CN108537925B - Lock terminal joint control method - Google Patents

Lock terminal joint control method Download PDF

Info

Publication number
CN108537925B
CN108537925B CN201810294140.2A CN201810294140A CN108537925B CN 108537925 B CN108537925 B CN 108537925B CN 201810294140 A CN201810294140 A CN 201810294140A CN 108537925 B CN108537925 B CN 108537925B
Authority
CN
China
Prior art keywords
terminal
lock
management
lock terminal
authority
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810294140.2A
Other languages
Chinese (zh)
Other versions
CN108537925A (en
Inventor
郭萌
李鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Hardrock Technology Co ltd
Original Assignee
Anheng Shitong Beijing Network Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Anheng Shitong Beijing Network Technology Co ltd filed Critical Anheng Shitong Beijing Network Technology Co ltd
Priority to CN201810294140.2A priority Critical patent/CN108537925B/en
Publication of CN108537925A publication Critical patent/CN108537925A/en
Application granted granted Critical
Publication of CN108537925B publication Critical patent/CN108537925B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit

Abstract

The invention discloses a lock terminal joint control method, which comprises the following steps: networking when the lockset terminal is powered on; the lockset terminal judges whether the management terminal has the control authority, if so, the operation authority is opened for the management terminal with the control authority; and the lock terminal uploads the lock data to a management terminal with control authority. Therefore, the invention provides the realization of the networking of the lock terminal, the opening of the operation authority and the uploading of the lock data from the lock terminal side, realizes the networking management and control of the lock terminal, can conveniently manage a large number of lock terminals for a management side such as a server, is particularly suitable for being applied to occasions needing the networking management and control of a large number of lock terminals such as communities, apartments, hotels, co-production rooms, rental rooms and the like, and has high market application value.

Description

Lock terminal joint control method
Technical Field
The invention relates to intelligent control of a lockset terminal, in particular to a lockset terminal joint control method.
Background
With the development of the technology, the research and the application of the Intelligent Lock (also called Intelligent Lock) have greatly improved, and Intelligent wings are added to the Lock by technologies such as fingerprint unlocking, sound unlocking and remote unlocking. The intelligent lock is different from a traditional mechanical lock, and is a lock which is more intelligent in the aspects of user identification, safety and manageability. The network communication-capable intelligent lock or its control device is understood as a lock terminal in a broad sense, and may also be called a network intelligent lock.
However, how to improve the networking and control of the intelligent lock is a technical problem to be solved.
Disclosure of Invention
The invention provides a novel lock terminal joint control method.
The technical scheme of the invention is as follows: a lock terminal joint control method comprises the following steps:
networking when the lockset terminal is powered on;
the lockset terminal judges whether the management terminal has the control authority, if so, the operation authority is opened for the management terminal with the control authority;
and the lock terminal uploads the lock data to a management terminal with control authority.
For example, the lock terminal acquires image data as the lock data or as part of the lock data each time the door is opened.
For example, the lock terminal respectively acquires image data as the lock data or as part of the lock data at a first preset time before door opening, at door opening and at a second preset time after door opening.
Preferably, the lockset terminal is networked when being powered on, and the method comprises the following steps:
powering on the lockset terminal;
reading the network type;
judging whether a dynamic host configuration protocol is started, if so, further judging whether the connection server is successful, otherwise, reading the lockset terminal networking information, and then further judging whether the connection server is successful;
when the connection with the server is unsuccessful, continuing to read the network type;
and when the server is successfully connected, the lockset terminal feeds back networking success information.
Preferably, after the lock terminal determines that the management terminal has the control authority and before the management terminal having the control authority opens the operation authority, the lock terminal joint control method further includes the steps of: the lock terminal is bound to the management terminal.
Preferably, the lock terminal is bound to the management terminal, and includes the following steps:
reporting a lock terminal identification number to a management terminal with control authority;
and inquiring whether the lockset terminal is bound or not from a management terminal, if so, encrypting and decrypting the communication content by using the new key, and otherwise, modifying the equipment key and then encrypting and decrypting the communication content by using the new key.
Preferably, the lock terminal uploads the lock data to a management terminal with control authority, and the method comprises the following steps: and when the lock terminal receives the data uploading instruction, the lock terminal uploads the lock data to the management terminal with the control authority.
Preferably, the lock terminal uploads the lock data to a management terminal with control authority, and the method comprises the following steps: when the lock terminal receives a door opening signal, lock data are uploaded to a management terminal with control authority.
Preferably, the lock terminal uploads the lock data to a management terminal with control authority, and the method comprises the following steps:
when receiving a door opening signal and triggering a data uploading instruction, the lockset terminal sends lockset data to a management terminal with control authority and receives a maximum record number;
and judging whether the current maximum record number is larger than the local maximum record number, if so, stopping uploading the lockset data to the management terminal with the control authority, otherwise, continuously sending the lockset data to the management terminal with the control authority and receiving the maximum record number.
Preferably, the lock data includes door opening data of the lock terminal.
Preferably, the lock terminal uploads the lock data to the management terminal with the control authority at regular time.
Preferably, the lock terminal uploads lock data to a management terminal with control authority in real time.
By adopting the scheme, the realization of the networking of the lock terminal, the opening of the operation authority and the uploading of the lock data is provided from the lock terminal side, the networking management and control of the lock terminal are realized, a large number of lock terminals can be conveniently managed for a management side such as a server, the lock terminal is particularly suitable for occasions needing the networking management and control of a large number of lock terminals such as communities, apartments, hotels, co-production rooms and rental rooms, and the like, and the lock terminal has high market application value.
Drawings
FIG. 1 is a schematic diagram of one embodiment of the present invention;
FIG. 2 is a schematic diagram of a networking flow of another embodiment of the present invention;
FIG. 3 is a binding flow diagram according to another embodiment of the present invention;
fig. 4 is a schematic view illustrating an upload door opening recording process according to another embodiment of the present invention.
Detailed Description
In order to facilitate an understanding of the invention, the invention is described in more detail below with reference to the accompanying drawings and specific examples. This invention may, however, be embodied in many different forms and should not be construed as limited to the embodiments set forth herein. It will be understood that when an element is referred to as being "secured to" another element, it can be directly on the other element or intervening elements may also be present. When an element is referred to as being "connected" to another element, it can be directly connected to the other element or intervening elements may also be present.
Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs. The terminology used in the description of the invention herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used herein, the term "and/or" includes any and all combinations of one or more of the associated listed items.
As shown in fig. 1, an embodiment of the present invention is a lock terminal joint control method, which includes the steps of: networking when the lockset terminal is powered on; the lockset terminal judges whether the management terminal has the control authority, if so, the operation authority is opened for the management terminal with the control authority; and the lock terminal uploads the lock data to a management terminal with control authority. Therefore, the invention provides the realization of the networking of the lock terminal, the opening of the operation authority and the uploading of the lock data from the lock terminal side, realizes the networking management and control of the lock terminal, can conveniently manage a large number of lock terminals for a management side such as a server, is particularly suitable for being applied to occasions needing the networking management and control of a large number of lock terminals such as communities, apartments, hotels, co-production rooms, rental rooms and the like, and has high market application value.
In various embodiments, the tool to lock terminal can realize networking and management and control, therefore can be called intelligent lock or wisdom lock. For example, a lock terminal joint control method comprises the following steps.
For example, networking is performed when the lock terminal is powered on; preferably, the lockset terminal is networked when being powered on, and the method comprises the following steps: powering on the lockset terminal; reading the network type; judging whether a Dynamic Host Configuration Protocol (DHCP) is started or not, if so, further judging whether the connection server is successful or not, otherwise, reading the networking information of the lockset terminal, and further judging whether the connection server is successful or not; when the connection with the server is unsuccessful, continuing to read the network type; when the server is successfully connected, the lockset terminal feeds back networking success information; for example, the control networking success indicator lights are often on or flashing or blinking for a period of time. As another example, the lock terminal networking information includes a lock terminal IP address, a subnet mask, and a default gateway. For example, as shown in FIG. 2, the lock terminal is powered up; reading the network type; judging whether a dynamic host configuration protocol is started, if so, further judging whether the connection server is successful, otherwise, reading a terminal (namely a locker terminal) IP address, a subnet mask and a default gateway, and further judging whether the connection server is successful; when the connection with the server is unsuccessful, continuing to read the network type; and when the server is successfully connected, the networking success indicating lamp is on. In this way, networked control may be achieved, connecting the lock terminal to a server, for example, the server comprising a router and/or the administration end.
For example, the lock terminal judges whether the management terminal has the control authority, and if so, the operation authority is opened for the management terminal with the control authority; preferably, the lockset terminal authenticates the management terminal to judge whether the management terminal has the control authority; for example, the lock terminal receives a user name and a password sent by the management terminal, performs authentication, determines that the management terminal has a control authority when the authentication is passed, and determines that the management terminal does not have the control authority when the authentication is not passed. For another example, the opening of the operation right to the management end with the control right includes opening of the door opening password setting, modifying and/or deleting right to the management end with the control right, at this time, the operation right includes the door opening password setting right, the door opening password modifying right and/or the door opening password deleting right, and so on in other embodiments. It can be understood that, with the intellectualization of the lock terminal, the operation rights will be richer and richer, such as playing video, transmitting voice, logging in Facebook, receiving and sending WeChat, etc., and the present invention is not limited to these operation rights. For example, the management terminal includes a mobile terminal such as a mobile phone, and the management terminal authenticates the management terminal by scanning a connection mode of the lock terminal and inputting an initial user name and an initial password obtained when the lock terminal is purchased to determine whether the management terminal has a control authority, for example, the operation authority further includes a modification authority of the user name and the password.
Preferably, after the lock terminal determines that the management terminal has the control authority and before the management terminal having the control authority opens the operation authority, the lock terminal joint control method further includes the steps of: the lock terminal is bound to the management terminal. Preferably, the lock terminal is bound to the management terminal, and includes the following steps: reporting an identification number to a management terminal with control authority; and inquiring whether the lock terminal is bound to a management terminal (namely a server) or not, if so, encrypting and decrypting the communication content by using the new key, otherwise, modifying the equipment key (namely the terminal equipment key) and then encrypting and decrypting the communication content by using the new key. For example, the lock terminal is bound to the management terminal, and includes the following steps: and reporting the unique identification number of the lock terminal to a management terminal with control authority, and inquiring whether the lock terminal is bound or not from the management terminal, if so, encrypting and decrypting the communication content by using a new key, otherwise, modifying the equipment key and then encrypting and decrypting the communication content by using the new key. For example, as shown in fig. 3, the lock terminal successfully networks, reports the identification number of the terminal device (i.e., the lock terminal), and the server (i.e., the management terminal) inquires whether to bind, encrypts and decrypts the communication content using the new key if the identification number is "binding", or encrypts and decrypts the communication content using the new key after modifying the device key (i.e., the terminal device key), and binding is completed. Therefore, the lockset terminal can be bound to a management end with control authority; the management end can manage a plurality of lock terminals bound by the management end simultaneously or sequentially. Preferably, the Encryption and decryption are implemented using Advanced Encryption Standard (AES). AES is a block encryption standard adopted by the federal government in the united states, has been analyzed by many parties and is widely used throughout the world. The encryption algorithm has high calculation speed, is suitable for running in a single chip microcomputer environment, simultaneously supports multiple server languages, and has good compatibility and strong expandability. The most important advantage of the encryption algorithm is safety, and the cracking probability is almost 0. For example, the advanced encryption standard is AES-128. For the lockset terminal, the AES-128 can give consideration to the efficiency and the safety of data communication.
For example, the lock terminal uploads lock data to a management terminal with control authority. Preferably, the lock data includes door opening data of the lock terminal. Preferably, the lock terminal uploads the lock data to the management terminal with the control authority at regular time, for example, the lock terminal uploads the lock data to the management terminal with the control authority every 12 or 24 hours. Preferably, the lock terminal uploads lock data to a management terminal with control authority in real time. For example, when the door is opened, the lock terminal uploads lock data to the management terminal with the control authority in real time. Preferably, when a preset uploading condition is reached, the lockset terminal uploads lockset data to the management terminal with the control authority. For example, the uploading condition is that or the uploading condition includes that an owner of the lock terminal logs in the lock terminal or opens the lock terminal through fingerprint identification, so that the lock data uploading of the lock terminal can be controlled strictly.
For example, the lock terminal acquires image data as the lock data or as part of the lock data each time the door is opened. For example, the lock terminal respectively acquires image data as the lock data or as part of the lock data at a first preset time before door opening, at door opening and at a second preset time after door opening. Therefore, the lockset data uploaded by the lockset terminal comprises image data when the door is opened, or three image data before and after the door is opened, so that strong evidence can be provided when an accident occurs; preferably, the device can also prevent the crime and play a role in warning and deterring the crime, and sprout in an ungerminated state to reduce the crime rate. For example, a lock terminal joint control method includes the steps of: networking when the lockset terminal is powered on; the lockset terminal judges whether the management terminal has the control authority, if so, the operation authority is opened for the management terminal with the control authority; the method comprises the steps that a lockset terminal uploads lockset data to a management terminal with control authority, wherein the lockset terminal acquires image data to serve as the lockset data or part of the lockset data when a door is opened every time; or the lock terminal respectively acquires image data as the lock data or part of the lock data at a first preset time before door opening, at door opening and at a second preset time after door opening; the rest of the examples are analogized. For example, the first predetermined time is 1 to 5 seconds, the second predetermined time is 1 to 5 seconds, for example, the first predetermined time is 1, 1.5, 2, 2.5, 3, 3.5, 4, 4.5 or 5 seconds, and/or the second predetermined time is 1, 1.5, 2, 2.5, 3, 3.5, 4, 4.5 or 5 seconds; preferably, the first preset time is shorter than the second preset time, and if the two preset times are the same, the effect is not good in the actual test, and the entry process cannot be accurately reflected; the second preset time is better to be slightly longer than the first preset time, for example, the second preset time is 0.5-1 second longer than the first preset time; for example, the first preset time is 1.5 seconds, and the second preset time is 2 or 2.5 seconds; the rest of the examples are analogized. Therefore, the entrance of a plurality of people into the gate can be better reflected, the group entrance monitoring is particularly favorably realized, and the method has the advantages of simplicity and convenience in realization.
Preferably, the lock terminal uploads the lock data to a management terminal with control authority, and the method comprises the following steps: and when the lock terminal receives the data uploading instruction, the lock terminal uploads the lock data to the management terminal with the control authority. Preferably, the lock terminal uploads the lock data to a management terminal with control authority, and the method comprises the following steps: when the lock terminal receives a door opening signal, lock data are uploaded to a management terminal with control authority. Preferably, the lock terminal uploads the lock data to a management terminal with control authority, and the method comprises the following steps: when receiving a door opening signal and triggering a data uploading instruction, the lockset terminal sends lockset data to a management terminal with control authority and receives a maximum record number; and judging whether the current maximum record number is larger than the local maximum record number, if so, stopping uploading the lockset data to the management terminal with the control authority, otherwise, continuously sending the lockset data to the management terminal with the control authority and receiving the maximum record number. Preferably, the lock terminal uploads the lock data to a management terminal with control authority, and the method comprises the following steps: when a door opening signal appears, the door opening signal is received or a data uploading instruction is received, the lockset terminal sends lockset data to a management terminal with control authority and receives a maximum record number; and judging whether the current maximum record number is larger than the local maximum record number, if so, stopping uploading the lockset data to the management terminal with the control authority, otherwise, continuously sending the lockset data to the management terminal with the control authority and receiving the maximum record number. For example, as shown in fig. 4, when the door opening signal and the data upload instruction occur at the same time or at any time, the data (i.e., the locker data) is sent to the server and the maximum record number is received, where the server is a management terminal, a router, a local server, or the like, and determines whether the maximum record number is greater than the local maximum record number, if so, the data upload is finished, otherwise, the data is continuously sent to the server and the maximum record number is received. Thus, after the control times of the lock data are finished or the maximum record number is reached, the data uploading is finished.
Preferably, the lock terminal joint control method comprises a connection step and a control step; the connecting step includes: networking when the lockset terminal is powered on; the management and control step comprises the following steps: the lockset terminal judges whether the management terminal has the control authority, if so, the operation authority is opened for the management terminal with the control authority; the lock terminal uploads lock data to a management terminal with control authority; for example, after the lock terminal determines that the management terminal has the control authority, and before the management terminal having the control authority opens the operation authority, the management and control step further includes: the lock terminal is bound to the management terminal.
Preferably, the connecting step further comprises: the management end is connected with the lock terminal, for example, the connection step comprises: networking when the lockset terminal is powered on, and connecting the management end with the lockset terminal; the managing and controlling step further comprises: a lock terminal registration step: registering a lock terminal at a management end; lockset terminal management: managing the registered lock terminal at a management end; lockset terminal control step: and controlling the registered lock terminal through a management terminal or control equipment. For example, the regulating step includes: a lock terminal registration step: registering a lock terminal at a management end; lockset terminal management: managing the registered lock terminal at the management end, judging whether the management end has a control authority or not by the lock terminal, and if so, opening the operation authority to the management end with the control authority; lockset terminal control step: the registered lock terminal is controlled through the management terminal or the control equipment, and the lock terminal uploads lock data to the management terminal with the control authority. The rest of the examples are analogized. Preferably, in the lock terminal registration step, the unique serial number of the lock terminal device is acquired and bound in a database of the management terminal. Preferably, in the step of registering the lock terminal, the management end interacts with the lock terminal to register a command, acquires the unique serial number of the lock terminal device, binds the management end in the database, mutually authenticates the lock terminal and the management end through the interaction registration command, and only the management end authenticated by the lock terminal has the right to operate the lock terminal; and only if the lock terminal passes the authentication of the management terminal, the management terminal adds the lock terminal into the database and performs subsequent lock terminal management steps and lock terminal control steps on the lock terminal, so that the lock terminal is controlled. In this way, in the lock terminal joint control method, the management end can manage a plurality of lock terminals, for example, one management end in a hotel lobby manages all network intelligent locks of a hotel. For example, in the lock terminal joint control method, N lock terminals are managed by M management terminals, where M and N are both positive integers, and the magnitude of N is greater than that of M. For example, one administration side of each floor of the hotel manages all the network smart locks of the floor of the hotel. It can be understood that the lock terminal registration step, the lock terminal management step, the lock terminal control step, the authority authentication interaction step, the authority permission interaction step, the authority prohibition interaction step, the database operation interaction step, the network configuration interaction step, the heartbeat interaction step, the time configuration interaction step and/or the data upload interaction step in the lock terminal joint control method can be executed in sequence, only one, two or more of the steps can be executed, and the execution can be selected according to actual requirements.
Preferably, the step of managing further comprises: and (3) authority authentication interaction step: acquiring a lock terminal control authority; and (3) permission interaction step: opening part of lock terminal operation authority; and the permission forbidding interaction step: forbidding part of lock terminal operation authorities; database operation interaction: the database operation interaction and the updating of the database information of the locker terminal; network configuration interaction: setting network parameters; a heartbeat interaction step: indicating whether the lockset terminal is on line or not through heartbeat interaction; time configuration interaction step: configuring and acquiring lockset terminal time; data uploading and interacting steps: and acquiring a data record of the lock terminal.
Preferably, in the authority authentication interaction step, the management end interacts with the lock terminal to obtain an authority authentication instruction, the management end obtains the control authority of the lock terminal, the lock terminal opens the control authority to the management end which is authenticated by the lock terminal and completes the lock terminal registration step, and the management end which succeeds in authority authentication performs the lock terminal management step and the lock terminal control step related operation on the lock terminal. Preferably, in the permission interaction step, the management end interacts a permission instruction with the lock terminal, the lock terminal opens part of lock terminal operation permissions, the management end which is authenticated by the lock terminal obtains part of lock terminal operation permissions, and the management end adopts the part of lock terminal operation permissions to perform subsequent lock terminal management steps and lock terminal control steps on the lock terminal, so that the control of the lock terminal is realized, and thus, a user can directly control the functions of the lock terminal through the management end. Preferably, in the permission prohibition interaction step, the management end interacts with the lock terminal with a permission prohibition instruction, the lock terminal cancels part of lock terminal operation permission, the management end authenticated by the lock terminal cancels part of lock terminal operation permission, the management end can not adopt the part of lock terminal operation permission to perform subsequent lock terminal management step and lock terminal control step on the lock terminal, so that the lock terminal realizes the separation control of the management end authenticated by the lock terminal, and/or the management end cancels part of lock terminal operation permission of the lock terminal authenticated by the management end, and the management end does not adopt the part of lock terminal operation permission to perform subsequent lock terminal management step and lock terminal control step on the lock terminal, thereby the management end realizes the abandonment control on the lock terminal; therefore, a user can directly control the functions of the terminal part of the lockset through the management terminal. For example, the database operation interaction step includes operations of adding a password to the lock terminal, deleting the password and the like. Preferably, in the step of interacting database operation, the management terminal interacts database operation instructions with the lock terminal, and the management terminal authenticated by the lock terminal brings the lock terminal into the database for management, including name management, password management, and/or authority management of the lock terminal. Wherein the name management comprises: adding, modifying and/or deleting names; the password management includes: adding, modifying and/or deleting passwords; the rights management includes: add rights, modify rights, and/or delete rights. For example, the database operation interaction step is subordinate to the lock terminal management step; namely, the lock terminal management step comprises the database operation interaction step. The rest of the examples are analogized. Therefore, the user can update the lock terminal database information of the management end, including operations of adding a name, modifying the name, adding a password, deleting the password and the like. For example, the step of managing further comprises a network configuration interaction step of: setting network parameters; for example, setting SSID, PASSWORD, IP address, TCP port, DHCP server, etc. for WIFI; preferably, one or more lock terminals are provided with the SSID of WIFI, PASSWORD, the IP address, the TCP port and/or the DHCP server and the like. For example, the network configuration interaction step is performed after the lock terminal registration step and before the lock terminal management step. As another example, the lock terminal management step includes the network configuration interaction step, for example, the lock terminal management step includes: and registering a lock terminal at a management end, and setting network parameters for the lock terminal. For example, the management terminal is connected with the lock terminal, and the management terminal and the lock terminal are connected in a Bluetooth communication mode or a local area network communication mode; in the network configuration interaction step, the management terminal sets network parameters for the lock terminal; the rest of the examples are analogized. As another example, the managing step further includes: the lockset terminal is connected with an external network through a management terminal. For example, the step of regulating further comprises a step of time configuration interaction: the lock terminal time is configured and obtained, and at the moment, the management end can set the lock terminal time and can also obtain the lock terminal time. Preferably, in the time configuration interaction step, the management end interacts with the lock terminal to configure a time configuration instruction, the lock terminal opens a time configuration right, the management end which is authenticated by the lock terminal adopts the time configuration right to set the lock terminal time, and the lock terminal time is acquired, so that the time configuration and acquisition of the lock terminal are realized. Therefore, the user can directly control the time of the lockset terminal through the management terminal, and unified management of a large number of locksets is facilitated.
Preferably, the step of managing and controlling further comprises a step of data uploading interaction: acquiring a data record of a lockset terminal; for example, door opening and closing records and the like are recorded, at the moment, a management end can acquire data records of a lock terminal, the data records are different for different intelligent locks, and the data records are more detailed and can be provided by some intelligent locks, for example, fingerprint door opening succeeds after MM fails for 3 times in SS seconds when door opening is carried out in XXXXX in YY month ZZ day HH, and successfully door opening is carried out again in MM fails for SS seconds when door opening is carried out in XXX in YY month ZZ day HH. Preferably, the lock terminal management step includes the data uploading interaction step. For example, the lock terminal management step includes: and managing the registered lock terminal at the management end and acquiring the data record of the lock terminal. Preferably, the lock terminal joint control method further includes a data encryption transmission step: the method comprises the steps that communication data are encrypted at a sender and then sent to a receiver, and the receiver decrypts the communication data after receiving the communication data, wherein the sender and the receiver are respectively a management terminal and a lock terminal. To prevent network snooping, the communication protocol does not employ plaintext. The communication data is encrypted at the sender and then sent to the receiver, and the receiver decrypts the communication data after receiving the communication data. For example, in each interaction step in the control step, the interaction steps include an authorization authentication interaction step, an authorization permission interaction step, an authorization prohibition interaction step, a database operation interaction step, a network configuration interaction step, a heartbeat interaction step, a time configuration interaction step, and/or a data upload interaction step.
Continuing to illustrate the embodiment of the present invention, for example, the lock terminal joint control method further includes a gateway configuration step and a gateway control step, for example, the gateway configuration step includes: in a gateway configuration mode, a gateway is connected through a gateway wireless interface, and network use permission is configured for the gateway; as another example, the gateway controlling step includes: in the gateway working mode, a lock terminal with a wireless receiving function, namely an intelligent lock, is managed. The Gateway (Gateway) is also called Gateway or protocol converter, and realizes network interconnection with intelligent lock and management end above network layer, at this time, the Gateway can be called intelligent lock Gateway or Gateway directly, and the intelligent lock with network interconnection capability is network intelligent lock. Therefore, the lockset terminal does not need to independently realize remote communication and can be connected to a remote management end, and one gateway can connect and manage a plurality of lockset terminals within the effective communication distance of the gateway or the lockset terminal. For example, the connecting step includes the gateway configuring step; the step of managing comprises the step of controlling the gateway. As another example, the lock terminal controlling step includes the gateway controlling step.
For example, configuring network use authority for the gateway at a management end; for example, in the gateway configuration mode, a gateway is connected through a gateway wireless interface, and a management end configures network use authority for the gateway; the rest of the examples are analogized. If the gateway is not in the network use permission, entering a setting page to configure the network use permission for the gateway; for example, in a gateway configuration mode, a gateway is connected through a gateway wireless interface, and a setting page is entered to configure network use permission for the gateway; the rest of the examples are analogized. Preferably, a setting page is entered at the management end to configure the network use permission for the gateway. For example, in a gateway configuration mode, a gateway is connected through a gateway wireless interface, and a setting page is entered at a management end to configure network use permission for the gateway; the rest of the examples are analogized. In each embodiment, the management terminal is a mobile terminal, such as a mobile phone, a tablet computer, a notebook computer, a mobile intelligent device, or the like, and preferably, in the gateway configuration mode, the mobile terminal is connected to the gateway through a gateway wireless interface, and the mobile terminal is used to configure the network usage right for the gateway. Preferably, in the gateway operating mode, a mobile terminal is adopted to manage a lock terminal with a wireless receiving function for the gateway. It can be understood that the mobile terminal used in the gateway configuration mode and the mobile terminal used in the gateway operation mode may be the same mobile terminal or different mobile terminals. Configuring network use authority for the gateway, namely enabling the gateway to have the authority of transmitting data through a network; for example, configuring the gateway with network usage rights includes: and configuring the wifi name and the password of the networking router of the current environment for the gateway. For example, in a gateway configuration mode, a gateway is connected through a gateway wireless interface, and a wifi name and a password of a networking router in the current environment are configured for the gateway; the rest of the examples are analogized. Therefore, the gateway and the lock terminal connected with the gateway can realize network access and data transmission through the networking router of the current environment.
Preferably, the lock terminal having the wireless receiving function includes: and establishing wireless association between the lock terminal with the wireless receiving function and the gateway, and wirelessly managing the lock terminal with the wireless receiving function through the gateway. For example, a lock terminal with a wireless receiving function is wirelessly associated with the gateway at a third-party platform, and the lock terminal with the wireless receiving function is wirelessly managed through the gateway. Preferably, the third party platform is a mobile terminal and/or an application program thereof. If necessary, the lock terminal with data transmission function, such as a wired lock terminal, can also be managed, but this will increase the workload of wiring and connecting, and the preferred embodiment of the present invention is that the gateway is wirelessly connected with the lock terminal, wirelessly managed, and network access and/or data transmission is realized through the networking router of the current environment.
Preferably, the lock terminal having a wireless receiving function includes: adding, deleting or modifying the lock terminal for the gateway, and setting the lock terminal adding, deleting or modifying information for the gateway. For example, the lock terminal with a wireless receiving function includes: establishing wireless association between the lock terminal with the wireless receiving function and the gateway, adding, deleting or modifying the lock terminal for the gateway, and setting the adding, deleting or modifying information of the lock terminal for the gateway. Preferably, the information comprises lock terminal self information, lock terminal environment information, control information and/or authority information; the control information includes enabling control information, disabling control information, display control information and/or monitoring control information, and the authority information includes fingerprint information, voice control information, motion control information, door card information, password information, validity time information and/or validity time information, for example, the lock terminal is turned on or turned off within validity times and/or validity time through the password information, the fingerprint information, the voice control information or the motion control information in the authority information. Therefore, when the lock terminal is connected, the information of the lock terminal can be known, such as a certain apartment 1603; when a user lives in a hotel, the environment information of the lockset terminal can be obtained, for example, a public swimming pool or a gymnasium exists in a 4 th building; when a certain room is temporarily used, authority information such as valid time information and the like can be obtained, and the use by a user or the control by a management party is very convenient.
Preferably, the lock terminal having the wireless receiving function includes: and establishing wireless association with the lock terminal in a mode of scanning the unique identifier of the lock terminal. For example, the gateway and the lock terminal are wirelessly associated by scanning the unique identifier of the lock terminal. For example, a serial number two-dimensional code is arranged on the lock terminal and serves as the unique identifier, and the gateway and the lock terminal are wirelessly associated in a mode that the mobile terminal scans the unique identifier of the lock terminal. Preferably, the lock terminal having the wireless receiving function includes: the gateway sends a working state selection notification, a Wifi configuration notification, a mobile phone connection notification, a TCP data notification, a CC1101 forwarding notification, a watchdog notification, and the like to a lock terminal, a mobile terminal, a management terminal, or the like.
Preferably, the lock terminal joint control method further includes the steps of: and controlling the gateway to enter a gateway configuration mode. For example, the gateway is controlled to enter the configuration mode through a configuration key; for another example, the gateway is controlled to enter the configuration mode through the mobile terminal; preferably, the gateway is controlled to enter the configuration mode by a pre-authorized mobile terminal. In this way, the gateway can be controlled to enter the gateway configuration mode in different ways, either soft or hard. Preferably, the lock terminal joint control method further includes the steps of: and controlling the gateway to enter a gateway working mode. For example, the gateway is controlled to enter the working mode through a configuration key; therefore, the user can realize that the gateway is controlled to enter the working mode by a hard configuration key or the gateway is controlled to enter the working mode by a preauthorized mobile phone and the like in a soft mode. Preferably, the lock terminal and the gateway have the same use authority of the internal network. In this way, the lock terminal and the gateway are in the same local area network, and the association can be established through the router. That is to say, the lock terminal can be connected to the router through the gateway to realize network connection, and the lock terminal can also be directly connected to the router to realize network connection, and the latter obviously increases the cost of the lock terminal, and can be realized by adopting different technical paths in the development stages of market and product cost brought by different technologies.
Preferably, the embodiment of the invention further comprises a lock terminal joint control method formed by mutually combining the technical features of the above embodiments.
The technical features mentioned above are combined with each other to form various embodiments which are not listed above, and all of them are regarded as the scope of the present invention described in the specification; also, modifications and variations may be suggested to those skilled in the art in light of the above teachings, and it is intended to cover all such modifications and variations as fall within the true spirit and scope of the invention as defined by the appended claims.

Claims (10)

1. A lock terminal joint control method is characterized by comprising a connection step and a control step;
the connecting step includes: networking when the lockset terminal is powered on;
the management and control step comprises the following steps:
a lock terminal registration step: registering a lock terminal at a management end; the management terminal and the lock terminal interact a registration instruction, the management terminal obtains a unique serial number of the lock terminal equipment, and the management terminal binds in a database of the management terminal;
lockset terminal management: managing the registered lock terminal at the management end, judging whether the management end has a control authority or not by the lock terminal, and if so, opening the operation authority to the management end with the control authority;
lockset terminal control step: controlling the registered lock terminal through a management terminal or control equipment, and uploading lock data to the management terminal with control authority by the lock terminal; the lock terminal respectively acquires image data as the lock data or part of the lock data at a first preset time before door opening, at door opening and at a second preset time after door opening, wherein the first preset time is less than the second preset time;
and (3) authority authentication interaction step: acquiring a lock terminal control authority; the management end interacts with the lock terminal to obtain authority authentication instructions, the management end obtains control authority of the lock terminal, the lock terminal opens the control authority to the management end which is authenticated by the lock terminal and completes the lock terminal registration step, and the management end which succeeds in authority authentication performs related operations of the lock terminal management step and the lock terminal control step on the lock terminal;
and (3) permission interaction step: opening part of lock terminal operation authority; the management end adopts the partial lockset terminal operation authority to carry out subsequent lockset terminal management steps and lockset terminal control steps on the lockset terminal;
and the permission forbidding interaction step: forbidding part of lock terminal operation authorities; the management end and the lock terminal interact a permission prohibition instruction, the lock terminal cancels part of lock terminal operation permission, the management end authenticated by the lock terminal cancels part of lock terminal operation permission, the management end does not adopt the part of lock terminal operation permission to carry out subsequent lock terminal management step and lock terminal control step on the lock terminal, so that the lock terminal realizes the separation control of the management end authenticated by the lock terminal, and/or the management end cancels part of lock terminal operation permission of the lock terminal authenticated by the management end, and the management end does not adopt the part of lock terminal operation permission to carry out subsequent lock terminal management step and lock terminal control step on the lock terminal;
database operation interaction: the database operation interaction and the updating of the database information of the locker terminal; the management end and the lock terminal interact a database operation instruction, and the management end which is authenticated by the lock terminal brings the lock terminal into a database of the lock terminal for management, including name management, password management and/or authority management of the lock terminal;
time configuration interaction step: configuring and acquiring lockset terminal time; the management end which is authenticated by the lock terminal adopts the time configuration authority to set the lock terminal time and acquire the lock terminal time so as to realize the time configuration and acquisition of the lock terminal;
and, the tool to lock terminal uploads tool to lock data to the management end that has control authority, including the step:
when receiving a door opening signal and triggering a data uploading instruction, the lockset terminal sends lockset data to a management terminal with control authority and receives a maximum record number;
and judging whether the current maximum record number is larger than the local maximum record number, if so, stopping uploading the lockset data to the management terminal with the control authority, otherwise, continuously sending the lockset data to the management terminal with the control authority and receiving the maximum record number.
2. The lock terminal joint control method according to claim 1, wherein the lock terminal is networked when powered on, comprising the steps of:
powering on the lockset terminal;
reading the network type;
judging whether a dynamic host configuration protocol is started, if so, further judging whether the connection server is successful, otherwise, reading the lockset terminal networking information, and then further judging whether the connection server is successful;
when the connection with the server is unsuccessful, continuing to read the network type;
and when the server is successfully connected, the lockset terminal feeds back networking success information.
3. The lock terminal joint control method according to claim 1, wherein after the lock terminal determines that the management terminal has the control authority, and before the management terminal having the control authority opens the operation authority, the lock terminal joint control method further comprises the steps of: the lock terminal is bound to the management terminal.
4. The lock terminal joint control method according to claim 3, wherein the lock terminal is bound to the management terminal, and the method comprises the following steps:
reporting a lock terminal identification number to a management terminal with control authority;
and inquiring whether the lockset terminal is bound or not from a management terminal, if so, encrypting and decrypting the communication content by using the new key, and otherwise, modifying the equipment key and then encrypting and decrypting the communication content by using the new key.
5. The lock terminal joint control method according to claim 1, wherein the lock terminal uploads lock data to a management terminal with control authority, comprising the steps of: and when the lock terminal receives the data uploading instruction, the lock terminal uploads the lock data to the management terminal with the control authority.
6. The lock terminal joint control method according to claim 1, wherein the lock terminal uploads lock data to a management terminal with control authority, comprising the steps of: when the lock terminal receives a door opening signal, lock data are uploaded to a management terminal with control authority.
7. The lock terminal joint control method according to claim 1, wherein the second preset time is 0.5-1 second longer than the first preset time.
8. The lock terminal joint control method according to claim 1, wherein the lock data comprises door opening data of the lock terminal.
9. The lock terminal joint control method according to claim 1, wherein the lock terminal uploads lock data to a management terminal with control authority at regular time.
10. The lock terminal joint control method according to claim 1, wherein the lock terminal uploads lock data to a management terminal with control authority in real time.
CN201810294140.2A 2018-04-04 2018-04-04 Lock terminal joint control method Active CN108537925B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810294140.2A CN108537925B (en) 2018-04-04 2018-04-04 Lock terminal joint control method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810294140.2A CN108537925B (en) 2018-04-04 2018-04-04 Lock terminal joint control method

Publications (2)

Publication Number Publication Date
CN108537925A CN108537925A (en) 2018-09-14
CN108537925B true CN108537925B (en) 2021-05-18

Family

ID=63481724

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810294140.2A Active CN108537925B (en) 2018-04-04 2018-04-04 Lock terminal joint control method

Country Status (1)

Country Link
CN (1) CN108537925B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113643460B (en) * 2021-07-28 2022-11-18 厦门美科安防科技股份有限公司 Rapid configuration method of cabinet lock

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6202151B1 (en) * 1997-05-09 2001-03-13 Gte Service Corporation System and method for authenticating electronic transactions using biometric certificates
CN102665197A (en) * 2012-04-18 2012-09-12 深圳市天和荣视频技术有限公司 WIFI (wireless fidelity) device configuration method
CN103685323A (en) * 2014-01-02 2014-03-26 中国科学院信息工程研究所 Method for realizing intelligent home security networking based on intelligent cloud television gateway
CN104144092A (en) * 2013-12-03 2014-11-12 国家电网公司 Method for being automatically access to LAN terminal
CN104883361A (en) * 2015-05-07 2015-09-02 深圳市共进电子股份有限公司 Wireless access client authentication management method and wireless gateway
CN105897722A (en) * 2016-05-05 2016-08-24 广东小天才科技有限公司 Method, system and mobile terminal for rapid unlocking based on client side
CN205899633U (en) * 2016-06-14 2017-01-18 天津宅美智能科技有限公司 Intelligence lock operating system
CN106558130A (en) * 2016-11-14 2017-04-05 安恒世通(北京)网络科技有限公司 A kind of intelligent door lock management system
CN107481361A (en) * 2017-08-01 2017-12-15 安恒世通(北京)网络科技有限公司 A kind of electronics lock management method

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101729667A (en) * 2009-10-09 2010-06-09 厦门敏讯信息技术股份有限公司 Method for managing terminal recording information
CN103595962A (en) * 2013-11-14 2014-02-19 无锡港湾网络科技有限公司 Access monitoring method based on pyroelectric sensor
CN104217480B (en) * 2014-08-29 2017-08-25 华南理工大学 A kind of intelligent access control system based on fingerprint and finger vein joint identification
CN105022976B (en) * 2015-07-27 2018-04-03 飞天诚信科技股份有限公司 A kind of method and apparatus of record in reading smart card

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6202151B1 (en) * 1997-05-09 2001-03-13 Gte Service Corporation System and method for authenticating electronic transactions using biometric certificates
CN102665197A (en) * 2012-04-18 2012-09-12 深圳市天和荣视频技术有限公司 WIFI (wireless fidelity) device configuration method
CN104144092A (en) * 2013-12-03 2014-11-12 国家电网公司 Method for being automatically access to LAN terminal
CN103685323A (en) * 2014-01-02 2014-03-26 中国科学院信息工程研究所 Method for realizing intelligent home security networking based on intelligent cloud television gateway
CN104883361A (en) * 2015-05-07 2015-09-02 深圳市共进电子股份有限公司 Wireless access client authentication management method and wireless gateway
CN105897722A (en) * 2016-05-05 2016-08-24 广东小天才科技有限公司 Method, system and mobile terminal for rapid unlocking based on client side
CN205899633U (en) * 2016-06-14 2017-01-18 天津宅美智能科技有限公司 Intelligence lock operating system
CN106558130A (en) * 2016-11-14 2017-04-05 安恒世通(北京)网络科技有限公司 A kind of intelligent door lock management system
CN107481361A (en) * 2017-08-01 2017-12-15 安恒世通(北京)网络科技有限公司 A kind of electronics lock management method

Also Published As

Publication number Publication date
CN108537925A (en) 2018-09-14

Similar Documents

Publication Publication Date Title
CN108537927B (en) Lockset terminal and method for controlling lockset terminal through regional management
US11044608B2 (en) System and method for access control via mobile device
WO2021023164A1 (en) Intelligent lock control method and system
CN104966336B (en) Intelligent lock and authorization management method and device of intelligent lock
CN105894627B (en) A kind of control of bluetooth access equipment, control of bluetooth access management system and method
CN105279832B (en) Intelligent door lock system and its control method
CN101297282B (en) Unified network and physical premises access control server
CN114530008A (en) Intelligent building integration and device concentrator
CN104732636A (en) Bluetooth cellphone-based intelligent community access control system and method
WO2016169424A1 (en) Networked community area access control system and community area access method based thereon
JP5314679B2 (en) Remote door opening device for building door or gate
CN105261100A (en) Entrance guard unlocking method and system
CN204759558U (en) Intelligent entrance guard , equipment and system
CN104794780A (en) Smart door, smart door control system and control method
CN110570559A (en) Electronic key sharing method in access control system based on mobile terminal
CN111292458A (en) Bluetooth access control system and unlocking method thereof
CN108010166A (en) Electronic door lock system
CN108537925B (en) Lock terminal joint control method
CN110415419A (en) Electron key share system in access control system based on mobile terminal
US20220014388A1 (en) Virtual security guard
CN108537924B (en) Method for realizing network intelligent lock
CN110570557A (en) access control system based on wireless communication network
WO2023280277A1 (en) Control method and system
CN105678869A (en) Entrance guard intelligent controller, entrance guard intelligent control system and entrance guard opening method thereof
CN110570560A (en) access control system based on identity recognition

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20230425

Address after: No. 048, 12th Floor, Weiya Building, No. 29 Suzhou Street, Haidian District, Beijing, 100080

Patentee after: BEIJING HARDROCK TECHNOLOGY CO.,LTD.

Address before: 100027 Beijing Chaoyang District East Third Ring Road North Road 2 international port C block 020D

Patentee before: ANHENG SHITONG (BEIJING) NETWORK TECHNOLOGY CO.,LTD.