CN110535950B - Intelligent lock control method, device, system and storage medium - Google Patents

Intelligent lock control method, device, system and storage medium Download PDF

Info

Publication number
CN110535950B
CN110535950B CN201910817919.2A CN201910817919A CN110535950B CN 110535950 B CN110535950 B CN 110535950B CN 201910817919 A CN201910817919 A CN 201910817919A CN 110535950 B CN110535950 B CN 110535950B
Authority
CN
China
Prior art keywords
intelligent lock
controlled
terminal
state
verified
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910817919.2A
Other languages
Chinese (zh)
Other versions
CN110535950A (en
Inventor
潘仲光
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Wireless Sports Club Co ltd
Original Assignee
Beijing Wireless Sports Club Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Wireless Sports Club Co ltd filed Critical Beijing Wireless Sports Club Co ltd
Priority to CN201910817919.2A priority Critical patent/CN110535950B/en
Publication of CN110535950A publication Critical patent/CN110535950A/en
Application granted granted Critical
Publication of CN110535950B publication Critical patent/CN110535950B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G05CONTROLLING; REGULATING
    • G05BCONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
    • G05B19/00Programme-control systems
    • G05B19/02Programme-control systems electric
    • G05B19/04Programme control other than numerical control, i.e. in sequence controllers or logic controllers
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/52Network services specially adapted for the location of the user terminal

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Automation & Control Theory (AREA)
  • Telephonic Communication Services (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The embodiment of the application provides an intelligent lock control method, equipment, a system and a storage medium. In the embodiment of the application, the server-side equipment determines whether the terminal to be verified has the authority to control the intelligent lock to be controlled or not according to the position of the terminal to be verified and the position of the intelligent lock to be controlled; and under the condition that the terminal to be verified has the control authority, the intelligent lock to be controlled is controlled to adjust the state of the intelligent lock to be controlled. The intelligent lock control mode avoids conversation between the terminal to be verified and the intelligent lock, reduces the risk of controlling the intelligent lock by the imitation terminal, and is further favorable for improving the safety of intelligent lock control.

Description

Intelligent lock control method, equipment, system and storage medium
Technical Field
The present application relates to the field of wireless communications technologies, and in particular, to an intelligent lock control method, an intelligent lock control device, an intelligent lock control system, and a storage medium.
Background
Along with the improvement of the life quality of people, the smart home gradually becomes an indispensable part of the life of people. The intelligent lock has the advantages that the trouble that people cannot unlock the lock due to the fact that the key is hung or lost is avoided due to the fact that the intelligent lock is released.
However, in practical application, the existing intelligent lock has low safety in unlocking or locking.
Disclosure of Invention
Aspects of the present application provide a method, device, system, and storage medium for intelligent lock control, which are used for security of an intelligent lock.
The embodiment of the application provides an intelligence lock control system, includes: the system comprises at least one intelligent lock, terminal equipment and server-side equipment; wherein, the first and the second end of the pipe are connected with each other,
the terminal equipment is used for sending an intelligent lock control request to the server-side equipment, wherein the intelligent lock control request comprises identification information of the intelligent lock to be controlled and the specified state of the intelligent lock to be controlled; the intelligent lock to be controlled is any one of the at least one intelligent lock;
the server side equipment is used for receiving the intelligent lock control request; determining the position of the intelligent lock to be controlled according to the identification information of the intelligent lock to be controlled; determining whether the terminal equipment has the authority to control the intelligent lock or not according to the position of the intelligent lock to be controlled and the position of the intelligent lock provided by the terminal equipment; and under the condition that the terminal equipment is determined to have the authority of controlling the intelligent lock to be controlled, sending a control instruction to the intelligent lock to be controlled so as to control the intelligent lock to be controlled to adjust the state of the intelligent lock to be controlled to the specified state.
The embodiment of the present application further provides an intelligent lock control method, which is applicable to a server device, and includes:
receiving an intelligent lock control request sent by a terminal to be verified; the intelligent lock control request comprises identification information of the intelligent lock to be controlled and an appointed state of the intelligent lock to be controlled;
determining the position of the intelligent lock to be controlled according to the identification information of the intelligent lock to be controlled;
determining whether the terminal to be verified has the authority to control the intelligent lock to be controlled or not according to the position of the intelligent lock to be controlled and the position of the terminal to be verified provided by the terminal to be verified;
and under the condition that the terminal to be verified is determined to have the authority for controlling the intelligent lock to be controlled, sending a control instruction to the intelligent lock to be controlled so as to control the intelligent lock to be controlled to adjust the state of the intelligent lock to be controlled to the specified state.
The embodiment of the present application further provides an intelligent lock control method, which is applicable to a terminal device, and includes:
acquiring self identification information broadcasted by the intelligent lock to be controlled;
determining whether the intelligent lock to be controlled has the authority to control according to the identification information of the intelligent lock to be controlled and the identification information of the bound intelligent lock;
and under the condition that the intelligent lock to be controlled has the authority, sending an intelligent lock control request to server equipment, wherein the intelligent lock control request contains identification information of the intelligent lock to be controlled and the appointed state of the intelligent lock to be controlled, so that the server equipment can determine whether to adjust the intelligent lock to be controlled to the appointed state.
The embodiment of the present application further provides an intelligent lock control method, which is applicable to an intelligent lock, and includes:
receiving a control instruction sent by server equipment; the control instruction is sent by the server side equipment under the condition that the server side equipment determines that the to-be-verified terminal has the authority for controlling the intelligent lock according to an intelligent lock control request sent by the to-be-verified terminal, wherein the intelligent lock control request comprises the appointed state of the intelligent lock;
and adjusting the self state to the specified state according to the control instruction.
An embodiment of the present application further provides a server device, including: a memory, a processor, and a communications component; wherein the memory is used for storing the position of the intelligent lock and a computer program;
the processor is coupled to the memory for executing the computer program for:
receiving an intelligent lock control request sent by a terminal to be verified through the communication assembly; the intelligent lock control request comprises identification information of the intelligent lock to be controlled and the specified state of the intelligent lock to be controlled;
determining the position of the intelligent lock to be controlled in the stored positions of the intelligent lock according to the identification information of the intelligent lock to be controlled;
determining whether the terminal to be verified has the authority to control the intelligent lock to be controlled or not according to the position of the intelligent lock to be controlled and the position of the terminal to be verified provided by the terminal to be verified;
and under the condition that the terminal to be checked is determined to have the authority of controlling the intelligent lock to be controlled, sending a control instruction to the intelligent lock to be controlled through the communication assembly so as to control the intelligent lock to be controlled to adjust the state of the intelligent lock to be controlled to the specified state.
An embodiment of the present application further provides a terminal device, including: a memory, a processor, and a communications component; the memory is used for storing the identification information of the bound intelligent lock and a computer program;
the processor is coupled to the memory for executing the computer program for:
acquiring self identification information broadcasted by the intelligent lock to be controlled;
determining whether the intelligent lock to be controlled has the authority to control according to the identification information of the intelligent lock to be controlled and the identification information of the bound intelligent lock;
and under the condition that the intelligent lock to be controlled has the authority, sending an intelligent lock control request to server equipment through the communication assembly, wherein the intelligent lock control request contains identification information of the intelligent lock to be controlled and the designated state of the intelligent lock to be controlled, so that the server equipment can determine whether to adjust the intelligent lock to be controlled to the designated state.
An embodiment of the present application further provides an electronic device, including: a memory, a processor, and a communications component;
wherein the memory is to store a computer program;
the processor is coupled to the memory for executing the computer program for:
receiving a control instruction sent by server equipment through the communication assembly; the control instruction is sent by the server-side equipment under the condition that the server-side equipment determines that the terminal to be verified has the authority to control the electronic equipment according to an intelligent lock control request sent by the terminal to be verified, wherein the intelligent lock control request comprises the appointed state of the electronic equipment;
and adjusting the electronic equipment to the specified state according to the control instruction.
Embodiments of the present application also provide a computer-readable storage medium storing computer instructions, which, when executed by one or more processors, cause the one or more processors to execute the steps in the above-mentioned intelligent lock control method.
In the embodiment of the application, the server-side equipment determines whether the terminal to be verified has the authority to control the intelligent lock to be controlled or not according to the position of the terminal to be verified and the position of the intelligent lock to be controlled; and under the condition that the terminal to be verified has the control authority, the intelligent lock to be controlled is controlled to adjust the state of the intelligent lock to be controlled. The intelligent lock control mode avoids the conversation between the terminal to be checked and the intelligent lock, reduces the risk of controlling the intelligent lock by a imitation terminal, and is further favorable for improving the safety of intelligent lock control.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the application and together with the description serve to explain the application and not to limit the application. In the drawings:
fig. 1a is a schematic structural diagram of an intelligent lock control system according to an embodiment of the present application;
FIG. 1b is a schematic structural diagram of another intelligent lock control system provided in an embodiment of the present application;
fig. 1c is a schematic diagram of signaling interaction of an intelligent lock control according to an embodiment of the present application;
fig. 2 is a schematic flowchart of an intelligent lock control method according to an embodiment of the present application;
FIG. 3 is a schematic flow chart of another intelligent lock control method provided in the embodiments of the present application;
FIG. 4 is a schematic flowchart of another intelligent lock control method according to an embodiment of the present application;
fig. 5 is a schematic structural diagram of a server device according to an embodiment of the present application;
fig. 6 is a schematic structural diagram of a terminal device according to an embodiment of the present application;
fig. 7 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
To make the objects, technical solutions and advantages of the present application more clear, the technical solutions of the present application will be clearly and completely described below with reference to specific embodiments of the present application and the accompanying drawings. It should be apparent that the described embodiments are only some of the embodiments of the present application, and not all of the embodiments. All other embodiments obtained by a person of ordinary skill in the art based on the embodiments in the present application without making any creative effort belong to the protection scope of the present application.
To the lower technical problem of current intelligence lock security, this application embodiment provides a solution, and the basic thinking is: the server-side equipment determines whether the terminal to be verified has the authority to control the intelligent lock to be controlled or not according to the terminal to be verified and the position of the intelligent lock to be controlled; and under the condition that the terminal to be verified is determined to have the control authority, the intelligent lock to be controlled is controlled to adjust the state of the intelligent lock to be controlled. The intelligent lock control mode avoids conversation between the terminal to be verified and the intelligent lock, reduces the risk of controlling the intelligent lock by the imitation terminal, and is further favorable for improving the safety of intelligent lock control.
The technical solutions provided by the embodiments of the present application are described in detail below with reference to the accompanying drawings.
Fig. 1a is a schematic structural diagram of an intelligent lock control system according to an embodiment of the present application. As shown in fig. 1a, the system comprises: at least one intelligent lock 10a, a terminal device 10b and a server device 10c. The number and implementation forms of the smart locks 10a and the implementation forms of the terminal device 10b and the server device 10c shown in fig. 1a are exemplary illustrations and are not limited thereto.
In this embodiment, the server device 10c and the terminal device 10b and the smart lock 10a may be wirelessly connected. Optionally, the server device 10c may be communicatively connected to the terminal device 10b and the intelligent lock 10a through a mobile network, and accordingly, the network format of the mobile network may be any one of 2G (GSM), 2.5G (GPRS), 3G (WCDMA, TD-SCDMA, CDMA2000, UTMS), 4G (LTE), 4G + (LTE +), 5G, wiMax, and the like. Optionally, the server device 10c may also be in communication connection with the terminal device 10b and the smart lock 10a through bluetooth, wiFi, infrared, NFC, zigBee, or the like.
In this embodiment, the smart lock 10a may also be any hardware device having the functions of unlocking and locking, and may be disposed on various devices to control the use status of the device. In this embodiment, the smart lock 10a may be implemented by a combination of software and hardware devices. The intelligent lock 10a may be various types of locks, and may be installed in various application places. In this embodiment, the intelligent lock 10a may be a door lock, a car lock, a cabinet lock, a lock on a shared vehicle, a lock on a shared fitness device, or a lock on a locker in a public place. For example, the smart lock 10a may be a lock on a public locker of a supermarket, a mall, a court, or the like, but is not limited thereto.
In the embodiment of the present application, the execution logic of the intelligent lock 10a may be completed by the intelligent lock 10a, or the intelligent lock 10a may be accessed to a local electronic device, and the local electronic device is connected to the intelligent lock 10a in a wired or wireless manner and completed by the local electronic device and the intelligent lock 10a in a matching manner. The local electronic device may be, but is not limited to, a server, a router, a gateway, and the like, which are connected to the smart lock 10a in a wired or wireless manner.
In this embodiment, the server device 10c is a computer device capable of managing the smart lock, responding to the service request of the terminal device 10b, and providing services related to the smart lock management for the user, and generally has the capability of undertaking and guaranteeing the services. The server device 10c may be a single server device, a cloud server array, or a Virtual Machine (VM) running in the cloud server array. In addition, the server device may also refer to other computing devices with corresponding service capabilities, such as a terminal device (running a service program) such as a computer. In this embodiment, the server device 10c stores identification information of at least one smart lock 10a and a corresponding location of each smart lock.
In this embodiment, the terminal device 10b refers to a computer device used by a user and having functions of computing, accessing internet, communicating and the like required by the user, and may be, for example, a smart phone, a tablet computer, a personal computer, a wearable device and the like. The terminal device 10b typically comprises at least one processing unit and at least one memory. The number of processing units and memories depends on the configuration and type of the terminal device 10 b. The Memory may include volatile, such as RAM, non-volatile, such as Read-Only Memory (ROM), flash Memory, etc., or both. The memory typically stores an Operating System (OS), one or more application software, for example, smart lock service software corresponding to the server device 10c, and may also store program data and the like. In addition to the processing unit and the memory, the terminal device 10b may also include a network card chip, an IO bus, an audio/video component, and other basic configurations. Optionally, depending on the implementation of the terminal device 10b, the terminal device 10b may also include some peripheral devices, such as a keyboard, a mouse, a stylus, a printer, etc. These peripheral devices are well known in the art and will not be described in detail herein.
In the present embodiment, for convenience of description and distinction, the smart lock requested to be controlled by the terminal device 10b in at least one smart lock 10a is defined as the smart lock 10a1 to be controlled. In this embodiment, the terminal device 10b may send an intelligent lock control request to the server device. The smart lock control request packet includes identification information of the smart lock 10a1 to be controlled and a designated state of the smart lock 10a1 to be controlled. Alternatively, the designated state of the smart lock 10a1 to be controlled may be an open state or a closed state. If the specified state is the opening state, the terminal device 10b requests to open the intelligent lock 10a1 to be controlled; if the specified state is the closing state, it means that the terminal device 10b requests to close the intelligent lock 10a1 to be controlled.
Accordingly, the server device 10c receives the intelligent lock control request, and determines the position of the intelligent lock 10a1 to be controlled according to the identification information of the intelligent lock 10a1 to be controlled in the intelligent lock control request. Then, the server device 10c determines whether the terminal device 10b has the authority to control the smart lock 10a1 to be controlled according to the position of the smart lock 10a1 to be controlled and the position of the terminal device 10b itself provided. If the server-side device 10c determines that the terminal device 10b has the authority to control the intelligent lock 10a1 to be controlled, a control instruction is sent to the intelligent lock 10a1 to be controlled to control the intelligent lock 10a to be controlled to adjust the state of the intelligent lock to be controlled to the designated state. Accordingly, the smart lock to be controlled 10a1 receives the control command, and adjusts its state to a designated state according to the control command.
Optionally, if the specified state is an open state, the server device 10c sends an unlocking instruction to the intelligent lock 10a1 to be controlled to control the intelligent lock 10a1 to be controlled to unlock when it is determined that the terminal device 10b has the authority to control the intelligent lock 10a1 to be controlled; if the specified state is a closed state, the server device 10c sends a lock closing instruction to the intelligent lock to be controlled 10a1 to control the intelligent lock to be controlled 10a1 to close the lock when it is determined that the terminal device 10b has the authority to control the intelligent lock to be controlled 10a1.
Correspondingly, if the server device 10c determines that the terminal device 10b does not have the authority to control the intelligent lock 10a1 to be controlled, the server device does not send a control instruction to the intelligent lock 10a1 to be controlled, and the intelligent lock 10a1 to be controlled is not controlled by the terminal device 10 b.
In the intelligent lock control system provided by this embodiment, the server device determines whether the terminal to be verified has the authority to control the intelligent lock to be controlled according to the position of the terminal to be verified and the position of the intelligent lock to be controlled; and under the condition that the terminal to be verified has the control authority, the intelligent lock to be controlled is controlled to adjust the state of the intelligent lock to be controlled. The intelligent lock control mode avoids conversation between the terminal to be verified and the intelligent lock, reduces the risk of controlling the intelligent lock by the imitation terminal, and is further favorable for improving the safety of intelligent lock control.
In some embodiments, as shown in FIG. 1b, at least one smart lock 10a may broadcast a wireless signal carrying its own identification information. Accordingly, the terminal device 10b may receive the wireless signal from the at least one smart lock 10 a. Accordingly, the terminal device 10b may determine the smart lock 10a1 to be controlled from the at least one smart lock 10a according to the wireless signal it receives. Optionally, the terminal device 10b may select, according to the strength of the received wireless signal sent by the at least one intelligent lock, the intelligent lock 10a1 to be controlled on the intelligent lock seat corresponding to the wireless signal with the strongest strength, and analyze the identification information of the intelligent lock 10a1 to be controlled from the wireless signal of the intelligent lock 10a1 to be controlled.
Further, in some application scenarios, it is contemplated that multiple smart locks may be identical. The user may not be able to determine whether the smart lock he or she is about to open is the smart lock he or she is bound to. For example, for the locks on the lockers in some public places such as shopping malls, supermarkets, court, gym, etc., it is difficult for the user to distinguish whether the locker to be opened is the user's own locker. In this case, if the user tentatively requests to unlock the smart lock on the locker each time, the locker may not be unlocked, which undoubtedly brings inconvenience to the user. Based on this, a self authority check function can be added on the terminal device 10b side, that is, the terminal device 10b can determine whether the terminal device has the authority to control the intelligent lock 10a1 according to the identification information of the intelligent lock to be controlled and the identification information of the intelligent lock bound to the terminal device, and send an intelligent lock control request to the server device 10c under the condition that the terminal device determines that the terminal device has the authority to control the intelligent lock 10a1. In this way, the probability that the terminal device 10b erroneously issues the smart lock control request can be reduced, thereby contributing to improvement of convenience in unlocking by the user.
In these application scenarios, when the terminal device 10b uses the smart lock, it may further send a smart lock use request to the server device 10c, where the smart lock use request includes identification information of the smart lock to be bound. Accordingly, the server device 10c receives the intelligent lock control request, and binds the intelligent lock to be bound with the terminal device 10 b.
In the embodiment of the present application, the intelligent lock control request sent by the terminal device 10b to the server device 10c carries the specified state of the intelligent lock to be controlled. The terminal device 10b may obtain the designated state of the smart lock 10a1 to be controlled. In some embodiments, a smart lock control Application (APP) is installed on the terminal device 10 b. When a user wants to control the intelligent lock 10a1 to be controlled, an icon corresponding to the intelligent lock control APP can be triggered on the terminal device 10b, and accordingly, the terminal device 10b responds to the operation of triggering the icon corresponding to the intelligent lock control APP by the user and displays an intelligent lock control interface for the user. Optionally, the intelligent lock control interface includes: and an intelligent lock state selection control. The user can select the state of the intelligent lock 10a1 to be controlled through the selection control. Accordingly, the terminal device 10b determines the state selected by the user as the specified state of the smart lock to be controlled 10a1 in response to the user's selection operation of the state of the smart lock to be controlled 10a1. For example, if the user wants to unlock the smart lock 10a1 to be controlled, the user may select the unlock state, and the terminal device 10b uses the unlock state as the designated state of the smart lock 10a1 to be controlled.
In practical application, if the user gradually leaves the to-be-controlled intelligent lock 10a1, which generally means that the user leaves, it indicates that the intelligent lock needs to be closed; if the user gets closer to the smart lock 10a1 to be controlled, it is generally indicated that the smart lock needs to be unlocked. Based on this, the terminal device 10b may also determine the designated state of the smart lock 10a1 to be controlled according to the received strength change of the wireless signal sent by the smart lock to be controlled.
Further, the wireless signal received by the terminal device 10b has time stamp information. If the strength of the wireless signal sent by the intelligent lock to be controlled 10a1 and received by the terminal device 10b is in an increasing trend along with the time, the designated state of the intelligent lock to be controlled is an open state. Accordingly, if the intensity of the wireless signal sent by the intelligent lock to be controlled 10a1 received by the terminal device 10b is in a decreasing trend along with time, the designated state of the intelligent lock to be controlled is the closed state.
In the embodiment of the present application, the terminal device 10b may also provide the server device 10c with its own location information. Alternatively, the terminal device 10b may carry its own location in the intelligent lock control request, and send the intelligent lock control request to the server device 10c. Accordingly, the server device 10c analyzes the position of the terminal device 10b from the smart lock control request.
Alternatively, the server device 10c transmits an address request to the terminal device 10b after receiving the smart lock control request. Accordingly, the terminal device 10b receives the address request, and returns its own location to the server device 10c according to the address request.
Further, the server device 10c may determine whether the terminal device 10b has the authority to control the smart lock 10a1 to be controlled according to the position of the smart lock 10a1 to be controlled and the position of the terminal device 10 b. Alternatively, the server device 10c may calculate the distance between the terminal device 10b and the smart lock 10a1 to be controlled according to the position of the smart lock 10a1 to be controlled and the position of the terminal device 10b itself provided. If the distance between the terminal device 10b and the intelligent lock 10a1 to be controlled is smaller than or equal to the set distance threshold, it is determined that the terminal device 10b has the authority to control the intelligent lock 10 to be controlled. Accordingly, if the distance between the terminal device 10b and the smart lock 10a1 to be controlled is greater than the set distance threshold, it is determined that the terminal device 10b does not have the authority to control the smart lock 10 to be controlled. The set distance threshold may be set according to a coverage range of the wireless signal sent by the smart lock 10a, and preferably, the set distance threshold belongs to the coverage range of the wireless signal sent by the smart lock 10 a. For example, if the coverage of the wireless signal emitted by the smart lock 10a is 5m, the set distance threshold may be any distance less than 5m, for example, 1m, 50cm, 20cm, and so on, but is not limited thereto. The smaller the set distance threshold is, the higher the safety is.
In some application scenarios, the smart lock 10a may be implemented as a transaction lock in a financial transaction. Such as a money transfer lock at a bank, etc. In this application scenario, the transaction lock is a virtual form of lock, i.e. similar to a payment password. In such an application scenario, a place where the terminal device 10b can pay may be set in advance, that is, the terminal device 10b can make payment within a certain security range. In such an application scenario, the server device 10c may check whether the current payment location of the terminal device 10b is within a preset safety range. If the determination result is yes, the server device 10c allows the terminal device 10b to perform the payment operation.
In some application scenarios, as shown in fig. 1b, the intelligent lock control system may further include: the management terminal 10d. The management terminal 10d may be a terminal device of a manager of a physical location where the smart lock 10a1 to be controlled is located. For example, for an application scenario such as a hotel, a court, a gym, etc., the management terminal 10d may be a terminal device of a foreground. For another example, for an application scenario of sharing an express delivery cabinet, the management terminal 10d may be a terminal device of an express delivery cabinet manager; and the like, but are not limited thereto. Accordingly, in some embodiments, if the server device 10c determines that the terminal device 10b does not have the authority to control the smart lock 10 to be controlled, a first prompt message may be sent to the management terminal 10d to prompt the smart lock manager that the terminal device 10b does not have the authority to control the smart lock 10a1 to be controlled, that is, prompt the smart lock manager that someone attempts to illegally control the smart lock 10a1.
In some embodiments, in order to further improve the security of the intelligent lock, after receiving the intelligent lock control request sent by the terminal device 10b, the server device 10c may further determine the current state of the intelligent lock 10a1 to be controlled according to the identification information of the intelligent lock 10a1 to be controlled; and judging whether the current state of the intelligent lock 10a1 to be controlled is a designated state, if so, sending a second prompt message to the management terminal 10d to prompt the intelligent lock manager that the terminal device 10b has no authority to control the intelligent lock 10a1 to be controlled, namely, prompting the intelligent lock manager that someone attempts to illegally control the intelligent lock 10a1 to be controlled. This is because: assuming that the designated state is an open state, if the to-be-controlled smart lock 10a1 is currently in the open state, it indicates that the to-be-controlled smart lock 10a1 is already opened by the terminal device bound thereto, and the terminal device 10b currently requesting to control the intelligent lock may be determined as an illegal terminal.
Further, in other embodiments, as shown in fig. 1b, after receiving the control instruction, the intelligent lock to be controlled 10a1 may further return feedback information to the server device 10c, where the feedback information includes information associated with the control instruction. Wherein, the associated information of the control instruction comprises: at least one of the sending time and the receiving time of the control command and the content contained in the control command, but not limited thereto. Accordingly, the server device 10c receives the feedback information and determines whether it has sent the control instruction according to the associated information of the control instruction. Further, if the server device 10c determines that it has not issued the control instruction, it issues a third prompt message to the management terminal 10d to prompt the intelligent lock associated person that the intelligent lock 10a1 to be controlled is illegally controlled. Therefore, even if the intelligent lock is illegally controlled by the illegal molecular counterfeiting server device, the legal server device 10c can determine the situation that the intelligent lock is illegally controlled in time, inform the intelligent lock manager as soon as possible and further improve the safety of the intelligent lock.
It should be noted that the content and the implementation form of the first prompt information, the second prompt information, and the third prompt information may be the same or different, and are not limited in this embodiment of the application.
In order to facilitate understanding of the intelligent lock control process provided by the above embodiments, an exemplary description is given below with reference to a signaling diagram in the intelligent lock control process shown in fig. 1 c. As shown in fig. 1c, the intelligent lock control process mainly includes the following steps:
step 1: the smart lock to be controlled 10a1 broadcasts a wireless signal containing its own identification information.
Step 2: the terminal device 10b receives the wireless signal, and determines whether or not it has the authority to control the intelligent lock 10a1 to be controlled according to the identification information of the intelligent lock 10a1 to be controlled and the identification information of the intelligent lock bound to itself. And if the judgment result is yes, step 3.
And 3, step 3: the terminal device 10b sends an intelligent lock control request to the server device 10c. The smart lock control request packet includes the identification information of the smart lock 10a1 to be controlled and the designated state of the smart lock 10a1 to be controlled, and step 4 is continuously executed.
And 4, step 4: the server device 10a1 receives the intelligent lock control request, and determines whether the current state of the intelligent lock 10a1 to be controlled is a designated state. If the judgment result is negative, executing the step 5; if yes, go to step 7.
And 5: the server device 10c sends an address request to the terminal device 10b and proceeds to step 6.
Step 6: the terminal device 10b receives the address request, returns its own location to the server device 10c according to the address request, and continues to execute step 8.
And 7: the server device 10c sends a second prompt message to the management terminal 10d to prompt the intelligent lock manager that the terminal device 10b has no authority to control the intelligent lock 10a1 to be controlled, that is, prompt the intelligent lock manager that someone attempts to illegally control the intelligent lock 10a1 to be controlled, and continues to execute step 8.
And 8: the server device 10c determines the position of the intelligent lock 10a1 to be controlled according to the identification information of the intelligent lock 10a1 to be controlled in the intelligent lock control request, and continues to execute step 9.
And step 9: the server device 10c determines whether the terminal device 10b has the authority to control the intelligent lock 10a1 to be controlled according to the position of the intelligent lock 10a1 to be controlled and the position of the terminal device 10b itself provided by the terminal device 10 b. If the server side device 10c determines that the terminal device 10b has the authority to control the intelligent lock 10a1 to be controlled, executing step 10; if the server device 10c determines that the terminal device 10b does not have the authority to control the intelligent lock 10a1 to be controlled, step 12 is executed.
Step 10: the server device 10c sends a control instruction to the intelligent lock to be controlled 10a1 to control the intelligent lock to be controlled 10a to adjust its state to a specified state, and continues to execute step 11.
Step 11: the intelligent lock to be controlled 10a1 receives the control instruction and adjusts the state of the intelligent lock to be controlled to be the designated state according to the control instruction; execution continues with step 13.
Step 12: the server device 10c sends a first prompt message to the management terminal 10d to prompt the intelligent lock manager that the terminal device 10b does not have the authority to control the intelligent lock 10a1 to be controlled, i.e. prompt the intelligent lock manager that someone attempts to illegally control the intelligent lock 10a1 to be controlled.
Step 13: the intelligent lock 10a1 to be controlled returns feedback information to the server device 10c, where the feedback information includes associated information of the control instruction. For the description of the control instruction association information, reference may be made to the relevant contents in the above embodiments, which are not described herein again.
Step 14: the server device 10c receives the feedback information and determines whether it has sent the control instruction according to the associated information of the control instruction. If the server device 10c determines that it has not issued the control command, step 15 is executed.
Step 15: the server device 10c sends a third prompt message to the management terminal 10d to prompt the intelligent lock associated person that the intelligent lock 10a1 to be controlled is illegally controlled.
It should be noted that, in the embodiment of the present application, as for step 4 and step 8, the steps may be executed in parallel or sequentially, and when the steps are executed sequentially, the order of execution is not limited, and fig. 1c only shows that step 4 and the associated step are executed first, and then step 8 is executed, but not limited thereto.
The intelligent lock control system provided by the embodiment of the application has higher safety. The safety of the intelligent lock control process is analyzed by combining several common potential safety hazards.
Potential safety hazard 1: a hacker may implant a trojan in the terminal device of a legitimate user, copy the APP in the terminal device 10b, and send an intelligent lock control request to the server device 10c. In this embodiment of the application, the server device 10c needs to determine whether to control the to-be-controlled smart lock to adjust its own state according to the position of the server device and the position of the to-be-controlled smart lock provided by the terminal device. In the potential safety hazard 1, the terminal device of the legal user provides the self position to the server device 10c, and the position is not generally within the set safety range of the controllable intelligent lock to be controlled, so that in the potential safety hazard, the server device 10b does not send a control instruction to the intelligent lock to be controlled, the risk of the potential safety hazard 1 is reduced, and the security of the intelligent lock is improved. In the potential safety hazard 1, if the terminal device of the legitimate user provides the server device 10c with a position within a set safety range in which the smart lock to be controlled can be controlled, it indicates that the legitimate user is near the smart lock to be controlled. Even if the intelligent lock to be controlled is opened by utilizing the potential safety hazard 1, a legal user can immediately find the intelligent lock.
Potential safety hazard 2: a hacker may attempt to open the smart lock to be controlled by using his/her own terminal device within the security range of the controllable smart lock. In the embodiment of the present application, in order to reduce the risk of occurrence of the potential safety hazard 2, when receiving the intelligent lock control request, the server device 10c may send an address request to the terminal device of the legitimate user, and the terminal device of the legitimate user may also send its own position to the server device 10c. Therefore, even if the position imitated by the hacker is within the safety range of the intelligent lock to be controlled, the server device 10c does not send a control instruction to the intelligent lock to be controlled because the server device 10c receives the 2 pieces of position information. Therefore, in the potential safety hazard 2, a hacker cannot control the intelligent lock to be controlled, and the safety of the intelligent lock can be further improved.
Potential safety hazard 3: a hacker may attempt to emulate a server-side device to control the smart lock. In the embodiment of the application, in order to reduce the potential safety hazard 3, the intelligent lock to be controlled can send feedback information to legal server-side equipment after being unlocked. And the legal server side equipment judges whether the legal server side equipment sends the control instruction or not according to the content associated with the control instruction in the feedback information. If the legal server device determines that the control instruction is not sent, the prompt message can be sent to the management terminal 10d or the terminal device of the legal user, so that an intelligent lock manager or the legal user can timely detect that the intelligent lock to be controlled is controlled illegally, and the safety is further improved.
It should be noted that, in the embodiment of the present application, the legitimate user of the smart lock to be controlled refers to: and the user has the control intelligent lock authority. In addition, in some embodiments, the server device 10c and the management terminal 10d may be the same physical device. For example, in a hotel scenario, the server device 10c and the management terminal 10d may be terminal devices of the foreground.
In addition to the system embodiment described above, the embodiment of the present application further provides an intelligent lock control method, which is respectively exemplarily described below from the perspective of the server device, the terminal device, and the intelligent lock.
Fig. 2 is a diagram of an intelligent lock control method according to an embodiment of the present application. The method is suitable for the server-side equipment. As shown in fig. 2, the method includes:
201. receiving an intelligent lock control request sent by a terminal to be verified; the intelligent lock control request comprises identification information of the intelligent lock to be controlled and an appointed state of the intelligent lock to be controlled.
202. And determining the position of the intelligent lock to be controlled according to the identification information of the intelligent lock to be controlled.
203. And determining whether the terminal to be verified has the authority to control the intelligent lock to be controlled or not according to the position of the intelligent lock to be controlled and the position of the terminal to be verified provided by the terminal to be verified.
204. And under the condition that the terminal to be verified has the authority of controlling the intelligent lock to be controlled, sending a control instruction to the intelligent lock to be controlled so as to control the intelligent lock to be controlled to adjust the state of the intelligent lock to be controlled to be the designated state.
Fig. 3 is a schematic flowchart of another intelligent lock control method according to an embodiment of the present application. The method is suitable for the intelligent lock. As shown in fig. 3, the method includes:
301. receiving a control instruction sent by server equipment; the control instruction is sent by the server-side equipment under the condition that the intelligent lock control request sent by the terminal to be verified confirms that the terminal to be verified has the authority to control the intelligent lock, and the intelligent lock control request comprises the appointed state of the intelligent lock.
302. And adjusting the self state to a specified state according to the control instruction.
First, the smart lock in fig. 3 is the smart lock to be controlled as described in fig. 2. In some places below, for ease of understanding and ease of description, the smart lock will be described as a smart lock to be controlled.
In the embodiment of the present application, the implementation forms of the intelligent lock, the terminal to be verified, and the server device and the communication modes among the three may all refer to the relevant contents of the above embodiments, and are not described herein again.
In the embodiment of the application, the terminal to be verified can send the intelligent lock control request to the server-side equipment. The intelligent lock control request packet contains identification information of the intelligent lock to be controlled and the designated state of the intelligent lock to be controlled. Alternatively, the designated state of the intelligent lock to be controlled can be an opening state or a closing state. If the specified state is an opening state, the terminal equipment requests to open the intelligent lock to be controlled; and if the designated state is the closing state, the terminal equipment requests to close the intelligent lock to be controlled.
Correspondingly, the server-side equipment receives the intelligent lock control request and determines the position of the intelligent lock to be controlled according to the identification information of the intelligent lock to be controlled in the intelligent lock control request. And then, the server side equipment determines whether the terminal equipment has the authority for controlling the intelligent lock to be controlled according to the position of the intelligent lock to be controlled and the position of the server side equipment provided by the terminal equipment. And if the server-side equipment determines that the terminal equipment has the authority of controlling the intelligent lock to be controlled, sending a control instruction to the intelligent lock to be controlled so as to control the intelligent lock to be controlled to adjust the state of the intelligent lock to be controlled to an appointed state. Correspondingly, the intelligent lock to be controlled receives the control instruction and adjusts the state of the intelligent lock to be controlled to be the designated state according to the control instruction.
Optionally, if the designated state is an open state, the server device sends an unlocking instruction to the intelligent lock to be controlled to control unlocking of the intelligent lock to be controlled under the condition that it is determined that the terminal device has the authority to control the intelligent lock to be controlled; if the designated state is a closed state, the server-side equipment sends a lock closing instruction to the intelligent lock to be controlled under the condition that the terminal equipment is determined to have the authority of controlling the intelligent lock to be controlled so as to control the intelligent lock to be controlled to close.
Correspondingly, if the server-side equipment determines that the terminal equipment does not have the authority to control the intelligent lock to be controlled, the server-side equipment does not send a control instruction to the intelligent lock to be controlled, and the intelligent lock to be controlled cannot be controlled by the terminal to be checked.
In the embodiment of the application, the server-side equipment determines whether the terminal to be verified has the authority to control the intelligent lock to be controlled or not according to the terminal to be verified and the position of the intelligent lock to be controlled; and under the condition that the terminal to be verified has the control authority, the intelligent lock to be controlled is controlled to adjust the state of the intelligent lock. The intelligent lock control mode avoids conversation between the terminal to be verified and the intelligent lock, reduces the risk of controlling the intelligent lock by the imitation terminal, and is further favorable for improving the safety of intelligent lock control.
Fig. 4 is a schematic flowchart of another intelligent lock control method provided in an embodiment of the present application. The method is suitable for the terminal equipment. As shown in fig. 4, the method includes:
401. and acquiring self identification information broadcasted by the intelligent lock to be controlled.
402. And determining whether the intelligent lock to be controlled has the authority to control according to the identification information of the intelligent lock to be controlled and the identification information of the bound intelligent lock.
403. And under the condition that the intelligent lock to be controlled has the authority, sending an intelligent lock control request to the server equipment, wherein the intelligent lock control request comprises identification information of the intelligent lock to be controlled and the appointed state of the intelligent lock to be controlled, so that the server equipment can determine whether to adjust the intelligent lock to be controlled to the appointed state.
In this embodiment, the terminal device in fig. 4 is the terminal to be verified in fig. 2 and fig. 3. In this embodiment, the to-be-controlled smart lock may broadcast a wireless signal carrying its own identification information. Correspondingly, in the embodiment of the application, the terminal to be verified can acquire the identification information of the intelligent lock to be controlled, and determine whether the terminal has the authority to control the intelligent lock to be controlled according to the identification information of the intelligent lock to be controlled and the identification information of the bound intelligent lock; and under the condition that the intelligent lock to be controlled is determined to have the authority, sending an intelligent lock control request to the server side equipment, wherein the intelligent lock control request comprises identification information of the intelligent lock to be controlled and the appointed state of the intelligent lock to be controlled, so that the server side equipment can determine whether to adjust the intelligent lock to be controlled to the appointed state.
In this embodiment, a self-permission verification function is added on the terminal device side, that is, the terminal device may determine whether the terminal device has a permission to control the intelligent lock to be controlled according to the identification information of the intelligent lock to be controlled and the identification information of the intelligent lock bound to the terminal device, and send an intelligent lock control request to the server device when determining that the terminal device has the permission to control the intelligent lock to be controlled. Therefore, the probability of the terminal equipment sending the intelligent lock control request by mistake can be reduced, and the unlocking convenience of the user is improved.
In some embodiments, the terminal device may receive wireless signals transmitted by multiple smart locks at the same time. In the embodiments of the present application, a plurality of fingers is 2 or more than 2. Based on the intelligent lock control method, the terminal equipment can determine the intelligent lock to be controlled from the plurality of intelligent locks according to the received wireless signals. Optionally, the terminal device may select the intelligent lock to be controlled on the intelligent lock seat corresponding to the wireless signal with the strongest intensity according to the intensity of the received wireless signal sent by the at least one intelligent lock, and analyze the identification information of the intelligent lock to be controlled from the wireless signal of the intelligent lock to be controlled.
Further, in some application scenarios, when a user uses the smart lock, the smart lock needs to be bound with a device therein in advance. For example, for locks on storage cabinets of public places such as shopping malls, supermarkets, court, gym and the like, when a user wants to use the locks, the user needs to bind the intelligent locks with the devices therein. Based on the method, the terminal device can send an intelligent lock use request to the server device, wherein the intelligent lock use request contains identification information of the intelligent lock to be bound. Correspondingly, the server side equipment receives the intelligent lock control request and binds the intelligent lock to be bound with the terminal equipment.
In the embodiment of the application, the designated state of the intelligent lock to be controlled is carried in the intelligent lock control request sent by the terminal device to the server device. The terminal equipment can acquire the designated state of the intelligent lock to be controlled. In some embodiments, an intelligent lock control Application (APP) is installed on the terminal device. When a user wants to control the intelligent lock to be controlled, an icon corresponding to the intelligent lock control APP can be triggered on the terminal equipment, and accordingly, the terminal equipment responds to the operation that the user triggers the icon corresponding to the intelligent lock control APP, and an intelligent lock control interface is displayed for the user. Optionally, the intelligent lock control interface includes: and the intelligent lock state selection control. The user can select the state of the intelligent lock to be controlled through the selection control. Correspondingly, the terminal equipment responds to the selection operation of the user on the state of the intelligent lock to be controlled, and the state selected by the user is determined as the specified state of the intelligent lock to be controlled. For example, if the user wants to unlock the smart lock to be controlled, the user may select the unlock state, and the unlock state is used as the designated state of the smart lock to be controlled by the terminal device.
In practical application, if the user gradually leaves the intelligent lock to be controlled, which generally means that the user leaves, it indicates that the intelligent lock needs to be closed; if the user gets closer to the intelligent lock to be controlled, the user generally indicates that the intelligent lock needs to be unlocked. Based on the method, the terminal equipment can also determine the designated state of the intelligent lock to be controlled according to the received strength change of the wireless signal sent by the intelligent lock to be controlled.
Further, the wireless signal received by the terminal device has time stamp information. If the intensity of the wireless signal sent by the intelligent lock to be controlled and received by the terminal equipment is in an increasing trend along with the time, the designated state of the intelligent lock to be controlled is an opening state. Correspondingly, if the intensity of the wireless signal sent by the intelligent lock to be controlled and received by the terminal equipment is in a weakening trend along with time, the designated state of the intelligent lock to be controlled is a closing state.
In the embodiment of the application, the terminal device can also provide the self position information to the server device. Optionally, the terminal device may carry its own location in the intelligent lock control request, and send the intelligent lock control request to the server device. Correspondingly, the server-side equipment analyzes the position of the terminal equipment from the intelligent lock control request.
Or after receiving the intelligent lock control request, the server device sends an address request to the terminal device. Correspondingly, the terminal equipment receives the address request and returns the position of the terminal equipment to the server equipment according to the address request.
Further, the server device may determine whether the terminal device has the authority to control the intelligent lock to be controlled according to the position of the intelligent lock to be controlled and the position of the terminal device. Optionally, the server device may calculate a distance between the terminal device and the intelligent lock to be controlled according to the position of the intelligent lock to be controlled and the position of the server device provided by the terminal device. And if the distance between the terminal equipment and the intelligent lock to be controlled is smaller than or equal to the set distance threshold, determining that the terminal equipment has the authority to control the intelligent lock to be controlled. Correspondingly, if the distance between the terminal equipment and the intelligent lock to be controlled is larger than the set distance threshold, it is determined that the terminal equipment does not have the authority to control the intelligent lock to be controlled. The set distance threshold can be set according to the coverage range of the wireless signal sent by the intelligent lock, and preferably, the set distance threshold belongs to the coverage range of the wireless signal sent by the intelligent lock. For example, if the coverage of the wireless signal emitted by the smart lock is 5m, the set distance threshold may be any distance less than 5m, for example, 1m, 50cm, 20cm, and so on, but is not limited thereto. The smaller the set distance threshold, the higher the safety.
In some application scenarios, the intelligent lock control system may further include: and managing the terminal. The management terminal can be terminal equipment of a manager of a physical place where the intelligent lock to be controlled is located. For example, for application scenarios such as hotels, ball courses, and gymnasiums, the management terminal may be a terminal device of a foreground. For another example, for an application scenario of a shared express cabinet, the management terminal may be a terminal device of an express cabinet manager; and the like, but are not limited thereto. Correspondingly, in some embodiments, if the server device determines that the terminal device does not have the authority to control the intelligent lock to be controlled, the server device may further send a first prompt message to the management terminal to prompt the intelligent lock manager that the terminal device does not have the authority to control the intelligent lock to be controlled, that is, prompt the intelligent lock manager that someone attempts to illegally control the intelligent lock to be controlled.
In some embodiments, in order to further improve the security of the intelligent lock, after receiving the intelligent lock control request sent by the terminal device, the server device may further determine the current state of the intelligent lock to be controlled according to the identification information of the intelligent lock to be controlled; and judging whether the current state of the intelligent lock to be controlled is a designated state, if so, sending second prompt information to the management terminal to prompt the intelligent lock manager that the terminal equipment has no authority to control the intelligent lock to be controlled, namely prompting the intelligent lock manager that someone attempts to illegally control the intelligent lock to be controlled. This is because: if the designated state is an open state, if the intelligent lock to be controlled is in the open state at present, it indicates that the intelligent lock to be controlled is opened by the terminal device bound with the intelligent lock to be controlled, and the terminal device currently requesting to control the intelligent lock can be determined as an illegal terminal.
Further, in other embodiments, after receiving the control instruction, the smart lock to be controlled may further return feedback information to the server device, where the feedback information includes information associated with the control instruction. Wherein, the associated information of the control instruction comprises: at least one of the sending time and the receiving time of the control command and the content contained in the control command, but not limited thereto. Correspondingly, the server-side equipment receives the feedback information and determines whether the server-side equipment sends the control instruction according to the associated information of the control instruction. Further, if the server device determines that the server device has not sent the control instruction, a third prompt message is sent to the management terminal to prompt the intelligent lock associated with the intelligent lock that the intelligent lock to be controlled is illegally controlled. Therefore, even if illegal molecules forge the server side equipment to illegally control the intelligent lock, the legal server side equipment can determine the condition that the intelligent lock is illegally controlled in time, and can inform an intelligent lock manager as soon as possible, so that the safety of the intelligent lock is further improved.
It should be noted that the content and the implementation form of the first prompt information, the second prompt information, and the third prompt information may be the same or different, and are not limited in this embodiment of the application.
It should be noted that the execution subjects of the steps of the methods provided in the above embodiments may be the same device, or different devices may be used as the execution subjects of the methods. For example, the execution subject of steps 401 and 402 may be device a; for another example, the execution subject of step 401 may be device a, and the execution subject of step 402 may be device B; and so on.
In addition, in some of the flows described in the above embodiments and the drawings, a plurality of operations are included in a specific order, but it should be clearly understood that the operations may be executed out of the order presented herein or in parallel, and the sequence numbers of the operations, such as 401, 402, etc., are merely used to distinguish various operations, and the sequence numbers themselves do not represent any execution order. Additionally, the flows may include more or fewer operations, and the operations may be performed sequentially or in parallel.
Accordingly, embodiments of the present application also provide a computer-readable storage medium storing computer instructions, which, when executed by one or more processors, cause the one or more processors to execute the server device to perform the steps of the method.
Accordingly, embodiments of the present application further provide a computer-readable storage medium storing computer instructions, which, when executed by one or more processors, cause the one or more processors to execute the steps of the method performed by the terminal device.
Accordingly, embodiments of the present application also provide a computer-readable storage medium storing computer instructions, which, when executed by one or more processors, cause the one or more processors to execute the smart lock to perform the steps of the method.
Fig. 5 is a schematic structural diagram of a server device according to an embodiment of the present application. As shown in fig. 5, the server device includes: a memory 50a, a processor 50b, and a communication component 50c; the memory 50a is used for storing the position of the intelligent lock and the computer program.
The processor 50b is coupled to the memory 50a for executing computer programs for: receiving an intelligent lock control request sent by a terminal to be verified through the communication component 50c; the intelligent lock control request comprises identification information of the intelligent lock to be controlled and an appointed state of the intelligent lock to be controlled; determining the position of the intelligent lock to be controlled in the stored positions of the intelligent lock according to the identification information of the intelligent lock to be controlled; determining whether the terminal to be verified has the authority to control the intelligent lock to be controlled or not according to the position of the intelligent lock to be controlled and the position of the terminal to be verified provided by the terminal to be verified; and under the condition that the terminal to be verified is determined to have the authority of controlling the intelligent lock to be controlled, sending a control instruction to the intelligent lock to be controlled through the communication component 50c so as to control the intelligent lock to be controlled to adjust the state of the intelligent lock to be controlled to be the designated state.
In some embodiments, the smart lock control request further comprises: and the position of the terminal to be verified.
In other embodiments, the processor 50b, before determining whether the terminal to be verified has the right to control the smart lock to be controlled, is further configured to: and sending an address request to the terminal to be verified through the communication component 50c, so that the terminal to be verified returns to the position of the terminal to be verified according to the address request.
In still other embodiments, the processor 50b, when determining whether the terminal to be verified has the right to control the smart lock to be controlled, is specifically configured to: calculating the distance between the terminal to be checked and the intelligent lock to be controlled according to the position of the intelligent lock to be controlled and the position of the intelligent lock to be checked provided by the terminal to be checked; and if the distance between the terminal to be verified and the intelligent lock to be controlled is smaller than or equal to the set distance threshold, determining that the terminal to be verified has the authority for controlling the intelligent lock to be controlled.
Accordingly, the processor 50b is further configured to: if the distance between the terminal to be verified and the intelligent lock to be controlled is larger than the set distance threshold, first prompt information is sent to the management terminal to prompt an intelligent lock manager that the terminal to be verified does not have the authority to control the intelligent lock to be controlled.
In still other embodiments, the processor 50b, after receiving the intelligent lock control request sent by the terminal to be verified through the communication component 50c, is further configured to: determining the current state of the intelligent lock to be controlled according to the identification information of the intelligent lock to be controlled; judging whether the current state is a designated state; if the judgment result is yes, second prompt information is sent to the management terminal through the communication component 50c to prompt the intelligent lock manager that the to-be-verified terminal does not have the authority to control the to-be-controlled intelligent lock.
In some other embodiments, the processor 50b, after sending the control instruction to the smart lock to be controlled through the communication component 50c, is further configured to: receiving feedback information sent by the intelligent lock to be controlled through the communication component 50c, wherein the feedback information comprises associated information of the control instruction, so that the server-side equipment can determine whether the server-side equipment sends the control instruction to the intelligent lock to be controlled; and under the condition that the control instruction is not sent to the intelligent lock to be controlled, sending third prompt information to the management terminal through the communication component 50c to prompt an intelligent lock manager that the intelligent lock to be controlled is illegally controlled.
Optionally, before receiving the intelligent lock control request sent by the terminal to be verified through the communication component 50c, the processor 50b is further configured to: receiving an intelligent lock use request sent by a terminal to be verified through the communication component 50c, wherein the intelligent lock use request contains identification information of an intelligent lock to be bound; and binding the intelligent lock to be bound and the terminal to be checked according to the identification information of the intelligent lock to be bound.
It should be noted that, in the present embodiment, the designated state is an off state or an on state.
In some optional embodiments, as shown in fig. 5, the server device may further include: power supply assembly 50d, etc. In some embodiments, the server device may also include optional components such as a display screen 50e, an audio component 50f, and the like. For example, the server device is a terminal device such as a computer. Only some of the components are schematically shown in fig. 5, which does not mean that the server device must include all of the components shown in fig. 5, nor that the server device only includes the components shown in fig. 5.
The server device provided by this embodiment can determine whether the terminal to be verified has the authority to control the intelligent lock to be controlled according to the terminal to be verified and the position of the intelligent lock to be controlled; and under the condition that the terminal to be verified has the control authority, the intelligent lock to be controlled is controlled to adjust the state of the intelligent lock to be controlled. The intelligent lock control mode avoids conversation between the terminal to be verified and the intelligent lock, reduces the risk of controlling the intelligent lock by the imitation terminal, and is further favorable for improving the safety of intelligent lock control.
Fig. 6 is a schematic structural diagram of a terminal device according to an embodiment of the present application. As shown in fig. 6, the terminal device includes: a memory 60a, a processor 60b, and a communication component 60c; the memory 60a is used for storing identification information of the bound intelligent lock and computer programs.
In the present embodiment, the processor 60b is coupled to the memory 60a for executing a computer program for: acquiring self identification information broadcasted by the intelligent lock to be controlled; determining whether the intelligent lock to be controlled has the authority to control according to the identification information of the intelligent lock to be controlled and the identification information of the bound intelligent lock; under the condition that the intelligent lock to be controlled has the authority, an intelligent lock control request is sent to the server device through the communication component 60c, wherein the intelligent lock control request comprises identification information of the intelligent lock to be controlled and the appointed state of the intelligent lock to be controlled, so that the server device can determine whether to adjust the intelligent lock to be controlled to the appointed state. Optionally, the specified state is an off state or an on state.
In some embodiments, the smart lock control request further comprises: the location of the terminal device.
In other embodiments, the processor 60b, after issuing the intelligent lock control request to the server device, is further configured to: receiving an address request sent by the server device through the communication component 60c; and returning the position of the terminal according to the address request so that the server-side equipment can determine whether the terminal equipment has the authority of controlling the intelligent lock to be controlled.
In still other embodiments, if the terminal device receives the identification information of multiple smart lock broadcasts, the processor 60b, when acquiring the identification information of the smart lock broadcast to be controlled, is specifically configured to: according to the strength of the wireless signals sent by the intelligent locks, selecting the intelligent lock corresponding to the wireless signal with the strongest strength as the intelligent lock to be controlled; the wireless signals sent by the intelligent locks contain respective identification information; and analyzing the identification information of the intelligent lock to be controlled from the wireless signal of the intelligent lock to be controlled.
Optionally, the processor 60b, before issuing the intelligent lock control request to the server device through the communication component 60c, is further configured to: determining the designated state of the intelligent lock to be controlled according to the received strength change of the wireless signal sent by the intelligent lock to be controlled; or, in response to the selection operation of the user on the state of the intelligent lock to be controlled, the state selected by the user is determined as the specified state.
Further, when determining the designated state of the smart lock, the processor 60b is specifically configured to: if the strength of the received wireless signal sent by the intelligent lock to be controlled is in an enhancement trend along with the time, determining that the designated state of the intelligent lock to be controlled is an opening state; and if the intensity of the received wireless signal sent by the intelligent lock to be controlled is in a decreasing trend along with the time, determining that the designated state of the intelligent lock is a closed state.
Optionally, the processor 60b is further configured to, before acquiring the identification information of itself broadcasted by the smart lock to be controlled: and sending an intelligent lock use request to the server device through the communication component 60c, wherein the intelligent lock use request contains identification information of the intelligent lock to be bound, so that the server device can bind the intelligent lock to be bound with the terminal device.
In some optional embodiments, as shown in fig. 6, the terminal device may further include: display 60d, power supply 60e, audio 60f, and the like. Only some of the components are schematically shown in fig. 6, and it does not mean that the terminal device must include all of the components shown in fig. 6, nor that the terminal device can include only the components shown in fig. 6.
The terminal device provided by this embodiment adds its own authority check function, that is, the terminal device can determine whether it has the authority to control the intelligent lock to be controlled according to the identification information of the intelligent lock to be controlled and the identification information of the intelligent lock bound to it, and send an intelligent lock control request to the server device when it is determined that it has the authority to control the intelligent lock to be controlled. Therefore, the probability of mistakenly sending the intelligent lock control request by the terminal equipment can be reduced, and the unlocking convenience of a user can be improved.
Fig. 7 is a schematic structural diagram of an electronic device according to an embodiment of the present application. As shown in fig. 7, the electronic apparatus includes: a memory 70a, a processor 70b, and a communication component 70c; the memory 70a is used for storing computer programs.
The processor 70b is coupled to the memory 70a for executing a computer program for: receiving a control instruction sent by the server device through the communication component 70c; the control instruction is sent by the server side equipment under the condition that the server side equipment determines that the terminal to be verified has the authority for controlling the electronic equipment according to the intelligent lock control request sent by the terminal to be verified, wherein the intelligent lock control request comprises the appointed state of the intelligent lock; and adjusting the electronic equipment to a specified state according to the control instruction.
In some embodiments, the processor 70b, before receiving the control instruction sent by the server device, is further configured to: and broadcasting a wireless signal containing the identification information of the terminal to be verified through the communication component 70c, so that the terminal to be verified can determine whether to send an intelligent lock control request to the server side equipment according to the identification information.
In other embodiments, the processor 70b, after adjusting its state to the specified state, is further configured to: and returning feedback information to the server-side equipment through the communication component 70c, wherein the feedback information contains the relevant information of the control instruction, so that the server-side equipment can determine whether the server-side equipment sends the control instruction to the intelligent lock.
It should be noted that the electronic device provided in this embodiment may be implemented in various forms, for example, the electronic device may be a shared vehicle having functions of unlocking and locking, may also be a storage cabinet having functions of unlocking and locking, may also be a fitness device having functions of unlocking and locking, and the like, but is not limited thereto.
In some optional embodiments, as shown in fig. 7, the smart lock may further include: optional components such as a machine body S70, a display 70d, a power supply component 70e, an audio component 70f, etc. Alternatively, the machine body S70 may include: but not limited to, the movable and fixed portions of the latch, and a control assembly 70g that controls the opening and closing of the movable and fixed portions. Only some of the components are schematically shown in fig. 7, and it is not meant that the smart lock must include all of the components shown in fig. 7, nor that the smart lock only includes the components shown in fig. 7.
The electronic device provided by this embodiment can receive the control instruction of the server device, and adjust its own state to a designated state according to the control instruction. The intelligent lock control mode avoids conversation between the terminal to be verified and the intelligent lock, reduces the risk of controlling the intelligent lock by the imitation terminal, and is further favorable for improving the safety of intelligent lock control.
In embodiments of the present application, the memory is used to store computer programs and may be configured to store various other data to support operations on the device on which it resides. Wherein the processor may execute a computer program stored in the memory to implement the corresponding control logic. The memory may be implemented by any type or combination of volatile and non-volatile memory devices, such as Static Random Access Memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable read-only memory (EPROM), programmable read-only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic or optical disks.
In embodiments of the present application, the communication component is configured to facilitate wired or wireless communication between the device in which it is located and other devices. The device where the communication component is located can access a wireless network based on a communication standard, such as WiFi,2G or 3G,4G,5G or a combination thereof. In an exemplary embodiment, the communication component receives a broadcast signal or broadcast related information from an external broadcast management system via a broadcast channel. In an exemplary embodiment, the communication component may also be implemented based on Near Field Communication (NFC) technology, radio Frequency Identification (RFID) technology, infrared data association (IrDA) technology, ultra Wideband (UWB) technology, bluetooth (BT) technology, or other technologies.
In the embodiment of the present application, the display screen may include a Liquid Crystal Display (LCD) and a Touch Panel (TP). If the screen includes a touch panel, the screen may be implemented as a touch screen to receive an input signal from a user. The touch panel includes one or more touch sensors to sense touch, slide, and gestures on the touch panel. The touch sensor may not only sense the boundary of a touch or slide action, but also detect the duration and pressure associated with the touch or slide operation.
In embodiments of the present application, a power supply component is configured to provide power to various components of the device in which it is located. The power components may include a power management system, one or more power supplies, and other components associated with generating, managing, and distributing power for the device in which the power component is located.
In embodiments of the present application, the audio component may be configured to output and/or input an audio signal. For example, the audio component includes a Microphone (MIC) configured to receive an external audio signal when the device in which the audio component is located is in an operational mode, such as a call mode, a recording mode, and a voice recognition mode. The received audio signal may further be stored in a memory or transmitted via a communication component. In some embodiments, the audio assembly further comprises a speaker for outputting audio signals. For example, for an electronic device with language interaction functionality, voice interaction with a user may be enabled through an audio component, and so forth.
It should be noted that, the descriptions of "first", "second", etc. in this document are used for distinguishing different messages, devices, modules, etc., and do not represent a sequential order, nor do they limit the types of "first" and "second".
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In a typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include forms of volatile memory in a computer readable medium, random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of a computer-readable medium.
Computer-readable media, including both permanent and non-permanent, removable and non-removable media, may implement the information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), static Random Access Memory (SRAM), dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), read Only Memory (ROM), electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrases "comprising a," "8230," "8230," or "comprising" does not exclude the presence of other like elements in a process, method, article, or apparatus comprising the element.
The above description is only an example of the present application and is not intended to limit the present application. Various modifications and changes may occur to those skilled in the art to which the present application pertains. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the scope of the claims of the present application.

Claims (29)

1. An intelligent lock control system, comprising: the system comprises at least one intelligent lock, terminal equipment and server-side equipment; wherein, the first and the second end of the pipe are connected with each other,
the terminal device is used for sending an intelligent lock control request to the server device, wherein the intelligent lock control request comprises identification information of the intelligent lock to be controlled and an appointed state of the intelligent lock to be controlled; the intelligent lock to be controlled is an intelligent lock which is requested to be controlled by the terminal equipment in the at least one intelligent lock, and the specified state is determined according to the intensity change of the wireless signal sent by the intelligent lock to be controlled and received by the terminal equipment, wherein if the intensity of the wireless signal sent by the intelligent lock to be controlled and received by the terminal equipment is in an increasing trend along with time, the specified state of the intelligent lock to be controlled is an opening state, and if the intensity of the wireless signal sent by the intelligent lock to be controlled and received by the terminal equipment is in a decreasing trend along with time, the specified state of the intelligent lock to be controlled is a closing state;
the server side equipment is used for receiving the intelligent lock control request; determining the position of the intelligent lock to be controlled according to the identification information of the intelligent lock to be controlled; determining whether the terminal equipment has the authority to control the intelligent lock to be controlled or not according to the position of the intelligent lock to be controlled and the position of the intelligent lock to be controlled provided by the terminal equipment; under the condition that the terminal equipment is determined to have the authority of controlling the intelligent lock to be controlled, sending a control instruction to the intelligent lock to be controlled so as to control the intelligent lock to be controlled to adjust the state of the intelligent lock to be controlled to the specified state;
the intelligent lock is used for broadcasting a wireless signal carrying identification information of the intelligent lock;
the terminal device is further configured to: before sending an intelligent lock control request to the server-side equipment, determining the intelligent lock to be controlled according to a received wireless signal;
the terminal device is further configured to:
after the intelligent lock to be controlled is determined, determining whether the intelligent lock to be controlled has the authority to control the intelligent lock to be controlled according to the identification information of the intelligent lock to be controlled and the identification information of the bound intelligent lock;
and sending an intelligent lock control request to the server side equipment under the condition of determining that the intelligent lock to be controlled has the authority.
2. The system of claim 1, wherein the server device is further configured to: before determining whether the terminal equipment has the authority of controlling the intelligent lock, sending an address request to the terminal equipment;
the terminal device is configured to: and returning the position of the self according to the address request.
3. The system of claim 1, wherein when determining whether the terminal to be verified has the right to control the smart lock to be controlled, the server device is specifically configured to:
calculating the distance between the terminal equipment and the intelligent lock to be controlled according to the position of the intelligent lock to be controlled and the position of the intelligent lock to be controlled provided by the terminal equipment;
and if the distance between the terminal equipment and the intelligent lock to be controlled is smaller than or equal to a set distance threshold value, determining that the terminal equipment has the authority to control the intelligent lock to be controlled.
4. The system of claim 3, further comprising: a management terminal;
the server device is further configured to: if the distance between the terminal equipment and the intelligent lock to be controlled is larger than a set distance threshold value, first prompt information is sent to the management terminal to prompt an intelligent lock manager that the terminal equipment does not have the authority to control the intelligent lock to be controlled.
5. The system according to any one of claims 1-4, wherein the smart lock to be controlled is further configured to: after the self state is adjusted to the designated state, feedback information is returned to the server side equipment, wherein the feedback information comprises the relevant information of the control instruction;
the server device is configured to: and determining whether the control instruction is sent to the intelligent lock according to the feedback information.
6. The system according to any of claims 1-4, wherein the terminal device is further configured to: before the intelligent lock to be controlled is determined, sending an intelligent lock using request to the server-side equipment, wherein the intelligent lock using request contains identification information of the intelligent lock to be bound;
the server device is configured to: and binding the intelligent lock to be bound and the terminal equipment according to the identification information of the intelligent lock to be bound.
7. An intelligent lock control method is suitable for server-side equipment and is characterized by comprising the following steps:
receiving an intelligent lock control request sent by a terminal to be verified; the intelligent lock control request comprises identification information of the intelligent lock to be controlled and an appointed state of the intelligent lock to be controlled, the appointed state is determined according to intensity change of a wireless signal sent by the intelligent lock to be controlled and received by the terminal to be verified, if the intensity of the wireless signal sent by the intelligent lock to be controlled and received by the terminal to be verified is in an enhancement trend along with time, the appointed state of the intelligent lock to be controlled is an opening state, and if the intensity of the wireless signal sent by the intelligent lock to be controlled and received by the terminal to be verified is in a reduction trend along with time, the appointed state of the intelligent lock to be controlled is a closing state;
determining the position of the intelligent lock to be controlled according to the identification information of the intelligent lock to be controlled;
determining whether the terminal to be verified has the authority to control the intelligent lock to be controlled or not according to the position of the intelligent lock to be controlled and the position of the terminal to be verified provided by the terminal to be verified;
and under the condition that the to-be-verified terminal is determined to have the authority of controlling the to-be-controlled intelligent lock, sending a control instruction to the to-be-controlled intelligent lock so as to control the to-be-controlled intelligent lock to adjust the state of the to-be-controlled intelligent lock to the specified state.
8. The method according to claim 7, wherein the intelligent lock control request further comprises: and the position of the terminal to be verified.
9. The method according to claim 7, before determining whether the terminal to be verified has the right to control the smart lock according to the position of the smart lock to be controlled and the position of the terminal to be verified, the method further comprising:
and sending an address request to the terminal to be verified so that the terminal to be verified returns to the position of the terminal to be verified according to the address request.
10. The method according to claim 7, wherein the determining whether the terminal to be verified has the authority to control the smart lock to be controlled according to the position of the smart lock to be controlled and the position of the terminal to be verified, includes:
calculating the distance between the terminal to be checked and the intelligent lock to be controlled according to the position of the intelligent lock to be controlled and the position of the intelligent lock to be controlled, which is provided by the terminal to be checked;
and if the distance between the terminal to be verified and the intelligent lock to be controlled is smaller than or equal to a set distance threshold value, determining that the terminal to be verified has the authority to control the intelligent lock to be controlled.
11. The method of claim 10, further comprising:
if the distance between the terminal to be verified and the intelligent lock to be controlled is larger than a set distance threshold value, first prompt information is sent to a management terminal to prompt an intelligent lock manager that the terminal to be verified does not have the authority to control the intelligent lock to be controlled.
12. The method according to claim 7, wherein after receiving the intelligent lock control request sent by the terminal to be verified, the method further comprises:
determining the current state of the intelligent lock to be controlled according to the identification information of the intelligent lock to be controlled;
judging whether the current state is the designated state;
if the judgment result is yes, second prompt information is sent to the management terminal to prompt an intelligent lock manager that the to-be-verified terminal does not have the authority to control the to-be-controlled intelligent lock.
13. The method according to any one of claims 7-12, wherein after sending a control instruction to the smart lock to be controlled, the method further comprises:
receiving feedback information sent by the intelligent lock to be controlled, wherein the feedback information comprises the associated information of the control instruction, so that the server-side equipment can determine whether the server-side equipment sends the control instruction to the intelligent lock to be controlled; and
and under the condition that the control instruction is not sent to the intelligent lock to be controlled, sending third prompt information to a management terminal to prompt an intelligent lock manager that the intelligent lock to be controlled is illegally controlled.
14. The method of any of claims 7-12, wherein the specified state is an off state or an on state.
15. The method according to any one of claims 7-12, further comprising, before receiving the intelligent lock control request sent by the terminal to be verified:
receiving an intelligent lock use request sent by the terminal to be checked, wherein the intelligent lock use request contains identification information of an intelligent lock to be bound;
and binding the intelligent lock to be bound and the terminal to be checked according to the identification information of the intelligent lock to be bound.
16. An intelligent lock control method is suitable for terminal equipment and is characterized by comprising the following steps:
acquiring self identification information broadcasted by the intelligent lock to be controlled;
determining whether the intelligent lock to be controlled has the authority to control according to the identification information of the intelligent lock to be controlled and the identification information of the bound intelligent lock;
the intelligent lock control method comprises the steps that an intelligent lock control request is sent to a server side device under the condition that the intelligent lock to be controlled has the authority, the intelligent lock control request comprises identification information of the intelligent lock to be controlled and an appointed state of the intelligent lock to be controlled, so that the server side device can determine whether to adjust the intelligent lock to be controlled to the appointed state or not, the appointed state is determined according to the strength change of a wireless signal sent by the intelligent lock to be controlled received by a terminal device, if the strength of the wireless signal sent by the intelligent lock to be controlled received by the terminal device is in an increasing trend along with time, the appointed state of the intelligent lock to be controlled is an opening state, and if the strength of the wireless signal sent by the intelligent lock to be controlled received by the terminal device is in a decreasing trend along with time, the appointed state of the intelligent lock to be controlled is a closing state.
17. The method according to claim 16, wherein the intelligent lock control request further comprises: a location of the terminal device.
18. The method according to claim 16, further comprising, after issuing the intelligent lock control request to the server device:
receiving an address request sent by the server-side equipment; and
and returning the position of the server side equipment according to the address request so that the server side equipment can determine whether the terminal equipment has the authority of controlling the intelligent lock to be controlled.
19. The method according to claim 16, wherein if the self identification information broadcasted by a plurality of smart locks is received, the obtaining the self identification information broadcasted by the smart lock to be controlled comprises:
according to the strength of the wireless signals sent by the intelligent locks, selecting the intelligent lock corresponding to the wireless signal with the strongest strength as the intelligent lock to be controlled; the wireless signals sent by the intelligent locks comprise respective identification information;
and analyzing the identification information of the intelligent lock to be controlled from the wireless signal of the intelligent lock to be controlled.
20. The method according to claim 19, wherein prior to issuing the intelligent lock control request to the server device, the method further comprises:
determining the designated state of the intelligent lock to be controlled according to the received strength change of the wireless signal sent by the intelligent lock to be controlled; alternatively, the first and second liquid crystal display panels may be,
and in response to the selection operation of the user on the state of the intelligent lock to be controlled, determining the state selected by the user as the specified state.
21. The method according to claim 20, wherein the determining the designated state of the smart lock according to the received strength change of the wireless signal sent by the smart lock to be controlled comprises:
if the strength of the received wireless signal sent by the intelligent lock to be controlled is in an increasing trend along with the time, determining that the designated state of the intelligent lock to be controlled is an opening state;
and if the strength of the received wireless signal sent by the intelligent lock to be controlled is in a decreasing trend along with the time, determining that the designated state of the intelligent lock is a closed state.
22. The method according to any one of claims 16 to 21, further comprising, before obtaining the own identification information broadcasted by the smart lock to be controlled:
and sending an intelligent lock use request to the server-side equipment, wherein the intelligent lock use request contains identification information of the intelligent lock to be bound, so that the server-side equipment can bind the intelligent lock to be bound and the terminal equipment.
23. An intelligent lock control method is suitable for an intelligent lock, and is characterized by comprising the following steps:
receiving a control instruction sent by server equipment; the control instruction is sent by the server side equipment under the condition that the server side equipment determines that the to-be-verified terminal has the authority to control the intelligent lock according to an intelligent lock control request sent by the to-be-verified terminal, the intelligent lock control request comprises an appointed state of the intelligent lock, and the appointed state is determined according to the intensity change of a wireless signal sent by the to-be-verified terminal and received by the to-be-verified terminal, wherein if the intensity of the wireless signal sent by the to-be-verified intelligent lock and received by the to-be-verified terminal is in an increasing trend along with time, the appointed state of the to-be-controlled intelligent lock is an open state, and if the intensity of the wireless signal sent by the to-be-verified terminal and received by the to-be-verified terminal is in a decreasing trend along with time, the appointed state of the to-be-controlled intelligent lock is a closed state;
and adjusting the self state to the specified state according to the control instruction.
24. The method of claim 23, wherein before receiving the control command sent by the server device, the method further comprises:
and broadcasting a wireless signal containing the identification information of the terminal to be verified so that the terminal to be verified can determine whether to send an intelligent lock control request to the server equipment according to the identification information.
25. The method of claim 23, further comprising, after adjusting the self status to the designated status:
and returning feedback information to the server-side equipment, wherein the feedback information comprises the associated information of the control instruction, so that the server-side equipment can determine whether the server-side equipment sends the control instruction to the intelligent lock.
26. A server-side device, comprising: a memory, a processor, and a communications component; wherein the memory is used for storing the position of the intelligent lock and a computer program;
the processor is coupled to the memory for executing the computer program for:
receiving an intelligent lock control request sent by a terminal to be verified through the communication assembly; the intelligent lock control request comprises identification information of the intelligent lock to be controlled and an appointed state of the intelligent lock to be controlled, the appointed state is determined according to intensity change of a wireless signal sent by the intelligent lock to be controlled and received by the terminal to be verified, if the intensity of the wireless signal sent by the intelligent lock to be controlled and received by the terminal to be verified is in an enhancement trend along with time, the appointed state of the intelligent lock to be controlled is an opening state, and if the intensity of the wireless signal sent by the intelligent lock to be controlled and received by the terminal to be verified is in a reduction trend along with time, the appointed state of the intelligent lock to be controlled is a closing state;
determining the position of the intelligent lock to be controlled in the stored positions of the intelligent lock according to the identification information of the intelligent lock to be controlled;
determining whether the terminal to be verified has the authority to control the intelligent lock to be controlled or not according to the position of the intelligent lock to be controlled and the position of the terminal to be verified provided by the terminal to be verified;
and under the condition that the terminal to be verified is determined to have the authority for controlling the intelligent lock to be controlled, sending a control instruction to the intelligent lock to be controlled through the communication assembly so as to control the intelligent lock to be controlled to adjust the state of the intelligent lock to be controlled to the specified state.
27. A terminal device, comprising: a memory, a processor, and a communications component; the memory is used for storing the identification information of the bound intelligent lock and a computer program;
the processor is coupled to the memory for executing the computer program for:
acquiring self identification information broadcasted by the intelligent lock to be controlled;
determining whether the intelligent lock to be controlled has the authority to control according to the identification information of the intelligent lock to be controlled and the identification information of the bound intelligent lock;
under the condition that the intelligent lock to be controlled has the authority, an intelligent lock control request is sent to a server side device through the communication assembly, the intelligent lock control request contains identification information of the intelligent lock to be controlled and an appointed state of the intelligent lock to be controlled, so that the server side device determines whether to adjust the intelligent lock to be controlled to the appointed state, the appointed state is determined according to strength change of a wireless signal received by the terminal device and sent by the intelligent lock to be controlled, if the strength of the wireless signal received by the terminal device and sent by the intelligent lock to be controlled is in an enhanced trend along with time, the appointed state of the intelligent lock to be controlled is in an open state, and if the strength of the wireless signal received by the terminal device and sent by the intelligent lock to be controlled is in a reduced trend along with time, the appointed state of the intelligent lock to be controlled is in a closed state.
28. An electronic device, comprising: a memory, a processor, and a communications component;
wherein the memory is used for storing a computer program;
the processor is coupled to the memory for executing the computer program for:
receiving a control instruction sent by server equipment through the communication assembly; the control instruction is sent by the server equipment under the condition that the server equipment determines that the to-be-verified terminal has the authority to control the electronic equipment according to an intelligent lock control request sent by the to-be-verified terminal, wherein the intelligent lock control request comprises an appointed state of the electronic equipment, and the appointed state is determined according to the intensity change of a wireless signal sent by the to-be-controlled intelligent lock received by the to-be-verified terminal, wherein if the intensity of the wireless signal sent by the to-be-controlled intelligent lock received by the to-be-verified terminal is in an increasing trend along with time, the appointed state of the to-be-controlled intelligent lock is in an opening state, and if the intensity of the wireless signal sent by the to-be-controlled intelligent lock received by the to-be-verified terminal is in a decreasing trend along with time, the appointed state of the to-be-controlled intelligent lock is in a closing state;
and adjusting the electronic equipment to the specified state according to the control instruction.
29. A computer-readable storage medium storing computer instructions, which when executed by one or more processors, cause the one or more processors to perform the steps of the method of any one of claims 7-25.
CN201910817919.2A 2019-08-30 2019-08-30 Intelligent lock control method, device, system and storage medium Active CN110535950B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910817919.2A CN110535950B (en) 2019-08-30 2019-08-30 Intelligent lock control method, device, system and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910817919.2A CN110535950B (en) 2019-08-30 2019-08-30 Intelligent lock control method, device, system and storage medium

Publications (2)

Publication Number Publication Date
CN110535950A CN110535950A (en) 2019-12-03
CN110535950B true CN110535950B (en) 2022-12-30

Family

ID=68665818

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910817919.2A Active CN110535950B (en) 2019-08-30 2019-08-30 Intelligent lock control method, device, system and storage medium

Country Status (1)

Country Link
CN (1) CN110535950B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113034736A (en) * 2019-12-09 2021-06-25 刘健 Intelligent lock database system based on unique mark position and longitude and latitude
CN110766844A (en) * 2019-12-30 2020-02-07 恒大智慧科技有限公司 Identity recognition method and equipment for entrance guard in intelligent community and readable storage medium
CN111721987A (en) * 2020-06-01 2020-09-29 王沛 Electric power thing networking batch meter equipment based on thing allies oneself with perception technique
CN112184968A (en) * 2020-10-16 2021-01-05 云南电网有限责任公司丽江供电局 Control method and device for intelligent lock of power distribution net cage
CN117253306A (en) * 2023-09-27 2023-12-19 中国铁塔股份有限公司涪陵分公司 Base station intelligent lock control method, system and computer equipment

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107040873A (en) * 2017-03-01 2017-08-11 深圳市君和睿通科技股份有限公司 A kind of bluetooth unlocking system and method
CN107978053A (en) * 2017-12-20 2018-05-01 东峡大通(北京)管理咨询有限公司 A kind of method for unlocking of smart lock, mobile terminal and unlocking system
CN109920114A (en) * 2019-03-13 2019-06-21 广州市和声信息技术有限公司 A kind of control method for door lock and system based on geographical location

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9704314B2 (en) * 2014-08-13 2017-07-11 August Home, Inc. BLE/WiFi bridge that detects signal strength of Bluetooth LE devices at an exterior of a dwelling
CN205140036U (en) * 2015-10-22 2016-04-06 深圳优方网络技术有限公司 Safe bluetooth intelligent lock of distance of unblanking

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107040873A (en) * 2017-03-01 2017-08-11 深圳市君和睿通科技股份有限公司 A kind of bluetooth unlocking system and method
CN107978053A (en) * 2017-12-20 2018-05-01 东峡大通(北京)管理咨询有限公司 A kind of method for unlocking of smart lock, mobile terminal and unlocking system
CN109920114A (en) * 2019-03-13 2019-06-21 广州市和声信息技术有限公司 A kind of control method for door lock and system based on geographical location

Also Published As

Publication number Publication date
CN110535950A (en) 2019-12-03

Similar Documents

Publication Publication Date Title
CN110535950B (en) Intelligent lock control method, device, system and storage medium
CN107578503B (en) Method for unlocking, unlocking terminal and the smart lock of shared vehicle
EP2646990B1 (en) Improved method and system for nfc transaction
EP1710692B1 (en) Secure device, terminal device, gate device, and device
CN105188049B (en) A kind of virtual SIM card service authorizing method, terminal, server and system
CN105321240A (en) Control method and device of intelligent door lock and intelligent door control system
CN104462889B (en) A kind of application rights management method and device
US20130060708A1 (en) User verification for electronic money transfers
US20080194296A1 (en) System and method for securely managing data stored on mobile devices, such as enterprise mobility data
CN104376274B (en) The guard method of mobile terminal payment interface and device
CN104375836A (en) Method and device for showing lock screen window
AU2015201272A1 (en) Secure distribution of electronic content
CN103686722A (en) Access control method and device
CN104050510A (en) Intelligent room reservation system based on mobile terminal
CN104243165A (en) Intelligent movable terminal privacy protection system and method based on intelligent bracelet
CN106020943A (en) Application program dual-opening method and device
US20170344965A1 (en) Automated transaction machine with associated beacon
CN113641981A (en) Authentication method and electronic equipment
CN110874657A (en) Resource reservation method, device, system and storage medium
CN115761939A (en) Withdrawal box lock and unlock control method, withdrawal box, system and device
CN107657454A (en) Biological method of payment, device, equipment and storage medium
CN107492174B (en) Enabled code introduction method, client and the shared vehicle server of shared vehicle
CN112989851A (en) NFC card activation method and device and electronic equipment
CN109426961A (en) One kind tying up card risk control method and device
CN102982267A (en) Safety protection method and system and terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant