CN110415411A - The method of securely unlocking - Google Patents

The method of securely unlocking Download PDF

Info

Publication number
CN110415411A
CN110415411A CN201910688060.XA CN201910688060A CN110415411A CN 110415411 A CN110415411 A CN 110415411A CN 201910688060 A CN201910688060 A CN 201910688060A CN 110415411 A CN110415411 A CN 110415411A
Authority
CN
China
Prior art keywords
intelligent lock
unlocking
mobile terminal
network
mobile phone
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910688060.XA
Other languages
Chinese (zh)
Inventor
王珏欣
曹肇榆
林嘉敏
伍延杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Xinhai Huihui Warehousing Co Ltd
Original Assignee
Beijing Xinhai Huihui Warehousing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Xinhai Huihui Warehousing Co Ltd filed Critical Beijing Xinhai Huihui Warehousing Co Ltd
Priority to CN201910688060.XA priority Critical patent/CN110415411A/en
Publication of CN110415411A publication Critical patent/CN110415411A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00817Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00817Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed
    • G07C2009/00825Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed remotely by lines or wireless communication

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The present invention provides a kind of methods of securely unlocking, belong to intelligent unlocking field, when the WiFi network that the WiFi network of its intelligent lock is connect with the mobile terminal with APP, wechat public platform, small routine, mobile phone website etc. is the same SSID, unlocking condition can be met, and during unlocking, when the collected position location of physical location and mobile terminal institute of intelligent lock is located at setting permitted value range, mobile terminal can realize the unlocking to intelligent lock.After mobile terminal carries out unlocking operation to above-mentioned intelligent lock, intelligent lock can maintain current state, if nobody opens the door within the set time, intelligent lock is automatically closed, to guarantee the safety unlocked.In the case where above-mentioned technical proposal, the application is capable of providing the verifying of a variety of unlockings in addition to key and password, improves the safety of smart lock, guarantees the safety of place property.

Description

The method of securely unlocking
Technical field
The present invention relates to intelligent unlocking technical fields, in particular to the method for a kind of pair of intelligent lock securely unlocking.
Background technique
With the development of development of Mobile Internet technology, intelligent lock is also from traditional biological information identification, key, password Etc. functions towards Internet of Things, cloud management and the directions such as control and develop, people can be by way of cloud or Internet of Things pair The intelligent lock in place carries out long-range management and control, and the intelligent lock in place can also pass through cloud or the side of Internet of Things Formula obtains the identification of newest control method and information.
The control method of existing intelligent lock generally comprises traditional physics method for unlocking, i.e., manually using key into Row opens operation, also includes the method for electronics and Mechanical course, i.e., the artificial side for using input password or inputting finger print information Method realizes lockset by mechanical device after being compared with the finger print information of the password and code that are stored in electric lockset It opens.
Certainly, the epoch with control, Internet of Things are managed beyond the clouds, and intelligent lock can pass through the wireless network mould built in it Block, communication module etc. are operated with the APP on mobile terminal by background server by network implementations.Operator can Operation on and off is carried out to the intelligent lock of distal end.But above-mentioned remote unlocking mode and dangerous.Therefore, In In long-term research and development, inventor has carried out a large amount of research to the method for unlocking of intelligent lock, proposes a kind of pair of smart lock One of the method for unlocking of tool, to solve the above technical problems.
Summary of the invention
The purpose of the present invention is to provide a kind of method for unlocking of intelligent lock, this method be able to solve it is mentioned above extremely A few technical problem.Concrete scheme is as follows:
Specific embodiment according to the present invention, in a first aspect, a kind of method of securely unlocking, which is characterized in that this is opened The method of lock includes the following steps:
Wireless network is in connection status in S1, setting intelligent lock and place;
S2, it is read on mobile terminal by APP matched with intelligent lock, wechat public platform, small routine, mobile phone website Radio network information, and be compared with the networked information of the intelligent lock of storage;The wechat public platform passes through wechat platform Identification to SSID under WIFI network and the judgement to current location are provided;The mobile phone website passes through webpage HTML5's Positioning function realizes the acquisition of current location and realizes request by orientation Intranet network address (such as router lan address) The function of unlocking, under same SSID network, mobile phone website can be realized by router and be forwarded.
S3, APP, wechat public platform, small routine, mobile phone website pass through the radio network information and institute that mobile terminal is connected After the networked information of the intelligent lock of storage compares successfully, intelligent lock is opened, and permission personnel carry out enabling operation.
Specific embodiment according to the present invention, second aspect, the intelligent lock include locating module, the locating module Location information can be obtained and be transferred to the location information through background server by connected wireless network transmitting and matched The APP of set, wechat public platform, small routine, on mobile phone website;The APP, wechat public platform, small routine, mobile phone website can It is compared by the location information of locating module on reading mobile terminal with the location information of intelligent lock, compares and successfully then hold Row unlocking operation.
Specific embodiment according to the present invention, the third aspect, the locating module include GPS chip and its association electricity One of road, Beidou chip and its associated circuit.
Specific embodiment according to the present invention, fourth aspect, on intelligent lock collected location information and it is mobile eventually After the collected location information of APP, wechat public platform, small routine, mobile phone website compares on end, the distance between both should Within the distance range that intelligent lock is defaulted or sets.
Specific embodiment according to the present invention, the 5th aspect, the mobile terminal include smart phone, tablet computer, One of PDA, laptop.
Specific embodiment according to the present invention, the 6th aspect, the wireless network in the intelligent lock and place place into Row connection, the wireless network in place place includes one of WIFI, WLAN.
Specific embodiment according to the present invention, the 7th aspect, described WIFI, WLAN use 2.4GHz or 5GHz, and intelligence Energy lockset should connect WIFI or wlan network under same SSID with APP, wechat public platform, small routine, mobile phone website.
Specific embodiment according to the present invention, eighth aspect, the APP, wechat public platform, small routine, mobile phone website It is that data exchange is carried out by carrier network and background server between intelligent lock, the carrier network includes Optical fiber, wlan network.
Specific embodiment according to the present invention, the 9th aspect, the mobile terminal APP, wechat public platform, small routine, The mobile network and background server that mobile phone website and intelligent lock are provided by internet or operator initiate request of unlocking, After background server verifying user has normal unlocking authority, by the intelligent lock information matched with position in storehouse to corresponding intelligence Energy lockset sends unlocking instruction, and intelligent lock executes unlocking action after receiving above-mentioned unlocking instruction.
Specific embodiment according to the present invention, the tenth on the one hand, and the present invention provides a kind of computer readable storage medium, It is stored thereon with computer program, the side of as above described in any item securely unlockings is realized when described program is executed by processor Method.
Specific embodiment according to the present invention, the 12nd aspect, the present invention provide a kind of intelligent lock, comprising: one Or multiple processors;Storage device, for storing one or more programs, when one or more of programs by one or When multiple processors execute, so that one or more of processors realize as above described in any item pairs of intelligent lock safety opens The method of lock.
The above scheme of the embodiment of the present invention compared with prior art, at least has the advantages that
The application can effectively realize the securely unlocking operation of intelligent lock, and pass through a variety of effective safety verification sides Formula is realized except the unlocking operation under the modes such as key, password authentification.And the side of the unlocking operation described in this application Method is transformed background server, intelligent lock in the case where capable of only increasing hardware by upgrading software or simply, The safety for improving unlocking operation reduces intelligent lock production and puts into financial resources required in transformation process, reduces life Production or improved cost.
Detailed description of the invention
The drawings herein are incorporated into the specification and forms part of this specification, and shows and meets implementation of the invention Example, and be used to explain the principle of the present invention together with specification.It should be evident that the accompanying drawings in the following description is only the present invention Some embodiments for those of ordinary skill in the art without creative efforts, can also basis These attached drawings obtain other attached drawings.In the accompanying drawings:
Fig. 1 shows the method flow diagram according to an embodiment of the present invention that unlocking operation is carried out to intelligent lock.
Fig. 2 is that this application involves the schematic illustrations of the hardware configuration arrived.
Specific embodiment
To make the objectives, technical solutions, and advantages of the present invention clearer, below in conjunction with attached drawing to the present invention make into It is described in detail to one step, it is clear that described embodiments are only a part of the embodiments of the present invention, rather than whole implementation Example.Based on the embodiments of the present invention, obtained by those of ordinary skill in the art without making creative efforts All other embodiment, shall fall within the protection scope of the present invention.
The term used in embodiments of the present invention is only to be not intended to be limiting merely for for the purpose of describing particular embodiments The present invention.In the embodiment of the present invention and the "an" of singular used in the attached claims, " described " and "the" It is also intended to including most forms, unless the context clearly indicates other meaning, " a variety of " generally comprise at least two.
It should be appreciated that term "and/or" used herein is only a kind of incidence relation for describing affiliated partner, indicate There may be three kinds of relationships, for example, A and/or B, can indicate: individualism A, exist simultaneously A and B, individualism B these three Situation.In addition, character "/" herein, typicallys represent the relationship that forward-backward correlation object is a kind of "or".
It will be appreciated that though may be described in embodiments of the present invention using term first, second, third, etc.., But these ... it should not necessarily be limited by these terms.These terms be only used to by ... distinguish.For example, not departing from implementation of the present invention In the case where example range, first ... can also be referred to as second ..., and similarly, second ... can also be referred to as the One ....
Depending on context, word as used in this " if ", " if " can be construed to " ... when " or " when ... " or " in response to determination " or " in response to detection ".Similarly, context is depended on, phrase " if it is determined that " or " such as Fruit detection (condition or event of statement) " can be construed to " when determining " or " in response to determination " or " when detection (statement Condition or event) when " or " in response to detection (condition or event of statement) ".
It should also be noted that, the terms "include", "comprise" or its any other variant are intended to nonexcludability Include, so that commodity or device including a series of elements not only include those elements, but also including not clear The other element listed, or further include for this commodity or the intrinsic element of device.In the feelings not limited more Under condition, the element that is limited by sentence "including a ...", it is not excluded that in the commodity or device for including the element also There are other identical elements.
The alternative embodiment that the invention will now be described in detail with reference to the accompanying drawings.
Embodiment 1
A kind of method of securely unlocking, the method for the unlocking include the following steps:
S1, setting intelligent lock and place wireless network are in connection status;
S2, it is read on mobile terminal by APP matched with intelligent lock, wechat public platform, small routine, mobile phone website Radio network information, and be compared with the networked information of the intelligent lock of storage;
S3, APP, wechat public platform, small routine, mobile phone website pass through the radio network information and institute that mobile terminal is connected After the networked information of the intelligent lock of storage compares successfully, intelligent lock is opened, and permission personnel carry out enabling operation.
Embodiment 2:
A kind of method of securely unlocking, the method for the unlocking include the steps that following:
The intelligent lock includes locating module, which can obtain location information and lead to the location information It crosses connected wireless network transmitting and is transferred to matched APP, wechat public platform, on mobile phone website through background server;It is described APP, wechat public platform, small routine, mobile phone website can pass through read mobile terminal on locating module location information and intelligence The location information of energy lockset is compared, and compares and successfully then executes unlocking operation.The locating module includes GPS chip and its pass Join one of circuit, Beidou chip and its associated circuit.Collected location information and mobile terminal on the intelligent lock After the collected location information of upper APP, wechat public platform, small routine, mobile phone website compares, the distance between both should position Within the distance range that intelligent lock is defaulted or sets.
Embodiment 3
A kind of method of securely unlocking, wherein the method for the unlocking include thes steps that following:
The mobile terminal includes one of smart phone, tablet computer, PDA, laptop.The intelligent lock It is attached with the wireless network in place, the wireless network in place includes one of WIFI, WLAN.Described WIFI, WLAN are adopted With 2.4GHz or 5GHz, and intelligent lock should connect the WIFI or wlan network under same frequency with APP.The APP, wechat It is that data exchange is carried out by carrier network and background server between public platform, mobile phone website and intelligent lock, it is described Carrier network include optical fiber, wlan network.The mobile terminal APP, wechat public platform, small routine, mobile phone website and net The background server of point is communicated, and background server verifies the request and whether has normal unlocking authority, if having Background server inquires the corresponding intelligent lock of position in storehouse, and sends request of unlocking to the intelligent lock, and intelligent lock receives this Unlocking action is executed after unlocking instruction.
Embodiment 4
A kind of method of securely unlocking, wherein the intelligent lock includes at least processor, storage device, network connection Device, positioning device, wherein the storage device, which is used to store, identifies network and location information and recognizable above- mentioned information Executable program, the processor by call executable program network connection device is connected to the network driving, read The cognizance code of network connection device connected network reads read location information in positioning device, and can pass through Network connection device directly carries out information exchange or logical with the APP of mobile terminal, wechat public platform, small routine, mobile phone website It crosses APP, wechat public platform, small routine, mobile phone website of the modes such as internet through background server and mobile terminal and carries out information Exchange.
Embodiment 5
The embodiment of the present disclosure provides a kind of nonvolatile computer storage media, and the computer storage medium is stored with Processor-executable instruction, which, which can be performed, carries out intelligent lock in above-mentioned any means embodiment The method of unlocking.
Embodiment 6
Below with reference to Fig. 2, it illustrates the intelligent locks for being suitable for being used to realize herein described method.The embodiment of the present disclosure In terminal device can include but is not limited to such as mobile phone, laptop, digit broadcasting receiver, PDA (a number Word assistant), PAD (tablet computer), PMP (portable media player), car-mounted terminal (such as vehicle mounted guidance terminal) etc. Mobile terminal and such as number TV, desktop computer etc. fixed terminal.
Fig. 2 shows electronic equipment be only an example, should not function and use scope band to the embodiment of the present disclosure Carry out any restrictions.
As shown in Fig. 2, the intelligent lock includes processor, storage device, position module (locating module), controls eventually End and cabinet position lock, wherein the processor be used to handle stored in storage device record herein described method can Program is executed, which is the embedded journey of the executable program or embedded system hardware that can run in its system Sequence.Processor can also obtain the corresponding network information, the address IPv4, IPv6, institute including place network by storage gateway In state, the ID of place network etc. of network, additionally it is possible to obtain corresponding location information by storage gateway, which can To be obtained by position module, position module can obtain corresponding physical location by network or locating module.
GPS positioning module or Beidou positioning module and above-mentioned fixed can be used in locating module described in above-mentioned paragraph The associated circuit of position module, can realize the more accurate physical positioning in position by above-mentioned module.Above-mentioned locating module is obtained Location information can be used for cabinet position lock unlocking operation.
In general, controlling terminal described herein includes input module, the input module include touch screen, touch tablet, Keyboard, mouse, camera, microphone, accelerometer, gyroscope etc.;It further include such as liquid crystal display in controlling terminal (LCD), the output device of loudspeaker, vibrator etc.;Storage device including such as tape, hard disk etc.;And communication device.It is logical T unit, which can permit, wirelessly or non-wirelessly to be communicated between controlling terminal and storage gateway to exchange data.Although Fig. 2 shows Intelligent lock applied to storage, it should be understood that be not required for implementing or having all devices shown.It can replace Implement or have more or fewer devices in generation ground.
Particularly, in accordance with an embodiment of the present disclosure, it may be implemented as computer above with reference to the process of flow chart description Software program.For example, embodiment of the disclosure includes a kind of computer program product comprising be carried on computer-readable medium On computer program, which includes the program code for method shown in execution flow chart.In such reality It applies in example, when which is executed by processing unit, executes the above-mentioned function of limiting in the method for the embodiment of the present disclosure.
It should be noted that the above-mentioned computer-readable medium of the disclosure can be computer-readable signal media or meter Calculation machine readable storage medium storing program for executing either the two any combination.Computer readable storage medium for example can be --- but not Be limited to --- electricity, magnetic, optical, electromagnetic, infrared ray or semiconductor system, device or device, or any above combination.Meter The more specific example of calculation machine readable storage medium storing program for executing can include but is not limited to: have the electrical connection, just of one or more conducting wires Taking formula computer disk, hard disk, random access storage device (RAM), read-only memory (ROM), erasable type may be programmed read-only storage Device (EPROM or flash memory), optical fiber, portable compact disc read-only memory (CD-ROM), light storage device, magnetic memory device, Or above-mentioned any appropriate combination.In the disclosure, computer readable storage medium can be it is any include or storage journey The tangible medium of sequence, the program can be commanded execution system, device or device use or in connection.And at this In open, computer-readable signal media may include in a base band or as the data-signal that carrier wave a part is propagated, In carry computer-readable program code.The data-signal of this propagation can take various forms, including but not limited to Electromagnetic signal, optical signal or above-mentioned any appropriate combination.Computer-readable signal media can also be computer-readable and deposit Any computer-readable medium other than storage media, the computer-readable signal media can send, propagate or transmit and be used for By the use of instruction execution system, device or device or program in connection.Include on computer-readable medium Program code can transmit with any suitable medium, including but not limited to: electric wire, optical cable, RF (radio frequency) etc. are above-mentioned Any appropriate combination.
Above-mentioned computer-readable medium can be included in above-mentioned electronic equipment;It is also possible to individualism, and not It is fitted into the electronic equipment.
Above-mentioned computer-readable medium carries one or more program, when said one or multiple programs are by the electricity When sub- equipment executes, so that the electronic equipment: obtaining at least two internet protocol addresses;Send to Node evaluation equipment includes institute State the Node evaluation request of at least two internet protocol addresses, wherein the Node evaluation equipment is internet from described at least two In protocol address, chooses internet protocol address and return;Receive the internet protocol address that the Node evaluation equipment returns;Its In, the fringe node in acquired internet protocol address instruction content distributing network.
Alternatively, above-mentioned computer-readable medium carries one or more program, when said one or multiple programs When being executed by the electronic equipment, so that the electronic equipment: receiving the Node evaluation including at least two internet protocol addresses and request; From at least two internet protocol address, internet protocol address is chosen;Return to the internet protocol address selected;Wherein, The fringe node in internet protocol address instruction content distributing network received.
The calculating of the operation for executing the disclosure can be write with one or more programming languages or combinations thereof Machine program code, above procedure design language include object oriented program language-such as Java, Smalltalk, C+ +, it further include conventional procedural programming language-such as " C " language or similar programming language.Program code can Fully to execute, partly execute on the user computer on the user computer, be executed as an independent software package, Part executes on the remote computer or executes on a remote computer or server completely on the user computer for part. In situations involving remote computers, remote computer can pass through the network of any kind --- including local area network (LAN) Or wide area network (WAN)-is connected to subscriber computer, or, it may be connected to outer computer (such as utilize Internet service Provider is connected by internet).
Flow chart and block diagram in attached drawing are illustrated according to the system of the various embodiments of the disclosure, method and computer journey The architecture, function and operation in the cards of sequence product.In this regard, each box in flowchart or block diagram can generation A part of one module, program segment or code of table, a part of the module, program segment or code include one or more use The executable instruction of the logic function as defined in realizing.It should also be noted that in some implementations as replacements, being marked in box The function of note can also occur in a different order than that indicated in the drawings.For example, two boxes succeedingly indicated are actually It can be basically executed in parallel, they can also be executed in the opposite order sometimes, and this depends on the function involved.Also it to infuse Meaning, the combination of each box in block diagram and or flow chart and the box in block diagram and or flow chart can be with holding The dedicated hardware based system of functions or operations as defined in row is realized, or can use specialized hardware and computer instruction Combination realize.
Being described in unit involved in the embodiment of the present disclosure can be realized by way of software, can also be by hard The mode of part is realized.Wherein, the title of unit does not constitute the restriction to the unit itself under certain conditions, for example, the One acquiring unit is also described as " obtaining the unit of at least two internet protocol addresses ".
Intelligent lock described herein comprising network connecting module, the network connecting module can be with place institutes Wireless network is attached, or is attached and is led to by the network of cellular carrier by built-in communication module Letter.The method of securely unlocking described herein, wherein the mode that wireless network can be used is verified, i.e., institute in the application Whether the wireless network that the wireless network that the mobile terminal of use is connected is connect with network connecting module is in same wireless In network.It should be noted that intelligent lock can not be by built-in communication module with operator under this kind of verification mode Internet of Things net mode and the external world of offer are attached, and are otherwise easy to cause authentication failed.
The wireless network in the mentioned place arrived in the preceding paragraph comprising believed by the WIFI that wireless router is converted Number, existing wireless router on the market provides two kinds of frequency ranges of 2.4GHz and 5GHz more.When in use, it should be noted that intelligent lock The frequency range that the frequency range and mobile terminal of the WIFI network connected are connected.When both above-mentioned same in same frequency range In the case of wireless network SSID, it can be realized by APP, wechat public platform, small routine, the mobile phone website etc. on mobile terminal Unlocking operation.
Before above-mentioned unlocking operation, user needs the mobile terminal being used for and the intelligent lock to be bound to carry out Operation is verified, the operating process of the verifying operation is generally as follows:
APP, wechat public platform, small routine, mobile phone website on mobile terminal pass through the cognizance code for reading mobile terminal, It is connected by wireless network or the background server in cloud, is stored with smart lock corresponding with each bin level in background server The information of tool, and intelligent lock is bound with the position in storehouse.If the intelligent lock of the position in storehouse is replaced, it is only necessary to rear The intelligent lock information accordingly bound is changed in platform server can be realized change.User is taken by hand-held mobile terminal and backstage Business device is communicated, and the request of unlocking is transferred to background server.Background server verifies whether unlocking request has just Normal unlocking authority, is verified, and background server receives unlocking request, and the position in storehouse is searched in background server Corresponding intelligent lock information.After the completion of lookup, unlocking instruction is transferred to intelligent lock by network, intelligent lock receives Unlocking action is executed after above-mentioned unlocking instruction.
Background server described herein can carry out binding operation between mobile terminal, mobile eventually by identification The identification code at end is realized.
One-to-one binding pattern or many-one are used between mobile terminal and background server described herein Binding pattern.Such as in many-to-one binding pattern, need to set one of mobile terminal as control device, remaining Equipment is required under the control in the control device.That is, the control device deletes remaining equipment of binding Except operation and increase operation.When the control device lose or be damaged be not available when, operator needs to pass through mobile phone Number, scans the modes such as original cognizance code and is verified WIFI verifying, can replace during remaining mobile terminal is used as Control equipment.The control device of the replacement needs the mobile terminal of at least one to be verified.

Claims (9)

1. a kind of method of securely unlocking, which is characterized in that the method for the unlocking includes the following steps:
The wireless network of S1, setting intelligent lock and position are in connection status;
S2, by matched with intelligent lock, including any one in cell phone application, wechat public platform, small routine, mobile phone website Radio network information on a reading mobile terminal, and be compared with the networked information of the intelligent lock of storage;
S3, cell phone application, wechat public platform, small routine, any one in mobile phone website are connected wireless by mobile terminal After the network information compares successfully with the networked information for requesting the intelligent lock opened, intelligent lock is opened, and personnel is allowed to carry out Enabling operation.
2. the method for securely unlocking according to claim 1, which is characterized in that the intelligent lock includes locating module, The locating module can obtain location information and transmit the location information through background service by connected wireless network Device be transferred to matched cell phone application, wechat public platform, small routine, on mobile phone website;The APP, wechat public platform, little Cheng Sequence, mobile phone website can be compared by reading the location information of locating module and the location information of intelligent lock on mobile terminal It is right, it compares and successfully then executes unlocking operation.
3. the method for securely unlocking according to claim 2, which is characterized in that the locating module include GPS chip and One of its associated circuit, Beidou chip and its associated circuit.
4. the method for securely unlocking according to claim 2, which is characterized in that collected positioning on the intelligent lock After APP, wechat public platform, small routine, the collected location information of mobile phone website compare on information and mobile terminal, both it Between distance should be located at intelligent lock default or set distance range within.
5. the method for securely unlocking according to claim 1, which is characterized in that the mobile terminal include smart phone, One of tablet computer, PDA, laptop.
6. the method for securely unlocking according to claim 1, which is characterized in that the wireless network of the intelligent lock and place Network is attached, and the wireless network in place includes one of WIFI, WLAN.
7. the method for securely unlocking according to claim 1, which is characterized in that described WIFI, WLAN using 2.4GHz or 5GHz, and mobile terminal where intelligent lock and cell phone application, wechat public platform, small routine, mobile phone website should connect it is same WIFI or wlan network under SSID.
8. the method for securely unlocking according to claim 6, which is characterized in that the APP, wechat public platform, small routine, It is that data exchange, the operator are carried out by carrier network and background server between mobile phone website and intelligent lock Network includes optical fiber, wlan network.
9. the method for securely unlocking according to claim 1, it is characterised in that: the mobile terminal APP, the wechat public Number, small routine, mobile phone website connect by internet or mobile communications network with background server, background server judgement user After the position in storehouse access right, unlocking instruction is sent to intelligent lock, smart lock according to the intelligent lock information of position in storehouse pairing Tool executes unlocking behavior after receiving above-metioned instruction.
CN201910688060.XA 2019-07-29 2019-07-29 The method of securely unlocking Pending CN110415411A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910688060.XA CN110415411A (en) 2019-07-29 2019-07-29 The method of securely unlocking

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910688060.XA CN110415411A (en) 2019-07-29 2019-07-29 The method of securely unlocking

Publications (1)

Publication Number Publication Date
CN110415411A true CN110415411A (en) 2019-11-05

Family

ID=68363737

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910688060.XA Pending CN110415411A (en) 2019-07-29 2019-07-29 The method of securely unlocking

Country Status (1)

Country Link
CN (1) CN110415411A (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106447860A (en) * 2016-09-27 2017-02-22 广州极酷物联智能科技有限公司 Wireless recognition access control system and access control opening device
CN107093232A (en) * 2017-03-29 2017-08-25 上海斐讯数据通信技术有限公司 A kind of gate inhibition's verification method and system based on mobile terminal
CN107154089A (en) * 2017-04-06 2017-09-12 上海斐讯数据通信技术有限公司 A kind of gate inhibition's verification method and system
CN107578519A (en) * 2017-10-24 2018-01-12 北京樱桃智心科技有限公司 A kind of intelligent access control system and intelligent entrance guard method for unlocking
CN108922000A (en) * 2018-07-19 2018-11-30 惠州Tcl家电集团有限公司 Intelligent door lock control method, device and computer readable storage medium
CN109920114A (en) * 2019-03-13 2019-06-21 广州市和声信息技术有限公司 A kind of control method for door lock and system based on geographical location

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106447860A (en) * 2016-09-27 2017-02-22 广州极酷物联智能科技有限公司 Wireless recognition access control system and access control opening device
CN107093232A (en) * 2017-03-29 2017-08-25 上海斐讯数据通信技术有限公司 A kind of gate inhibition's verification method and system based on mobile terminal
CN107154089A (en) * 2017-04-06 2017-09-12 上海斐讯数据通信技术有限公司 A kind of gate inhibition's verification method and system
CN107578519A (en) * 2017-10-24 2018-01-12 北京樱桃智心科技有限公司 A kind of intelligent access control system and intelligent entrance guard method for unlocking
CN108922000A (en) * 2018-07-19 2018-11-30 惠州Tcl家电集团有限公司 Intelligent door lock control method, device and computer readable storage medium
CN109920114A (en) * 2019-03-13 2019-06-21 广州市和声信息技术有限公司 A kind of control method for door lock and system based on geographical location

Similar Documents

Publication Publication Date Title
CN103546294B (en) Entrance guard authorization method, device and equipment
CN104468463B (en) Verification method, device and system
CN100594508C (en) Network system based control apparatus and control method thereof
CN108305360A (en) Access control method and relevant apparatus
CN108307674A (en) A kind of method and apparatus ensureing terminal security
CN107229854B (en) Application program registration method and device, electronic equipment and storage medium
US11316693B2 (en) Trusted platform module-based prepaid access token for commercial IoT online services
CN110826043A (en) Digital identity application system and method, identity authentication system and method
CN110300083A (en) A kind of method, terminal and authentication server obtaining identity information
CN103544749A (en) Cloud control access control management system and authentication method thereof
CN107396364A (en) A kind of method and apparatus for being used to carry out user equipment wireless connection pre-authorization
CN107172588A (en) A kind of WiFi network recommends method and device
CN106209918A (en) The method of a kind of internet security management and terminal
CN107396362A (en) A kind of method and apparatus for being used to carry out user equipment wireless connection pre-authorization
US20150348034A1 (en) Settlement management apparatus, information processing apparatus, settlement management method, and settlement management system
WO2014021054A1 (en) Information processing device, server device, and information processing system
US9477917B1 (en) System and method of context specific identity in a radio frequency identity (RFID) chip
CN106302519A (en) The method of a kind of internet security management and terminal
CN104640112A (en) Authentication method, device and system
CN103595573B (en) Method and device for issuing strategy rules
CN205880904U (en) Booking system
CN109391472A (en) Wireless network authentication method and device
CN110415411A (en) The method of securely unlocking
CN104811304A (en) Identity authentication method and device
CN105426796A (en) Method for downloading applications into smart card

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20191105