CN109377600A - Intelligent lock cipher sharing method, apparatus and system - Google Patents
Intelligent lock cipher sharing method, apparatus and system Download PDFInfo
- Publication number
- CN109377600A CN109377600A CN201811124421.XA CN201811124421A CN109377600A CN 109377600 A CN109377600 A CN 109377600A CN 201811124421 A CN201811124421 A CN 201811124421A CN 109377600 A CN109377600 A CN 109377600A
- Authority
- CN
- China
- Prior art keywords
- lock
- information
- target user
- intelligence
- smart lock
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/215—Individual registration on entry or exit involving the use of a pass the system having a variable access-code, e.g. varied as a function of time
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Lock And Its Accessories (AREA)
Abstract
The present invention provides a kind of intelligent lock cipher sharing method, apparatus and system, it is related to electronic intelligent lock technical field, the intelligence lock cipher sharing method includes: the identity information and intelligence lock information that terminal obtains target user, corresponding intelligent lock information is determined according to the identity information of target user, the identity information is used to indicate the identity of the target user, which is used to indicate smart lock mark;The terminal sends intelligence lock information authority information corresponding with the smart lock to target user, wherein, the authority information is used for the combination according to current intelligent lock information and current temporal information, effective password in preset time is generated by Encryption Algorithm, so that target user unlocks to the smart lock in the preset time by the password, the password leakage or permission overlong time for avoiding the problem that smart lock are realized.
Description
Technical field
The present invention relates to electronic intelligent lock technical fields, in particular to a kind of intelligent lock cipher sharing method, device
And system.
Background technique
With the development of science and technology with the progress in epoch, people's lives increasingly focus on intelligence and safety, especially in intelligence
In energy household, electronic intelligent lock can be described as opening the first sect of household connection.Electronic intelligent lock is locked in tradition machinery
On the basis of it is improved, user security, identification, the more intelligent easy of managerial aspect lockset.With society and
The security consciousness of the development of science and technology, people is also increasingly reinforced, and the appearance of intelligent smart lock also gradually replaces traditional mechanical lock.
In the prior art, electronic intelligent lock is usually that the password for passing through setting fixation or fingerprint recognition are unlocked, so
And these forms unlocked are fairly simple, and make electronic intelligence if informing guest's password when have guest at home
The password of lock is revealed, and then endangers the life and property safety of electronic intelligent lock resident.
Summary of the invention
It is an object of the present invention in view of the deficiency of the prior art, provide a kind of intelligent lock cipher sharing method,
Apparatus and system makes if informing guest's password when with solution, electric intelligent door lock has guest at home in the prior art
Electronic intelligent lock password leakage, the problem of endangering the life and property safety of electronic intelligent lock resident.
To achieve the above object, technical solution used in the embodiment of the present invention is as follows:
In a first aspect, the embodiment of the invention provides a kind of intelligent lock cipher sharing methods, comprising: terminal obtains target and uses
The identity information at family and intelligent lock information determine corresponding intelligent lock information, the identity according to the identity information of target user
Information is used to indicate the identity of the target user, and the intelligence lock information is used to indicate smart lock mark;The terminal
The intelligent lock information and the corresponding authority information of the smart lock are sent to target user, wherein the authority information is used for
According to the combination of current intelligent lock information and current temporal information, generated by Encryption Algorithm effective close in preset time
Code, so that target user unlocks to the smart lock in the preset time by the password.
Optionally, the authority information is used to indicate the unlocking times of the target user of the smart lock, the smart lock
At least one of with the uncaging time section of the smart lock.
Optionally, before the step of identity information according to target user determines corresponding intelligent lock information, the side
Method further include: the graphic code by scanning the smart lock is bound with the smart lock, and the graphic code carries described
The mark of smart lock.
Optionally, after the step of obtaining the identity information of target user, the method also includes: verify the target
The identity information of user is associated with the corresponding smart lock of the target user if verifying meets, if verifying is not met,
Again the identity information of the target user is verified.
Optionally, after the step of being associated with the target user corresponding smart lock, the method also includes: establish institute
The relation list of target user with corresponding smart lock are stated, the relation list is used to indicate target user and corresponding intelligent lock information
Between authority information.
Optionally, the algorithm includes: at least one of partitioning algorithm, peace bit arithmetic, logical operation and arithmetic operator.
Second aspect, the embodiment of the invention also provides a kind of intelligent lock cipher sharing apparatus, comprising: first obtains mould
Block determines corresponding intelligence according to the identity information of target user for obtaining the identity information and intelligence lock information of target user
Energy lock information, the identity information are used to indicate the identity of the target user, and the intelligence lock information is used to indicate intelligence
It can lock mark;Sending module, for sending the intelligent lock information and the corresponding authority information of the smart lock to target user,
Wherein, the authority information is used to pass through Encryption Algorithm according to the combination of current intelligent lock information and current temporal information
Generate preset time in effective password so that target user by the password in the preset time to the smart lock
It unlocks.
Optionally, described device further include: second obtains module, for passing through graphic code and the institute of scanning the smart lock
It states smart lock to be bound, the graphic code carries the mark of the smart lock.
Optionally, described device further include: authentication module, for verifying after the identity information for obtaining target user
The identity information of the target user is associated with the corresponding smart lock of the target user if verifying meets, if verifying is not
Meet, then verifies the identity information of the target user again.
The third aspect, the embodiment of the invention also provides a kind of intelligent lock cipher share system, the system comprises intelligence is close
Code lock and the intelligent lock cipher sharing apparatus of any one of such as second aspect.
The beneficial effects of the present invention are: the present invention provides a kind of intelligent lock cipher sharing method, due to the intelligence lock cipher
It include: that the terminal transmission intelligent lock information and the corresponding authority information of the smart lock are used to target in sharing method
Family, so that the intelligent cipher can carry out unlocking operation to target user to energy within preset a period of time;Moreover, described
Authority information is used for the combination according to current intelligent lock information and current temporal information, when generating default by Encryption Algorithm
Interior effective password, so that cipher safety higher the advantages of not revealing password in the intelligence lock cipher sharing method.
Detailed description of the invention
In order to illustrate the technical solution of the embodiments of the present invention more clearly, below will be to needed in the embodiment attached
Figure is briefly described, it should be understood that the following drawings illustrates only certain embodiments of the present invention, therefore is not construed as pair
The restriction of range for those of ordinary skill in the art without creative efforts, can also be according to this
A little attached drawings obtain other relevant attached drawings.
Fig. 1 is a kind of intelligent lock cipher sharing method interaction schematic diagram that the application first embodiment provides;
Fig. 2 is a kind of flow diagram for intelligent lock cipher sharing method that the application second embodiment provides;
Fig. 3 is a kind of intelligent lock cipher sharing apparatus structural schematic diagram that the application 3rd embodiment provides;
Fig. 4 is a kind of intelligent lock cipher share system structural schematic diagram that the application fourth embodiment provides;
Fig. 5 is the schematic diagram of the intelligent lock cipher share system of another embodiment of the present invention.
Specific embodiment
In order to make the object, technical scheme and advantages of the embodiment of the invention clearer, below in conjunction with the embodiment of the present invention
In attached drawing, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described embodiment is
A part of the embodiment of the present invention, instead of all the embodiments.
Fig. 1 is a kind of intelligent lock cipher sharing method interaction schematic diagram that the application first embodiment provides, such as Fig. 1 institute
Show, the present embodiment provides a kind of intelligent lock cipher sharing methods to include:
S101, terminal obtain the identity information and intelligence lock information of target user, true according to the identity information of target user
Fixed corresponding intelligent lock information.
Specifically, terminal obtains the identity information and intelligent door lock information of target user, wherein the identity of the target user
Information can be at least one of name, cell-phone number, identification card number or account number of APP of the target user, the intelligence
Unique sequence when the identification number in APP or the intelligent door lock that door lock information can be the intelligent door lock dispatch from the factory
Number, to the identity information particular content of the target user according to being actually not specifically limited, used as long as being able to achieve by the target
The identity information at family can accurately and uniquely determine that target user's identity, the door lock information of the intelligent door lock are not done herein
It limits, as long as being able to achieve the function that can identify unique intelligent door lock by the intelligent door lock;The terminal is according to target
The identity information of user determines corresponding intelligent lock information, and determination will after which obtains the identity information of target user
It is shared with the intelligent lock information of the target user, can establish incidence relation, wherein the identity information is used to indicate target use
The identity at family, the intelligence lock information are used to indicate smart lock mark.
S102, the terminal send intelligence lock information authority information corresponding with the smart lock to target user.
Specifically, after the information of terminal check target user, by the authority information and the intelligence of the smart lock for needing to send
The information that can be locked is sent to the target user, and target user can be managed the smart lock, i.e., the target user can be right
This intelligently carries out the unlocking operation of a period of time or certain number, wherein the mode of transmission can be short message, network linking
Or message in APP etc., it can not limit.
Wherein, which is used for the combination according to current intelligent lock information and current temporal information, by adding
Close algorithm generates effective password in preset time, so that target user passes through the password in the preset time to the smart lock
It unlocks.
Specifically, in the present embodiment, the combination are as follows: the identity information of such as smart lock is 2C425EA, current time letter
Breath is the combination of the 201801021112 current intelligent lock informations and current temporal information are as follows:
2C425EA201801021112 obtains the ciphertext of one group of 16 byte after sending out using md5 encryption, generated later by Encryption Algorithm
Effective password in preset time can open the smart lock in the password preset time, if password fails, repeat
S101 and S102 step reacquires one group of password.
It unlocks in the present embodiment principle are as follows: the smart lock is not attached to network, whithin a period of time can be in the smart lock
One group of password is generated, which also can be generated one group of password identical with the smart lock in same amount of time, and user should
Into the smart lock, the password which generates the password of the input with oneself compares the Password Input that terminal generates,
If password is consistent, which is opened, and generates password again if password bad;Password share process are as follows: terminal according to
The identity information of target user determines target user, the smart lock for needing to share is determined according to intelligent lock information, which should
The intelligent lock information of smart lock authority information corresponding with the smart lock is sent to the target user, which can be to this
Smart lock carries out unlocking operation whithin a period of time.
The beneficial effect of intelligence lock cipher sharing method provided in this embodiment is: the people except smart lock owner needs
When carrying out unlocking operation to the smart lock, the owner of the smart lock can be by the unlocking authority of the smart lock accurately at one section
Other people are shared in time, and the smart lock can be managed the permission of sharing, so as to avoid the close of smart lock
Code leakage or permission overlong time, and then the problem of endanger the life and property safety of electronic intelligent lock resident.
Second embodiment
Fig. 2 is a kind of flow diagram for intelligent lock cipher sharing method that the application second embodiment provides, such as Fig. 2 institute
Show, includes: the S101 and S102, S101 and S102 in first embodiment the present embodiment provides a kind of intelligent lock cipher sharing method
With first constantly in step it is completely the same, this will not be repeated here, and optionally, in addition, which is used to indicate the intelligence
At least one of uncaging time section of the target user of lock, the unlocking times of the smart lock and the smart lock.
Specifically, the authority information is used to indicate the target user of the smart lock, it is the authority information for determining simultaneously
Indicate the identity information for the target user that the smart lock is shared, the authority information be used to indicate the smart lock unlocking times and
Uncaging time, the i.e. authority information are that target user can be to the restricted information of the smart lock number or uncaging time, such as eventually
When end to target user's sending permission information, the smart lock can be carried out in three days following by setting the target user
Unlocking operation and the target user can unlock 10 times.
Optionally, before the step of identity information according to target user determines corresponding intelligent lock information, this method
Further include: S100, the graphic code by scanning the smart lock and the smart lock are bound, which carries the smart lock
Mark.
Specifically, before the step of identity information according to target user determines corresponding intelligent lock information, this method
Further include: the graphic code by scanning the smart lock is bound with the smart lock, which carries the mark of the smart lock
Know.Wherein it is possible to which smart lock is first bound with terminal, smart lock posts two dimensional code when dispatching from the factory, and can be scanned by terminal
The two dimensional code of smart lock binds the smart lock, and the two-dimensional barcode information of smart lock can be received with terminal, is swept by smart lock
The two dimensional code is retouched, so that terminal is bound with smart lock, unlocking operation can be carried out after binding to the smart lock, and should
Smart lock assert that the terminal is the manager of the smart lock, that is, possesses the unlocking authority of the smart lock, if necessary to replacement terminal,
Unbundlings processing can also be carried out to smart lock.
Optionally, after the step of obtaining the identity information of target user, this method further include: S103, verify the mesh
Mark the identity information of user.
If verifying meets, execute S104 and be associated with the corresponding smart lock of the target user, if verifying is not met, holds
Row S105 verifies the identity information of the target user again.
Specifically, further including the identity information to target user after the step of obtaining the identity information of target user
It is verified, which includes: in name authentication, verifying dynamic password, password authentification, cell-phone number verifying and identification card number verifying
It is at least one;If target user's verifying meets, which, which obtains permission, can carry out unlocking operation to the smart lock;If
Target user's verifying is not met, then newly verifies the identity information of the target user.
Optionally, after the step of being associated with the target user corresponding smart lock, this method further include: S106, foundation
The relation list of the target user and corresponding smart lock, the relation list be used to indicate target user and corresponding intelligent lock information it
Between authority information.
Specifically, the target user generates a list, by the intelligence after the target user is verified by identity information
Lock is added in the list, which can be by operating the list to the smart lock, and the list records
Target user's unlocking times and uncaging time.
Optionally, which includes: at least one of partitioning algorithm, peace bit arithmetic, logical operation and arithmetic operator.
In intelligence lock cipher sharing method provided in this embodiment, intelligence can be carried out to target user according to the actual situation
The sharing of corresponding authority information is locked, and authority information can make target user right in the preset time by the password
The smart lock is unlocked, and so as to avoid the password leakage of smart lock or permission overlong time, and then endangers electronic intelligence
The problem of lockking the life and property safety at family.
3rd embodiment
Fig. 3 is a kind of intelligent lock cipher sharing apparatus structural schematic diagram that the application 3rd embodiment provides, such as Fig. 3 institute
Show, the present embodiment provides a kind of intelligent lock cipher sharing apparatus 200, which includes: the first acquisition
Module 201 is determined according to the identity information of target user and is corresponded to for obtaining the identity information and intelligence lock information of target user
Intelligent lock information, which is used to indicate the identity of the target user, which is used to indicate intelligence
Lock mark;Sending module 202, for sending intelligence lock information authority information corresponding with the smart lock to target user,
In, which is used to be generated according to the combination of current intelligent lock information and current temporal information by Encryption Algorithm
Effective password in preset time, so that target user unlocks to the smart lock in the preset time by the password.
Optionally, device further include: second obtains module 203, for the graphic code by scanning the smart lock and is somebody's turn to do
Smart lock is bound, which carries the mark of the smart lock.
Optionally, the device further include: authentication module 204, for verifying after the identity information for obtaining target user
The identity information of the target user is associated with the corresponding smart lock of the target user if verifying meets, if verifying is not inconsistent
It closes, then verifies the identity information of the target user again.
Intelligence lock cipher sharing apparatus provided in this embodiment, which includes: the first acquisition mould
Block 201, sending module 202, second obtain module 203 and authentication module 204;The first acquisition module 204 can determine target
The identity information of user and intelligent lock information;The authentication module 202 is corresponding with the smart lock for sending the intelligence lock information
Authority information is to target user;The second acquisition module 203, is locked into for the graphic code by scanning the smart lock with the intelligence
Row binding;The authentication module 204, for after the identity information for obtaining target user, verifying the identity letter of the target user
Breath;It can carry out the sharing of the corresponding authority information of smart lock to target user according to the actual situation, and authority information can be with
So that target user unlocks to the smart lock in the preset time by the password, so as to avoid the password of smart lock
Leakage or permission overlong time, and then the problem of endanger the life and property safety of electronic intelligent lock resident.
Fourth embodiment
Fig. 4 is a kind of intelligent lock cipher share system structural schematic diagram that the application fourth embodiment provides, such as Fig. 4 institute
Show, the present embodiment provides a kind of intelligent lock cipher share system 300, which includes that intelligent cipher lock 301 and such as second are implemented
The intelligent lock cipher sharing apparatus 200 of any one of example.
Intelligence lock cipher share system 300 provided in this embodiment, the system include: that intelligent cipher lock 301 and second are real
Intelligent lock cipher sharing apparatus 200 in example is applied, which is not attached to network, can be according to intelligence
First in lock cipher sharing apparatus obtains module 201, sending module 202, second obtains module 203 and authentication module 204 is right
The password of input is verified, and can be carried out the corresponding authority information of smart lock to target user according to the actual situation and be divided
It enjoys, authority information can make target user by obtaining password in the terminal 302 of the target user to when this is preset
It is interior to unlock to the smart lock, so as to avoid the password leakage of smart lock or permission overlong time, and then endanger electricity
The problem of life and property safety of sub- smart lock resident.
Above-mentioned apparatus can be used for executing the method for above method embodiment offer, specific implementation and technical effect class
Seemingly, which is not described herein again.
The above module can be arranged to implement one or more integrated circuits of above method, such as: one
Or multiple specific integrated circuits (Application SpecificIntegrated Circuit, abbreviation ASIC), or, one or
Multi-microprocessor (digitalsingnal processor, abbreviation DSP), or, one or more field-programmable gate array
Arrange (Field Programmable Gate Array, abbreviation FPGA) etc..For another example, when some above module passes through processing element
When the form of scheduler program code is realized, which can be general processor, such as central processing unit
(CentralProcessing Unit, abbreviation CPU) or it is other can be with the processor of caller code.For another example, these modules
It can integrate together, realized in the form of system on chip (system-on-a-chip, abbreviation SOC).
Fig. 5 is the schematic diagram of the intelligent lock cipher share system of another embodiment of the present invention, as shown in figure 5, the device can
To be integrated in the chip of terminal device or terminal device, which can be the calculating equipment for having image processing function.
The device includes: memory 401, processor 402.
Memory 401 is for storing program, the program that processor 402 calls memory 401 to store, to execute the above method
Embodiment.Specific implementation is similar with technical effect, and which is not described herein again.
Optionally, the present invention also provides a kind of program product, such as computer readable storage medium, including program, the journeys
Sequence is when being executed by processor for executing above method embodiment.
In several embodiments provided by the present invention, it should be understood that disclosed device and method can pass through it
Its mode is realized.For example, the apparatus embodiments described above are merely exemplary, for example, the division of the unit, only
For a kind of logical function partition, there may be another division manner in actual implementation, such as multiple units or components can combine
Or it is desirably integrated into another system, or some features can be ignored or not executed.Another point, shown or discussed phase
Coupling, direct-coupling or communication connection between mutually can be through some interfaces, the INDIRECT COUPLING or communication of device or unit
Connection can be electrical property, mechanical or other forms.
Unit may or may not be physically separated as illustrated by the separation member for this, show as unit
Component may or may not be physical unit, it can it is in one place, or may be distributed over multiple nets
On network unit.It can select some or all of unit therein according to the actual needs to realize the mesh of this embodiment scheme
's.
It, can also be in addition, the functional units in various embodiments of the present invention may be integrated into one processing unit
It is that each unit physically exists alone, can also be integrated in one unit with two or more units.Above-mentioned integrated list
Member both can take the form of hardware realization, can also realize in the form of hardware adds SFU software functional unit.
The above-mentioned integrated unit being realized in the form of SFU software functional unit can store and computer-readable deposit at one
In storage media.Above-mentioned SFU software functional unit is stored in a storage medium, including some instructions are used so that a computer
Equipment (can be personal computer, server or the network equipment etc.) or processor (English: processor) execute this hair
The part steps of bright each embodiment this method.And storage medium above-mentioned includes: USB flash disk, mobile hard disk, read-only memory (English
Text: Read-OnlyMemory, referred to as: ROM), random access memory (English: Random AccessMemory, referred to as:
RAM), the various media that can store program code such as magnetic or disk.
Claims (10)
1. a kind of intelligence lock cipher sharing method characterized by comprising
Terminal obtains the identity information and intelligence lock information of target user, determines corresponding intelligence according to the identity information of target user
Energy lock information, the identity information are used to indicate the identity of the target user, and the intelligence lock information is used to indicate intelligence
It can lock mark;
The terminal sends the intelligent lock information and the corresponding authority information of the smart lock to target user, wherein described
Authority information is used for the combination according to current intelligent lock information and current temporal information, when generating default by Encryption Algorithm
Interior effective password, so that target user unlocks to the smart lock in the preset time by the password.
2. intelligence lock cipher sharing method as described in claim 1, which is characterized in that the authority information is used to indicate the intelligence
At least one of the unlocking times of the target user, the smart lock that can lock and the uncaging time section of the smart lock.
3. intelligence lock cipher sharing method as described in claim 1, which is characterized in that true according to the identity information of target user
Before the step of fixed corresponding intelligent lock information, the method also includes:
Graphic code by scanning the smart lock is bound with the smart lock, and the graphic code carries the smart lock
Mark.
4. the intelligent lock cipher sharing method as described in claim any one of 1-3, which is characterized in that in the body for obtaining target user
After the step of part information, the method also includes:
The identity information of the target user is verified, if verifying meets, is associated with the corresponding smart lock of the target user, such as
Fruit verifying is not met, then verifies the identity information of the target user again.
5. intelligence lock cipher sharing method as claimed in claim 4, which is characterized in that be associated with the corresponding intelligence of the target user
After the step of capable of locking, the method also includes:
Establish the relation list of the target user with corresponding smart lock, the relation list be used to indicate target user with it is corresponding
Authority information between intelligent lock information.
6. intelligence lock cipher sharing method according to claim 1, which is characterized in that the algorithm include: partitioning algorithm,
Pacify at least one of bit arithmetic, logical operation and arithmetic operator.
7. a kind of intelligence lock cipher sharing apparatus characterized by comprising
First obtains module, for obtaining the identity information and intelligence lock information of target user, is believed according to the identity of target user
Breath determines corresponding intelligent lock information, and the identity information is used to indicate the identity of the target user, the smart lock
Information is used to indicate smart lock mark;
Sending module, for sending the intelligent lock information and the corresponding authority information of the smart lock to target user, wherein
The authority information is used for the combination according to current intelligent lock information and current temporal information, is generated by Encryption Algorithm pre-
If effective password in the time, so that target user opens the smart lock in the preset time by the password
Lock.
8. intelligence lock cipher sharing apparatus as claimed in claim 7, which is characterized in that described device further include: second obtains mould
Block is bound for the graphic code by scanning the smart lock with the smart lock, and the graphic code carries the intelligence
The mark that can be locked.
9. intelligence lock cipher sharing apparatus as claimed in claim 8, which is characterized in that described device further include: authentication module is used
In after the identity information for obtaining target user, the identity information of the target user is verified, if verifying meets, is associated with
The corresponding smart lock of the target user verifies the identity information of the target user if verifying is not met again.
10. a kind of intelligence lock cipher share system, which is characterized in that the system comprises intelligent cipher lock and such as claim 7-
Any one of 9 intelligent lock cipher sharing apparatus.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811124421.XA CN109377600A (en) | 2018-09-26 | 2018-09-26 | Intelligent lock cipher sharing method, apparatus and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811124421.XA CN109377600A (en) | 2018-09-26 | 2018-09-26 | Intelligent lock cipher sharing method, apparatus and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109377600A true CN109377600A (en) | 2019-02-22 |
Family
ID=65402016
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811124421.XA Pending CN109377600A (en) | 2018-09-26 | 2018-09-26 | Intelligent lock cipher sharing method, apparatus and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109377600A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109840978A (en) * | 2019-03-25 | 2019-06-04 | 广州阔道物联网技术有限公司 | A kind of centralized management intelligent lock system and its management method and method for unlocking |
CN110570564A (en) * | 2019-09-05 | 2019-12-13 | 安恒世通(北京)网络科技有限公司 | single-machine lock and control method thereof |
CN115273276A (en) * | 2021-04-30 | 2022-11-01 | 云丁网络技术(北京)有限公司 | Method and apparatus for authenticating a user |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105049653A (en) * | 2015-05-29 | 2015-11-11 | 深圳光启智能光子技术有限公司 | Method and system for controlling unlocking authority of locks based on network |
CN105719374A (en) * | 2016-01-22 | 2016-06-29 | 慧锐通智能科技股份有限公司 | Door access control method |
CN105719376A (en) * | 2016-01-22 | 2016-06-29 | 慧锐通智能科技股份有限公司 | Door access control system and method |
CN106131179A (en) * | 2016-07-05 | 2016-11-16 | 林哲敏 | The password Rights Management System of a kind of intelligent door lock and method |
CN107316019A (en) * | 2017-06-23 | 2017-11-03 | 比奥香港有限公司 | A kind of fingerprint lock control method and Fingerprint Lock System |
US20170345239A9 (en) * | 2014-12-23 | 2017-11-30 | Gate Labs Inc. | Access management system |
CN108492413A (en) * | 2018-03-15 | 2018-09-04 | 广东西雅斯智能科技有限公司 | Dynamic cipher generating method, password generator and coded lock |
-
2018
- 2018-09-26 CN CN201811124421.XA patent/CN109377600A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20170345239A9 (en) * | 2014-12-23 | 2017-11-30 | Gate Labs Inc. | Access management system |
CN105049653A (en) * | 2015-05-29 | 2015-11-11 | 深圳光启智能光子技术有限公司 | Method and system for controlling unlocking authority of locks based on network |
CN105719374A (en) * | 2016-01-22 | 2016-06-29 | 慧锐通智能科技股份有限公司 | Door access control method |
CN105719376A (en) * | 2016-01-22 | 2016-06-29 | 慧锐通智能科技股份有限公司 | Door access control system and method |
CN106131179A (en) * | 2016-07-05 | 2016-11-16 | 林哲敏 | The password Rights Management System of a kind of intelligent door lock and method |
CN107316019A (en) * | 2017-06-23 | 2017-11-03 | 比奥香港有限公司 | A kind of fingerprint lock control method and Fingerprint Lock System |
CN108492413A (en) * | 2018-03-15 | 2018-09-04 | 广东西雅斯智能科技有限公司 | Dynamic cipher generating method, password generator and coded lock |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109840978A (en) * | 2019-03-25 | 2019-06-04 | 广州阔道物联网技术有限公司 | A kind of centralized management intelligent lock system and its management method and method for unlocking |
CN110570564A (en) * | 2019-09-05 | 2019-12-13 | 安恒世通(北京)网络科技有限公司 | single-machine lock and control method thereof |
CN115273276A (en) * | 2021-04-30 | 2022-11-01 | 云丁网络技术(北京)有限公司 | Method and apparatus for authenticating a user |
CN115273276B (en) * | 2021-04-30 | 2024-02-06 | 云丁网络技术(北京)有限公司 | Method and device for authenticating a user |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105160226B (en) | User ID authentication method, device, system and smart home | |
CN105069876B (en) | The method and system of intelligent entrance guard control | |
CN103971435B (en) | Method for unlocking, server, mobile terminal, electronic lock and unlocking system | |
CN104780043B (en) | Access control method and system based on two dimensional code | |
CN109377600A (en) | Intelligent lock cipher sharing method, apparatus and system | |
CN108551455A (en) | The configuration method and device of smart card | |
CN103136820A (en) | Remote access control system based on terminal fingerprint identification | |
CN110177088B (en) | Temporary identity authentication method, device and system | |
CN105303664A (en) | Intelligent access control system based on two dimensional code technology and control method thereof | |
CN109767534A (en) | Gate inhibition's access method, system, management terminal and door control terminal based on block chain | |
CN109151820A (en) | One kind being based on the safety certifying method and device of " one machine of a people, one card No.1 " | |
CN106846580A (en) | Intelligent unlocking method and system | |
CN109558918A (en) | A kind of certificate chain real estate electronics license system and its application method | |
CN110381075B (en) | Block chain-based equipment identity authentication method and device | |
CN109858220A (en) | Electronic contract signs method, apparatus, terminal device and storage medium | |
CN105488875B (en) | A kind of gate inhibition's verification method and device | |
CN109117668A (en) | A kind of identification authorization safety access method based on block chain building | |
CN107395369A (en) | Towards mobile Internet from the authentication method of carrying device, access method and system | |
CN107615301A (en) | The safety storage of fingerprint coherent element | |
CN108920919A (en) | Control method, the device and system of interactive intelligence equipment | |
CN108121904B (en) | Unlocking method, device, electronic equipment and server | |
Prada-Delgado et al. | A blockchain-based crypto-anchor platform for interoperable product authentication | |
CN103370713A (en) | Method for programming a mobile terminal chip | |
CN206773793U (en) | Tripper and system | |
CN110399577A (en) | Office facility sharing method and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190222 |
|
RJ01 | Rejection of invention patent application after publication |