CN110942537B - Intelligent door lock unlocking system, method, device and medium - Google Patents

Intelligent door lock unlocking system, method, device and medium Download PDF

Info

Publication number
CN110942537B
CN110942537B CN201911172929.1A CN201911172929A CN110942537B CN 110942537 B CN110942537 B CN 110942537B CN 201911172929 A CN201911172929 A CN 201911172929A CN 110942537 B CN110942537 B CN 110942537B
Authority
CN
China
Prior art keywords
door lock
request
data
intelligent door
client
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201911172929.1A
Other languages
Chinese (zh)
Other versions
CN110942537A (en
Inventor
黄宇
李绍斌
唐杰
陈道远
杨苗
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Gree Electric Appliances Inc of Zhuhai
Zhuhai Lianyun Technology Co Ltd
Original Assignee
Gree Electric Appliances Inc of Zhuhai
Zhuhai Lianyun Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Gree Electric Appliances Inc of Zhuhai, Zhuhai Lianyun Technology Co Ltd filed Critical Gree Electric Appliances Inc of Zhuhai
Priority to CN201911172929.1A priority Critical patent/CN110942537B/en
Publication of CN110942537A publication Critical patent/CN110942537A/en
Application granted granted Critical
Publication of CN110942537B publication Critical patent/CN110942537B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The invention relates to an intelligent door lock unlocking system, method, device and medium. According to the scheme provided by the embodiment of the invention, the unlocking data can be generated by the intelligent door lock and directly stored in the mobile terminal. The unlocking data in the mobile terminal cannot be read by the card reader, so that the possibility of copying the unlocking data is reduced. The unlocking data is not required to be written into the IC card, the problems that the unlocking data of the intelligent door lock is stored in the IC card, the unlocking data in the IC card is easy to read by a card reader, and the IC card is cracked and copied are solved fundamentally, and the safety of the intelligent door lock is improved.

Description

Intelligent door lock unlocking system, method, device and medium
Technical Field
The invention relates to the technical field of intelligent door locks, in particular to an unlocking system, method, device and medium of an intelligent door lock.
Background
Along with the continuous development of the science and technology level, an Integrated Circuit (IC) card (subsequently, simply referred to as an IC card) with a Near Field Communication (NFC) function is widely applied to various intelligent door lock unlocking scenes at present, for example, various household intelligent door locks are unlocked, hotel room intelligent door locks are unlocked, dormitory entrance guard intelligent door locks are unlocked and the like.
The encryption modes of the IC cards in different scenes are different, for example, the encryption level of the IC card used in the scenes of unlocking the intelligent door lock of a hotel room and unlocking the intelligent door lock of a dormitory entrance guard is relatively low, and the encryption level of the IC card used in the scene of unlocking the intelligent door lock of a household is relatively high.
Because the current cracking technology is continuously improved, the use safety risk of the IC card is higher. The IC cards applied to various intelligent door lock unlocking scenes are very easy to be cracked and copied by lawbreakers, and the safety of the intelligent door lock cannot be guaranteed. Especially, in a household intelligent door lock unlocking scene with higher safety requirements, the safety requirements of the intelligent door lock cannot be met.
Disclosure of Invention
The embodiment of the invention provides an intelligent door lock unlocking system, method, device and medium, which are used for solving the problem of low safety of an intelligent door lock.
The invention provides an intelligent door lock unlocking system, which comprises a first mobile terminal and an intelligent door lock, wherein the first mobile terminal communicates with the intelligent door lock through a local area network by using a bound first client, and is bound with the intelligent door lock, wherein:
the first client is used for receiving and generating an unlocking data request and sending the unlocking data request to the intelligent door lock in an administrator mode, wherein the unlocking data request is generated and carries a first terminal identifier of the first mobile terminal and/or a second terminal identifier of at least one second mobile terminal;
and the intelligent door lock is used for generating a data packet corresponding to the first terminal identifier and/or a data packet corresponding to each second terminal identifier according to the received unlocking data generation request in the administrator mode, and sending the generated data packets to corresponding clients, wherein the unlocking key data in each generated data packet are different.
According to the scheme provided by the embodiment of the invention, the mobile terminal can be bound with the intelligent door lock, and the mobile terminal bound with the intelligent door lock is communicated with the intelligent door lock through the local area network by utilizing the installed client. The client on the mobile terminal bound with the intelligent door lock can indicate the intelligent door lock to generate a data packet corresponding to the mobile terminal and comprising unlocking secret key data through the local area network in the administrator mode, and the intelligent door lock can generate the data packet and send the generated data packet to each corresponding mobile terminal through the local area network in the administrator mode, so that the mobile terminal can unlock the intelligent door lock according to the received data packet.
Namely, according to the scheme provided by the embodiment of the invention, the unlocking data can be generated by the intelligent door lock and directly stored in the mobile terminal. The unlocking data in the mobile terminal cannot be read by the card reader, so that the possibility of copying the unlocking data is reduced. The unlocking data is not required to be written into the IC card, the problems that the unlocking data of the intelligent door lock is stored in the IC card, the unlocking data in the IC card is easy to read by a card reader, and the IC card is cracked and copied are solved fundamentally, and the safety of the intelligent door lock is improved.
In addition, various security protection functions of the mobile terminal, such as functions of a password or a fingerprint unlocking screen, further improve the difficulty of copying the unlocking data in the mobile terminal, reduce the possibility of copying the unlocking data in the mobile terminal, and further improve the security of the intelligent door lock.
In addition, data transmission between the mobile terminal and the intelligent door lock is carried out through the local area network, a server is not needed, the unlocking data can be prevented from being illegally acquired in the transmission process through the server, and the safety of the intelligent door lock is further improved.
In a possible implementation manner, if the request for generating the unlocking data carries the first terminal identifier of the first mobile terminal, then:
the first client is further configured to send a corresponding virtual card adding request to the smart door lock if the virtual card adding request is received, where the corresponding virtual card adding request carries the first terminal identifier;
the intelligence lock sends the data package that generates to corresponding customer end, includes:
and sending a data packet corresponding to the first terminal identifier to the first client according to the received virtual card adding request sent by the first client.
That is, according to the scheme provided by the embodiment of the present invention, the mobile terminal bound to the intelligent door lock can send a request to the intelligent door lock, and obtain the corresponding data packet through the local area network, so that the received data packet can be used to unlock the intelligent door lock, thereby implementing the unlocking operation of the mobile terminal bound to the intelligent door lock on the intelligent door lock.
In a possible implementation manner, if the request for generating the unlocking data carries the second terminal identifier of the at least one second mobile terminal, then:
the system also comprises at least one second mobile terminal, each second mobile terminal is bound with a second client, the second client communicates with the intelligent door lock through a local area network, and the system comprises:
the second client is used for sending a corresponding virtual card adding request to the intelligent door lock if the virtual card adding request is received, wherein the virtual card adding request carries a second terminal identifier of a second mobile terminal bound by the second client;
the intelligence lock sends the data package that generates to corresponding customer end, includes:
and sending a data packet corresponding to the second terminal identifier carried in the virtual card adding request to the second client according to the received virtual card adding request sent by the second client.
That is, according to the scheme provided by the embodiment of the present invention, the mobile terminal that is not bound to the intelligent door lock can also send a request to the intelligent door lock, and obtain the corresponding data packet through the local area network, so that the received data packet can be used to unlock the intelligent door lock, and the unlocking operation of the mobile terminal that is not bound to the intelligent door lock on the intelligent door lock is realized.
In a possible implementation manner, the intelligent door lock receives a binding request sent by the first client, where the binding request carries a media access control address MAC of the first mobile terminal, generates identification ID data according to the MAC and a random number, and establishes a binding relationship with the first mobile terminal according to the ID data, then:
the first client is further used for sending an instruction for entering the administrator mode to the intelligent door lock in the administrator mode, wherein the instruction carries the MAC;
the intelligent door lock is further used for entering the administrator mode if the MAC carried in the instruction is matched with the ID data and the received input administrator password is correct according to the received instruction entering the administrator mode.
Namely, according to the scheme provided by the embodiment of the invention, the intelligent door lock can acquire the MAC of the mobile terminal, generate the corresponding ID data by using the MAC, and establish the binding relationship with the mobile terminal. At this time, when the intelligent door lock enters the administrator mode, whether the received instruction for entering the administrator mode is from the bound mobile terminal needs to be verified according to the MAC, and if the received instruction for entering the administrator mode is correct, the intelligent door lock enters the administrator mode.
Therefore, the intelligent door lock can enter the administrator mode only according to the instruction of the binding mobile terminal, and then follow-up operation can be executed in the administrator mode, so that illegal operation on the intelligent door lock is avoided, and the safety of the intelligent door lock is further ensured.
In a possible implementation manner, the first client is further configured to receive a request for releasing binding with a door lock, and if it is determined that a received input administrator password is correct, send a corresponding request for releasing binding with the door lock to the smart door lock, where the corresponding request for releasing binding with the door lock carries the MAC of the first mobile terminal;
and the intelligent door lock is further used for deleting the ID data corresponding to the MAC according to the received binding releasing request with the door lock, and releasing the binding relation with the first mobile terminal.
Of course, if the intelligent door lock acquires the MAC of the mobile terminal, the corresponding ID data is generated by using the MAC, and the binding relationship with the mobile terminal is established. Then, when the binding relationship between the smart door lock and the mobile terminal is released, the corresponding ID data may be deleted according to the MAC, so that the binding relationship with the mobile terminal may be released.
When a client on the mobile terminal bound with the intelligent door lock receives a request for releasing the binding with the door lock, the identity of an administrator of a user needs to be verified, and when the administrator password input by the user is determined to be correct, a corresponding request is sent to the intelligent door lock, so that the binding with the intelligent door lock is released. Therefore, illegal operation of an illegal user on the client side is avoided, and the safety of the intelligent door lock is further improved.
In a possible implementation manner, the first client is further configured to receive, in an administrator mode, a request for deleting unlocking data and send the request to the intelligent door lock, where the request for deleting unlocking data carries the first terminal identifier and/or the at least one second terminal identifier;
and the intelligent door lock is further used for deleting the data packet corresponding to the first terminal identifier and/or the data packet corresponding to each second terminal identifier carried in the request for deleting the unlocking data in the administrator mode according to the received request for deleting the unlocking data.
According to the scheme provided by the embodiment of the invention, the number of mobile terminals for unlocking the intelligent door lock can be reduced, so that the mobile terminals for unlocking the intelligent door lock can be updated in time, and the safety of the intelligent door lock is further ensured.
In a possible implementation manner, the first client is further configured to receive a newly-added unlocking data request and send the newly-added unlocking data request to the intelligent door lock in an administrator mode, where the newly-added unlocking data request carries the first terminal identifier and/or the at least one second terminal identifier;
the intelligent door lock is further configured to generate, in the administrator mode, a data packet corresponding to the first terminal identifier and/or a data packet corresponding to each second terminal identifier carried in the newly added unlocking data request, according to the received newly added unlocking data request, where unlocking key data included in each generated data packet are different from each other.
According to the scheme provided by the embodiment of the invention, the mobile terminal for unlocking the intelligent door lock can be added, so that the mobile terminal for unlocking the intelligent door lock can be updated in time, and the safety of the intelligent door lock is further ensured.
The scheme provided by the embodiment of the invention is explained from the side of the first mobile terminal bound with the intelligent door lock.
The invention also provides an intelligent door lock unlocking method, which is applied to a first client bound on a first mobile terminal, wherein the first client communicates with the intelligent door lock through a local area network, and the first mobile terminal is bound with the intelligent door lock, and the method comprises the following steps:
receiving a request for generating unlocking data under an administrator mode, wherein the request for generating the unlocking data carries a first terminal identifier of the first mobile terminal and/or a second terminal identifier of at least one second mobile terminal;
sending the request for generating unlocking data to the intelligent door lock;
and the intelligent door lock generates a data packet corresponding to the first terminal identifier and/or a data packet corresponding to each second terminal identifier according to the received request for generating the unlocking data under the administrator mode, and sends the generated data packets to corresponding clients, wherein the unlocking key data in each generated data packet are different.
In a possible implementation manner, if the request for generating the unlocking data carries the first terminal identifier of the first mobile terminal, the method further includes:
receiving a request for adding a virtual card;
sending a corresponding virtual card adding request to the intelligent door lock, wherein the corresponding virtual card adding request carries the first terminal identification;
and receiving a data packet corresponding to the first terminal identification sent by the intelligent door lock.
In a possible implementation manner, the intelligent door lock receives a binding request sent by the first client, where the binding request carries a media access control address MAC of the first mobile terminal, and generates identification ID data according to the MAC and a random number, and establishes a binding relationship with the first mobile terminal according to the ID data, where the method further includes:
in the administrator mode, sending an instruction for entering the administrator mode to the intelligent door lock, wherein the instruction carries the MAC;
and if the MAC carried in the instruction is matched with the ID data and the received input administrator password is correct, the intelligent door lock enters the administrator mode.
In one possible implementation, the method further includes:
receiving a request for releasing the binding with the door lock;
if the received input administrator password is determined to be correct, sending a corresponding request for releasing the binding with the door lock to the intelligent door lock, wherein the corresponding request for releasing the binding with the door lock carries the MAC of the first mobile terminal;
and the intelligent door lock deletes the ID data corresponding to the MAC according to the received binding releasing request with the door lock, and releases the binding relation with the first mobile terminal.
In one possible implementation, the method further includes:
receiving a request for deleting unlocking data in an administrator mode;
and sending the unlocking data deleting request to the intelligent door lock, wherein the unlocking data deleting request carries the first terminal identification and/or at least one second terminal identification.
In one possible implementation, the method further includes:
receiving a newly-added unlocking data request in an administrator mode;
and sending the newly-added unlocking data request to the intelligent door lock, wherein the newly-added unlocking data request carries the first terminal identification and/or at least one second terminal identification.
The solution provided by the embodiment of the present invention is explained below from the second mobile terminal side, which is not bound to the intelligent door lock.
The invention also provides an unlocking method of the intelligent door lock, which is applied to a second client bound on a second mobile terminal, wherein the second client communicates with the intelligent door lock through a local area network, and the unlocking method of the intelligent door lock comprises the following steps:
receiving a request for adding a virtual card;
sending a corresponding virtual card adding request to the intelligent door lock, wherein the corresponding virtual card adding request carries a second terminal identifier of the second mobile terminal;
and receiving a data packet corresponding to the second terminal identification sent by the intelligent door lock.
The scheme provided by the embodiment of the invention is explained from the side of the intelligent door lock.
The invention also provides an intelligent door lock unlocking method, which is applied to an intelligent door lock, wherein the intelligent door lock is communicated with a first client bound on a first mobile terminal through a local area network and is bound with the first mobile terminal, and the method comprises the following steps:
in an administrator mode, receiving a request for generating unlocking data sent by the first client, wherein the request for generating unlocking data carries a first terminal identifier of the first mobile terminal and/or a second terminal identifier of at least one second mobile terminal;
and generating a data packet corresponding to the first terminal identifier and/or a data packet corresponding to each second terminal identifier according to the received request for generating the unlocking data, and sending the generated data packets to corresponding clients, wherein the unlocking key data in each generated data packet are different.
In a possible implementation manner, if the request for generating the unlocking data carries the first terminal identifier of the first mobile terminal, the method further includes:
receiving a virtual card adding request sent by the first client, wherein the virtual card adding request carries the first terminal identification;
sending the generated data packet to a corresponding client, comprising:
and sending a data packet corresponding to the first terminal identifier to the first client according to the received virtual card adding request sent by the first client.
In a possible implementation manner, if the request for generating the unlocking data carries a second terminal identifier of at least one second mobile terminal, the intelligent door lock communicates with at least one second client through a local area network, and the second client is bound to the second mobile terminal, the method further includes:
receiving a virtual card adding request sent by a second client, wherein the virtual card adding request carries a second terminal identifier of a second mobile terminal bound by the second client;
sending the generated data packet to a corresponding client, comprising:
and sending a data packet corresponding to the second terminal identifier carried in the virtual card adding request to the second client according to the received virtual card adding request sent by the second client.
In a possible implementation manner, the intelligent door lock receives a binding request sent by the first client, where the binding request carries a media access control address MAC of the first mobile terminal, generates identification ID data according to the MAC and a random number, and establishes a binding relationship with the first mobile terminal according to the ID data, where the method further includes:
receiving an instruction which is sent by the first client and enters an administrator mode, wherein the instruction carries the MAC;
and according to the received instruction for entering the administrator mode, if the MAC carried in the instruction is matched with the ID data and the received input administrator password is correct, entering the administrator mode.
In one possible implementation, the method further includes:
receiving a binding releasing and door lock request sent by the first client, wherein the MAC is carried in the binding releasing and door lock request;
and deleting the ID data corresponding to the MAC according to the received request for releasing the binding with the door lock, and releasing the binding relation with the first mobile terminal.
In one possible implementation, the method further includes:
in an administrator mode, receiving a request for deleting unlocking data sent by the first client, wherein the request for deleting unlocking data carries the first terminal identification and/or at least one second terminal identification;
and deleting the data packet corresponding to the first terminal identifier and/or the data packet corresponding to each second terminal identifier carried in the request for deleting the unlocking data according to the received request for deleting the unlocking data.
In one possible implementation, the method further includes:
in an administrator mode, receiving a newly-added unlocking data request sent by the first client, wherein the newly-added unlocking data request carries the first terminal identification and/or at least one second terminal identification;
and generating a data packet corresponding to the first terminal identifier and/or a data packet corresponding to each second terminal identifier carried in the newly added unlocking data request according to the received newly added unlocking data request, wherein the generated data packets comprise different unlocking secret key data.
Corresponding to the method, the embodiment of the invention also provides the following device.
The invention also provides a client, wherein the client is bound with the first mobile terminal, the client communicates with the intelligent door lock through the local area network, and the first mobile terminal is bound with the intelligent door lock, and the client comprises:
a receiving module, configured to receive a request for generating unlocking data in an administrator mode, where the request for generating unlocking data carries a first terminal identifier of the first mobile terminal and/or a second terminal identifier of at least one second mobile terminal;
the sending module is used for sending the unlocking data generation request to the intelligent door lock; and the intelligent door lock generates a data packet corresponding to the first terminal identifier and/or a data packet corresponding to each second terminal identifier according to the received request for generating the unlocking data under the administrator mode, and sends the generated data packets to corresponding clients, wherein the unlocking key data in each generated data packet are different.
The invention also provides a client, wherein the client is bound with the second mobile terminal, and the client and the intelligent door lock communicate through the local area network, and the client comprises:
the receiving module is used for receiving a virtual card adding request; receiving a data packet corresponding to a second terminal identifier of the second mobile terminal sent by the intelligent door lock;
and the sending module is used for sending a corresponding virtual card adding request to the intelligent door lock, wherein the corresponding virtual card adding request carries a second terminal identifier of the second mobile terminal.
The invention also provides an intelligent door lock, which communicates with a first client bound on a first mobile terminal through a local area network and is bound with the first mobile terminal, and the intelligent door lock comprises:
a receiving module, configured to receive, in an administrator mode, a request for generating unlocking data sent by the first client, where the request for generating unlocking data carries a first terminal identifier of the first mobile terminal and/or a second terminal identifier of at least one second mobile terminal;
the generating module is used for generating a data packet corresponding to the first terminal identifier and/or a data packet corresponding to each second terminal identifier according to the received request for generating the unlocking data, and the unlocking secret key data included in each generated data packet are different;
and the sending module is used for sending the generated data packet to the corresponding client.
The present invention also provides a non-volatile computer storage medium having stored thereon an executable program for execution by a processor to implement the method as described above.
Additional features and advantages of the invention will be set forth in the description which follows, and in part will be obvious from the description, or may be learned by practice of the invention. The objectives and other advantages of the invention will be realized and attained by the structure particularly pointed out in the written description and claims hereof as well as the appended drawings.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a schematic structural diagram of an intelligent door lock unlocking system according to a first embodiment of the present invention;
fig. 2 is a schematic flow chart of an unlocking method for an intelligent door lock according to a second embodiment of the present invention;
fig. 3 is a schematic flow chart of an unlocking method for an intelligent door lock according to a third embodiment of the present invention;
fig. 4 is a schematic flow chart of an unlocking method for an intelligent door lock according to a fourth embodiment of the present invention;
fig. 5 is a schematic flow chart of an unlocking method for an intelligent door lock according to a fifth embodiment of the present invention;
fig. 6 is a schematic structural diagram of a client according to a sixth embodiment of the present invention;
fig. 7 is a schematic structural diagram of a client according to a seventh embodiment of the present invention;
fig. 8 is a schematic structural diagram of an intelligent door lock according to an eighth embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention clearer, the present invention will be described in further detail with reference to the accompanying drawings, and it is apparent that the described embodiments are only a part of the embodiments of the present invention, not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It should be noted that, the "plurality" or "a plurality" mentioned herein means two or more. "and/or" describes the association relationship of the associated objects, meaning that there may be three relationships, e.g., a and/or B, which may mean: a exists alone, A and B exist simultaneously, and B exists alone. The character "/" generally indicates that the former and latter associated objects are in an "or" relationship.
The terms "first," "second," and the like in the description and in the claims, and in the drawings described above, are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments of the invention described herein are capable of operation in sequences other than those illustrated or described herein.
Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
Example one
The structure schematic diagram of the system can be shown in fig. 1, and includes a first mobile terminal 11 and an intelligent door lock 12, where the first mobile terminal 11 communicates with the intelligent door lock 12 through a local area network by using a bound first client 111, and the first mobile terminal 11 is bound with the intelligent door lock 12, where:
the first client 111 is configured to receive, generate and send an unlocking data request to the intelligent door lock in the administrator mode, where the generated unlocking data request carries a first terminal identifier of the first mobile terminal and/or a second terminal identifier of at least one second mobile terminal;
the smart door lock 12 is configured to, in the administrator mode, generate a data packet corresponding to the first terminal identifier and/or a data packet corresponding to each second terminal identifier according to the received request for generating the unlocking data, and send the generated data packets to corresponding clients, where the unlocking key data included in each generated data packet are different from each other.
It should be noted that, the first client 111 receives and generates an unlocking data request and sends the unlocking data request to the intelligent door lock in the administrator mode, which can also ensure the administrator identity of the operating user, avoid the illegal user from performing illegal operation on the intelligent door lock, and further improve the security of the intelligent door lock. In addition, the intelligent door lock can also generate unlocking data and send the unlocking data in the administrator mode, so that the safety of the unlocking data is ensured, and the safety of the intelligent door lock is further improved.
If the first terminal identification of the first mobile terminal is carried in the unlocking data request, the first mobile terminal bound with the intelligent door lock can send a request to the intelligent door lock, and a corresponding data packet is obtained through a local area network, so that the first mobile terminal bound with the intelligent door lock can carry out unlocking operation on the intelligent door lock:
the first client 111 is further configured to send a corresponding virtual card adding request to the smart door lock if the virtual card adding request is received, where the corresponding virtual card adding request carries the first terminal identifier;
the intelligent door lock 12 sends the generated data packet to a corresponding client, and the method includes:
and sending a data packet corresponding to the first terminal identifier to the first client according to the received virtual card adding request sent by the first client.
If the second terminal identification of at least one second mobile terminal is carried in the unlocking data request, the second mobile terminal which is not bound with the intelligent door lock can send a request to the intelligent door lock, and a corresponding data packet is obtained through the local area network, so that the second mobile terminal which is not bound with the intelligent door lock can unlock the intelligent door lock:
the system further comprises at least one second mobile terminal 13, each second mobile terminal is bound with a second client 131, the second client 131 and the intelligent door lock 12 communicate through a local area network, wherein:
a second client 131 is configured to send a corresponding virtual card adding request to the smart door lock if the virtual card adding request is received, where the virtual card adding request carries a second terminal identifier of a second mobile terminal bound to the second client;
the intelligent door lock 12 sends the generated data packet to a corresponding client, and the method includes:
and sending a data packet corresponding to the second terminal identifier carried in the virtual card adding request to the second client according to the received virtual card adding request sent by the second client.
In one possible implementation, the binding relationship between the smart door lock and the mobile terminal may be established through a media access control address (MAC) of the mobile terminal.
In a possible implementation manner, the intelligent door lock may receive a binding request sent by the first client, where the binding request carries an MAC of the first mobile terminal, and the intelligent door lock generates Identification (ID) data according to the MAC and the random number, and establishes a binding relationship with the first mobile terminal according to the ID data.
At this time, the smart door lock may enter the manager mode by:
the first client 111 is further configured to send, in the administrator mode, an instruction for entering the administrator mode to the smart door lock, where the instruction carries the MAC of the first mobile terminal;
the intelligent door lock 12 is further configured to enter the administrator mode if it is determined that the MAC carried in the instruction matches the stored ID data and the received input administrator password is correct, according to the received instruction to enter the administrator mode.
That is, according to the solution provided in this embodiment, the smart door lock enters the administrator mode only after confirming that the received command for entering the administrator mode is from the bound mobile terminal and the received administrator password is correct. Therefore, illegal operation on the intelligent door lock is effectively avoided, and the safety of the intelligent door lock is further ensured.
Further, in a possible implementation manner, the first client 111 is further configured to receive a request for releasing the binding with the door lock, and if it is determined that the received input administrator password is correct, send a corresponding request for releasing the binding with the door lock to the intelligent door lock, where the corresponding request for releasing the binding with the door lock carries the MAC of the first mobile terminal;
the intelligent door lock 12 is further configured to delete the ID data corresponding to the MAC according to the received request for releasing the binding with the door lock, and release the binding relationship with the first mobile terminal.
And if the intelligent door lock passes through the MAC of the first mobile terminal, establishing a binding relationship with the first mobile terminal. Then, when the binding relationship between the smart door lock and the first mobile terminal is released, the corresponding ID data may be deleted according to the MAC, so that the binding relationship with the first mobile terminal is released. When a request for releasing the binding with the door lock is received, whether the first client side is in the administrator mode or not, the administrator password needs to be verified again, the fact that the binding between the intelligent door lock and the first mobile terminal is released only according to the operation of an administrator user is guaranteed, the illegal operation of an illegal user on the client side can be avoided, and the safety of the intelligent door lock is further improved.
Of course, it should be noted that, in the solution provided in this embodiment, the first client may also change the mobile terminal that can be used to unlock the smart door lock, for example, reduce the mobile terminals that are used to unlock the smart door lock, in this case:
the first client 111 is further configured to receive, in the administrator mode, a request for deleting the unlocking data and send the request to the intelligent door lock, where the request for deleting the unlocking data carries the first terminal identifier and/or the at least one second terminal identifier;
the intelligent door lock 12 is further configured to delete, in the administrator mode, the data packet corresponding to the first terminal identifier and/or the data packet corresponding to each second terminal identifier, which are carried in the unlocking data request, according to the received unlocking data deletion request.
If so, can also be used for carrying out the mobile terminal unblanked to intelligent lock through first customer end newly-increased, this moment:
the first client 111 is further configured to receive a newly-added unlocking data request and send the newly-added unlocking data request to the intelligent door lock in the administrator mode, where the newly-added unlocking data request carries the first terminal identifier and/or the at least one second terminal identifier;
the intelligent door lock 12 is further configured to generate, in the administrator mode, a data packet corresponding to the first terminal identifier and/or a data packet corresponding to each second terminal identifier, which are carried in the newly added unlocking data request, according to the received newly added unlocking data request, where the generated unlocking key data in each data packet are different from each other.
Through changing the mobile terminal for unlocking the intelligent door lock, the flexible configuration of the mobile terminal for unlocking the intelligent door lock can be ensured, the mobile terminal for unlocking the intelligent door lock can be updated in time, and the safety of the intelligent door lock is further ensured.
Corresponding to the system provided in the first embodiment, the following method is provided.
Example two
An embodiment of the present invention provides an intelligent door lock unlocking method, which is applied to a first client bound on a first mobile terminal, where the first client communicates with an intelligent door lock through a local area network, and the first mobile terminal is bound with the intelligent door lock, and a flow of steps of the method may be as shown in fig. 2, and includes:
step 101, receiving a request for generating unlocking data.
In this step, the first client may receive, in the administrator mode, a request for generating unlocking data sent by a user. The generated unlocking data request may carry a first terminal identifier of the first mobile terminal and/or a second terminal identifier of at least one second mobile terminal.
And 102, sending a request for generating unlocking data.
In this step, the first client may send a request for generating unlocking data to the smart door lock, so that the smart door lock generates a data packet corresponding to the first terminal identifier and/or a data packet corresponding to each second terminal identifier according to the received request for generating unlocking data in the administrator mode, and sends the generated data packets to the corresponding clients, where unlocking key data included in each generated data packet are different from each other.
If the request for generating the unlocking data carries the first terminal identifier of the first mobile terminal, the embodiment may further include the following steps:
step 103, receiving a request for adding a virtual card.
In this step, the first client may receive a virtual card adding request sent by a user. At this time, the first client may be in the administrator mode or in the non-administrator mode.
And step 104, sending a corresponding request to the intelligent door lock.
In this step, the first client may send a corresponding virtual card adding request to the smart door lock according to the received virtual card adding request, where the corresponding virtual card adding request carries the first terminal identifier.
Step 105, receiving a data packet.
In this step, the first client may receive a data packet corresponding to the first terminal identifier sent by the intelligent door lock.
It should be noted that, in this embodiment, the intelligent door lock may enter the administrator mode according to an instruction of the first client. If the intelligent door lock and the first mobile terminal establish a binding relationship through the MAC of the first mobile terminal, for example, the binding relationship is established through the following method:
the intelligent door lock receives a binding request sent by a first client, the binding request carries MAC of a first mobile terminal, the intelligent door lock generates ID data according to the MAC and the random number, and a binding relation with the first mobile terminal is established according to the ID data.
The first client on the first mobile terminal may instruct the smart door lock to enter the supervisor mode by:
and the first client sends an instruction for entering the administrator mode to the intelligent door lock in the administrator mode, wherein the instruction carries the MAC of the first mobile terminal, so that the intelligent door lock enters the administrator mode if the MAC carried in the instruction is matched with the stored ID data and the received input administrator password is correct according to the received instruction for entering the administrator mode.
Further, if the binding relationship between the intelligent door lock and the first mobile terminal is established in the above manner, the binding relationship between the intelligent door lock and the first mobile terminal can be released in the following manner:
the first client receives the request for releasing the binding with the door lock, if the received input administrator password is determined to be correct, the corresponding request for releasing the binding with the door lock is sent to the intelligent door lock, and the MAC of the first mobile terminal is carried in the corresponding request for releasing the binding with the door lock, so that the ID data corresponding to the MAC is deleted by the intelligent door lock according to the received request for releasing the binding with the door lock, and the binding relation between the intelligent door lock and the first mobile terminal is released.
It should be further noted that, after step 102, the first client may also make a change to the mobile terminal for unlocking the intelligent door lock.
At this time, the first client may receive the request for deleting the unlocking data and send the request for deleting the unlocking data to the intelligent door lock in the administrator mode, where the request for deleting the unlocking data carries the first terminal identifier and/or the at least one second terminal identifier. And deleting the data packet corresponding to the first terminal identifier and/or the data packet corresponding to each second terminal identifier carried in the unlocking data request according to the received unlocking data deleting request under the administrator mode.
In addition, the first client can also receive a newly-increased unlocking data request and send the newly-increased unlocking data request to the intelligent door lock in the administrator mode, wherein the newly-increased unlocking data request carries the first terminal identifier and/or the at least one second terminal identifier. And generating a data packet corresponding to the first terminal identifier and/or a data packet corresponding to each second terminal identifier carried in the newly added unlocking data request according to the received newly added unlocking data request, wherein the generated unlocking secret key data in each data packet are different from each other.
EXAMPLE III
The third embodiment of the present invention provides an intelligent door lock unlocking method, which is applied to a second client bound on a second mobile terminal, wherein the second client and an intelligent door lock communicate through a local area network, and the flow of the steps of the method can be as shown in fig. 3, and the method includes:
step 201, receiving a request for adding a virtual card.
In this step, the second client may receive a virtual card adding request sent by the user. At this point, the second client may be in a non-administrator mode.
Step 202, sending a corresponding request to the intelligent door lock.
In this step, the second client may send a corresponding virtual card adding request to the smart door lock according to the received virtual card adding request, where the corresponding virtual card adding request carries the second terminal identifier of the second mobile terminal.
Step 203, receiving the data packet.
In this step, the second client may receive a data packet corresponding to the second terminal identifier sent by the intelligent door lock.
Example four
The fourth embodiment of the present invention provides an intelligent door lock unlocking method, which is applied to an intelligent door lock, wherein the intelligent door lock communicates with a first client bound to a first mobile terminal through a local area network, and is bound to the first mobile terminal, and the flow of the steps of the method can be as shown in fig. 4, and the method includes:
step 301, receiving a request for generating unlocking data.
In this step, the intelligent door lock may receive, in the administrator mode, the request for generating the unlocking data sent by the first client, and the request for generating the unlocking data carries the first terminal identifier of the first mobile terminal and/or the second terminal identifier of the at least one second mobile terminal.
It should be noted that, the intelligent door lock and the first mobile terminal may be bound in any manner, for example, but not limited to, the following manners:
the intelligent door lock receives a binding request sent by a first client, the binding request carries MAC of a first mobile terminal, the intelligent door lock generates ID data according to the MAC and the random number, and a binding relation with the first mobile terminal is established according to the ID data.
If the intelligent door lock and the first mobile terminal are bound through the above method, in a possible implementation manner, the intelligent door lock can enter the administrator mode through the following method:
the intelligent door lock receives an instruction for entering the administrator mode sent by a first client, wherein the instruction carries the MAC of a first mobile terminal; and according to the received instruction for entering the administrator mode, if the MAC carried in the instruction is matched with the stored ID data and the received input administrator password is correct, entering the administrator mode.
If the intelligent door lock and the first mobile terminal are bound in the above manner, the binding may be released in the following manner:
the intelligent door lock receives a request for releasing the binding with the door lock, which is sent by a first client, and the MAC of a first mobile terminal is carried in the request for releasing the binding with the door lock; and deleting the ID data corresponding to the MAC according to the received request for releasing the binding with the door lock, and releasing the binding relation with the first mobile terminal.
And step 302, generating unlocking data and sending the unlocking data.
In this step, the smart door lock may generate a data packet corresponding to the first terminal identifier and/or a data packet corresponding to each second terminal identifier according to the received request for generating the unlocking data, and send the generated data packets to the corresponding clients, where the unlocking key data included in each generated data packet are different from each other.
It should be noted that, if the generated unlocking data request carries the first terminal identifier of the first mobile terminal, the virtual card adding request sent by the first client may be received, where the virtual card adding request carries the first terminal identifier, and the data packet corresponding to the first terminal identifier is sent to the first client according to the received virtual card adding request sent by the first client.
If the unlocking data request is generated to carry a second terminal identifier of at least one second mobile terminal, the intelligent door lock can also communicate with at least one second client through the local area network, one second client is bound with one second mobile terminal and can receive a virtual card adding request sent by the second client, the virtual card adding request carries the second terminal identifier of the second mobile terminal bound by the second client, and a data packet corresponding to the second terminal identifier carried in the virtual card adding request is sent to the second client according to the received virtual card adding request sent by the second client.
In addition, it should be noted that in a possible implementation manner, in this embodiment, the intelligent door lock may further receive, in the administrator mode, a request for deleting the unlocking data sent by the first client, where the request for deleting the unlocking data carries the first terminal identifier and/or the at least one second terminal identifier; and deleting the data packet corresponding to the first terminal identifier and/or the data packet corresponding to each second terminal identifier carried in the unlocking data request according to the received unlocking data deleting request.
In a possible implementation manner, in this embodiment, the intelligent door lock may further receive, in the administrator mode, a newly added unlocking data request sent by the first client, where the newly added unlocking data request carries the first terminal identifier and/or the at least one second terminal identifier; and generating a data packet corresponding to the first terminal identifier and/or a data packet corresponding to each second terminal identifier carried in the newly added unlocking data request according to the received newly added unlocking data request, wherein the generated unlocking secret key data in each data packet are different from each other.
The following describes the schemes provided in the first to fourth embodiments of the present invention with a specific example.
EXAMPLE five
The fifth embodiment of the invention provides an intelligent door lock unlocking method, which is mainly explained from a first mobile terminal side. Assuming that a first client (which may be referred to as a client (APP) in this embodiment) is already installed on a first mobile terminal (which may be referred to as a mobile phone in this embodiment, and may be referred to as a mobile phone in this embodiment), and the first client is already bound with the first mobile terminal (which may be referred to as being bound by a mobile phone number in this embodiment), a flow of steps of the method may be as shown in fig. 5, and includes:
step 401, the intelligent door lock is accessed to a local area network.
When the process is started, the intelligent door lock can be accessed to the local area network.
Step 402, the mobile phone binds the intelligent door lock through the APP.
In this embodiment, it is assumed that the mobile phone and the smart door lock are bound by the MAC of the mobile phone.
In a possible implementation manner, in this step, the mobile phone may access a local area network, the APP installed on the mobile phone may receive a request for binding with the door lock sent by the user, connect the smart door lock through the local area network, and send a binding request to the smart door lock, where the binding request carries the MAC of the mobile phone.
The intelligent door lock generates ID data according to the MAC and the random number, and a binding relation with the mobile phone is established according to the ID data to realize the binding of the mobile phone and the intelligent door lock.
And step 403, the APP prompts setting of the administrator password.
When APP on the cell-phone that APP bound as with intelligent lock was used for the first time, can indicate the user to set up administrator's password for only administrator's user could operate this APP, with the security that improves APP and use, and then improve the security of intelligent lock.
Step 404, the APP enters the administrator mode.
In this step, the APP may receive an input administrator password and enter an administrator mode.
If APP is used for the first time as APP on the mobile phone bound with the intelligent door lock, then after the administrator password is set in step 403, in this step, the user can be prompted to input the administrator password, and the APP can receive the input administrator password and enter the administrator mode.
If the APP is not used for the first time as the APP on the mobile phone bound to the smart door lock, i.e. if steps 402 and 403 have already been performed once, then this step can be performed directly after step 401.
It should be noted that, in this embodiment, the APP may send, in the administrator mode, an instruction to enter the administrator mode to the smart door lock through the local area network, where the instruction carries the MAC of the mobile phone.
The intelligent door lock can enter the administrator mode when the MAC carried in the instruction is matched with the stored ID data and the received input administrator password is correct according to the received instruction entering the administrator mode.
In one possible implementation, the smart door lock may further prompt the user to enter an administrator password when it is determined that the MAC matches the stored ID data, and enter an administrator mode when it is determined that the entered administrator password is correct.
That is, when the mobile phone and the smart door lock establish a binding relationship through the MAC of the mobile phone, the smart door lock can enter the administrator mode after receiving an instruction from the binding mobile phone to enter the administrator mode according to the MAC confirmation and when determining that a correct administrator password is received, so that the smart door lock can enter the administrator mode only according to the instruction from the binding mobile phone, and then subsequent operations can be performed in the administrator mode, thereby avoiding illegal operations on the smart door lock, and further ensuring the security of the smart door lock.
Step 405, the APP sends a request for generating unlocking data.
In this step, the APP may receive, in the administrator mode, an unlocking data generation request sent by a user and send the unlocking data generation request to the smart door lock, where the unlocking data generation request carries a first terminal identifier (e.g., a mobile phone number) of the first mobile terminal and/or a second terminal identifier (e.g., a mobile phone number) of at least one second mobile terminal.
That is, APP can receive user's setting to the mobile terminal that can be used for unblanking to intelligent lock under the administrator mode to send to intelligent lock, make intelligent lock can be to the mobile terminal that can unblank to it that user set up, generate the data of unblanking.
The intelligent door lock can generate a data packet corresponding to the first terminal identification and/or a data packet corresponding to each second terminal identification according to the received unlocking data generation request in the administrator mode, so that the generated data packets can be sent to the corresponding client side in the follow-up process, and the mobile terminal where the client side is located can unlock the intelligent door lock according to the received data packets. It should be noted that the unlocking key data included in each generated data packet are different from each other, so that one mobile terminal corresponds to one unique unlocking key data.
In this embodiment, it is assumed that the first terminal identifier of the first mobile terminal is carried in the request for generating the unlocking data.
And step 406, the intelligent door lock sends a data packet.
In this step, the APP may send a corresponding virtual card adding request to the smart door lock when receiving the virtual card adding request sent by the user, where the corresponding virtual card adding request carries the first terminal identifier (mobile phone number).
And the intelligent door lock sends the generated data packet corresponding to the first terminal identification to the APP through the local area network according to the received virtual card adding request.
Of course, if the generated unlocking data request also carries the second terminal identifier of the second mobile terminal, the smart door lock may also receive a virtual card adding request sent by a second client on the second mobile terminal, and send the generated data packet corresponding to the second terminal identifier to the corresponding second client through the local area network.
It should be noted that, in a possible implementation manner, one data packet may be sent to a corresponding client only once, and is not sent to the corresponding client many times, so as to further ensure the security and reliability of the intelligent door lock.
Step 407, the APP parses the data packet.
In this step, the APP can parse the received data packet and generate a virtual card according to the unlocking key data in the data packet, so that the generated virtual card can be used to unlock the smart door lock.
It should be noted that, if the smart door lock is unlocked by the mobile phone using the virtual card, it can be understood that the mobile phone has an NFC function.
And step 408, the intelligent door lock exits the manager mode.
It should be noted that after the generated data packet is sent to the corresponding client through the local area network, the intelligent door lock may exit the administrator mode, and the process is ended. Of course, step 408 is not limited to being performed after step 407.
According to the scheme provided by each embodiment of the invention, the unlocking data of the intelligent door lock can be directly written into the mobile terminal (such as a mobile phone, a tablet personal computer, an intelligent watch and the like), the unlocking data is read by the intelligent door lock by using the NFC function of the mobile terminal, the door is opened by identification, an IC card is not used, the mobile terminal is directly used as the IC card, and the problems that the unlocking data is written into the IC card, the IC card is easy to read by a card reader once being lost, and the IC card is easy to crack and copy are solved. And because the mobile terminal has the safety protection measures, the data in the mobile terminal is acquired, and the safety protection measures of the mobile terminal, such as fingerprint or password verification and the like, need to be cracked, so that the cracking difficulty is high, the safety of the written data is further improved, and the safety of the intelligent door lock is further ensured.
In addition, the unlocking data is transmitted through the local area network without passing through the server, so that the possibility of being illegally acquired in the data transmission process is reduced, and the safety of data transmission is also ensured.
In addition, the unlocking data can be only written into the appointed mobile terminal through the configuration of the user, and the safety and the reliability of the intelligent door lock are further guaranteed.
Corresponding to the methods provided in examples two to four, the following apparatuses are provided.
EXAMPLE six
An embodiment of the present invention provides a client, where the client is bound to a first mobile terminal, the client communicates with an intelligent door lock through a local area network, and the first mobile terminal is bound to the intelligent door lock, and a structure of the client may be as shown in fig. 6, where the client includes:
the receiving module 21 is configured to receive a request for generating unlocking data in an administrator mode, where the request for generating unlocking data carries a first terminal identifier of the first mobile terminal and/or a second terminal identifier of at least one second mobile terminal; the sending module 22 is configured to send the request for generating the unlocking data to the intelligent door lock; and the intelligent door lock generates a data packet corresponding to the first terminal identifier and/or a data packet corresponding to each second terminal identifier according to the received request for generating the unlocking data under the administrator mode, and sends the generated data packets to corresponding clients, wherein the unlocking key data in each generated data packet are different.
The receiving module 21 is further configured to receive a request for adding a virtual card; the sending module 22 is further configured to send a corresponding virtual card adding request to the smart door lock, where the corresponding virtual card adding request carries the first terminal identifier; the receiving module 21 is further configured to receive a data packet corresponding to the first terminal identifier sent by the intelligent door lock.
The sending module 22 is further configured to send, in the administrator mode, an instruction to enter the administrator mode to the intelligent door lock, where the instruction carries the MAC; and if the MAC carried in the instruction is matched with the ID data and the received input administrator password is correct, the intelligent door lock enters the administrator mode.
The receiving module 21 is further configured to receive a request for releasing the binding with the door lock; the sending module 22 is further configured to send a corresponding request for releasing the binding with the door lock to the intelligent door lock if it is determined that the received input administrator password is correct, where the corresponding request for releasing the binding with the door lock carries the MAC of the first mobile terminal; and the intelligent door lock deletes the ID data corresponding to the MAC according to the received binding releasing request with the door lock, and releases the binding relation with the first mobile terminal.
The receiving module 21 is further configured to receive a request for deleting the unlocking data in the administrator mode; the sending module 22 is further configured to send the request for deleting the unlocking data to the intelligent door lock, where the request for deleting the unlocking data carries the first terminal identifier and/or the at least one second terminal identifier.
The receiving module 21 is further configured to receive a request for newly adding unlocking data in the administrator mode; the sending module 22 is further configured to send the new unlocking data request to the intelligent door lock, where the new unlocking data request carries the first terminal identifier and/or the at least one second terminal identifier.
EXAMPLE seven
The seventh embodiment of the present invention provides a client, where the client is bound with a second mobile terminal, the client communicates with an intelligent door lock through a local area network, and a structure of the client may be as shown in fig. 7, where the client includes:
the receiving module 31 is configured to receive a virtual card adding request; receiving a data packet corresponding to a second terminal identifier of the second mobile terminal sent by the intelligent door lock;
the sending module 32 is configured to send a corresponding virtual card adding request to the smart door lock, where the corresponding virtual card adding request carries a second terminal identifier of the second mobile terminal.
It should be noted that the client provided in the sixth embodiment and the seventh embodiment may be understood as the same client, and is only installed on different mobile terminals. The mobile terminal can be bound with the intelligent door lock by utilizing the installed client, so that a user can serve as an administrator to communicate with the intelligent door lock through the local area network by using the client. The mobile terminal can also not be bound with the intelligent door lock, so that the user can be used as a general user to communicate with the intelligent door lock through the local area network by using the client.
Example eight
An eighth embodiment of the present invention provides an intelligent door lock, where the intelligent door lock communicates with a first client bound to a first mobile terminal through a local area network, and is bound to the first mobile terminal, and a structure of the intelligent door lock may be as shown in fig. 8, where the structure includes:
the receiving module 41 is configured to receive, in an administrator mode, a request for generating unlocking data sent by the first client, where the request for generating unlocking data carries a first terminal identifier of the first mobile terminal and/or a second terminal identifier of at least one second mobile terminal; the generating module 42 is configured to generate a data packet corresponding to the first terminal identifier and/or a data packet corresponding to each second terminal identifier according to the received request for generating unlocking data, where unlocking key data included in each generated data packet are different from each other; the sending module 43 is configured to send the generated data packet to a corresponding client.
The receiving module 41 is further configured to receive a virtual card adding request sent by the first client, where the virtual card adding request carries the first terminal identifier; the sending module 43 is specifically configured to send a data packet corresponding to the first terminal identifier to the first client according to the received virtual card adding request sent by the first client.
The receiving module 41 is further configured to receive a virtual card adding request sent by a second client, where the virtual card adding request carries a second terminal identifier of a second mobile terminal bound to the second client; the sending module 43 is specifically configured to send, according to the received virtual card adding request sent by the second client, a data packet corresponding to the second terminal identifier carried in the virtual card adding request to the second client.
The receiving module 41 is further configured to receive an instruction sent by the first client to enter an administrator mode, where the instruction carries the MAC; and according to the received instruction for entering the administrator mode, if the MAC carried in the instruction is matched with the ID data and the received input administrator password is correct, triggering the intelligent door lock to enter the administrator mode.
The receiving module 41 is further configured to receive a request for releasing the binding with the door lock sent by the first client, where the request for releasing the binding with the door lock carries the MAC; the generating module 42 is further configured to delete the ID data corresponding to the MAC according to the received request for releasing the binding with the door lock, and release the binding relationship with the first mobile terminal.
The receiving module 41 is further configured to receive, in an administrator mode, a request for deleting unlocking data sent by the first client, where the request for deleting unlocking data carries the first terminal identifier and/or the at least one second terminal identifier; the generating module 42 is further configured to delete, according to the received request for deleting the unlocking data, the data packet corresponding to the first terminal identifier and/or the data packet corresponding to each second terminal identifier, which are carried in the request for deleting the unlocking data.
The receiving module 41 is further configured to receive, in an administrator mode, a newly added unlocking data request sent by the first client, where the newly added unlocking data request carries the first terminal identifier and/or the at least one second terminal identifier; the generating module 42 is further configured to generate, according to the received new unlocking data request, a data packet corresponding to the first terminal identifier and/or a data packet corresponding to each second terminal identifier, which are carried in the new unlocking data request, where unlocking key data included in each generated data packet are different from each other.
Based on the same inventive concept, the embodiments of the present invention provide the following media.
The ninth embodiment of the present invention provides a nonvolatile computer storage medium, where the computer storage medium stores an executable program, and when the executable program is executed by a processor, the method provided in the second to fourth embodiments of the present invention is implemented.
In particular implementations, computer storage media may include: various storage media capable of storing program codes, such as a Universal Serial Bus flash drive (USB), a mobile hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
In the embodiments of the present invention, it should be understood that the disclosed apparatus and method may be implemented in other ways. For example, the above-described embodiments of the apparatus are merely illustrative, and for example, the described unit or division of units is only one division of logical functions, and there may be other divisions when actually implemented, for example, a plurality of units or components may be combined or may be integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical or other form.
The functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may be an independent physical module.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, all or part of the technical solutions of the embodiments of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device, such as a personal computer, a server, or a network device, or a processor (processor) to execute all or part of the steps of the methods according to the embodiments of the present invention. And the aforementioned storage medium includes: various media that can store program codes, such as a universal serial bus flash drive (usb flash drive), a removable hard disk, a ROM, a RAM, a magnetic disk, or an optical disk.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
While preferred embodiments of the present invention have been described, additional variations and modifications in those embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims be interpreted as including preferred embodiments and all such alterations and modifications as fall within the scope of the invention.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present invention without departing from the spirit and scope of the invention. Thus, if such modifications and variations of the present invention fall within the scope of the claims of the present invention and their equivalents, the present invention is also intended to include such modifications and variations.

Claims (22)

1. The utility model provides an intelligence lock system of unblanking, its characterized in that, the system includes first mobile terminal and intelligent lock, first mobile terminal utilize the first customer end of binding, through LAN with the intelligence lock communicates, just first mobile terminal with the intelligence lock is bound, wherein:
the first client is used for receiving and generating an unlocking data request and sending the unlocking data request to the intelligent door lock in an administrator mode, wherein the unlocking data request is generated and carries a first terminal identifier of the first mobile terminal and/or a second terminal identifier of at least one second mobile terminal;
the intelligent door lock is used for generating a data packet corresponding to the first terminal identifier and/or a data packet corresponding to each second terminal identifier according to the received unlocking data generation request in the administrator mode, and sending the generated data packets to corresponding clients, wherein the unlocking secret key data in each generated data packet are different;
if the intelligent door lock receives a binding request sent by the first client, the binding request carries a media access control address MAC of the first mobile terminal, the intelligent door lock generates identification ID data according to the MAC and a random number, and a binding relationship with the first mobile terminal is established according to the ID data, then:
the first client is further used for sending an instruction for entering the administrator mode to the intelligent door lock in the administrator mode, wherein the instruction carries the MAC;
the intelligent door lock is further used for entering the administrator mode if the MAC carried in the instruction is matched with the ID data and the received input administrator password is correct according to the received instruction entering the administrator mode.
2. The system according to claim 1, wherein if the request for generating the unlocking data carries the first terminal identifier of the first mobile terminal, then:
the first client is further configured to send a corresponding virtual card adding request to the smart door lock if the virtual card adding request is received, where the corresponding virtual card adding request carries the first terminal identifier;
the intelligence lock sends the data package that generates to corresponding customer end, includes:
and sending a data packet corresponding to the first terminal identifier to the first client according to the received virtual card adding request sent by the first client.
3. The system according to claim 1, wherein if the request for generating the unlocking data carries the second terminal identifier of at least one second mobile terminal, then:
the system also comprises at least one second mobile terminal, each second mobile terminal is bound with a second client, the second client communicates with the intelligent door lock through a local area network, and the system comprises:
the second client is used for sending a corresponding virtual card adding request to the intelligent door lock if the virtual card adding request is received, wherein the virtual card adding request carries a second terminal identifier of a second mobile terminal bound by the second client;
the intelligence lock sends the data package that generates to corresponding customer end, includes:
and sending a data packet corresponding to the second terminal identifier carried in the virtual card adding request to the second client according to the received virtual card adding request sent by the second client.
4. The system of claim 1,
the first client is further used for receiving a request for releasing the binding with the door lock, and if the received input administrator password is determined to be correct, sending a corresponding request for releasing the binding with the door lock to the intelligent door lock, wherein the corresponding request for releasing the binding with the door lock carries the MAC of the first mobile terminal;
and the intelligent door lock is further used for deleting the ID data corresponding to the MAC according to the received binding releasing request with the door lock, and releasing the binding relation with the first mobile terminal.
5. The system according to any one of claims 1 to 4, wherein the first client is further configured to receive, in an administrator mode, a request for deleting unlocking data and send the request to the smart door lock, where the request for deleting unlocking data carries the first terminal identifier and/or the at least one second terminal identifier;
and the intelligent door lock is further used for deleting the data packet corresponding to the first terminal identifier and/or the data packet corresponding to each second terminal identifier carried in the request for deleting the unlocking data in the administrator mode according to the received request for deleting the unlocking data.
6. The system according to any one of claims 1 to 4, wherein the first client is further configured to receive a new unlocking data request and send the new unlocking data request to the smart door lock in an administrator mode, where the new unlocking data request carries the first terminal identifier and/or the at least one second terminal identifier;
the intelligent door lock is further configured to generate, in the administrator mode, a data packet corresponding to the first terminal identifier and/or a data packet corresponding to each second terminal identifier carried in the newly added unlocking data request, according to the received newly added unlocking data request, where unlocking key data included in each generated data packet are different from each other.
7. An intelligent door lock unlocking method is characterized in that the method is applied to a first client bound on a first mobile terminal, the first client communicates with an intelligent door lock through a local area network, and the first mobile terminal is bound with the intelligent door lock, and the method comprises the following steps:
receiving a request for generating unlocking data under an administrator mode, wherein the request for generating the unlocking data carries a first terminal identifier of the first mobile terminal and/or a second terminal identifier of at least one second mobile terminal;
sending the request for generating unlocking data to the intelligent door lock;
the intelligent door lock is in an administrator mode, and according to the received request for generating the unlocking data, data packets corresponding to the first terminal identification and/or data packets corresponding to each second terminal identification are generated, the generated data packets are sent to corresponding clients, and the unlocking secret key data included in each generated data packet are different;
if the intelligent door lock receives a binding request sent by the first client, the binding request carries a media access control address MAC of the first mobile terminal, the intelligent door lock generates identification ID data according to the MAC and a random number, and a binding relationship between the intelligent door lock and the first mobile terminal is established according to the ID data, the method further comprises the following steps:
in the administrator mode, sending an instruction for entering the administrator mode to the intelligent door lock, wherein the instruction carries the MAC;
and if the MAC carried in the instruction is matched with the ID data and the received input administrator password is correct, the intelligent door lock enters the administrator mode.
8. The method of claim 7, wherein if the request to generate the unlocking data carries the first terminal identifier of the first mobile terminal, the method further comprises:
receiving a request for adding a virtual card;
sending a corresponding virtual card adding request to the intelligent door lock, wherein the corresponding virtual card adding request carries the first terminal identification;
and receiving a data packet corresponding to the first terminal identification sent by the intelligent door lock.
9. The method of claim 7, wherein the method further comprises:
receiving a request for releasing the binding with the door lock;
if the received input administrator password is determined to be correct, sending a corresponding request for releasing the binding with the door lock to the intelligent door lock, wherein the corresponding request for releasing the binding with the door lock carries the MAC of the first mobile terminal;
and the intelligent door lock deletes the ID data corresponding to the MAC according to the received binding releasing request with the door lock, and releases the binding relation with the first mobile terminal.
10. The method of any of claims 7 to 9, further comprising:
receiving a request for deleting unlocking data in an administrator mode;
and sending the unlocking data deleting request to the intelligent door lock, wherein the unlocking data deleting request carries the first terminal identification and/or at least one second terminal identification.
11. The method of any of claims 7 to 9, further comprising:
receiving a newly-added unlocking data request in an administrator mode;
and sending the newly-added unlocking data request to the intelligent door lock, wherein the newly-added unlocking data request carries the first terminal identification and/or at least one second terminal identification.
12. The intelligent door lock unlocking method is applied to a second client bound on a second mobile terminal, the second client and the intelligent door lock are communicated through a local area network, and the method comprises the following steps:
receiving a request for adding a virtual card;
sending a corresponding virtual card adding request to the intelligent door lock, wherein the corresponding virtual card adding request carries a second terminal identifier of the second mobile terminal;
receiving a data packet corresponding to the second terminal identification sent by the intelligent door lock;
the data packets are generated by a first client side in an administrator mode, receiving and generating an unlocking data request and sending the unlocking data request to an intelligent door lock, wherein the unlocking data request is carried with a first terminal identifier of a first mobile terminal and/or a second terminal identifier of at least one second mobile terminal, the intelligent door lock generates data packets corresponding to the first terminal identifier and/or data packets corresponding to each second terminal identifier according to the received unlocking data request, and sends the generated data packets to corresponding client sides, and unlocking secret key data included in each data packet generated by the intelligent door lock are different;
the first client is bound with a first mobile terminal, and is communicated with the intelligent door lock through a local area network, and the first mobile terminal is bound with the intelligent door lock;
if the intelligent door lock receives a binding request sent by the first client, the binding request carries a media access control address MAC of the first mobile terminal, the intelligent door lock generates identification ID data according to the MAC and a random number, and a binding relationship with the first mobile terminal is established according to the ID data, then:
the first client is further used for sending an instruction for entering the administrator mode to the intelligent door lock in the administrator mode, wherein the instruction carries the MAC;
the intelligent door lock is further used for entering the administrator mode if the MAC carried in the instruction is matched with the ID data and the received input administrator password is correct according to the received instruction entering the administrator mode.
13. An intelligent door lock unlocking method is applied to an intelligent door lock, the intelligent door lock is communicated with a first client bound on a first mobile terminal through a local area network and is bound with the first mobile terminal, and the method comprises the following steps:
in an administrator mode, receiving a request for generating unlocking data sent by the first client, wherein the request for generating unlocking data carries a first terminal identifier of the first mobile terminal and/or a second terminal identifier of at least one second mobile terminal;
generating a data packet corresponding to the first terminal identifier and/or a data packet corresponding to each second terminal identifier according to the received request for generating the unlocking data, and sending the generated data packets to corresponding clients, wherein the unlocking secret key data in each generated data packet are different;
if the intelligent door lock receives a binding request sent by the first client, the binding request carries a media access control address MAC of the first mobile terminal, the intelligent door lock generates identification ID data according to the MAC and a random number, and a binding relationship between the intelligent door lock and the first mobile terminal is established according to the ID data, and the method further comprises the following steps:
receiving an instruction which is sent by the first client and enters an administrator mode, wherein the instruction carries the MAC;
and according to the received instruction for entering the administrator mode, if the MAC carried in the instruction is matched with the ID data and the received input administrator password is correct, entering the administrator mode.
14. The method of claim 13, wherein if the request to generate the unlocking data carries the first terminal identifier of the first mobile terminal, the method further comprises:
receiving a virtual card adding request sent by the first client, wherein the virtual card adding request carries the first terminal identification;
sending the generated data packet to a corresponding client, comprising:
and sending a data packet corresponding to the first terminal identifier to the first client according to the received virtual card adding request sent by the first client.
15. The method of claim 13, wherein if the request for generating the unlocking data carries a second terminal identifier of at least one second mobile terminal, the smart door lock communicates with at least one second client via a local area network, and one second client is bound to one second mobile terminal, the method further comprising:
receiving a virtual card adding request sent by a second client, wherein the virtual card adding request carries a second terminal identifier of a second mobile terminal bound by the second client;
sending the generated data packet to a corresponding client, comprising:
and sending a data packet corresponding to the second terminal identifier carried in the virtual card adding request to the second client according to the received virtual card adding request sent by the second client.
16. The method of claim 13, wherein the method further comprises:
receiving a binding releasing and door lock request sent by the first client, wherein the MAC is carried in the binding releasing and door lock request;
and deleting the ID data corresponding to the MAC according to the received request for releasing the binding with the door lock, and releasing the binding relation with the first mobile terminal.
17. The method of any of claims 13 to 16, further comprising:
in an administrator mode, receiving a request for deleting unlocking data sent by the first client, wherein the request for deleting unlocking data carries the first terminal identification and/or at least one second terminal identification;
and deleting the data packet corresponding to the first terminal identifier and/or the data packet corresponding to each second terminal identifier carried in the request for deleting the unlocking data according to the received request for deleting the unlocking data.
18. The method of any of claims 13 to 16, further comprising:
in an administrator mode, receiving a newly-added unlocking data request sent by the first client, wherein the newly-added unlocking data request carries the first terminal identification and/or at least one second terminal identification;
and generating a data packet corresponding to the first terminal identifier and/or a data packet corresponding to each second terminal identifier carried in the newly added unlocking data request according to the received newly added unlocking data request, wherein the generated data packets comprise different unlocking secret key data.
19. The utility model provides a first client, its characterized in that, first client and first mobile terminal bind, first client and intelligent lock communicate through LAN, and first mobile terminal with intelligent lock is bound, includes:
a receiving module, configured to receive a request for generating unlocking data in an administrator mode, where the request for generating unlocking data carries a first terminal identifier of the first mobile terminal and/or a second terminal identifier of at least one second mobile terminal;
the sending module is used for sending the unlocking data generation request to the intelligent door lock; the intelligent door lock is in an administrator mode, and according to the received request for generating the unlocking data, data packets corresponding to the first terminal identification and/or data packets corresponding to each second terminal identification are generated, the generated data packets are sent to corresponding clients, and the unlocking secret key data included in each generated data packet are different;
if the intelligent door lock receives a binding request sent by the first client, the binding request carries a media access control address MAC of the first mobile terminal, the intelligent door lock generates identification ID data according to the MAC and a random number, and a binding relationship with the first mobile terminal is established according to the ID data, then:
the sending module is further configured to send an instruction for entering the administrator mode to the intelligent door lock in the administrator mode, where the instruction carries the MAC; and if the MAC carried in the instruction is matched with the ID data and the received input administrator password is correct, the intelligent door lock enters the administrator mode.
20. The utility model provides a second client, its characterized in that, second client and second mobile terminal bind, second client and intelligent lock carry out communication through LAN, include:
the receiving module is used for receiving a virtual card adding request; receiving a data packet corresponding to a second terminal identifier of the second mobile terminal sent by the intelligent door lock;
the sending module is used for sending a corresponding virtual card adding request to the intelligent door lock, wherein the corresponding virtual card adding request carries a second terminal identifier of the second mobile terminal;
the data packets are generated by a first client side in an administrator mode, receiving and generating an unlocking data request and sending the unlocking data request to an intelligent door lock, wherein the unlocking data request is carried with a first terminal identifier of a first mobile terminal and/or a second terminal identifier of at least one second mobile terminal, the intelligent door lock generates data packets corresponding to the first terminal identifier and/or data packets corresponding to each second terminal identifier according to the received unlocking data request, and sends the generated data packets to corresponding client sides, and unlocking secret key data included in each data packet generated by the intelligent door lock are different;
the first client is bound with a first mobile terminal, and is communicated with the intelligent door lock through a local area network, and the first mobile terminal is bound with the intelligent door lock;
if the intelligent door lock receives a binding request sent by the first client, the binding request carries a media access control address MAC of the first mobile terminal, the intelligent door lock generates identification ID data according to the MAC and a random number, and a binding relationship with the first mobile terminal is established according to the ID data, then:
the first client is further used for sending an instruction for entering the administrator mode to the intelligent door lock in the administrator mode, wherein the instruction carries the MAC;
the intelligent door lock is further used for entering the administrator mode if the MAC carried in the instruction is matched with the ID data and the received input administrator password is correct according to the received instruction entering the administrator mode.
21. The utility model provides an intelligence lock, its characterized in that, intelligence lock communicates through the first customer end that binds on LAN and the first mobile terminal to bind with the first mobile terminal, includes:
a receiving module, configured to receive, in an administrator mode, a request for generating unlocking data sent by the first client, where the request for generating unlocking data carries a first terminal identifier of the first mobile terminal and/or a second terminal identifier of at least one second mobile terminal;
the generating module is used for generating a data packet corresponding to the first terminal identifier and/or a data packet corresponding to each second terminal identifier according to the received request for generating the unlocking data, and the unlocking secret key data included in each generated data packet are different;
the sending module is used for sending the generated data packet to the corresponding client;
if the intelligent door lock receives a binding request sent by the first client, the binding request carries a media access control address MAC of the first mobile terminal, the intelligent door lock generates identification ID data according to the MAC and a random number, and a binding relationship with the first mobile terminal is established according to the ID data, then:
the receiving module is further configured to receive an instruction for entering an administrator mode sent by the first client, where the instruction carries the MAC; and according to the received instruction for entering the administrator mode, if the MAC carried in the instruction is matched with the ID data and the received input administrator password is correct, triggering the intelligent door lock to enter the administrator mode.
22. A non-transitory computer storage medium storing an executable program for execution by a processor to perform the method of any one of claims 7 to 18.
CN201911172929.1A 2019-11-26 2019-11-26 Intelligent door lock unlocking system, method, device and medium Active CN110942537B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911172929.1A CN110942537B (en) 2019-11-26 2019-11-26 Intelligent door lock unlocking system, method, device and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911172929.1A CN110942537B (en) 2019-11-26 2019-11-26 Intelligent door lock unlocking system, method, device and medium

Publications (2)

Publication Number Publication Date
CN110942537A CN110942537A (en) 2020-03-31
CN110942537B true CN110942537B (en) 2021-10-15

Family

ID=69908089

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911172929.1A Active CN110942537B (en) 2019-11-26 2019-11-26 Intelligent door lock unlocking system, method, device and medium

Country Status (1)

Country Link
CN (1) CN110942537B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112200954A (en) * 2020-09-10 2021-01-08 中信银行股份有限公司 Internet access control authorization method, system, electronic equipment and readable storage medium
CN114495331A (en) * 2022-01-25 2022-05-13 深圳拓邦股份有限公司 Binding method, binding device and binding system of intelligent lock

Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8844811B1 (en) * 2013-06-04 2014-09-30 April Elizabeth Rogers System and method for controlling locks
CN104282060A (en) * 2014-08-21 2015-01-14 厦门华数电力科技有限公司 Method for unlocking safety intelligent lock system
CN104508713A (en) * 2012-06-05 2015-04-08 塔普基有限公司 Method and device for control of a lock mechanism using a mobile terminal
CN105261104A (en) * 2015-11-24 2016-01-20 重庆理工大学 Bluetooth door lock system based on intelligent terminal, and control method of Bluetooth door lock system
US9395133B2 (en) * 2013-02-06 2016-07-19 Karl F. Milde, Jr. Secure smartphone-operated gun trigger lock
CN106131179A (en) * 2016-07-05 2016-11-16 林哲敏 The password Rights Management System of a kind of intelligent door lock and method
CN106293816A (en) * 2016-08-02 2017-01-04 成都荷码科技有限公司 A kind of method of the viscosity increasing the App that user installs with mobile intelligent terminal
CN106652106A (en) * 2015-10-29 2017-05-10 中兴通讯股份有限公司 Door lock control method, device and terminal
CN107038777A (en) * 2017-03-29 2017-08-11 云丁网络技术(北京)有限公司 A kind of safety communicating method and its intelligent door lock system based on intelligent door lock system
CN108183797A (en) * 2018-01-05 2018-06-19 浙江科易理想量子信息技术有限公司 A kind of quantum cryptography locks implementation method
CN109658556A (en) * 2018-11-27 2019-04-19 深圳市赛亿科技开发有限公司 A kind of intelligent door lock method for unlocking and system
CN109712278A (en) * 2018-11-27 2019-05-03 深圳市小石安防科技有限公司 Intelligent door lock identity identifying method, system, readable storage medium storing program for executing and mobile terminal
CN109830017A (en) * 2019-02-01 2019-05-31 深圳市汇顶科技股份有限公司 Data managing method, device, equipment, system and the storage medium of smart lock

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105118127B (en) * 2015-09-17 2016-06-08 慧锐通智能科技股份有限公司 A kind of guest system and control method thereof
CN107093228B (en) * 2016-02-17 2020-09-01 腾讯科技(深圳)有限公司 Authorization method, device and system applied to electronic lock

Patent Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104508713A (en) * 2012-06-05 2015-04-08 塔普基有限公司 Method and device for control of a lock mechanism using a mobile terminal
US9395133B2 (en) * 2013-02-06 2016-07-19 Karl F. Milde, Jr. Secure smartphone-operated gun trigger lock
US8844811B1 (en) * 2013-06-04 2014-09-30 April Elizabeth Rogers System and method for controlling locks
CN104282060A (en) * 2014-08-21 2015-01-14 厦门华数电力科技有限公司 Method for unlocking safety intelligent lock system
CN106652106A (en) * 2015-10-29 2017-05-10 中兴通讯股份有限公司 Door lock control method, device and terminal
CN105261104A (en) * 2015-11-24 2016-01-20 重庆理工大学 Bluetooth door lock system based on intelligent terminal, and control method of Bluetooth door lock system
CN106131179A (en) * 2016-07-05 2016-11-16 林哲敏 The password Rights Management System of a kind of intelligent door lock and method
CN106293816A (en) * 2016-08-02 2017-01-04 成都荷码科技有限公司 A kind of method of the viscosity increasing the App that user installs with mobile intelligent terminal
CN107038777A (en) * 2017-03-29 2017-08-11 云丁网络技术(北京)有限公司 A kind of safety communicating method and its intelligent door lock system based on intelligent door lock system
CN108183797A (en) * 2018-01-05 2018-06-19 浙江科易理想量子信息技术有限公司 A kind of quantum cryptography locks implementation method
CN109658556A (en) * 2018-11-27 2019-04-19 深圳市赛亿科技开发有限公司 A kind of intelligent door lock method for unlocking and system
CN109712278A (en) * 2018-11-27 2019-05-03 深圳市小石安防科技有限公司 Intelligent door lock identity identifying method, system, readable storage medium storing program for executing and mobile terminal
CN109830017A (en) * 2019-02-01 2019-05-31 深圳市汇顶科技股份有限公司 Data managing method, device, equipment, system and the storage medium of smart lock

Also Published As

Publication number Publication date
CN110942537A (en) 2020-03-31

Similar Documents

Publication Publication Date Title
CN109272606B (en) Intelligent lock supervision equipment and method based on block chain and storage medium
CN108462710B (en) Authentication and authorization method, device, authentication server and machine-readable storage medium
CN110009776B (en) Identity authentication method and device
CN111130602B (en) Near field communication card data writing system, method, device and medium
CN110232568B (en) Mobile payment method, mobile payment device, computer equipment and readable storage medium
CN106503492A (en) A kind of authorization management method, server, customer equipment and system
CN106127888B (en) Intelligent lock operation method and smart lock operating system
CN110942537B (en) Intelligent door lock unlocking system, method, device and medium
CN109714769A (en) Information binding method, device, equipment and storage medium
CN104469736B (en) A kind of data processing method, server and terminal
CN106027250A (en) Identity card information safety transmission method and system
CN110853191A (en) Intelligent door lock unlocking method, equipment and medium
CN110176091A (en) A method of smart lock safety is improved by mobile terminal device code
CN108121904B (en) Unlocking method, device, electronic equipment and server
CN106162607A (en) The management method of a kind of virtual SIM card, device and system
CN108537532B (en) Resource transfer method, device and system based on near field communication and electronic equipment
CN109639434A (en) A kind of method for unlocking based on block chain, device, system and calculate equipment
CN105025548B (en) A kind of the connection control method and device of SIM card
CN104980279A (en) Identity authentication method, and related equipment and system
CN105871840B (en) A kind of certificate management method and system
CN105141795A (en) Unlocking method and system for device to be unlocked
CN110766388B (en) Virtual card generation method and system and electronic equipment
CN110738759A (en) fingerprint storage method, identity verification method, device and system
CN113807843B (en) Card binding method, user terminal, server, system and storage medium
CN104113417A (en) Dynamic password identity authentication method and system based on near field communication (NFC)

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant