CN110176091B - Method for improving security of intelligent lock through mobile terminal equipment code - Google Patents
Method for improving security of intelligent lock through mobile terminal equipment code Download PDFInfo
- Publication number
- CN110176091B CN110176091B CN201910408057.8A CN201910408057A CN110176091B CN 110176091 B CN110176091 B CN 110176091B CN 201910408057 A CN201910408057 A CN 201910408057A CN 110176091 B CN110176091 B CN 110176091B
- Authority
- CN
- China
- Prior art keywords
- identification code
- intelligent lock
- code
- mobile terminal
- remote system
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00571—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72403—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
- H04M1/72409—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories
- H04M1/72412—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories using two-way short-range wireless interfaces
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72403—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
- H04M1/72409—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories
- H04M1/72415—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories for remote control of appliances
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Human Computer Interaction (AREA)
- Signal Processing (AREA)
- Telephone Function (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses a method for improving the security of an intelligent lock through a mobile terminal device code, which comprises the following steps: the mobile terminal initiates a binding request to the intelligent lock and sends a first identification code to the intelligent lock; the intelligent lock receives the first identification code and sends the first identification code and the second identification code of the intelligent lock to the remote system; and the remote system matches the first identification code with the second identification code and verifies whether the mobile terminal is allowed to bind the intelligent lock. The method has the advantages that the mobile phone imei code of the intelligent lock owner is bound with the intelligent lock, and the mobile phone terminal equipment which rejects other imei codes is forced to control the intelligent lock, so that the problem that an illegal person impersonates the intelligent lock owner to maliciously control the intelligent lock is solved, the operation mode of the method is simple, the safety of the intelligent lock is greatly improved, and the method is suitable for users with high requirements on use safety.
Description
Technical Field
The invention relates to the technical field of intelligent locks, in particular to a method for improving the safety of an intelligent lock through a mobile terminal device code.
Background
At present, with the continuous improvement of the intellectualization degree and the informatization degree of the modern society, the intelligent lock is taken as a novel safety lock which is just appeared in recent years and is used by more and more families. The intelligent lock is used as the most important defense line in the family security, in particular to the problem of property security, and consumers pay more attention to the use security. As a prominent safety problem, illegal persons can maliciously pretend to be the owner of the intelligent lock in various modes to rebind the intelligent lock, so that illegal control over the intelligent lock is realized, and the safety of the real owner of the intelligent lock is endangered.
Disclosure of Invention
In order to solve the technical problems, the invention provides the method for improving the safety of the intelligent lock through the mobile terminal equipment code, which is simple to operate and can improve the use safety of the intelligent lock.
In order to achieve the purpose, the invention adopts the following technical scheme:
a method for improving security of an intelligent lock through a mobile terminal device code, the method comprising:
the mobile terminal initiates a binding request to the intelligent lock and sends a first identification code to the intelligent lock;
the intelligent lock receives the first identification code and sends the first identification code and the second identification code of the intelligent lock to the remote system;
and the remote system matches the first identification code with the second identification code and verifies whether the mobile terminal is allowed to bind the intelligent lock.
Preferably, when the remote system verifies whether the mobile terminal is allowed to bind the intelligent lock, the following method is executed:
the remote system judges whether the first identification code and the second identification code are bound for the first time;
if the first identification code and the second identification code are bound for the first time, pairing the first identification code and the second identification code, storing the first identification code and the second identification code as a group of verification number groups, and sending an instruction for allowing binding to the intelligent lock;
if the first identification code and the second identification code are not bound for the first time, verifying whether the first identification code of the current request is the same as the first identification code bound for the first time or the first identification code after modified binding;
if the first identification code of the current request is the same as the first identification code bound for the first time or the first identification code after the binding is modified, sending a binding permission instruction to the intelligent lock;
and if the first identification code of the current request is different from the first identification code bound for the first time or the first identification code after the binding is modified, sending an instruction of refusing the binding to the intelligent lock.
Preferably, the method further comprises the following steps: the identity information of the owner of the intelligent lock is input into a database of a remote system through a mobile terminal, and the remote system simultaneously generates a random code and sends the random code to a client; the identity information comprises identity card information, mobile phone number information, fingerprint information and facial image information of an owner of the intelligent lock.
Preferably, the mobile terminal can also send a binding modification request to the remote system, the remote system manually verifies whether the identity information of the owner of the intelligent lock and the random code are in accordance, and if so, the first identification code bound with the second identification code is allowed to be modified to form a new verification number group.
Preferably, the mobile terminal is a mobile phone, the first identification code is an imei code of the mobile phone, and the second identification code is a unique identification code recorded in the smart lock.
Compared with the prior art, the invention has the following beneficial effects:
the invention binds the mobile phone imei code of the intelligent lock owner with the intelligent lock, and forcibly rejects the control of other mobile phone terminal equipment of the imei code, thereby solving the problem that an illegal person pretends to be the intelligent lock owner to maliciously control the intelligent lock. The method is simple in operation mode, greatly improves the safety of the intelligent lock, and is suitable for users with high requirements on use safety.
Drawings
FIG. 1 is a flow chart of a method for improving security of an intelligent lock through a mobile terminal device code according to the present invention;
FIG. 2 is a schematic flow chart of the operation of the method of the present invention;
fig. 3 is a flow chart of a method for verifying whether the mobile terminal is allowed to bind the intelligent lock by the remote system.
Detailed Description
The present invention will be described in further detail with reference to examples and drawings, but the present invention is not limited thereto.
Referring to fig. 1, fig. 1 is a flow chart of a method for improving security of an intelligent lock by using a mobile terminal device code according to the present invention, where the mobile terminal of this embodiment refers to a mobile phone, the following first identification code is an imei code of the mobile phone, that is, an international mobile device identification code, used for identifying each independent mobile communication device such as a mobile phone in a mobile phone network, and is equivalent to an identification card of the mobile phone, and the following second identification code is a unique identification code entered into the intelligent lock, and the unique identification code may be set by a manufacturer and entered into a memory of the intelligent lock when the intelligent lock device leaves a factory, and is used as a unique device identification number of the intelligent lock. The method comprises the following steps:
s10: the mobile terminal initiates a binding request to the intelligent lock and sends a first identification code to the intelligent lock;
exemplarily, as shown in fig. 2, fig. 2 is an operation flow diagram of the method, in this step, a mobile phone terminal sends a binding instruction to an intelligent lock through an APP (application program) loaded on the mobile phone terminal, and simultaneously obtains an imei code of the mobile phone through the APP (application program), and sends the imei code to the intelligent lock loaded with a wireless data transceiver module through a wireless network. The wireless transmission mode can be WIFI, Bluetooth, 2G/3G/4G/5G, NFC or ZigBee and the like.
S20: the intelligent lock receives the first identification code and sends the first identification code and the second identification code of the intelligent lock to the remote system;
illustratively, in this step, the so-called remote system is a database server, and after receiving the imei code of the mobile phone, the smart lock remotely sends the imei code and the unique identification code entered into the smart lock to the database server associated with the APP (application program) and providing data service for the APP (application program).
S30: and the remote system matches the first identification code with the second identification code and verifies whether the mobile terminal is allowed to bind the intelligent lock.
Illustratively, in this step, after the database server receives the imei code of the mobile phone and the unique identification code entered into the smart lock, the database server is called to obtain information, the imei code of the mobile phone is matched with the unique identification code entered into the smart lock, and whether the mobile phone is allowed to bind the smart lock is determined.
Further, as shown in fig. 3, fig. 3 is a flowchart of a method for the remote system to verify whether the mobile terminal is allowed to bind the smart lock, wherein when the remote system verifies whether the mobile terminal is allowed to bind the smart lock, the following method is executed:
s301: the remote system judges whether the first identification code and the second identification code are bound for the first time;
illustratively, in this step, the database server determines whether the unique identification code entered into the smart lock and the imei code of the mobile phone are bound for the first time.
S302: if the first identification code and the second identification code are bound for the first time, pairing the first identification code and the second identification code, storing the first identification code and the second identification code as a group of verification number groups, and sending an instruction for allowing binding to the intelligent lock;
illustratively, in this step, if the imei code of the mobile phone and the unique identification code entered into the intelligent lock are bound for the first time, the imei code and the unique identification code entered into the intelligent lock are paired and stored in the database of the server as a group of verification number groups, and an instruction for allowing binding is sent to the intelligent lock.
S303: if the first identification code and the second identification code are not bound for the first time, verifying whether the first identification code of the current request is the same as the first identification code bound for the first time or the first identification code after modified binding;
if the first identification code of the current request is the same as the first identification code bound for the first time or the first identification code after the binding is modified, sending a binding permission instruction to the intelligent lock;
and if the first identification code of the current request is different from the first identification code bound for the first time or the first identification code after the binding is modified, sending an instruction of refusing the binding to the intelligent lock.
Illustratively, in this step, if the imei code of the mobile phone and the unique identification code entered into the intelligent lock are not first bound, the database server determines whether the imei code is the first bound imei code or the imei code that is newly paired with the intelligent lock after the user actively modifies the binding.
If the imei code is the first bound imei code or the imei code which is automatically modified and bound by the user and then is newly paired with the intelligent lock, the server sends a binding permission instruction to the intelligent lock, and the mobile phone terminal and the intelligent lock are bound at the moment;
if the imei code is not the first-time binding imei code or the imei code which is actively modified and bound by the user and then is re-paired with the intelligent lock, the server sends a binding refusing instruction to the intelligent lock, and information such as 'binding failure' is prompted on an application program interface of the mobile phone.
Further, the method further comprises the following steps: the identity information of the owner of the intelligent lock is input into a database of a remote system through the mobile terminal, and the input identity information comprises identity card information, mobile phone number information, fingerprint information, facial image information and the like of the owner of the intelligent lock. The remote system will simultaneously generate a random code to send to the client.
Illustratively, in this step, the user can manually input identity information of an individual, such as identity card information and mobile phone number information, to be remotely uploaded and entered into a database of the server through a mobile phone APP (application program), or can enter personal fingerprint information and facial image information into the database of the server through a fingerprint sensor and a camera of the mobile phone. At the same time, the server will generate a random code and return it to the user, the user needs to remember the random code, and the identity information and the random code will be used as the data information for future user identity verification. In this step, the security of the verification is further improved by adding the random code.
Further, the method further comprises the following steps: and sending a modification binding request to a remote system through the mobile terminal, manually verifying whether the identity information of the owner of the intelligent lock is consistent with the random code by the remote system, and if so, allowing the first identification code bound with the second identification code to be modified to form a new verification number group.
Illustratively, in this step, if the user loses the mobile phone and needs to bind the smart lock again, a modified binding request may be sent to the server through the mobile phone APP (application), specifically, the personal identity information and the random code need to be sent to the server, after receiving the request, the server manually verifies whether the identity information and the random code are consistent with the data information stored in the database, and if so, the user is allowed to unbind the previous imei code from the smart lock, bind the new imei code again, and update and store the new verification number group into the database.
The method provided by the invention binds the mobile phone imei code of the intelligent lock owner with the intelligent lock, and forcibly rejects the control of other mobile phone terminal equipment of the imei code, thereby solving the problem that an illegal person pretends to be the intelligent lock owner to maliciously control the intelligent lock. The method is simple in operation mode, greatly improves the safety of the intelligent lock, and is suitable for users with high requirements on use safety.
The steps in the method of the embodiment of the invention can be sequentially adjusted, combined or deleted according to actual needs. It will be understood by those skilled in the art that all or part of the steps in the methods of the above embodiments may be implemented by hardware associated with a program instructing a terminal device, and the program may be stored in a computer-readable storage medium, and the storage medium may include: flash disk, read only memory ROM, random access memory RAM, magnetic or optical disk, and the like.
The above description is only for the preferred embodiment of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art should be considered to be within the technical scope of the present invention, and the technical solutions and their concepts should be considered to be equivalent or modified within the scope of the present invention.
Claims (2)
1. A method for improving the security of an intelligent lock through a mobile terminal device code is characterized by comprising the following steps:
the mobile terminal initiates a binding request to the intelligent lock and sends a first identification code to the intelligent lock;
the intelligent lock receives the first identification code and sends the first identification code and the second identification code of the intelligent lock to the remote system;
the remote system matches the first identification code with the second identification code and verifies whether the mobile terminal is allowed to bind the intelligent lock;
when the remote system verifies whether the mobile terminal is allowed to bind the intelligent lock, the following method is executed:
the remote system judges whether the first identification code and the second identification code are bound for the first time;
if the first identification code and the second identification code are bound for the first time, pairing the first identification code and the second identification code, storing the first identification code and the second identification code as a group of verification number groups, and sending an instruction for allowing binding to the intelligent lock;
if the first identification code and the second identification code are not bound for the first time, verifying whether the first identification code of the current request is the same as the first identification code bound for the first time or the first identification code after modified binding;
if the first identification code of the current request is the same as the first identification code bound for the first time or the first identification code after the binding is modified, sending a binding permission instruction to the intelligent lock;
if the first identification code of the current request is different from the first identification code bound for the first time or the first identification code after modified binding, sending an instruction of refusing binding to the intelligent lock;
further comprising: the identity information of the owner of the intelligent lock is input into a database of a remote system through a mobile terminal, and the remote system simultaneously generates a random code and sends the random code to a client; the identity information comprises identity card information, mobile phone number information, fingerprint information and facial image information of an owner of the intelligent lock; specifically, the method comprises the following steps: a user remotely uploads and records identity information such as identity card information and mobile phone number information into a database of a server through manual input of a mobile terminal application program, or records personal fingerprint information and facial image information into the database of the server through a fingerprint sensor and a camera of a mobile phone; meanwhile, the server generates a random code to be returned and sent to the user, the user needs to remember the random code, and the identity information and the random code are used as data information for verifying the identity of the user in the future;
and sending a modification binding request to a remote system through the mobile terminal, manually verifying whether the identity information of the owner of the intelligent lock is consistent with the random code by the remote system, and if so, allowing the first identification code bound with the second identification code to be modified to form a new verification number group.
2. The method for improving the security of the intelligent lock through the mobile terminal equipment code according to claim 1, wherein the mobile terminal is a mobile phone, the first identification code is an imei code of the mobile phone, and the second identification code is a unique identification code entered into the intelligent lock.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910408057.8A CN110176091B (en) | 2019-05-15 | 2019-05-15 | Method for improving security of intelligent lock through mobile terminal equipment code |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910408057.8A CN110176091B (en) | 2019-05-15 | 2019-05-15 | Method for improving security of intelligent lock through mobile terminal equipment code |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110176091A CN110176091A (en) | 2019-08-27 |
CN110176091B true CN110176091B (en) | 2022-03-25 |
Family
ID=67691306
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910408057.8A Active CN110176091B (en) | 2019-05-15 | 2019-05-15 | Method for improving security of intelligent lock through mobile terminal equipment code |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110176091B (en) |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110991982A (en) * | 2019-10-28 | 2020-04-10 | 中船重工海鑫工程管理(北京)有限公司 | Construction project building information management method and system |
CN111182535B (en) * | 2019-12-23 | 2023-08-01 | 广东好太太智能家居有限公司 | Random code binding method, device and storage medium for intelligent door lock |
CN111583451A (en) * | 2020-04-09 | 2020-08-25 | 惠州拓邦电气技术有限公司 | Identity verification method and device of electronic lock, computer equipment and storage medium |
CN111508111A (en) * | 2020-04-13 | 2020-08-07 | 广东科徕尼智能科技有限公司 | Method, equipment and storage medium for binding intelligent lock |
CN113256853B (en) * | 2021-06-21 | 2021-10-15 | 德施曼机电(中国)有限公司 | Information transmission method, electronic equipment, door lock, server and storage medium |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106296899A (en) * | 2016-08-02 | 2017-01-04 | 成都荷码科技有限公司 | A kind of method that user account is unbinding with smart lock |
CN109672683A (en) * | 2018-12-25 | 2019-04-23 | 深圳市安信认证系统有限公司 | Binding method, binding device and the terminal device of internet of things equipment |
Family Cites Families (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102262793B (en) * | 2010-05-26 | 2013-08-21 | 中兴通讯股份有限公司 | Entrance guard control method and entrance guard control system |
US20150048927A1 (en) * | 2013-08-13 | 2015-02-19 | Directed, Llc | Smartphone based passive keyless entry system |
CN104143056A (en) * | 2013-12-31 | 2014-11-12 | 腾讯科技(深圳)有限公司 | Identity authentication method and system |
CN103971435B (en) * | 2014-05-22 | 2016-07-06 | 广东欧珀移动通信有限公司 | Method for unlocking, server, mobile terminal, electronic lock and unlocking system |
CN106981108A (en) * | 2016-01-19 | 2017-07-25 | 福建省光速达物联网科技股份有限公司 | A kind of bluetooth nurse method for unlocking and system |
CN106228654B (en) * | 2016-08-02 | 2018-05-15 | 成都荷码科技有限公司 | A kind of method of user account binding smart lock |
CN106228655B (en) * | 2016-08-02 | 2018-09-11 | 成都荷码科技有限公司 | A kind of method of user account binding smart lock |
CN106652136A (en) * | 2016-12-22 | 2017-05-10 | 奇酷互联网络科技(深圳)有限公司 | Mobile terminal-based access control management information processing method and device |
CN106971442B (en) * | 2017-05-03 | 2018-05-25 | 河南传通电子科技有限公司 | A kind of safe and intelligent lock system |
CN107146307B (en) * | 2017-05-03 | 2018-05-25 | 河南传通电子科技有限公司 | A kind of method of securely unlocking of intelligent lock system |
CN107895415B (en) * | 2017-10-31 | 2024-02-23 | 美智光电科技股份有限公司 | Intelligent door lock, voice burning method, server and voice burning system |
CN107833321B (en) * | 2017-11-01 | 2021-05-18 | 潍柴动力股份有限公司 | Equipment binding and unbinding method, car locking method and related equipment |
CN108537923A (en) * | 2018-03-27 | 2018-09-14 | 丁巨波 | Network-based smart lock management control method and system |
-
2019
- 2019-05-15 CN CN201910408057.8A patent/CN110176091B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106296899A (en) * | 2016-08-02 | 2017-01-04 | 成都荷码科技有限公司 | A kind of method that user account is unbinding with smart lock |
CN109672683A (en) * | 2018-12-25 | 2019-04-23 | 深圳市安信认证系统有限公司 | Binding method, binding device and the terminal device of internet of things equipment |
Non-Patent Citations (2)
Title |
---|
一种新型智能安全锁系统的设计;王安义;《网络与通信》;20171130;83-98 * |
基于云端的无线智能锁系统设计与实现;张焕兰;《软件导刊》;20181215;130-134 * |
Also Published As
Publication number | Publication date |
---|---|
CN110176091A (en) | 2019-08-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110176091B (en) | Method for improving security of intelligent lock through mobile terminal equipment code | |
CN107507305B (en) | A kind of access control system of residential community and door opening method based on wechat | |
US9836899B2 (en) | Systems and methods for programming a credential reader | |
CN103250434B (en) | For the management systems accessing controlled entity more | |
CN104157029B (en) | Gate control system control method, control system and mobile terminal based on mobile terminal | |
CN107948321A (en) | The remote-authorization method and system of vehicle | |
CN106340087A (en) | Intelligent switch lock system based on intelligent mobile terminal | |
CN105741395A (en) | Entrance guard access method and system based on two-dimension code and face identification | |
CN105303670A (en) | Access control management method, device and system | |
CN102467762A (en) | System and method for managing entrance and exit using driver face identification within vehicle | |
CN104966340A (en) | Access control system, access control method and cloud service platform | |
CN105610842B (en) | A kind of WIFI hot spot cut-in method and mobile device | |
CN104637131A (en) | Authorization method and authorization device for access control system and access control system | |
US20200228981A1 (en) | Authentication method and device | |
CN106127888B (en) | Intelligent lock operation method and smart lock operating system | |
JP2019036091A (en) | Vehicle security system and vehicle security method | |
CN109584410B (en) | Data processing method of electronic lock, computer equipment and storage medium | |
CN106559213A (en) | Device management method, equipment and system | |
CN105050086A (en) | Method for terminal to log in Wifi hotspot | |
CN109951437A (en) | Safety certifying method, device and server based on recognition of face | |
CN109830010A (en) | Wireless entrance guard equipment unlocking information distribution method, device and computer equipment | |
CN106534102A (en) | Device access method and device and electronic device | |
CN108876987A (en) | Building access control method, Cloud Server and computer readable storage medium | |
CN106856585A (en) | Set up the method and device of short-distance wireless passage | |
CN110517372B (en) | Biological characteristic information processing method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information |
Address after: 511434 No.1 and No.2, Shihua Road, Hualong Town, Panyu District, Guangzhou City, Guangdong Province Applicant after: Guangdong haomadame smart home Co.,Ltd. Address before: No.1, No.2 highway, No.2, Panyu, Guangzhou Applicant before: GUANGDONG KELAINI INTELLIGENT TECHNOLOGY Co.,Ltd. |
|
CB02 | Change of applicant information | ||
GR01 | Patent grant | ||
GR01 | Patent grant |