CN110176091B - Method for improving security of intelligent lock through mobile terminal equipment code - Google Patents

Method for improving security of intelligent lock through mobile terminal equipment code Download PDF

Info

Publication number
CN110176091B
CN110176091B CN201910408057.8A CN201910408057A CN110176091B CN 110176091 B CN110176091 B CN 110176091B CN 201910408057 A CN201910408057 A CN 201910408057A CN 110176091 B CN110176091 B CN 110176091B
Authority
CN
China
Prior art keywords
identification code
intelligent lock
code
mobile terminal
remote system
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910408057.8A
Other languages
Chinese (zh)
Other versions
CN110176091A (en
Inventor
沈汉标
王妙玉
童威云
吴宁泉
李思龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Hotata Smart Home Co Ltd
Original Assignee
Guangdong Hotata Smart Home Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Hotata Smart Home Co Ltd filed Critical Guangdong Hotata Smart Home Co Ltd
Priority to CN201910408057.8A priority Critical patent/CN110176091B/en
Publication of CN110176091A publication Critical patent/CN110176091A/en
Application granted granted Critical
Publication of CN110176091B publication Critical patent/CN110176091B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • H04M1/72409User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories
    • H04M1/72412User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories using two-way short-range wireless interfaces
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • H04M1/72409User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories
    • H04M1/72415User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories for remote control of appliances

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Human Computer Interaction (AREA)
  • Signal Processing (AREA)
  • Telephone Function (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a method for improving the security of an intelligent lock through a mobile terminal device code, which comprises the following steps: the mobile terminal initiates a binding request to the intelligent lock and sends a first identification code to the intelligent lock; the intelligent lock receives the first identification code and sends the first identification code and the second identification code of the intelligent lock to the remote system; and the remote system matches the first identification code with the second identification code and verifies whether the mobile terminal is allowed to bind the intelligent lock. The method has the advantages that the mobile phone imei code of the intelligent lock owner is bound with the intelligent lock, and the mobile phone terminal equipment which rejects other imei codes is forced to control the intelligent lock, so that the problem that an illegal person impersonates the intelligent lock owner to maliciously control the intelligent lock is solved, the operation mode of the method is simple, the safety of the intelligent lock is greatly improved, and the method is suitable for users with high requirements on use safety.

Description

Method for improving security of intelligent lock through mobile terminal equipment code
Technical Field
The invention relates to the technical field of intelligent locks, in particular to a method for improving the safety of an intelligent lock through a mobile terminal device code.
Background
At present, with the continuous improvement of the intellectualization degree and the informatization degree of the modern society, the intelligent lock is taken as a novel safety lock which is just appeared in recent years and is used by more and more families. The intelligent lock is used as the most important defense line in the family security, in particular to the problem of property security, and consumers pay more attention to the use security. As a prominent safety problem, illegal persons can maliciously pretend to be the owner of the intelligent lock in various modes to rebind the intelligent lock, so that illegal control over the intelligent lock is realized, and the safety of the real owner of the intelligent lock is endangered.
Disclosure of Invention
In order to solve the technical problems, the invention provides the method for improving the safety of the intelligent lock through the mobile terminal equipment code, which is simple to operate and can improve the use safety of the intelligent lock.
In order to achieve the purpose, the invention adopts the following technical scheme:
a method for improving security of an intelligent lock through a mobile terminal device code, the method comprising:
the mobile terminal initiates a binding request to the intelligent lock and sends a first identification code to the intelligent lock;
the intelligent lock receives the first identification code and sends the first identification code and the second identification code of the intelligent lock to the remote system;
and the remote system matches the first identification code with the second identification code and verifies whether the mobile terminal is allowed to bind the intelligent lock.
Preferably, when the remote system verifies whether the mobile terminal is allowed to bind the intelligent lock, the following method is executed:
the remote system judges whether the first identification code and the second identification code are bound for the first time;
if the first identification code and the second identification code are bound for the first time, pairing the first identification code and the second identification code, storing the first identification code and the second identification code as a group of verification number groups, and sending an instruction for allowing binding to the intelligent lock;
if the first identification code and the second identification code are not bound for the first time, verifying whether the first identification code of the current request is the same as the first identification code bound for the first time or the first identification code after modified binding;
if the first identification code of the current request is the same as the first identification code bound for the first time or the first identification code after the binding is modified, sending a binding permission instruction to the intelligent lock;
and if the first identification code of the current request is different from the first identification code bound for the first time or the first identification code after the binding is modified, sending an instruction of refusing the binding to the intelligent lock.
Preferably, the method further comprises the following steps: the identity information of the owner of the intelligent lock is input into a database of a remote system through a mobile terminal, and the remote system simultaneously generates a random code and sends the random code to a client; the identity information comprises identity card information, mobile phone number information, fingerprint information and facial image information of an owner of the intelligent lock.
Preferably, the mobile terminal can also send a binding modification request to the remote system, the remote system manually verifies whether the identity information of the owner of the intelligent lock and the random code are in accordance, and if so, the first identification code bound with the second identification code is allowed to be modified to form a new verification number group.
Preferably, the mobile terminal is a mobile phone, the first identification code is an imei code of the mobile phone, and the second identification code is a unique identification code recorded in the smart lock.
Compared with the prior art, the invention has the following beneficial effects:
the invention binds the mobile phone imei code of the intelligent lock owner with the intelligent lock, and forcibly rejects the control of other mobile phone terminal equipment of the imei code, thereby solving the problem that an illegal person pretends to be the intelligent lock owner to maliciously control the intelligent lock. The method is simple in operation mode, greatly improves the safety of the intelligent lock, and is suitable for users with high requirements on use safety.
Drawings
FIG. 1 is a flow chart of a method for improving security of an intelligent lock through a mobile terminal device code according to the present invention;
FIG. 2 is a schematic flow chart of the operation of the method of the present invention;
fig. 3 is a flow chart of a method for verifying whether the mobile terminal is allowed to bind the intelligent lock by the remote system.
Detailed Description
The present invention will be described in further detail with reference to examples and drawings, but the present invention is not limited thereto.
Referring to fig. 1, fig. 1 is a flow chart of a method for improving security of an intelligent lock by using a mobile terminal device code according to the present invention, where the mobile terminal of this embodiment refers to a mobile phone, the following first identification code is an imei code of the mobile phone, that is, an international mobile device identification code, used for identifying each independent mobile communication device such as a mobile phone in a mobile phone network, and is equivalent to an identification card of the mobile phone, and the following second identification code is a unique identification code entered into the intelligent lock, and the unique identification code may be set by a manufacturer and entered into a memory of the intelligent lock when the intelligent lock device leaves a factory, and is used as a unique device identification number of the intelligent lock. The method comprises the following steps:
s10: the mobile terminal initiates a binding request to the intelligent lock and sends a first identification code to the intelligent lock;
exemplarily, as shown in fig. 2, fig. 2 is an operation flow diagram of the method, in this step, a mobile phone terminal sends a binding instruction to an intelligent lock through an APP (application program) loaded on the mobile phone terminal, and simultaneously obtains an imei code of the mobile phone through the APP (application program), and sends the imei code to the intelligent lock loaded with a wireless data transceiver module through a wireless network. The wireless transmission mode can be WIFI, Bluetooth, 2G/3G/4G/5G, NFC or ZigBee and the like.
S20: the intelligent lock receives the first identification code and sends the first identification code and the second identification code of the intelligent lock to the remote system;
illustratively, in this step, the so-called remote system is a database server, and after receiving the imei code of the mobile phone, the smart lock remotely sends the imei code and the unique identification code entered into the smart lock to the database server associated with the APP (application program) and providing data service for the APP (application program).
S30: and the remote system matches the first identification code with the second identification code and verifies whether the mobile terminal is allowed to bind the intelligent lock.
Illustratively, in this step, after the database server receives the imei code of the mobile phone and the unique identification code entered into the smart lock, the database server is called to obtain information, the imei code of the mobile phone is matched with the unique identification code entered into the smart lock, and whether the mobile phone is allowed to bind the smart lock is determined.
Further, as shown in fig. 3, fig. 3 is a flowchart of a method for the remote system to verify whether the mobile terminal is allowed to bind the smart lock, wherein when the remote system verifies whether the mobile terminal is allowed to bind the smart lock, the following method is executed:
s301: the remote system judges whether the first identification code and the second identification code are bound for the first time;
illustratively, in this step, the database server determines whether the unique identification code entered into the smart lock and the imei code of the mobile phone are bound for the first time.
S302: if the first identification code and the second identification code are bound for the first time, pairing the first identification code and the second identification code, storing the first identification code and the second identification code as a group of verification number groups, and sending an instruction for allowing binding to the intelligent lock;
illustratively, in this step, if the imei code of the mobile phone and the unique identification code entered into the intelligent lock are bound for the first time, the imei code and the unique identification code entered into the intelligent lock are paired and stored in the database of the server as a group of verification number groups, and an instruction for allowing binding is sent to the intelligent lock.
S303: if the first identification code and the second identification code are not bound for the first time, verifying whether the first identification code of the current request is the same as the first identification code bound for the first time or the first identification code after modified binding;
if the first identification code of the current request is the same as the first identification code bound for the first time or the first identification code after the binding is modified, sending a binding permission instruction to the intelligent lock;
and if the first identification code of the current request is different from the first identification code bound for the first time or the first identification code after the binding is modified, sending an instruction of refusing the binding to the intelligent lock.
Illustratively, in this step, if the imei code of the mobile phone and the unique identification code entered into the intelligent lock are not first bound, the database server determines whether the imei code is the first bound imei code or the imei code that is newly paired with the intelligent lock after the user actively modifies the binding.
If the imei code is the first bound imei code or the imei code which is automatically modified and bound by the user and then is newly paired with the intelligent lock, the server sends a binding permission instruction to the intelligent lock, and the mobile phone terminal and the intelligent lock are bound at the moment;
if the imei code is not the first-time binding imei code or the imei code which is actively modified and bound by the user and then is re-paired with the intelligent lock, the server sends a binding refusing instruction to the intelligent lock, and information such as 'binding failure' is prompted on an application program interface of the mobile phone.
Further, the method further comprises the following steps: the identity information of the owner of the intelligent lock is input into a database of a remote system through the mobile terminal, and the input identity information comprises identity card information, mobile phone number information, fingerprint information, facial image information and the like of the owner of the intelligent lock. The remote system will simultaneously generate a random code to send to the client.
Illustratively, in this step, the user can manually input identity information of an individual, such as identity card information and mobile phone number information, to be remotely uploaded and entered into a database of the server through a mobile phone APP (application program), or can enter personal fingerprint information and facial image information into the database of the server through a fingerprint sensor and a camera of the mobile phone. At the same time, the server will generate a random code and return it to the user, the user needs to remember the random code, and the identity information and the random code will be used as the data information for future user identity verification. In this step, the security of the verification is further improved by adding the random code.
Further, the method further comprises the following steps: and sending a modification binding request to a remote system through the mobile terminal, manually verifying whether the identity information of the owner of the intelligent lock is consistent with the random code by the remote system, and if so, allowing the first identification code bound with the second identification code to be modified to form a new verification number group.
Illustratively, in this step, if the user loses the mobile phone and needs to bind the smart lock again, a modified binding request may be sent to the server through the mobile phone APP (application), specifically, the personal identity information and the random code need to be sent to the server, after receiving the request, the server manually verifies whether the identity information and the random code are consistent with the data information stored in the database, and if so, the user is allowed to unbind the previous imei code from the smart lock, bind the new imei code again, and update and store the new verification number group into the database.
The method provided by the invention binds the mobile phone imei code of the intelligent lock owner with the intelligent lock, and forcibly rejects the control of other mobile phone terminal equipment of the imei code, thereby solving the problem that an illegal person pretends to be the intelligent lock owner to maliciously control the intelligent lock. The method is simple in operation mode, greatly improves the safety of the intelligent lock, and is suitable for users with high requirements on use safety.
The steps in the method of the embodiment of the invention can be sequentially adjusted, combined or deleted according to actual needs. It will be understood by those skilled in the art that all or part of the steps in the methods of the above embodiments may be implemented by hardware associated with a program instructing a terminal device, and the program may be stored in a computer-readable storage medium, and the storage medium may include: flash disk, read only memory ROM, random access memory RAM, magnetic or optical disk, and the like.
The above description is only for the preferred embodiment of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art should be considered to be within the technical scope of the present invention, and the technical solutions and their concepts should be considered to be equivalent or modified within the scope of the present invention.

Claims (2)

1. A method for improving the security of an intelligent lock through a mobile terminal device code is characterized by comprising the following steps:
the mobile terminal initiates a binding request to the intelligent lock and sends a first identification code to the intelligent lock;
the intelligent lock receives the first identification code and sends the first identification code and the second identification code of the intelligent lock to the remote system;
the remote system matches the first identification code with the second identification code and verifies whether the mobile terminal is allowed to bind the intelligent lock;
when the remote system verifies whether the mobile terminal is allowed to bind the intelligent lock, the following method is executed:
the remote system judges whether the first identification code and the second identification code are bound for the first time;
if the first identification code and the second identification code are bound for the first time, pairing the first identification code and the second identification code, storing the first identification code and the second identification code as a group of verification number groups, and sending an instruction for allowing binding to the intelligent lock;
if the first identification code and the second identification code are not bound for the first time, verifying whether the first identification code of the current request is the same as the first identification code bound for the first time or the first identification code after modified binding;
if the first identification code of the current request is the same as the first identification code bound for the first time or the first identification code after the binding is modified, sending a binding permission instruction to the intelligent lock;
if the first identification code of the current request is different from the first identification code bound for the first time or the first identification code after modified binding, sending an instruction of refusing binding to the intelligent lock;
further comprising: the identity information of the owner of the intelligent lock is input into a database of a remote system through a mobile terminal, and the remote system simultaneously generates a random code and sends the random code to a client; the identity information comprises identity card information, mobile phone number information, fingerprint information and facial image information of an owner of the intelligent lock; specifically, the method comprises the following steps: a user remotely uploads and records identity information such as identity card information and mobile phone number information into a database of a server through manual input of a mobile terminal application program, or records personal fingerprint information and facial image information into the database of the server through a fingerprint sensor and a camera of a mobile phone; meanwhile, the server generates a random code to be returned and sent to the user, the user needs to remember the random code, and the identity information and the random code are used as data information for verifying the identity of the user in the future;
and sending a modification binding request to a remote system through the mobile terminal, manually verifying whether the identity information of the owner of the intelligent lock is consistent with the random code by the remote system, and if so, allowing the first identification code bound with the second identification code to be modified to form a new verification number group.
2. The method for improving the security of the intelligent lock through the mobile terminal equipment code according to claim 1, wherein the mobile terminal is a mobile phone, the first identification code is an imei code of the mobile phone, and the second identification code is a unique identification code entered into the intelligent lock.
CN201910408057.8A 2019-05-15 2019-05-15 Method for improving security of intelligent lock through mobile terminal equipment code Active CN110176091B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910408057.8A CN110176091B (en) 2019-05-15 2019-05-15 Method for improving security of intelligent lock through mobile terminal equipment code

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910408057.8A CN110176091B (en) 2019-05-15 2019-05-15 Method for improving security of intelligent lock through mobile terminal equipment code

Publications (2)

Publication Number Publication Date
CN110176091A CN110176091A (en) 2019-08-27
CN110176091B true CN110176091B (en) 2022-03-25

Family

ID=67691306

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910408057.8A Active CN110176091B (en) 2019-05-15 2019-05-15 Method for improving security of intelligent lock through mobile terminal equipment code

Country Status (1)

Country Link
CN (1) CN110176091B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110991982A (en) * 2019-10-28 2020-04-10 中船重工海鑫工程管理(北京)有限公司 Construction project building information management method and system
CN111182535B (en) * 2019-12-23 2023-08-01 广东好太太智能家居有限公司 Random code binding method, device and storage medium for intelligent door lock
CN111583451A (en) * 2020-04-09 2020-08-25 惠州拓邦电气技术有限公司 Identity verification method and device of electronic lock, computer equipment and storage medium
CN111508111A (en) * 2020-04-13 2020-08-07 广东科徕尼智能科技有限公司 Method, equipment and storage medium for binding intelligent lock
CN113256853B (en) * 2021-06-21 2021-10-15 德施曼机电(中国)有限公司 Information transmission method, electronic equipment, door lock, server and storage medium

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106296899A (en) * 2016-08-02 2017-01-04 成都荷码科技有限公司 A kind of method that user account is unbinding with smart lock
CN109672683A (en) * 2018-12-25 2019-04-23 深圳市安信认证系统有限公司 Binding method, binding device and the terminal device of internet of things equipment

Family Cites Families (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102262793B (en) * 2010-05-26 2013-08-21 中兴通讯股份有限公司 Entrance guard control method and entrance guard control system
US20150048927A1 (en) * 2013-08-13 2015-02-19 Directed, Llc Smartphone based passive keyless entry system
CN104143056A (en) * 2013-12-31 2014-11-12 腾讯科技(深圳)有限公司 Identity authentication method and system
CN103971435B (en) * 2014-05-22 2016-07-06 广东欧珀移动通信有限公司 Method for unlocking, server, mobile terminal, electronic lock and unlocking system
CN106981108A (en) * 2016-01-19 2017-07-25 福建省光速达物联网科技股份有限公司 A kind of bluetooth nurse method for unlocking and system
CN106228654B (en) * 2016-08-02 2018-05-15 成都荷码科技有限公司 A kind of method of user account binding smart lock
CN106228655B (en) * 2016-08-02 2018-09-11 成都荷码科技有限公司 A kind of method of user account binding smart lock
CN106652136A (en) * 2016-12-22 2017-05-10 奇酷互联网络科技(深圳)有限公司 Mobile terminal-based access control management information processing method and device
CN106971442B (en) * 2017-05-03 2018-05-25 河南传通电子科技有限公司 A kind of safe and intelligent lock system
CN107146307B (en) * 2017-05-03 2018-05-25 河南传通电子科技有限公司 A kind of method of securely unlocking of intelligent lock system
CN107895415B (en) * 2017-10-31 2024-02-23 美智光电科技股份有限公司 Intelligent door lock, voice burning method, server and voice burning system
CN107833321B (en) * 2017-11-01 2021-05-18 潍柴动力股份有限公司 Equipment binding and unbinding method, car locking method and related equipment
CN108537923A (en) * 2018-03-27 2018-09-14 丁巨波 Network-based smart lock management control method and system

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106296899A (en) * 2016-08-02 2017-01-04 成都荷码科技有限公司 A kind of method that user account is unbinding with smart lock
CN109672683A (en) * 2018-12-25 2019-04-23 深圳市安信认证系统有限公司 Binding method, binding device and the terminal device of internet of things equipment

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
一种新型智能安全锁系统的设计;王安义;《网络与通信》;20171130;83-98 *
基于云端的无线智能锁系统设计与实现;张焕兰;《软件导刊》;20181215;130-134 *

Also Published As

Publication number Publication date
CN110176091A (en) 2019-08-27

Similar Documents

Publication Publication Date Title
CN110176091B (en) Method for improving security of intelligent lock through mobile terminal equipment code
CN107507305B (en) A kind of access control system of residential community and door opening method based on wechat
US9836899B2 (en) Systems and methods for programming a credential reader
CN103250434B (en) For the management systems accessing controlled entity more
CN104157029B (en) Gate control system control method, control system and mobile terminal based on mobile terminal
CN107948321A (en) The remote-authorization method and system of vehicle
CN106340087A (en) Intelligent switch lock system based on intelligent mobile terminal
CN105741395A (en) Entrance guard access method and system based on two-dimension code and face identification
CN105303670A (en) Access control management method, device and system
CN102467762A (en) System and method for managing entrance and exit using driver face identification within vehicle
CN104966340A (en) Access control system, access control method and cloud service platform
CN105610842B (en) A kind of WIFI hot spot cut-in method and mobile device
CN104637131A (en) Authorization method and authorization device for access control system and access control system
US20200228981A1 (en) Authentication method and device
CN106127888B (en) Intelligent lock operation method and smart lock operating system
JP2019036091A (en) Vehicle security system and vehicle security method
CN109584410B (en) Data processing method of electronic lock, computer equipment and storage medium
CN106559213A (en) Device management method, equipment and system
CN105050086A (en) Method for terminal to log in Wifi hotspot
CN109951437A (en) Safety certifying method, device and server based on recognition of face
CN109830010A (en) Wireless entrance guard equipment unlocking information distribution method, device and computer equipment
CN106534102A (en) Device access method and device and electronic device
CN108876987A (en) Building access control method, Cloud Server and computer readable storage medium
CN106856585A (en) Set up the method and device of short-distance wireless passage
CN110517372B (en) Biological characteristic information processing method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: 511434 No.1 and No.2, Shihua Road, Hualong Town, Panyu District, Guangzhou City, Guangdong Province

Applicant after: Guangdong haomadame smart home Co.,Ltd.

Address before: No.1, No.2 highway, No.2, Panyu, Guangzhou

Applicant before: GUANGDONG KELAINI INTELLIGENT TECHNOLOGY Co.,Ltd.

CB02 Change of applicant information
GR01 Patent grant
GR01 Patent grant