CN110415411A - The method of securely unlocking - Google Patents
The method of securely unlocking Download PDFInfo
- Publication number
- CN110415411A CN110415411A CN201910688060.XA CN201910688060A CN110415411A CN 110415411 A CN110415411 A CN 110415411A CN 201910688060 A CN201910688060 A CN 201910688060A CN 110415411 A CN110415411 A CN 110415411A
- Authority
- CN
- China
- Prior art keywords
- intelligent lock
- unlocking
- mobile terminal
- network
- mobile phone
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00571—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00817—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00817—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed
- G07C2009/00825—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed remotely by lines or wireless communication
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The present invention provides a kind of methods of securely unlocking, belong to intelligent unlocking field, when the WiFi network that the WiFi network of its intelligent lock is connect with the mobile terminal with APP, wechat public platform, small routine, mobile phone website etc. is the same SSID, unlocking condition can be met, and during unlocking, when the collected position location of physical location and mobile terminal institute of intelligent lock is located at setting permitted value range, mobile terminal can realize the unlocking to intelligent lock.After mobile terminal carries out unlocking operation to above-mentioned intelligent lock, intelligent lock can maintain current state, if nobody opens the door within the set time, intelligent lock is automatically closed, to guarantee the safety unlocked.In the case where above-mentioned technical proposal, the application is capable of providing the verifying of a variety of unlockings in addition to key and password, improves the safety of smart lock, guarantees the safety of place property.
Description
Technical field
The present invention relates to intelligent unlocking technical fields, in particular to the method for a kind of pair of intelligent lock securely unlocking.
Background technique
With the development of development of Mobile Internet technology, intelligent lock is also from traditional biological information identification, key, password
Etc. functions towards Internet of Things, cloud management and the directions such as control and develop, people can be by way of cloud or Internet of Things pair
The intelligent lock in place carries out long-range management and control, and the intelligent lock in place can also pass through cloud or the side of Internet of Things
Formula obtains the identification of newest control method and information.
The control method of existing intelligent lock generally comprises traditional physics method for unlocking, i.e., manually using key into
Row opens operation, also includes the method for electronics and Mechanical course, i.e., the artificial side for using input password or inputting finger print information
Method realizes lockset by mechanical device after being compared with the finger print information of the password and code that are stored in electric lockset
It opens.
Certainly, the epoch with control, Internet of Things are managed beyond the clouds, and intelligent lock can pass through the wireless network mould built in it
Block, communication module etc. are operated with the APP on mobile terminal by background server by network implementations.Operator can
Operation on and off is carried out to the intelligent lock of distal end.But above-mentioned remote unlocking mode and dangerous.Therefore, In
In long-term research and development, inventor has carried out a large amount of research to the method for unlocking of intelligent lock, proposes a kind of pair of smart lock
One of the method for unlocking of tool, to solve the above technical problems.
Summary of the invention
The purpose of the present invention is to provide a kind of method for unlocking of intelligent lock, this method be able to solve it is mentioned above extremely
A few technical problem.Concrete scheme is as follows:
Specific embodiment according to the present invention, in a first aspect, a kind of method of securely unlocking, which is characterized in that this is opened
The method of lock includes the following steps:
Wireless network is in connection status in S1, setting intelligent lock and place;
S2, it is read on mobile terminal by APP matched with intelligent lock, wechat public platform, small routine, mobile phone website
Radio network information, and be compared with the networked information of the intelligent lock of storage;The wechat public platform passes through wechat platform
Identification to SSID under WIFI network and the judgement to current location are provided;The mobile phone website passes through webpage HTML5's
Positioning function realizes the acquisition of current location and realizes request by orientation Intranet network address (such as router lan address)
The function of unlocking, under same SSID network, mobile phone website can be realized by router and be forwarded.
S3, APP, wechat public platform, small routine, mobile phone website pass through the radio network information and institute that mobile terminal is connected
After the networked information of the intelligent lock of storage compares successfully, intelligent lock is opened, and permission personnel carry out enabling operation.
Specific embodiment according to the present invention, second aspect, the intelligent lock include locating module, the locating module
Location information can be obtained and be transferred to the location information through background server by connected wireless network transmitting and matched
The APP of set, wechat public platform, small routine, on mobile phone website;The APP, wechat public platform, small routine, mobile phone website can
It is compared by the location information of locating module on reading mobile terminal with the location information of intelligent lock, compares and successfully then hold
Row unlocking operation.
Specific embodiment according to the present invention, the third aspect, the locating module include GPS chip and its association electricity
One of road, Beidou chip and its associated circuit.
Specific embodiment according to the present invention, fourth aspect, on intelligent lock collected location information and it is mobile eventually
After the collected location information of APP, wechat public platform, small routine, mobile phone website compares on end, the distance between both should
Within the distance range that intelligent lock is defaulted or sets.
Specific embodiment according to the present invention, the 5th aspect, the mobile terminal include smart phone, tablet computer,
One of PDA, laptop.
Specific embodiment according to the present invention, the 6th aspect, the wireless network in the intelligent lock and place place into
Row connection, the wireless network in place place includes one of WIFI, WLAN.
Specific embodiment according to the present invention, the 7th aspect, described WIFI, WLAN use 2.4GHz or 5GHz, and intelligence
Energy lockset should connect WIFI or wlan network under same SSID with APP, wechat public platform, small routine, mobile phone website.
Specific embodiment according to the present invention, eighth aspect, the APP, wechat public platform, small routine, mobile phone website
It is that data exchange is carried out by carrier network and background server between intelligent lock, the carrier network includes
Optical fiber, wlan network.
Specific embodiment according to the present invention, the 9th aspect, the mobile terminal APP, wechat public platform, small routine,
The mobile network and background server that mobile phone website and intelligent lock are provided by internet or operator initiate request of unlocking,
After background server verifying user has normal unlocking authority, by the intelligent lock information matched with position in storehouse to corresponding intelligence
Energy lockset sends unlocking instruction, and intelligent lock executes unlocking action after receiving above-mentioned unlocking instruction.
Specific embodiment according to the present invention, the tenth on the one hand, and the present invention provides a kind of computer readable storage medium,
It is stored thereon with computer program, the side of as above described in any item securely unlockings is realized when described program is executed by processor
Method.
Specific embodiment according to the present invention, the 12nd aspect, the present invention provide a kind of intelligent lock, comprising: one
Or multiple processors;Storage device, for storing one or more programs, when one or more of programs by one or
When multiple processors execute, so that one or more of processors realize as above described in any item pairs of intelligent lock safety opens
The method of lock.
The above scheme of the embodiment of the present invention compared with prior art, at least has the advantages that
The application can effectively realize the securely unlocking operation of intelligent lock, and pass through a variety of effective safety verification sides
Formula is realized except the unlocking operation under the modes such as key, password authentification.And the side of the unlocking operation described in this application
Method is transformed background server, intelligent lock in the case where capable of only increasing hardware by upgrading software or simply,
The safety for improving unlocking operation reduces intelligent lock production and puts into financial resources required in transformation process, reduces life
Production or improved cost.
Detailed description of the invention
The drawings herein are incorporated into the specification and forms part of this specification, and shows and meets implementation of the invention
Example, and be used to explain the principle of the present invention together with specification.It should be evident that the accompanying drawings in the following description is only the present invention
Some embodiments for those of ordinary skill in the art without creative efforts, can also basis
These attached drawings obtain other attached drawings.In the accompanying drawings:
Fig. 1 shows the method flow diagram according to an embodiment of the present invention that unlocking operation is carried out to intelligent lock.
Fig. 2 is that this application involves the schematic illustrations of the hardware configuration arrived.
Specific embodiment
To make the objectives, technical solutions, and advantages of the present invention clearer, below in conjunction with attached drawing to the present invention make into
It is described in detail to one step, it is clear that described embodiments are only a part of the embodiments of the present invention, rather than whole implementation
Example.Based on the embodiments of the present invention, obtained by those of ordinary skill in the art without making creative efforts
All other embodiment, shall fall within the protection scope of the present invention.
The term used in embodiments of the present invention is only to be not intended to be limiting merely for for the purpose of describing particular embodiments
The present invention.In the embodiment of the present invention and the "an" of singular used in the attached claims, " described " and "the"
It is also intended to including most forms, unless the context clearly indicates other meaning, " a variety of " generally comprise at least two.
It should be appreciated that term "and/or" used herein is only a kind of incidence relation for describing affiliated partner, indicate
There may be three kinds of relationships, for example, A and/or B, can indicate: individualism A, exist simultaneously A and B, individualism B these three
Situation.In addition, character "/" herein, typicallys represent the relationship that forward-backward correlation object is a kind of "or".
It will be appreciated that though may be described in embodiments of the present invention using term first, second, third, etc..,
But these ... it should not necessarily be limited by these terms.These terms be only used to by ... distinguish.For example, not departing from implementation of the present invention
In the case where example range, first ... can also be referred to as second ..., and similarly, second ... can also be referred to as the
One ....
Depending on context, word as used in this " if ", " if " can be construed to " ... when " or
" when ... " or " in response to determination " or " in response to detection ".Similarly, context is depended on, phrase " if it is determined that " or " such as
Fruit detection (condition or event of statement) " can be construed to " when determining " or " in response to determination " or " when detection (statement
Condition or event) when " or " in response to detection (condition or event of statement) ".
It should also be noted that, the terms "include", "comprise" or its any other variant are intended to nonexcludability
Include, so that commodity or device including a series of elements not only include those elements, but also including not clear
The other element listed, or further include for this commodity or the intrinsic element of device.In the feelings not limited more
Under condition, the element that is limited by sentence "including a ...", it is not excluded that in the commodity or device for including the element also
There are other identical elements.
The alternative embodiment that the invention will now be described in detail with reference to the accompanying drawings.
Embodiment 1
A kind of method of securely unlocking, the method for the unlocking include the following steps:
S1, setting intelligent lock and place wireless network are in connection status;
S2, it is read on mobile terminal by APP matched with intelligent lock, wechat public platform, small routine, mobile phone website
Radio network information, and be compared with the networked information of the intelligent lock of storage;
S3, APP, wechat public platform, small routine, mobile phone website pass through the radio network information and institute that mobile terminal is connected
After the networked information of the intelligent lock of storage compares successfully, intelligent lock is opened, and permission personnel carry out enabling operation.
Embodiment 2:
A kind of method of securely unlocking, the method for the unlocking include the steps that following:
The intelligent lock includes locating module, which can obtain location information and lead to the location information
It crosses connected wireless network transmitting and is transferred to matched APP, wechat public platform, on mobile phone website through background server;It is described
APP, wechat public platform, small routine, mobile phone website can pass through read mobile terminal on locating module location information and intelligence
The location information of energy lockset is compared, and compares and successfully then executes unlocking operation.The locating module includes GPS chip and its pass
Join one of circuit, Beidou chip and its associated circuit.Collected location information and mobile terminal on the intelligent lock
After the collected location information of upper APP, wechat public platform, small routine, mobile phone website compares, the distance between both should position
Within the distance range that intelligent lock is defaulted or sets.
Embodiment 3
A kind of method of securely unlocking, wherein the method for the unlocking include thes steps that following:
The mobile terminal includes one of smart phone, tablet computer, PDA, laptop.The intelligent lock
It is attached with the wireless network in place, the wireless network in place includes one of WIFI, WLAN.Described WIFI, WLAN are adopted
With 2.4GHz or 5GHz, and intelligent lock should connect the WIFI or wlan network under same frequency with APP.The APP, wechat
It is that data exchange is carried out by carrier network and background server between public platform, mobile phone website and intelligent lock, it is described
Carrier network include optical fiber, wlan network.The mobile terminal APP, wechat public platform, small routine, mobile phone website and net
The background server of point is communicated, and background server verifies the request and whether has normal unlocking authority, if having
Background server inquires the corresponding intelligent lock of position in storehouse, and sends request of unlocking to the intelligent lock, and intelligent lock receives this
Unlocking action is executed after unlocking instruction.
Embodiment 4
A kind of method of securely unlocking, wherein the intelligent lock includes at least processor, storage device, network connection
Device, positioning device, wherein the storage device, which is used to store, identifies network and location information and recognizable above- mentioned information
Executable program, the processor by call executable program network connection device is connected to the network driving, read
The cognizance code of network connection device connected network reads read location information in positioning device, and can pass through
Network connection device directly carries out information exchange or logical with the APP of mobile terminal, wechat public platform, small routine, mobile phone website
It crosses APP, wechat public platform, small routine, mobile phone website of the modes such as internet through background server and mobile terminal and carries out information
Exchange.
Embodiment 5
The embodiment of the present disclosure provides a kind of nonvolatile computer storage media, and the computer storage medium is stored with
Processor-executable instruction, which, which can be performed, carries out intelligent lock in above-mentioned any means embodiment
The method of unlocking.
Embodiment 6
Below with reference to Fig. 2, it illustrates the intelligent locks for being suitable for being used to realize herein described method.The embodiment of the present disclosure
In terminal device can include but is not limited to such as mobile phone, laptop, digit broadcasting receiver, PDA (a number
Word assistant), PAD (tablet computer), PMP (portable media player), car-mounted terminal (such as vehicle mounted guidance terminal) etc.
Mobile terminal and such as number TV, desktop computer etc. fixed terminal.
Fig. 2 shows electronic equipment be only an example, should not function and use scope band to the embodiment of the present disclosure
Carry out any restrictions.
As shown in Fig. 2, the intelligent lock includes processor, storage device, position module (locating module), controls eventually
End and cabinet position lock, wherein the processor be used to handle stored in storage device record herein described method can
Program is executed, which is the embedded journey of the executable program or embedded system hardware that can run in its system
Sequence.Processor can also obtain the corresponding network information, the address IPv4, IPv6, institute including place network by storage gateway
In state, the ID of place network etc. of network, additionally it is possible to obtain corresponding location information by storage gateway, which can
To be obtained by position module, position module can obtain corresponding physical location by network or locating module.
GPS positioning module or Beidou positioning module and above-mentioned fixed can be used in locating module described in above-mentioned paragraph
The associated circuit of position module, can realize the more accurate physical positioning in position by above-mentioned module.Above-mentioned locating module is obtained
Location information can be used for cabinet position lock unlocking operation.
In general, controlling terminal described herein includes input module, the input module include touch screen, touch tablet,
Keyboard, mouse, camera, microphone, accelerometer, gyroscope etc.;It further include such as liquid crystal display in controlling terminal
(LCD), the output device of loudspeaker, vibrator etc.;Storage device including such as tape, hard disk etc.;And communication device.It is logical
T unit, which can permit, wirelessly or non-wirelessly to be communicated between controlling terminal and storage gateway to exchange data.Although Fig. 2 shows
Intelligent lock applied to storage, it should be understood that be not required for implementing or having all devices shown.It can replace
Implement or have more or fewer devices in generation ground.
Particularly, in accordance with an embodiment of the present disclosure, it may be implemented as computer above with reference to the process of flow chart description
Software program.For example, embodiment of the disclosure includes a kind of computer program product comprising be carried on computer-readable medium
On computer program, which includes the program code for method shown in execution flow chart.In such reality
It applies in example, when which is executed by processing unit, executes the above-mentioned function of limiting in the method for the embodiment of the present disclosure.
It should be noted that the above-mentioned computer-readable medium of the disclosure can be computer-readable signal media or meter
Calculation machine readable storage medium storing program for executing either the two any combination.Computer readable storage medium for example can be --- but not
Be limited to --- electricity, magnetic, optical, electromagnetic, infrared ray or semiconductor system, device or device, or any above combination.Meter
The more specific example of calculation machine readable storage medium storing program for executing can include but is not limited to: have the electrical connection, just of one or more conducting wires
Taking formula computer disk, hard disk, random access storage device (RAM), read-only memory (ROM), erasable type may be programmed read-only storage
Device (EPROM or flash memory), optical fiber, portable compact disc read-only memory (CD-ROM), light storage device, magnetic memory device,
Or above-mentioned any appropriate combination.In the disclosure, computer readable storage medium can be it is any include or storage journey
The tangible medium of sequence, the program can be commanded execution system, device or device use or in connection.And at this
In open, computer-readable signal media may include in a base band or as the data-signal that carrier wave a part is propagated,
In carry computer-readable program code.The data-signal of this propagation can take various forms, including but not limited to
Electromagnetic signal, optical signal or above-mentioned any appropriate combination.Computer-readable signal media can also be computer-readable and deposit
Any computer-readable medium other than storage media, the computer-readable signal media can send, propagate or transmit and be used for
By the use of instruction execution system, device or device or program in connection.Include on computer-readable medium
Program code can transmit with any suitable medium, including but not limited to: electric wire, optical cable, RF (radio frequency) etc. are above-mentioned
Any appropriate combination.
Above-mentioned computer-readable medium can be included in above-mentioned electronic equipment;It is also possible to individualism, and not
It is fitted into the electronic equipment.
Above-mentioned computer-readable medium carries one or more program, when said one or multiple programs are by the electricity
When sub- equipment executes, so that the electronic equipment: obtaining at least two internet protocol addresses;Send to Node evaluation equipment includes institute
State the Node evaluation request of at least two internet protocol addresses, wherein the Node evaluation equipment is internet from described at least two
In protocol address, chooses internet protocol address and return;Receive the internet protocol address that the Node evaluation equipment returns;Its
In, the fringe node in acquired internet protocol address instruction content distributing network.
Alternatively, above-mentioned computer-readable medium carries one or more program, when said one or multiple programs
When being executed by the electronic equipment, so that the electronic equipment: receiving the Node evaluation including at least two internet protocol addresses and request;
From at least two internet protocol address, internet protocol address is chosen;Return to the internet protocol address selected;Wherein,
The fringe node in internet protocol address instruction content distributing network received.
The calculating of the operation for executing the disclosure can be write with one or more programming languages or combinations thereof
Machine program code, above procedure design language include object oriented program language-such as Java, Smalltalk, C+
+, it further include conventional procedural programming language-such as " C " language or similar programming language.Program code can
Fully to execute, partly execute on the user computer on the user computer, be executed as an independent software package,
Part executes on the remote computer or executes on a remote computer or server completely on the user computer for part.
In situations involving remote computers, remote computer can pass through the network of any kind --- including local area network (LAN)
Or wide area network (WAN)-is connected to subscriber computer, or, it may be connected to outer computer (such as utilize Internet service
Provider is connected by internet).
Flow chart and block diagram in attached drawing are illustrated according to the system of the various embodiments of the disclosure, method and computer journey
The architecture, function and operation in the cards of sequence product.In this regard, each box in flowchart or block diagram can generation
A part of one module, program segment or code of table, a part of the module, program segment or code include one or more use
The executable instruction of the logic function as defined in realizing.It should also be noted that in some implementations as replacements, being marked in box
The function of note can also occur in a different order than that indicated in the drawings.For example, two boxes succeedingly indicated are actually
It can be basically executed in parallel, they can also be executed in the opposite order sometimes, and this depends on the function involved.Also it to infuse
Meaning, the combination of each box in block diagram and or flow chart and the box in block diagram and or flow chart can be with holding
The dedicated hardware based system of functions or operations as defined in row is realized, or can use specialized hardware and computer instruction
Combination realize.
Being described in unit involved in the embodiment of the present disclosure can be realized by way of software, can also be by hard
The mode of part is realized.Wherein, the title of unit does not constitute the restriction to the unit itself under certain conditions, for example, the
One acquiring unit is also described as " obtaining the unit of at least two internet protocol addresses ".
Intelligent lock described herein comprising network connecting module, the network connecting module can be with place institutes
Wireless network is attached, or is attached and is led to by the network of cellular carrier by built-in communication module
Letter.The method of securely unlocking described herein, wherein the mode that wireless network can be used is verified, i.e., institute in the application
Whether the wireless network that the wireless network that the mobile terminal of use is connected is connect with network connecting module is in same wireless
In network.It should be noted that intelligent lock can not be by built-in communication module with operator under this kind of verification mode
Internet of Things net mode and the external world of offer are attached, and are otherwise easy to cause authentication failed.
The wireless network in the mentioned place arrived in the preceding paragraph comprising believed by the WIFI that wireless router is converted
Number, existing wireless router on the market provides two kinds of frequency ranges of 2.4GHz and 5GHz more.When in use, it should be noted that intelligent lock
The frequency range that the frequency range and mobile terminal of the WIFI network connected are connected.When both above-mentioned same in same frequency range
In the case of wireless network SSID, it can be realized by APP, wechat public platform, small routine, the mobile phone website etc. on mobile terminal
Unlocking operation.
Before above-mentioned unlocking operation, user needs the mobile terminal being used for and the intelligent lock to be bound to carry out
Operation is verified, the operating process of the verifying operation is generally as follows:
APP, wechat public platform, small routine, mobile phone website on mobile terminal pass through the cognizance code for reading mobile terminal,
It is connected by wireless network or the background server in cloud, is stored with smart lock corresponding with each bin level in background server
The information of tool, and intelligent lock is bound with the position in storehouse.If the intelligent lock of the position in storehouse is replaced, it is only necessary to rear
The intelligent lock information accordingly bound is changed in platform server can be realized change.User is taken by hand-held mobile terminal and backstage
Business device is communicated, and the request of unlocking is transferred to background server.Background server verifies whether unlocking request has just
Normal unlocking authority, is verified, and background server receives unlocking request, and the position in storehouse is searched in background server
Corresponding intelligent lock information.After the completion of lookup, unlocking instruction is transferred to intelligent lock by network, intelligent lock receives
Unlocking action is executed after above-mentioned unlocking instruction.
Background server described herein can carry out binding operation between mobile terminal, mobile eventually by identification
The identification code at end is realized.
One-to-one binding pattern or many-one are used between mobile terminal and background server described herein
Binding pattern.Such as in many-to-one binding pattern, need to set one of mobile terminal as control device, remaining
Equipment is required under the control in the control device.That is, the control device deletes remaining equipment of binding
Except operation and increase operation.When the control device lose or be damaged be not available when, operator needs to pass through mobile phone
Number, scans the modes such as original cognizance code and is verified WIFI verifying, can replace during remaining mobile terminal is used as
Control equipment.The control device of the replacement needs the mobile terminal of at least one to be verified.
Claims (9)
1. a kind of method of securely unlocking, which is characterized in that the method for the unlocking includes the following steps:
The wireless network of S1, setting intelligent lock and position are in connection status;
S2, by matched with intelligent lock, including any one in cell phone application, wechat public platform, small routine, mobile phone website
Radio network information on a reading mobile terminal, and be compared with the networked information of the intelligent lock of storage;
S3, cell phone application, wechat public platform, small routine, any one in mobile phone website are connected wireless by mobile terminal
After the network information compares successfully with the networked information for requesting the intelligent lock opened, intelligent lock is opened, and personnel is allowed to carry out
Enabling operation.
2. the method for securely unlocking according to claim 1, which is characterized in that the intelligent lock includes locating module,
The locating module can obtain location information and transmit the location information through background service by connected wireless network
Device be transferred to matched cell phone application, wechat public platform, small routine, on mobile phone website;The APP, wechat public platform, little Cheng
Sequence, mobile phone website can be compared by reading the location information of locating module and the location information of intelligent lock on mobile terminal
It is right, it compares and successfully then executes unlocking operation.
3. the method for securely unlocking according to claim 2, which is characterized in that the locating module include GPS chip and
One of its associated circuit, Beidou chip and its associated circuit.
4. the method for securely unlocking according to claim 2, which is characterized in that collected positioning on the intelligent lock
After APP, wechat public platform, small routine, the collected location information of mobile phone website compare on information and mobile terminal, both it
Between distance should be located at intelligent lock default or set distance range within.
5. the method for securely unlocking according to claim 1, which is characterized in that the mobile terminal include smart phone,
One of tablet computer, PDA, laptop.
6. the method for securely unlocking according to claim 1, which is characterized in that the wireless network of the intelligent lock and place
Network is attached, and the wireless network in place includes one of WIFI, WLAN.
7. the method for securely unlocking according to claim 1, which is characterized in that described WIFI, WLAN using 2.4GHz or
5GHz, and mobile terminal where intelligent lock and cell phone application, wechat public platform, small routine, mobile phone website should connect it is same
WIFI or wlan network under SSID.
8. the method for securely unlocking according to claim 6, which is characterized in that the APP, wechat public platform, small routine,
It is that data exchange, the operator are carried out by carrier network and background server between mobile phone website and intelligent lock
Network includes optical fiber, wlan network.
9. the method for securely unlocking according to claim 1, it is characterised in that: the mobile terminal APP, the wechat public
Number, small routine, mobile phone website connect by internet or mobile communications network with background server, background server judgement user
After the position in storehouse access right, unlocking instruction is sent to intelligent lock, smart lock according to the intelligent lock information of position in storehouse pairing
Tool executes unlocking behavior after receiving above-metioned instruction.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910688060.XA CN110415411A (en) | 2019-07-29 | 2019-07-29 | The method of securely unlocking |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910688060.XA CN110415411A (en) | 2019-07-29 | 2019-07-29 | The method of securely unlocking |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110415411A true CN110415411A (en) | 2019-11-05 |
Family
ID=68363737
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910688060.XA Pending CN110415411A (en) | 2019-07-29 | 2019-07-29 | The method of securely unlocking |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110415411A (en) |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106447860A (en) * | 2016-09-27 | 2017-02-22 | 广州极酷物联智能科技有限公司 | Wireless recognition access control system and access control opening device |
CN107093232A (en) * | 2017-03-29 | 2017-08-25 | 上海斐讯数据通信技术有限公司 | A kind of gate inhibition's verification method and system based on mobile terminal |
CN107154089A (en) * | 2017-04-06 | 2017-09-12 | 上海斐讯数据通信技术有限公司 | A kind of gate inhibition's verification method and system |
CN107578519A (en) * | 2017-10-24 | 2018-01-12 | 北京樱桃智心科技有限公司 | A kind of intelligent access control system and intelligent entrance guard method for unlocking |
CN108922000A (en) * | 2018-07-19 | 2018-11-30 | 惠州Tcl家电集团有限公司 | Intelligent door lock control method, device and computer readable storage medium |
CN109920114A (en) * | 2019-03-13 | 2019-06-21 | 广州市和声信息技术有限公司 | A kind of control method for door lock and system based on geographical location |
-
2019
- 2019-07-29 CN CN201910688060.XA patent/CN110415411A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106447860A (en) * | 2016-09-27 | 2017-02-22 | 广州极酷物联智能科技有限公司 | Wireless recognition access control system and access control opening device |
CN107093232A (en) * | 2017-03-29 | 2017-08-25 | 上海斐讯数据通信技术有限公司 | A kind of gate inhibition's verification method and system based on mobile terminal |
CN107154089A (en) * | 2017-04-06 | 2017-09-12 | 上海斐讯数据通信技术有限公司 | A kind of gate inhibition's verification method and system |
CN107578519A (en) * | 2017-10-24 | 2018-01-12 | 北京樱桃智心科技有限公司 | A kind of intelligent access control system and intelligent entrance guard method for unlocking |
CN108922000A (en) * | 2018-07-19 | 2018-11-30 | 惠州Tcl家电集团有限公司 | Intelligent door lock control method, device and computer readable storage medium |
CN109920114A (en) * | 2019-03-13 | 2019-06-21 | 广州市和声信息技术有限公司 | A kind of control method for door lock and system based on geographical location |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103546294B (en) | Entrance guard authorization method, device and equipment | |
CN104468463B (en) | Verification method, device and system | |
CN100594508C (en) | Network system based control apparatus and control method thereof | |
CN108305360A (en) | Access control method and relevant apparatus | |
CN108307674A (en) | A kind of method and apparatus ensureing terminal security | |
CN107229854B (en) | Application program registration method and device, electronic equipment and storage medium | |
US11316693B2 (en) | Trusted platform module-based prepaid access token for commercial IoT online services | |
CN110826043A (en) | Digital identity application system and method, identity authentication system and method | |
CN110300083A (en) | A kind of method, terminal and authentication server obtaining identity information | |
CN103544749A (en) | Cloud control access control management system and authentication method thereof | |
CN107396364A (en) | A kind of method and apparatus for being used to carry out user equipment wireless connection pre-authorization | |
CN107172588A (en) | A kind of WiFi network recommends method and device | |
CN106209918A (en) | The method of a kind of internet security management and terminal | |
CN107396362A (en) | A kind of method and apparatus for being used to carry out user equipment wireless connection pre-authorization | |
US20150348034A1 (en) | Settlement management apparatus, information processing apparatus, settlement management method, and settlement management system | |
WO2014021054A1 (en) | Information processing device, server device, and information processing system | |
US9477917B1 (en) | System and method of context specific identity in a radio frequency identity (RFID) chip | |
CN106302519A (en) | The method of a kind of internet security management and terminal | |
CN104640112A (en) | Authentication method, device and system | |
CN103595573B (en) | Method and device for issuing strategy rules | |
CN205880904U (en) | Booking system | |
CN109391472A (en) | Wireless network authentication method and device | |
CN110415411A (en) | The method of securely unlocking | |
CN104811304A (en) | Identity authentication method and device | |
CN105426796A (en) | Method for downloading applications into smart card |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20191105 |