification is passed, entering a step of judging whether the electronic lock is in a bound state. And if the verification is not passed, the server sends registration prompt information to the terminal. And the server receives the registration information uploaded by the terminal, wherein the registration information comprises the biological characteristic information of the user and the login information of the user.
Further, the password information is the biometric information which is input and stored in advance when the user registers.
Further, the password information further includes a set of digital passwords randomly selected by the server from the stored plurality of password information. The step of obtaining the password information corresponding to the identity of the electronic lock further comprises the following steps: and sending the password information to the terminal and the electronic lock.
Further, when the valid remaining time of the password information is less than the threshold, the server sends a time-continuation prompt message to the terminal. And the terminal displays the time-continuation prompt information. The server judges whether a time-continuing request sent by the terminal is received. When the server receives a time-continuing request sent by the terminal, a time-continuing instruction is sent to the electronic lock according to the time-continuing request, and the time-continuing instruction comprises a time-continuing time period. And when the electronic lock receives the password information in a continuous time period, unlocking.
Further, the server sends the room returning prompt message to the terminal when not receiving the time-continuing request sent by the terminal. The terminal acquires and uploads the image information of the room to the server. The server receives the image information, calculates the similarity value of the detected image information and the image information preset by the server, and reduces the attribute value of the user when the similarity value is lower than the preset similarity value, wherein the reduction of the attribute value of the user comprises reduction of at least one of the credit score of the user and the balance of the account.
The embodiment of the invention also provides an unlocking and sharing house system which comprises a terminal, a server and an electronic lock. The terminal is used for sending an unlocking request to the server, and the unlocking request comprises the identity of the electronic lock and login information of the user. The server is used for receiving the unlocking request, acquiring the password information corresponding to the identity of the electronic lock, and sending the timing instruction to the electronic lock, wherein the timing instruction comprises the effective time of the password information. The electronic lock is used for starting timing after receiving the timing instruction and carrying out unlocking action when receiving the password information within the effective time.
Furthermore, the electronic lock is provided with a two-dimensional code, and the terminal obtains the identity of the electronic lock by scanning the two-dimensional code on the electronic lock.
Further, the server is used for sending a binding failure prompt message to the terminal when the electronic lock is in the bound state, and binding the user with the electronic lock when the electronic lock is not in the bound state.
Further, the server is used for performing audit verification on the user according to the login information of the user, judging whether the audit verification passes, and sending registration prompt information to the terminal when the audit verification fails. The server is also used for receiving registration information uploaded by the terminal, and the registration information comprises the biological characteristic information of the user and the login information of the user.
Further, the server is configured to store the password information and randomly select a set of digital passwords from the stored plurality of password information. The server is also used for sending the password information to the terminal and the electronic lock.
Further, the server is used for sending the time-continuous prompt information to the terminal when the valid remaining time of the password information is less than the threshold value. The terminal is used for displaying the time-continuation prompt information. The server is further used for judging whether a time-continuing request sent by the terminal is received or not, and sending a time-continuing instruction to the electronic lock according to the time-continuing request when the time-continuing request sent by the terminal is received, wherein the time-continuing instruction comprises a time-continuing time period. The electronic lock is used for unlocking when the password information is received within a time period.
Further, the server is used for sending the room returning prompt message to the terminal when the time-continuing request sent by the terminal is not received. The terminal is used for acquiring and uploading image information of the room to the server. The server is further used for receiving the image information, calculating a similarity value between the detected image information and the image information preset by the server, and reducing the attribute value of the user when the similarity value is lower than the preset similarity value, wherein the reduction of the attribute value of the user comprises reduction of at least one of the reputation score of the user and the balance of the account.
According to the method for unlocking and sharing the house and the system for unlocking and sharing the house, the unlocking request is sent to the server through the terminal, the unlocking request comprises the identity of the electronic lock and login information of the user, the server receives the unlocking request, password information corresponding to the identity of the electronic lock is obtained, the timing instruction is sent to the electronic lock, the timing instruction comprises the effective time of the password information, the electronic lock starts timing after receiving the timing instruction, and unlocking is carried out when the password information is received within the effective time, so that keyless unlocking within the limited time is realized, and the renting process of a homeowner is simpler and faster.
In order to make the aforementioned and other objects, features and advantages of the invention comprehensible, preferred embodiments accompanied with figures are described in detail below.
Drawings
Fig. 1 shows a flowchart of an implementation of a method for unlocking and sharing a house according to an embodiment of the present invention;
fig. 2 shows a flowchart of an implementation of the method for unlocking and sharing a house according to the second embodiment of the present invention;
fig. 3 shows a flowchart of an implementation of the method for unlocking and sharing a house according to the third embodiment of the present invention;
fig. 4 shows a flowchart of an implementation of the method for unlocking and sharing a house according to the fourth embodiment of the present invention;
fig. 5 shows a structural diagram of an unlocking and shared room system according to the fifth embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The first embodiment is as follows:
fig. 1 shows a flowchart of an implementation of a method for unlocking and sharing a house according to an embodiment of the present invention. Specifically, the method for unlocking and sharing the house provided by the embodiment can be applied to the technical field of electronic locks, the technical field of rental house management and other technical fields of sharing management with electronic locks. In one embodiment of the present invention, a method for unlocking and sharing a house is applied among a terminal, a server and an electronic lock, and includes:
step S101: the terminal sends an unlocking request to the server.
Specifically, the terminal may be a mobile terminal capable of connecting to a network for uploading and downloading or receiving and transmitting information, such as a mobile phone, a smart watch, a tablet computer, and the like.
Specifically, the unlocking request includes an identification of the electronic lock and login information of the user. The login information of the user may be, for example, an account name of the user and an account password corresponding to the account of the user. The account name may be, for example, a mobile phone number, a mailbox, or the like, and the account password may be a numeric password, a voice password, or a combination thereof. In other embodiments, the unlocking request may further include one or more of geographic location information of the user or an identity of the user terminal, and the like, and the unlocking request may further include other attribute information of the electronic lock, such as a level of the electronic lock, and the like. Wherein the level of the electronic lock corresponds to the price of the respective shared resource, e.g. room, etc.
Specifically, a server, also called a waiting server, is a device for providing computer services, and under a network environment, the server is divided into a file server, a database server, an application server, a WEB server, a service management server, a cloud server, a house sharing management server, and the like according to different types of services provided by the server.
Specifically, before the terminal sends an unlocking request to the server, contact needs to be established with the server. The terminal establishes contact with the server through various communication protocols or network protocols.
Step S102: the server acquires password information corresponding to the identity of the electronic lock and sends the timing instruction to the electronic lock.
The server needs to receive an unlocking request sent by the terminal first. The timing instructions include the validity time of the cryptographic information.
Specifically, the password information may be one or more of a digital password with any number of digits, a pattern password, a gesture password, a character password, voice information, motion information, fingerprint information, face information, pupil information, palm print information, audio information, and the like, or one or more of them in any combination.
In the first embodiment of the present invention, the password information may be pre-stored by the user, for example: biometric information set at the time of registration, a digital password, a combination thereof, or the like. The digital password generating method may further include randomly selecting one group of digital passwords from a plurality of digital passwords stored in the electronic lock or the server, or sequentially generating one group of digital passwords in the electronic lock and the server according to a plurality of groups of stored password queues. For example, the multiple sets of passwords stored in the electronic lock and the server are respectively the first password, the second password, and the third password in sequence, so that the electronic lock and the server can set the password information as the first password, the second password, or the third password in sequence according to the number of times of unlocking and the like.
In an embodiment, the server may send the acquired password information corresponding to the identity of the electronic lock to one of the terminal and/or the electronic lock. For example, when the password information acquired by the server is pre-stored by the user, the server may not transmit the password information to the terminal. When the password information acquired by the server is one group sequentially generated with the plurality of groups of password queues stored in the electronic lock, the server does not need to send the password information to the electronic lock, and the server or the electronic lock can send the password information to the terminal so that the terminal can display the password information.
Specifically, the timing instruction is an instruction that enables the timing function of the electronic lock, the server, or the terminal to start functioning. The valid time of the password information is the default of the electronic lock or the server or the user input by the terminal in a customized way. The effective time may be one hour, 24 hours, days, months to months, or years to years. The timing instructions include the validity time of the cryptographic information. The main body of the timing can be one of an electronic lock, a server and a terminal, or at least two of the electronic lock, the server and the terminal. In the embodiment, the timing command is sent to the electronic lock, and the electronic lock is used for timing.
Step S103: the electronic lock starts timing after receiving the timing instruction, and performs unlocking action when receiving the password information within the effective time.
Specifically, the electronic lock is timed after receiving the timing command, and the electronic lock is unlocked when receiving the password information within a valid time, such as 24 hours. The mode of the electronic lock for receiving the password information can be that a user directly inputs the password information through an input device on the electronic lock, such as a keyboard, a touch screen and the like, or can establish connection with the electronic lock through a terminal, such as input after Bluetooth connection and the like.
According to the embodiment, keyless time-limited unlocking can be realized through the password information and the effective time limit of the password information, the unlocking steps during house sharing are simplified, and the efficiency of the sharing process is improved.
Example two:
fig. 2 shows a flowchart of an implementation of the method for unlocking and sharing a house according to the second embodiment of the present invention. Specifically, the method for unlocking and sharing the house provided by the embodiment can be applied to the technical field of two-dimensional codes, the technical field of electronic locks, the technical field of rental house management and other technical fields of sharing management with electronic locks. In the second embodiment of the present invention, the method for unlocking and sharing a house is applied between a terminal, a server and an electronic lock, and includes:
step S201: and uploading the registration information by the terminal.
The registration information includes biometric information of the user and login information of the user.
Specifically, the specific implementation of the login information of the terminal and the user in this embodiment is as described in the first embodiment, and details are not described here. The biological characteristic information of the user comprises one or more of sound information, action information, fingerprint information, face information, pupil information or palm print information and the like. The uploaded registration information in this embodiment may further include deposit payment information of the user, real-name system information of the user, and the like.
Step S202: the terminal scans the two-dimensional code.
Specifically, the two-dimensional code scanned by the terminal may be attached to a door or a wall, or may be an entity two-dimensional code attached to any position of the electronic lock or a two-dimensional code displayed on a display of the electronic lock. In this embodiment, the terminal obtains the identification of the electronic lock by scanning the two-dimensional code, and in other embodiments, the terminal may also receive identification information of the electronic lock sent by other electronic devices to obtain the identification of the electronic lock.
Step S203: the terminal sends an unlocking request to the server.
Specifically, in this embodiment, the specific implementation manner of step S203 is described with reference to the first embodiment, and details will not be described here.
Step S204: and the server verifies the user according to the login information of the user and judges whether the verification passes.
Specifically, the server performs audit verification on the user according to the login information of the user, the verification is the registration information of the user, if the audit verification is judged to be failed, the server sends registration prompt information to the terminal, and the step of step S201 is returned. If the determination is made as pass, the subsequent step S205 is performed.
Step S205: the server judges whether the electronic lock is in a bound state.
Specifically, the electronic lock being in the binding state includes the electronic lock being occupied or a facility, such as a room, corresponding to the electronic lock being in a state of not being usable.
If the electronic lock is in the binding state, step S206: and the server sends a binding failure prompt message to the terminal.
Specifically, the binding failure information may include, for example: the room is occupied, the binding is invalid, the binding is not available, etc.
If the electronic lock is not in the unbound state, step S207 is entered: and the server requests to upload the real-name information of the resident.
Specifically, the real-name system information includes the name, gender, identification card number, front and back photos of the user, the face photo of the resident at that time, and the like. The terminal can upload the real-name information of the resident through a webpage or an application program on the terminal. When a plurality of people live in, the real-name information of the plurality of people can be added. After the real-name system information is uploaded, the server checks whether the uploaded real-name system information meets the requirements or not, and if the uploaded real-name system information does not meet the requirements, the server requests the user terminal to upload the real-name system information again.
Step S208: the server acquires password information corresponding to the identity of the electronic lock and sends the timing instruction to the electronic lock.
Step S209: the electronic lock starts timing after receiving the timing instruction, and performs unlocking action when receiving the password information within the effective time.
Specifically, the specific implementation manner of step S208 and step S209 in this embodiment refers to the first embodiment, and will not be described herein again.
According to the embodiment, keyless time-limited unlocking can be achieved through the steps of effective time limitation of the password information and verification of the identity of the person living in, unlocking steps during house sharing are simplified, the efficiency of the sharing process is improved, real-name information of the person living in can be automatically verified, and the flexibility is high.
Example three:
fig. 3 shows an implementation flowchart of the method for unlocking and sharing a house according to the third embodiment of the present invention. Specifically, the method for unlocking and sharing the house provided by the embodiment can be applied to the technical field of electronic locks, the technical field of rental house management and other technical fields of sharing management with electronic locks. In the third embodiment of the present invention, the method for unlocking and sharing a house is applied among a terminal, a server and an electronic lock, and includes:
step S301: the terminal sends an unlocking request to the server.
Step S302: the server acquires password information corresponding to the identity of the electronic lock and sends the timing instruction to the electronic lock.
Step S303: the electronic lock starts timing after receiving the timing instruction, and performs unlocking action when receiving the password information within the effective time.
Specifically, the specific implementation of step S301, step S302, and step S303 in this embodiment refers to the description of the first embodiment, and will not be described again in this embodiment.
Step S304: and when the effective time of the password information is less than the threshold value, the server sends a time-continuation prompt message to the terminal.
In particular, the threshold value, also referred to as a threshold value, refers to the minimum input value that can produce a corrective action in the automatic control system. The threshold value of the effective time in this embodiment may be any period of time, such as one minute, five minutes, ten minutes, thirty minutes, one hour, several hours, one day, several days, one month, or several months. The threshold value of this embodiment is at least one. In this embodiment, after the server sends the time-continuation prompt message to the terminal, the terminal may, but is not limited to, display the time-continuation prompt message through a short message or an application program, and the user may input a time-continuation operation instruction as needed after knowing the prompt message displayed by the terminal, so that the terminal sends a time-continuation request to the server.
Step S305: and when the server receives the time-continuing request sent by the terminal, sending a time-continuing instruction to the electronic lock according to the time-continuing request.
The time duration request includes a time duration period, which may be a default series of time periods for the server, the terminal, or the electronic lock, for example: thirty minutes, an hour, several hours, a day, several days, a month or several months, etc., and may also be a user-defined time period of duration through the terminal.
Step S306: and when the electronic lock receives the password information in a continuous time period, unlocking.
Specifically, in this embodiment, after receiving the time duration request including the time duration period, the server sends the extended timing instruction to the electronic lock. After the electronic lock receives the timing prolonging instruction, the electronic lock can be unlocked when the password information is received within the time duration. The manner in which the electronic lock receives the password information is as described in the first embodiment, and will not be described herein again.
Specifically, the continuous time period may be, but is not limited to, continuous effective time or discontinuous effective time. For example, the effective time is 1 to 2, the time period may be, but is not limited to, 2 to 3, 3 to 4, and so on.
According to the embodiment, the keyless time-limited unlocking and time-limited duration can be realized through the password information and the effective time limitation and time continuation steps of the password information, so that the unlocking step during house sharing and the step of prolonging the house sharing time are simplified.
Example four:
fig. 4 shows a flowchart of an implementation of the method for unlocking and sharing a house according to the fourth embodiment of the present invention. Specifically, the method for unlocking and sharing the house provided by the embodiment can be applied to the technical field of electronic locks, the technical field of rental house management and other technical fields of sharing management with electronic locks. In the fourth embodiment of the present invention, the method for unlocking and sharing a house is applied among a terminal, a server and an electronic lock, and includes:
step S401: the terminal sends an unlocking request to the server.
Step S402: the server acquires password information corresponding to the identity of the electronic lock and sends the timing instruction to the electronic lock.
Step S403: the electronic lock starts timing after receiving the timing instruction, and performs unlocking action when receiving the password information within the effective time.
Specifically, the specific implementation of step S401, step S402, and step S403 in this embodiment refers to the description of the first embodiment, and will not be described again in this embodiment.
Step S404: and the terminal uploads the image information of the room to the server.
Specifically, in this embodiment, when the valid remaining time of the password is less than the threshold, the server sends the retirement prompt message to the terminal. And after the terminal acquires the room returning prompt information, the room returning prompt information is displayed to the user, and the user uploads the image information of the room to the server through the terminal. In other embodiments, when the valid time of the password information is less than the threshold, the server may first send the time-continuation prompt message to the terminal, and send the room-returning prompt message to the terminal when the time-continuation request is not received. After the terminal acquires the room returning prompt information, the room returning prompt information is displayed to the user, and then the user can upload the image information of the room to the server through the terminal.
The specific implementation of the threshold value refers to the third embodiment, and will not be described herein again. The room returning prompt information comprises one or more items of room identity identification information or electronic lock identity identification information, effective remaining time of password information, room returning operation prompt, an action required to be executed during room returning, a requirement for uploading image information during room returning, preset image information and the like. The main body for sending the room-returning prompt message to the terminal can also be an electronic lock. The method for sending the room-returning prompting information to the terminal can be one or more of sending through a short message, sending through an application program, sending through a telephone, sending through Bluetooth, sending through a wireless network or sending through near-field microwave.
In addition, in this embodiment, when the valid time of the password information is not set to the threshold or the valid time of the password information is greater than the threshold, the user uploads the image information of the room to the server through the terminal by himself, that is, the user actively returns the room.
The mode of uploading the image information of the room by the terminal may be through a web page or an application program on the terminal. The uploaded image information should meet the requirements in the refuge prompt information, and in this embodiment, for example: the uploaded image information should include an image of a specific location in the room, and the uploaded image of the room should also include time information of the acquired image and/or identification information of the location, and the like. Specifically, the identification information of the place may be determined by, for example, a two-dimensional code image within a room in the image.
Step S405: the server receives the image information, calculates the similarity value of the detected image information and the image information preset by the server, and reduces the attribute value of the user when the similarity value is lower than the preset similarity value.
Specifically, in one embodiment, after receiving image information uploaded by a terminal, a server starts to detect original shooting time, original shooting location and image content of the image information, and when the detected image information has one or more of the conditions that the shooting time is uncertain or incorrect, the shooting location is uncertain or incorrect, the shot image content is unclear or not meet requirements and the like, the server feeds back information of the image content meeting the requirements to the terminal again to be uploaded until the detection is qualified.
The preset image information comprises objects which are easy to damage, move or carry in the room, and also comprises furniture, wall surfaces and the like which are frequently used or easy to damage in the room. The preset image information also comprises the content of normal closing of the electronic lock and the like when the user is located outside the door in the closed state.
When the detected image information uploaded by the terminal is qualified, the server may, but is not limited to, calculate a similarity value between the detected image information and the image information preset by the server, and compare the similarity value with the similarity value preset by the server. For example: the preset similarity value can be 80% -100%. And when the similarity value is lower than the preset similarity value, reducing the attribute value of the user, wherein the reduction of the attribute value of the user comprises one or more of reduction of credit score of the user, balance of an account, deposit provided by the user, preferential benefit enjoyed by the user later or high-speed refund preferential treatment and the like. In this embodiment, the attribute value of the user may be at least one of a reputation score of the user and a balance of the account.
According to the embodiment, the keyless time-limited unlocking, the unlocking step during house sharing simplification and the property safety of the shared house can be realized through the effective time limitation of the password information and the self-service house returning step.
Example five:
fig. 5 shows a structural diagram of an unlocking and shared room system according to the fifth embodiment of the present invention. The fifth embodiment of the invention provides a system for unlocking and sharing a house. In the embodiment of the present invention, the unlocking and room sharing system includes a terminal 51, a server 52, and an electronic lock 53.
Specifically, in the present embodiment, the terminal 51 is configured to send an unlocking request to the server 52. The unlocking request includes the identification of the electronic lock 53 and the login information of the user.
In one embodiment, the terminal 51 may scan a two-dimensional code on the electronic lock 53 to obtain the identity of the electronic lock 53.
The server 52 is configured to receive an unlocking request, acquire password information corresponding to the identification of the electronic lock 53, send a timing instruction to the electronic lock 53, and send the password information to the terminal 51 and the electronic lock 53. Wherein the timing instruction includes a valid time of the cryptographic information.
The electronic lock 53 is configured to start timing after receiving a timing command, and perform an unlocking operation when receiving the password information within a valid time.
In other embodiments, before the server 52 obtains the password information corresponding to the identity of the electronic lock 53, the server 52 is further configured to determine whether the electronic lock 53 is in the bound state, and send a binding failure prompt message to the terminal 51 when the electronic lock 53 is in the bound state. Or bind the user with the electronic lock 53 when the electronic lock 53 is not in the bound state.
In addition, before the server 52 determines whether the electronic lock 53 is in the bound state, the server 52 may be further configured to perform an audit verification on the user according to the login information of the user, and determine whether the audit verification is passed. The server 52 is also configured to send registration prompt information to the terminal 53 when the audit verification fails.
In one embodiment, the server 52 may be further configured to receive registration information uploaded by the terminal 53, where the registration information includes biometric information of the user and login information of the user.
In addition, in other embodiments, the server 52 is configured to send the prompt message to the terminal 51 when the validity time of the password message is less than the threshold. The terminal 51 may also be used to present a time-lapse reminder message. When receiving the time-out request sent by the terminal 51, the server 52 sends a time-out command to the electronic lock 53 according to the time-out request, wherein the time-out command includes a time-out period.
The electronic lock 53 is also configured to perform an unlocking operation when the password information is received within a time-continuous period.
In addition, the server 52 is further configured to send the refuge prompt message to the terminal 51 when the time-out request sent by the terminal 51 is not received. The terminal 51 is further configured to upload the image information of the room to the server 52 after receiving and displaying the room-returning prompt information. The server 52 is further configured to receive the image information, calculate a similarity value between the detected image information and the image information preset by the server 52, and decrease the attribute value of the user when the similarity value is lower than the preset similarity value, where decreasing the attribute value of the user includes decreasing at least one of a reputation score and an account balance of the user.
The unlocking and room sharing system provided by the fifth embodiment of the present invention includes a terminal 51, a server 52 and an electronic lock 53, which are not listed here, and specific implementation manners and implementation effects can refer to the first embodiment, the second embodiment, the third embodiment and the fourth embodiment, and are not described herein again.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents and improvements made within the spirit and principle of the present invention are intended to be included within the scope of the present invention.

Claims (15)

1. A method for unlocking and sharing a house is characterized by being applied among a terminal, a server and an electronic lock, and comprising the following steps:
the terminal sends an unlocking request to the server, wherein the unlocking request comprises the identity of the electronic lock and login information of a user;
the server receives the unlocking request, acquires password information corresponding to the identity of the electronic lock, and sends a timing instruction to the electronic lock, wherein the timing instruction comprises the effective time of the password information;
the electronic lock starts timing after receiving the timing instruction, and performs unlocking action when receiving the password information within the effective time;
the server receives image information sent by the terminal when the terminal leaves a room, wherein the image information comprises an image of a specific position in the room, time information and/or place identification information when the image is acquired, and the place identification information is determined through a two-dimensional code at the specific position in the room;
and after detecting that the image information is qualified, the server calculates a similarity value between the image information and preset image information, and reduces the attribute value of the user when the similarity value is lower than the preset similarity value.
2. The method of unlocking and sharing premises of claim 1, wherein the step of said terminal sending an unlock request to said server is preceded by:
and the terminal scans the two-dimensional code on the electronic lock to acquire the identity of the electronic lock.
3. The method of unlocking and sharing a house according to claim 1, wherein the step of the server obtaining the password information corresponding to the identification of the electronic lock comprises:
judging whether the electronic lock is in a bound state;
if the electronic lock is in the bound state, sending a binding failure prompt message to the terminal;
and if the electronic lock is not in the bound state, binding the user and the electronic lock, and then entering a step of acquiring password information corresponding to the identity of the electronic lock.
4. The method of unlocking and sharing a house of claim 3, further comprising, before determining whether the electronic lock is in the bound state:
the server verifies the user according to the login information of the user and judges whether the verification passes;
if the verification is passed, entering a step of judging whether the electronic lock is in a bound state;
if the verification is not passed, the server sends registration prompt information to the terminal;
and the server receives registration information uploaded by the terminal, wherein the registration information comprises the biological characteristic information of the user and the login information of the user.
5. The method of unlocking and sharing a house according to claim 4, wherein the password information is the biometric information previously input and stored when the user registers.
6. The method of unlocking and sharing premises of claim 5, wherein said password information further comprises a set of numeric passwords randomly selected by said server from a plurality of stored password information;
the step of obtaining the password information corresponding to the identity of the electronic lock further comprises the following steps:
and sending the password information to the terminal and the electronic lock.
7. The method of unlocking and sharing a house of claim 1, the method further comprising:
when the valid remaining time of the password information is less than a threshold value, the server sends a time-continuation prompt message to the terminal;
the terminal displays the time-continuation prompt information;
the server judges whether a time-continuing request sent by the terminal is received or not;
when receiving a time-out request sent by the terminal, the server sends a time-out instruction to the electronic lock according to the time-out request, wherein the time-out instruction comprises a time-out time period;
and when the electronic lock receives the password information in the time-continuous time period, the unlocking action is carried out.
8. The method of unlocking and sharing a house of claim 7, the method further comprising:
the server sends a room returning prompt message to the terminal when not receiving the time continuing request sent by the terminal;
the terminal acquires and uploads image information of a room to the server;
the server receives the image information, calculates a similarity value between the detected image information and image information preset by the server, and reduces the attribute value of the user when the similarity value is lower than a preset similarity value, wherein the reduction of the attribute value of the user comprises reduction of at least one of credit score of the user and balance of an account.
9. An unlocking and sharing house system is characterized in that the unlocking and sharing house system comprises a terminal, a server and an electronic lock;
the terminal is used for sending an unlocking request to the server, and the unlocking request comprises the identity of the electronic lock and login information of a user;
the server is used for receiving the unlocking request, acquiring password information corresponding to the identity of the electronic lock and sending a timing instruction to the electronic lock, wherein the timing instruction comprises the effective time of the password information;
the electronic lock is used for starting timing after receiving the timing instruction and carrying out unlocking action when receiving the password information within the effective time;
the server is further configured to receive image information sent by the terminal when the terminal leaves the room, calculate a similarity value between the image information and preset image information after detecting that the image information is qualified, and reduce the attribute value of the user when the similarity value is lower than the preset similarity value, where the image information includes an image of a specific position in the room, time information and/or location identification information when the image is acquired, and the location identification information is determined by a two-dimensional code at the specific position in the room.
10. The unlocking and room sharing system of claim 9, wherein the electronic lock is provided with a two-dimensional code, and the terminal obtains the identification of the electronic lock by scanning the two-dimensional code on the electronic lock.
11. The unlocking and sharing house system according to claim 9, wherein the server is configured to send a binding failure prompt message to the terminal when the electronic lock is in the bound state, and bind the user with the electronic lock when the electronic lock is not in the bound state.
12. The unlocking and sharing house system according to claim 11, wherein the server is configured to perform an audit verification on the user according to the login information of the user, determine whether the audit verification passes, and send a registration prompt message to the terminal when the audit verification fails;
the server is further used for receiving registration information uploaded by the terminal, wherein the registration information comprises the biological characteristic information of the user and the login information of the user.
13. The system for unlocked and shared housing of claim 12, wherein said server is adapted to store password information and to randomly select a set of numeric passwords from a plurality of stored password information;
the server is further used for sending the password information to the terminal and the electronic lock.
14. The unlocking and sharing house system according to claim 9, wherein the server is configured to send a time-continuation prompt message to the terminal when the remaining time of validity of the password information is less than a threshold value;
the terminal is used for displaying the time-continuation prompt information;
the server is further used for judging whether a time-out request sent by the terminal is received or not, and sending a time-out instruction to the electronic lock according to the time-out request when the time-out request sent by the terminal is received, wherein the time-out instruction comprises a time-out time period;
and the electronic lock is used for unlocking when the password information is received in the time-continuous time period.
15. The unlocking and sharing house system according to claim 14, wherein the server is configured to send a room-returning prompt message to the terminal when a time-continuation request sent by the terminal is not received;
the terminal is used for acquiring and uploading image information of a room to the server;
the server is further configured to receive the image information, calculate a similarity value between the detected image information and image information preset by the server, and reduce the attribute value of the user when the similarity value is lower than a preset similarity value, where reducing the attribute value of the user includes reducing at least one of a reputation score of the user and a balance of an account.
CN201710990154.3A 2017-10-23 2017-10-23 Method for unlocking and sharing house and system for unlocking and sharing house Active CN107886602B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710990154.3A CN107886602B (en) 2017-10-23 2017-10-23 Method for unlocking and sharing house and system for unlocking and sharing house

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710990154.3A CN107886602B (en) 2017-10-23 2017-10-23 Method for unlocking and sharing house and system for unlocking and sharing house

Publications (2)

Publication Number Publication Date
CN107886602A CN107886602A (en) 2018-04-06
CN107886602B true CN107886602B (en) 2020-11-06

Family

ID=61781945

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710990154.3A Active CN107886602B (en) 2017-10-23 2017-10-23 Method for unlocking and sharing house and system for unlocking and sharing house

Country Status (1)

Country Link
CN (1) CN107886602B (en)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109087424B (en) * 2018-08-04 2021-08-17 韶关市英诺维科技设备有限公司 Public security system-based method for detecting stack check-in identity
CN109410397B (en) * 2018-10-17 2021-09-24 惠州市博实结科技有限公司 Unlocking method, unlocking system, intelligent terminal and intelligent terminal storage medium
CN111199596A (en) * 2018-10-31 2020-05-26 云丁网络技术(北京)有限公司 Intelligent door lock control method, device and system
CN110910544A (en) * 2019-12-17 2020-03-24 深圳市深华方科技有限公司 Dynamic password door opening method and door lock
CN111383371B (en) * 2020-04-29 2021-09-14 珠海格力电器股份有限公司 Unlocking method, door lock, server, system, storage medium and electronic device
CN112258704A (en) * 2020-10-22 2021-01-22 上海廖迎网络科技有限公司 Shared electronic lock and unlocking method thereof
CN112819999A (en) * 2020-12-31 2021-05-18 重庆房慧科技有限公司 Intelligent security system

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102262793A (en) * 2010-05-26 2011-11-30 中兴通讯股份有限公司 Entrance guard control method and entrance guard control system
CN104574598A (en) * 2014-12-29 2015-04-29 张泽 Centralized control method and system for intelligent door lock
CN204759558U (en) * 2015-07-14 2015-11-11 深圳市亲邻科技有限公司 Intelligent entrance guard , equipment and system
CN105279832A (en) * 2015-12-01 2016-01-27 北京卡多宝信息技术有限公司 Intelligent door lock system and control method thereof
CN105303670A (en) * 2015-12-04 2016-02-03 马孝康 Access control management method, device and system
CN105321237A (en) * 2014-08-05 2016-02-10 艾默生网络能源有限公司 Management method and system for door control of cabinet
CN205644698U (en) * 2016-04-25 2016-10-12 中山睿点智能科技有限公司 Electron door lock control system

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE3002798A1 (en) * 1980-01-26 1981-07-30 Rudolf Wanzl Kg, 8874 Leipheim Photoelectric detection of goods trolleys - uses reflected beam sensor to provide non-contact sensing of supermarket trolley
CN105847418A (en) * 2016-05-12 2016-08-10 重庆佐鸣科技有限公司 Check-out information processing method, device and system

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102262793A (en) * 2010-05-26 2011-11-30 中兴通讯股份有限公司 Entrance guard control method and entrance guard control system
CN105321237A (en) * 2014-08-05 2016-02-10 艾默生网络能源有限公司 Management method and system for door control of cabinet
CN104574598A (en) * 2014-12-29 2015-04-29 张泽 Centralized control method and system for intelligent door lock
CN204759558U (en) * 2015-07-14 2015-11-11 深圳市亲邻科技有限公司 Intelligent entrance guard , equipment and system
CN105279832A (en) * 2015-12-01 2016-01-27 北京卡多宝信息技术有限公司 Intelligent door lock system and control method thereof
CN105303670A (en) * 2015-12-04 2016-02-03 马孝康 Access control management method, device and system
CN205644698U (en) * 2016-04-25 2016-10-12 中山睿点智能科技有限公司 Electron door lock control system

Also Published As

Publication number Publication date
CN107886602A (en) 2018-04-06

Similar Documents

Publication Publication Date Title
CN107886602B (en) Method for unlocking and sharing house and system for unlocking and sharing house
US10121301B1 (en) Web-based structure access
US9247010B2 (en) Method, system, and devices for facilitating real-time social and business interactions/networking
US11854105B2 (en) System and method for visitation management in a controlled environment
JP5925373B1 (en) Communication support system
US20170251344A1 (en) Method and System for Connecting People in a Social Network
CN110211262B (en) House use state judgment system and method and access control equipment
US10629014B1 (en) Web-based structure access
US11165584B2 (en) Method for transmitting personal information
JP2009003805A (en) Validity authentication system and validity authentication method
US20170169635A1 (en) Method and system for visitor access control management
CN105447743A (en) Cloud-based house transaction system and method
JP2017517825A (en) Dynamic context device network
CN113808312B (en) Front-desk-free hotel management method and system
CN108734888A (en) A kind of locker and its storing method
KR20150133055A (en) An electronic attendance method with a wireless access point
CN108876987A (en) Building access control method, Cloud Server and computer readable storage medium
KR20130131543A (en) House lease system and method using qr code
AU2015101875A4 (en) Site Attendance Management System
CN108197916B (en) Hotel application system based on mobile terminal and hotel equipment system
CN115410301A (en) Visitor invitation access control authority management method, device and system based on two-dimensional code
US10713872B1 (en) Access to controlled-environment facility visitation centers and controlled-environment facility resident visits
AU2021203079A1 (en) A system, computing device and application server for voting
JP2014006642A (en) Request reception system, communication terminal device, reception terminal device, request implementation program, request reception program and request reception method
JP7422428B1 (en) Visitor information sharing device, visitor information sharing system and computer program

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20190520

Address after: 523710 First Floor, 60 Baoling Road, Pingshan Community, Tangxia Town, Dongguan City, Guangdong Province

Applicant after: Dongguan Yungu Photoelectric Technology Co., Ltd.

Address before: 518001 No. 230 Taojin Mountain, Cuiyin Road, Donghu Street, Luohu District, Shenzhen City, Guangdong Province

Applicant before: Shenzhen summit Biotechnology Co., Ltd.

GR01 Patent grant
GR01 Patent grant