CN109377600A - Intelligent lock cipher sharing method, apparatus and system - Google Patents

Intelligent lock cipher sharing method, apparatus and system Download PDF

Info

Publication number
CN109377600A
CN109377600A CN201811124421.XA CN201811124421A CN109377600A CN 109377600 A CN109377600 A CN 109377600A CN 201811124421 A CN201811124421 A CN 201811124421A CN 109377600 A CN109377600 A CN 109377600A
Authority
CN
China
Prior art keywords
lock
information
target user
intelligence
smart lock
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811124421.XA
Other languages
Chinese (zh)
Inventor
邓宇华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Xiyasi Intelligent Technology Co Ltd
Original Assignee
Guangdong Xiyasi Intelligent Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Xiyasi Intelligent Technology Co Ltd filed Critical Guangdong Xiyasi Intelligent Technology Co Ltd
Priority to CN201811124421.XA priority Critical patent/CN109377600A/en
Publication of CN109377600A publication Critical patent/CN109377600A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/215Individual registration on entry or exit involving the use of a pass the system having a variable access-code, e.g. varied as a function of time
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The present invention provides a kind of intelligent lock cipher sharing method, apparatus and system, it is related to electronic intelligent lock technical field, the intelligence lock cipher sharing method includes: the identity information and intelligence lock information that terminal obtains target user, corresponding intelligent lock information is determined according to the identity information of target user, the identity information is used to indicate the identity of the target user, which is used to indicate smart lock mark;The terminal sends intelligence lock information authority information corresponding with the smart lock to target user, wherein, the authority information is used for the combination according to current intelligent lock information and current temporal information, effective password in preset time is generated by Encryption Algorithm, so that target user unlocks to the smart lock in the preset time by the password, the password leakage or permission overlong time for avoiding the problem that smart lock are realized.

Description

Intelligent lock cipher sharing method, apparatus and system
Technical field
The present invention relates to electronic intelligent lock technical fields, in particular to a kind of intelligent lock cipher sharing method, device And system.
Background technique
With the development of science and technology with the progress in epoch, people's lives increasingly focus on intelligence and safety, especially in intelligence In energy household, electronic intelligent lock can be described as opening the first sect of household connection.Electronic intelligent lock is locked in tradition machinery On the basis of it is improved, user security, identification, the more intelligent easy of managerial aspect lockset.With society and The security consciousness of the development of science and technology, people is also increasingly reinforced, and the appearance of intelligent smart lock also gradually replaces traditional mechanical lock.
In the prior art, electronic intelligent lock is usually that the password for passing through setting fixation or fingerprint recognition are unlocked, so And these forms unlocked are fairly simple, and make electronic intelligence if informing guest's password when have guest at home The password of lock is revealed, and then endangers the life and property safety of electronic intelligent lock resident.
Summary of the invention
It is an object of the present invention in view of the deficiency of the prior art, provide a kind of intelligent lock cipher sharing method, Apparatus and system makes if informing guest's password when with solution, electric intelligent door lock has guest at home in the prior art Electronic intelligent lock password leakage, the problem of endangering the life and property safety of electronic intelligent lock resident.
To achieve the above object, technical solution used in the embodiment of the present invention is as follows:
In a first aspect, the embodiment of the invention provides a kind of intelligent lock cipher sharing methods, comprising: terminal obtains target and uses The identity information at family and intelligent lock information determine corresponding intelligent lock information, the identity according to the identity information of target user Information is used to indicate the identity of the target user, and the intelligence lock information is used to indicate smart lock mark;The terminal The intelligent lock information and the corresponding authority information of the smart lock are sent to target user, wherein the authority information is used for According to the combination of current intelligent lock information and current temporal information, generated by Encryption Algorithm effective close in preset time Code, so that target user unlocks to the smart lock in the preset time by the password.
Optionally, the authority information is used to indicate the unlocking times of the target user of the smart lock, the smart lock At least one of with the uncaging time section of the smart lock.
Optionally, before the step of identity information according to target user determines corresponding intelligent lock information, the side Method further include: the graphic code by scanning the smart lock is bound with the smart lock, and the graphic code carries described The mark of smart lock.
Optionally, after the step of obtaining the identity information of target user, the method also includes: verify the target The identity information of user is associated with the corresponding smart lock of the target user if verifying meets, if verifying is not met, Again the identity information of the target user is verified.
Optionally, after the step of being associated with the target user corresponding smart lock, the method also includes: establish institute The relation list of target user with corresponding smart lock are stated, the relation list is used to indicate target user and corresponding intelligent lock information Between authority information.
Optionally, the algorithm includes: at least one of partitioning algorithm, peace bit arithmetic, logical operation and arithmetic operator.
Second aspect, the embodiment of the invention also provides a kind of intelligent lock cipher sharing apparatus, comprising: first obtains mould Block determines corresponding intelligence according to the identity information of target user for obtaining the identity information and intelligence lock information of target user Energy lock information, the identity information are used to indicate the identity of the target user, and the intelligence lock information is used to indicate intelligence It can lock mark;Sending module, for sending the intelligent lock information and the corresponding authority information of the smart lock to target user, Wherein, the authority information is used to pass through Encryption Algorithm according to the combination of current intelligent lock information and current temporal information Generate preset time in effective password so that target user by the password in the preset time to the smart lock It unlocks.
Optionally, described device further include: second obtains module, for passing through graphic code and the institute of scanning the smart lock It states smart lock to be bound, the graphic code carries the mark of the smart lock.
Optionally, described device further include: authentication module, for verifying after the identity information for obtaining target user The identity information of the target user is associated with the corresponding smart lock of the target user if verifying meets, if verifying is not Meet, then verifies the identity information of the target user again.
The third aspect, the embodiment of the invention also provides a kind of intelligent lock cipher share system, the system comprises intelligence is close Code lock and the intelligent lock cipher sharing apparatus of any one of such as second aspect.
The beneficial effects of the present invention are: the present invention provides a kind of intelligent lock cipher sharing method, due to the intelligence lock cipher It include: that the terminal transmission intelligent lock information and the corresponding authority information of the smart lock are used to target in sharing method Family, so that the intelligent cipher can carry out unlocking operation to target user to energy within preset a period of time;Moreover, described Authority information is used for the combination according to current intelligent lock information and current temporal information, when generating default by Encryption Algorithm Interior effective password, so that cipher safety higher the advantages of not revealing password in the intelligence lock cipher sharing method.
Detailed description of the invention
In order to illustrate the technical solution of the embodiments of the present invention more clearly, below will be to needed in the embodiment attached Figure is briefly described, it should be understood that the following drawings illustrates only certain embodiments of the present invention, therefore is not construed as pair The restriction of range for those of ordinary skill in the art without creative efforts, can also be according to this A little attached drawings obtain other relevant attached drawings.
Fig. 1 is a kind of intelligent lock cipher sharing method interaction schematic diagram that the application first embodiment provides;
Fig. 2 is a kind of flow diagram for intelligent lock cipher sharing method that the application second embodiment provides;
Fig. 3 is a kind of intelligent lock cipher sharing apparatus structural schematic diagram that the application 3rd embodiment provides;
Fig. 4 is a kind of intelligent lock cipher share system structural schematic diagram that the application fourth embodiment provides;
Fig. 5 is the schematic diagram of the intelligent lock cipher share system of another embodiment of the present invention.
Specific embodiment
In order to make the object, technical scheme and advantages of the embodiment of the invention clearer, below in conjunction with the embodiment of the present invention In attached drawing, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described embodiment is A part of the embodiment of the present invention, instead of all the embodiments.
Fig. 1 is a kind of intelligent lock cipher sharing method interaction schematic diagram that the application first embodiment provides, such as Fig. 1 institute Show, the present embodiment provides a kind of intelligent lock cipher sharing methods to include:
S101, terminal obtain the identity information and intelligence lock information of target user, true according to the identity information of target user Fixed corresponding intelligent lock information.
Specifically, terminal obtains the identity information and intelligent door lock information of target user, wherein the identity of the target user Information can be at least one of name, cell-phone number, identification card number or account number of APP of the target user, the intelligence Unique sequence when the identification number in APP or the intelligent door lock that door lock information can be the intelligent door lock dispatch from the factory Number, to the identity information particular content of the target user according to being actually not specifically limited, used as long as being able to achieve by the target The identity information at family can accurately and uniquely determine that target user's identity, the door lock information of the intelligent door lock are not done herein It limits, as long as being able to achieve the function that can identify unique intelligent door lock by the intelligent door lock;The terminal is according to target The identity information of user determines corresponding intelligent lock information, and determination will after which obtains the identity information of target user It is shared with the intelligent lock information of the target user, can establish incidence relation, wherein the identity information is used to indicate target use The identity at family, the intelligence lock information are used to indicate smart lock mark.
S102, the terminal send intelligence lock information authority information corresponding with the smart lock to target user.
Specifically, after the information of terminal check target user, by the authority information and the intelligence of the smart lock for needing to send The information that can be locked is sent to the target user, and target user can be managed the smart lock, i.e., the target user can be right This intelligently carries out the unlocking operation of a period of time or certain number, wherein the mode of transmission can be short message, network linking Or message in APP etc., it can not limit.
Wherein, which is used for the combination according to current intelligent lock information and current temporal information, by adding Close algorithm generates effective password in preset time, so that target user passes through the password in the preset time to the smart lock It unlocks.
Specifically, in the present embodiment, the combination are as follows: the identity information of such as smart lock is 2C425EA, current time letter Breath is the combination of the 201801021112 current intelligent lock informations and current temporal information are as follows: 2C425EA201801021112 obtains the ciphertext of one group of 16 byte after sending out using md5 encryption, generated later by Encryption Algorithm Effective password in preset time can open the smart lock in the password preset time, if password fails, repeat S101 and S102 step reacquires one group of password.
It unlocks in the present embodiment principle are as follows: the smart lock is not attached to network, whithin a period of time can be in the smart lock One group of password is generated, which also can be generated one group of password identical with the smart lock in same amount of time, and user should Into the smart lock, the password which generates the password of the input with oneself compares the Password Input that terminal generates, If password is consistent, which is opened, and generates password again if password bad;Password share process are as follows: terminal according to The identity information of target user determines target user, the smart lock for needing to share is determined according to intelligent lock information, which should The intelligent lock information of smart lock authority information corresponding with the smart lock is sent to the target user, which can be to this Smart lock carries out unlocking operation whithin a period of time.
The beneficial effect of intelligence lock cipher sharing method provided in this embodiment is: the people except smart lock owner needs When carrying out unlocking operation to the smart lock, the owner of the smart lock can be by the unlocking authority of the smart lock accurately at one section Other people are shared in time, and the smart lock can be managed the permission of sharing, so as to avoid the close of smart lock Code leakage or permission overlong time, and then the problem of endanger the life and property safety of electronic intelligent lock resident.
Second embodiment
Fig. 2 is a kind of flow diagram for intelligent lock cipher sharing method that the application second embodiment provides, such as Fig. 2 institute Show, includes: the S101 and S102, S101 and S102 in first embodiment the present embodiment provides a kind of intelligent lock cipher sharing method With first constantly in step it is completely the same, this will not be repeated here, and optionally, in addition, which is used to indicate the intelligence At least one of uncaging time section of the target user of lock, the unlocking times of the smart lock and the smart lock.
Specifically, the authority information is used to indicate the target user of the smart lock, it is the authority information for determining simultaneously Indicate the identity information for the target user that the smart lock is shared, the authority information be used to indicate the smart lock unlocking times and Uncaging time, the i.e. authority information are that target user can be to the restricted information of the smart lock number or uncaging time, such as eventually When end to target user's sending permission information, the smart lock can be carried out in three days following by setting the target user Unlocking operation and the target user can unlock 10 times.
Optionally, before the step of identity information according to target user determines corresponding intelligent lock information, this method Further include: S100, the graphic code by scanning the smart lock and the smart lock are bound, which carries the smart lock Mark.
Specifically, before the step of identity information according to target user determines corresponding intelligent lock information, this method Further include: the graphic code by scanning the smart lock is bound with the smart lock, which carries the mark of the smart lock Know.Wherein it is possible to which smart lock is first bound with terminal, smart lock posts two dimensional code when dispatching from the factory, and can be scanned by terminal The two dimensional code of smart lock binds the smart lock, and the two-dimensional barcode information of smart lock can be received with terminal, is swept by smart lock The two dimensional code is retouched, so that terminal is bound with smart lock, unlocking operation can be carried out after binding to the smart lock, and should Smart lock assert that the terminal is the manager of the smart lock, that is, possesses the unlocking authority of the smart lock, if necessary to replacement terminal, Unbundlings processing can also be carried out to smart lock.
Optionally, after the step of obtaining the identity information of target user, this method further include: S103, verify the mesh Mark the identity information of user.
If verifying meets, execute S104 and be associated with the corresponding smart lock of the target user, if verifying is not met, holds Row S105 verifies the identity information of the target user again.
Specifically, further including the identity information to target user after the step of obtaining the identity information of target user It is verified, which includes: in name authentication, verifying dynamic password, password authentification, cell-phone number verifying and identification card number verifying It is at least one;If target user's verifying meets, which, which obtains permission, can carry out unlocking operation to the smart lock;If Target user's verifying is not met, then newly verifies the identity information of the target user.
Optionally, after the step of being associated with the target user corresponding smart lock, this method further include: S106, foundation The relation list of the target user and corresponding smart lock, the relation list be used to indicate target user and corresponding intelligent lock information it Between authority information.
Specifically, the target user generates a list, by the intelligence after the target user is verified by identity information Lock is added in the list, which can be by operating the list to the smart lock, and the list records Target user's unlocking times and uncaging time.
Optionally, which includes: at least one of partitioning algorithm, peace bit arithmetic, logical operation and arithmetic operator.
In intelligence lock cipher sharing method provided in this embodiment, intelligence can be carried out to target user according to the actual situation The sharing of corresponding authority information is locked, and authority information can make target user right in the preset time by the password The smart lock is unlocked, and so as to avoid the password leakage of smart lock or permission overlong time, and then endangers electronic intelligence The problem of lockking the life and property safety at family.
3rd embodiment
Fig. 3 is a kind of intelligent lock cipher sharing apparatus structural schematic diagram that the application 3rd embodiment provides, such as Fig. 3 institute Show, the present embodiment provides a kind of intelligent lock cipher sharing apparatus 200, which includes: the first acquisition Module 201 is determined according to the identity information of target user and is corresponded to for obtaining the identity information and intelligence lock information of target user Intelligent lock information, which is used to indicate the identity of the target user, which is used to indicate intelligence Lock mark;Sending module 202, for sending intelligence lock information authority information corresponding with the smart lock to target user, In, which is used to be generated according to the combination of current intelligent lock information and current temporal information by Encryption Algorithm Effective password in preset time, so that target user unlocks to the smart lock in the preset time by the password.
Optionally, device further include: second obtains module 203, for the graphic code by scanning the smart lock and is somebody's turn to do Smart lock is bound, which carries the mark of the smart lock.
Optionally, the device further include: authentication module 204, for verifying after the identity information for obtaining target user The identity information of the target user is associated with the corresponding smart lock of the target user if verifying meets, if verifying is not inconsistent It closes, then verifies the identity information of the target user again.
Intelligence lock cipher sharing apparatus provided in this embodiment, which includes: the first acquisition mould Block 201, sending module 202, second obtain module 203 and authentication module 204;The first acquisition module 204 can determine target The identity information of user and intelligent lock information;The authentication module 202 is corresponding with the smart lock for sending the intelligence lock information Authority information is to target user;The second acquisition module 203, is locked into for the graphic code by scanning the smart lock with the intelligence Row binding;The authentication module 204, for after the identity information for obtaining target user, verifying the identity letter of the target user Breath;It can carry out the sharing of the corresponding authority information of smart lock to target user according to the actual situation, and authority information can be with So that target user unlocks to the smart lock in the preset time by the password, so as to avoid the password of smart lock Leakage or permission overlong time, and then the problem of endanger the life and property safety of electronic intelligent lock resident.
Fourth embodiment
Fig. 4 is a kind of intelligent lock cipher share system structural schematic diagram that the application fourth embodiment provides, such as Fig. 4 institute Show, the present embodiment provides a kind of intelligent lock cipher share system 300, which includes that intelligent cipher lock 301 and such as second are implemented The intelligent lock cipher sharing apparatus 200 of any one of example.
Intelligence lock cipher share system 300 provided in this embodiment, the system include: that intelligent cipher lock 301 and second are real Intelligent lock cipher sharing apparatus 200 in example is applied, which is not attached to network, can be according to intelligence First in lock cipher sharing apparatus obtains module 201, sending module 202, second obtains module 203 and authentication module 204 is right The password of input is verified, and can be carried out the corresponding authority information of smart lock to target user according to the actual situation and be divided It enjoys, authority information can make target user by obtaining password in the terminal 302 of the target user to when this is preset It is interior to unlock to the smart lock, so as to avoid the password leakage of smart lock or permission overlong time, and then endanger electricity The problem of life and property safety of sub- smart lock resident.
Above-mentioned apparatus can be used for executing the method for above method embodiment offer, specific implementation and technical effect class Seemingly, which is not described herein again.
The above module can be arranged to implement one or more integrated circuits of above method, such as: one Or multiple specific integrated circuits (Application SpecificIntegrated Circuit, abbreviation ASIC), or, one or Multi-microprocessor (digitalsingnal processor, abbreviation DSP), or, one or more field-programmable gate array Arrange (Field Programmable Gate Array, abbreviation FPGA) etc..For another example, when some above module passes through processing element When the form of scheduler program code is realized, which can be general processor, such as central processing unit (CentralProcessing Unit, abbreviation CPU) or it is other can be with the processor of caller code.For another example, these modules It can integrate together, realized in the form of system on chip (system-on-a-chip, abbreviation SOC).
Fig. 5 is the schematic diagram of the intelligent lock cipher share system of another embodiment of the present invention, as shown in figure 5, the device can To be integrated in the chip of terminal device or terminal device, which can be the calculating equipment for having image processing function.
The device includes: memory 401, processor 402.
Memory 401 is for storing program, the program that processor 402 calls memory 401 to store, to execute the above method Embodiment.Specific implementation is similar with technical effect, and which is not described herein again.
Optionally, the present invention also provides a kind of program product, such as computer readable storage medium, including program, the journeys Sequence is when being executed by processor for executing above method embodiment.
In several embodiments provided by the present invention, it should be understood that disclosed device and method can pass through it Its mode is realized.For example, the apparatus embodiments described above are merely exemplary, for example, the division of the unit, only For a kind of logical function partition, there may be another division manner in actual implementation, such as multiple units or components can combine Or it is desirably integrated into another system, or some features can be ignored or not executed.Another point, shown or discussed phase Coupling, direct-coupling or communication connection between mutually can be through some interfaces, the INDIRECT COUPLING or communication of device or unit Connection can be electrical property, mechanical or other forms.
Unit may or may not be physically separated as illustrated by the separation member for this, show as unit Component may or may not be physical unit, it can it is in one place, or may be distributed over multiple nets On network unit.It can select some or all of unit therein according to the actual needs to realize the mesh of this embodiment scheme 's.
It, can also be in addition, the functional units in various embodiments of the present invention may be integrated into one processing unit It is that each unit physically exists alone, can also be integrated in one unit with two or more units.Above-mentioned integrated list Member both can take the form of hardware realization, can also realize in the form of hardware adds SFU software functional unit.
The above-mentioned integrated unit being realized in the form of SFU software functional unit can store and computer-readable deposit at one In storage media.Above-mentioned SFU software functional unit is stored in a storage medium, including some instructions are used so that a computer Equipment (can be personal computer, server or the network equipment etc.) or processor (English: processor) execute this hair The part steps of bright each embodiment this method.And storage medium above-mentioned includes: USB flash disk, mobile hard disk, read-only memory (English Text: Read-OnlyMemory, referred to as: ROM), random access memory (English: Random AccessMemory, referred to as: RAM), the various media that can store program code such as magnetic or disk.

Claims (10)

1. a kind of intelligence lock cipher sharing method characterized by comprising
Terminal obtains the identity information and intelligence lock information of target user, determines corresponding intelligence according to the identity information of target user Energy lock information, the identity information are used to indicate the identity of the target user, and the intelligence lock information is used to indicate intelligence It can lock mark;
The terminal sends the intelligent lock information and the corresponding authority information of the smart lock to target user, wherein described Authority information is used for the combination according to current intelligent lock information and current temporal information, when generating default by Encryption Algorithm Interior effective password, so that target user unlocks to the smart lock in the preset time by the password.
2. intelligence lock cipher sharing method as described in claim 1, which is characterized in that the authority information is used to indicate the intelligence At least one of the unlocking times of the target user, the smart lock that can lock and the uncaging time section of the smart lock.
3. intelligence lock cipher sharing method as described in claim 1, which is characterized in that true according to the identity information of target user Before the step of fixed corresponding intelligent lock information, the method also includes:
Graphic code by scanning the smart lock is bound with the smart lock, and the graphic code carries the smart lock Mark.
4. the intelligent lock cipher sharing method as described in claim any one of 1-3, which is characterized in that in the body for obtaining target user After the step of part information, the method also includes:
The identity information of the target user is verified, if verifying meets, is associated with the corresponding smart lock of the target user, such as Fruit verifying is not met, then verifies the identity information of the target user again.
5. intelligence lock cipher sharing method as claimed in claim 4, which is characterized in that be associated with the corresponding intelligence of the target user After the step of capable of locking, the method also includes:
Establish the relation list of the target user with corresponding smart lock, the relation list be used to indicate target user with it is corresponding Authority information between intelligent lock information.
6. intelligence lock cipher sharing method according to claim 1, which is characterized in that the algorithm include: partitioning algorithm, Pacify at least one of bit arithmetic, logical operation and arithmetic operator.
7. a kind of intelligence lock cipher sharing apparatus characterized by comprising
First obtains module, for obtaining the identity information and intelligence lock information of target user, is believed according to the identity of target user Breath determines corresponding intelligent lock information, and the identity information is used to indicate the identity of the target user, the smart lock Information is used to indicate smart lock mark;
Sending module, for sending the intelligent lock information and the corresponding authority information of the smart lock to target user, wherein The authority information is used for the combination according to current intelligent lock information and current temporal information, is generated by Encryption Algorithm pre- If effective password in the time, so that target user opens the smart lock in the preset time by the password Lock.
8. intelligence lock cipher sharing apparatus as claimed in claim 7, which is characterized in that described device further include: second obtains mould Block is bound for the graphic code by scanning the smart lock with the smart lock, and the graphic code carries the intelligence The mark that can be locked.
9. intelligence lock cipher sharing apparatus as claimed in claim 8, which is characterized in that described device further include: authentication module is used In after the identity information for obtaining target user, the identity information of the target user is verified, if verifying meets, is associated with The corresponding smart lock of the target user verifies the identity information of the target user if verifying is not met again.
10. a kind of intelligence lock cipher share system, which is characterized in that the system comprises intelligent cipher lock and such as claim 7- Any one of 9 intelligent lock cipher sharing apparatus.
CN201811124421.XA 2018-09-26 2018-09-26 Intelligent lock cipher sharing method, apparatus and system Pending CN109377600A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811124421.XA CN109377600A (en) 2018-09-26 2018-09-26 Intelligent lock cipher sharing method, apparatus and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811124421.XA CN109377600A (en) 2018-09-26 2018-09-26 Intelligent lock cipher sharing method, apparatus and system

Publications (1)

Publication Number Publication Date
CN109377600A true CN109377600A (en) 2019-02-22

Family

ID=65402016

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811124421.XA Pending CN109377600A (en) 2018-09-26 2018-09-26 Intelligent lock cipher sharing method, apparatus and system

Country Status (1)

Country Link
CN (1) CN109377600A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109840978A (en) * 2019-03-25 2019-06-04 广州阔道物联网技术有限公司 A kind of centralized management intelligent lock system and its management method and method for unlocking
CN110570564A (en) * 2019-09-05 2019-12-13 安恒世通(北京)网络科技有限公司 single-machine lock and control method thereof
CN115273276A (en) * 2021-04-30 2022-11-01 云丁网络技术(北京)有限公司 Method and apparatus for authenticating a user

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105049653A (en) * 2015-05-29 2015-11-11 深圳光启智能光子技术有限公司 Method and system for controlling unlocking authority of locks based on network
CN105719374A (en) * 2016-01-22 2016-06-29 慧锐通智能科技股份有限公司 Door access control method
CN105719376A (en) * 2016-01-22 2016-06-29 慧锐通智能科技股份有限公司 Door access control system and method
CN106131179A (en) * 2016-07-05 2016-11-16 林哲敏 The password Rights Management System of a kind of intelligent door lock and method
CN107316019A (en) * 2017-06-23 2017-11-03 比奥香港有限公司 A kind of fingerprint lock control method and Fingerprint Lock System
US20170345239A9 (en) * 2014-12-23 2017-11-30 Gate Labs Inc. Access management system
CN108492413A (en) * 2018-03-15 2018-09-04 广东西雅斯智能科技有限公司 Dynamic cipher generating method, password generator and coded lock

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170345239A9 (en) * 2014-12-23 2017-11-30 Gate Labs Inc. Access management system
CN105049653A (en) * 2015-05-29 2015-11-11 深圳光启智能光子技术有限公司 Method and system for controlling unlocking authority of locks based on network
CN105719374A (en) * 2016-01-22 2016-06-29 慧锐通智能科技股份有限公司 Door access control method
CN105719376A (en) * 2016-01-22 2016-06-29 慧锐通智能科技股份有限公司 Door access control system and method
CN106131179A (en) * 2016-07-05 2016-11-16 林哲敏 The password Rights Management System of a kind of intelligent door lock and method
CN107316019A (en) * 2017-06-23 2017-11-03 比奥香港有限公司 A kind of fingerprint lock control method and Fingerprint Lock System
CN108492413A (en) * 2018-03-15 2018-09-04 广东西雅斯智能科技有限公司 Dynamic cipher generating method, password generator and coded lock

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109840978A (en) * 2019-03-25 2019-06-04 广州阔道物联网技术有限公司 A kind of centralized management intelligent lock system and its management method and method for unlocking
CN110570564A (en) * 2019-09-05 2019-12-13 安恒世通(北京)网络科技有限公司 single-machine lock and control method thereof
CN115273276A (en) * 2021-04-30 2022-11-01 云丁网络技术(北京)有限公司 Method and apparatus for authenticating a user
CN115273276B (en) * 2021-04-30 2024-02-06 云丁网络技术(北京)有限公司 Method and device for authenticating a user

Similar Documents

Publication Publication Date Title
CN105160226B (en) User ID authentication method, device, system and smart home
CN105069876B (en) The method and system of intelligent entrance guard control
CN103971435B (en) Method for unlocking, server, mobile terminal, electronic lock and unlocking system
CN104780043B (en) Access control method and system based on two dimensional code
CN109377600A (en) Intelligent lock cipher sharing method, apparatus and system
CN108551455A (en) The configuration method and device of smart card
CN103136820A (en) Remote access control system based on terminal fingerprint identification
CN110177088B (en) Temporary identity authentication method, device and system
CN105303664A (en) Intelligent access control system based on two dimensional code technology and control method thereof
CN109767534A (en) Gate inhibition's access method, system, management terminal and door control terminal based on block chain
CN109151820A (en) One kind being based on the safety certifying method and device of " one machine of a people, one card No.1 "
CN106846580A (en) Intelligent unlocking method and system
CN109558918A (en) A kind of certificate chain real estate electronics license system and its application method
CN110381075B (en) Block chain-based equipment identity authentication method and device
CN109858220A (en) Electronic contract signs method, apparatus, terminal device and storage medium
CN105488875B (en) A kind of gate inhibition's verification method and device
CN109117668A (en) A kind of identification authorization safety access method based on block chain building
CN107395369A (en) Towards mobile Internet from the authentication method of carrying device, access method and system
CN107615301A (en) The safety storage of fingerprint coherent element
CN108920919A (en) Control method, the device and system of interactive intelligence equipment
CN108121904B (en) Unlocking method, device, electronic equipment and server
Prada-Delgado et al. A blockchain-based crypto-anchor platform for interoperable product authentication
CN103370713A (en) Method for programming a mobile terminal chip
CN206773793U (en) Tripper and system
CN110399577A (en) Office facility sharing method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190222

RJ01 Rejection of invention patent application after publication