CN111369716B - Unlocking method, door lock and computer readable storage medium - Google Patents

Unlocking method, door lock and computer readable storage medium Download PDF

Info

Publication number
CN111369716B
CN111369716B CN202010135372.0A CN202010135372A CN111369716B CN 111369716 B CN111369716 B CN 111369716B CN 202010135372 A CN202010135372 A CN 202010135372A CN 111369716 B CN111369716 B CN 111369716B
Authority
CN
China
Prior art keywords
unlocking
mobile terminal
information
door lock
instruction
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010135372.0A
Other languages
Chinese (zh)
Other versions
CN111369716A (en
Inventor
杨建伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Goertek Techology Co Ltd
Original Assignee
Goertek Techology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Goertek Techology Co Ltd filed Critical Goertek Techology Co Ltd
Priority to CN202010135372.0A priority Critical patent/CN111369716B/en
Publication of CN111369716A publication Critical patent/CN111369716A/en
Application granted granted Critical
Publication of CN111369716B publication Critical patent/CN111369716B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00563Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys using personal physical data of the operator, e.g. finger prints, retinal images, voicepatterns
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Telephone Function (AREA)

Abstract

The invention discloses an unlocking method, a door lock and a computer readable storage medium, wherein when an unlocking instruction is received, an unlocking mode combination is obtained; sending the unlocking mode combination to a target mobile terminal; receiving unlocking information fed back by the target mobile terminal according to the unlocking mode combination; and matching the received unlocking information with prestored unlocking information associated with the unlocking mode combination, and executing unlocking operation when the matching is successful. The invention provides an unlocking method, a door lock and a computer readable storage medium, which solve the problem that in the prior art, when a door lock key or an unlocking password is obtained by others, the door lock is easy to be unlocked directly through the door lock key or the unlocking password, so that the safety of the door lock is low.

Description

Unlocking method, door lock and computer readable storage medium
Technical Field
The invention relates to the technical field of door lock control, in particular to an unlocking method, a door lock and a computer readable storage medium.
Background
The door lock is the guarantee of indoor safety, and among the prior art, the mode of lock unblock is diversified gradually, and the mode of unblock still includes unlocking modes such as fingerprint unblock and password unblock except traditional key unblock. When other people except the resident obtain the door lock key or the unlocking password, the door lock is easily unlocked only through the door lock key or the unlocking password, and therefore the safety of the door lock is influenced.
Disclosure of Invention
The invention provides an unlocking method, a door lock and a computer readable storage medium, and aims to solve the problem that in the prior art, when a door lock key or an unlocking password is obtained by others, the door lock is easy to be unlocked directly through the door lock key or the unlocking password, so that the safety of the door lock is low.
In order to achieve the above object, the present invention provides an unlocking method, which is applied to a door lock, and includes:
when an unlocking instruction is received, an unlocking mode combination is obtained;
sending the unlocking mode combination to a target mobile terminal;
receiving unlocking information fed back by the target mobile terminal according to the unlocking mode combination;
and matching the received unlocking information with prestored unlocking information associated with the unlocking mode combination, and executing unlocking operation when the matching is successful.
Optionally, the step of obtaining the unlocking mode combination when the unlocking instruction is received includes:
when the unlocking instruction is received, a target mobile terminal corresponding to the unlocking instruction is obtained;
and acquiring an unlocking mode combination according to the target mobile terminal.
Optionally, the step of obtaining the target mobile terminal corresponding to the unlocking instruction when receiving the unlocking instruction includes:
when the unlocking instruction is received, identity identification information corresponding to the unlocking instruction is determined;
matching the identity identification information with preset identification information;
and when the matching is successful, taking the mobile terminal corresponding to the preset identification information matched with the identity identification information as the target mobile terminal.
Optionally, when the unlocking instruction is received, the step of determining the identification information corresponding to the unlocking instruction includes:
when the unlocking instruction is received, determining a triggering mode of the unlocking instruction;
when the triggering mode is voice triggering, performing voice recognition on the unlocking instruction to determine voice recognition information;
and determining the identity recognition information according to the voice recognition information.
Optionally, after the step of matching the identification information with preset identification information, the method further includes:
when the matching fails, acquiring a mobile terminal in the same network environment where the door lock is located;
sending unlocking confirmation information to the mobile terminal;
and after receiving the confirmation feedback information sent by the mobile terminal, determining a target mobile terminal according to the mobile terminal sending the confirmation feedback information.
Optionally, the step of determining the target mobile terminal according to the mobile terminal sending the acknowledgment feedback information includes:
after the confirmation feedback information sent by the plurality of mobile terminals is obtained, determining the sending time of the unlocking confirmation feedback information sent by the plurality of mobile terminals;
and taking the mobile terminal with the earliest sending time as the target mobile terminal.
Optionally, the step of determining the target mobile terminal according to the mobile terminal sending the acknowledgment feedback information includes:
after receiving the confirmation feedback information sent by the mobile terminal, sending the equipment information and the authorized unlocking information of the mobile terminal to a preset mobile terminal;
and when the authorization confirmation information fed back by the preset mobile terminal is acquired, taking the mobile terminal sending the confirmation feedback information as the target mobile terminal.
Optionally, after the step of receiving the unlocking information fed back by the mobile terminal, the method further includes:
when the matching of the unlocking information and the prestored unlocking information associated with the unlocking mode combination fails, recording the failure times;
and outputting alarm information when the failure times exceed a threshold value.
In order to achieve the above object, the present application proposes a door lock, which includes a processor, a memory, and a computer program stored on the memory and executable on the processor, wherein the computer program, when executed by the processor, further implements the steps of the unlocking method according to any one of the above embodiments.
In order to achieve the above object, the present application provides a computer-readable storage medium, where an unlocking program is stored, and the sound box control program, when executed by a processor, implements the steps of the unlocking method according to any one of the above embodiments.
According to the technical scheme, after the door lock receives an unlocking instruction, an unlocking mode combination can be obtained, the door lock is determined, after the unlocking mode combination, the unlocking mode combination is sent to the target mobile terminal, the target mobile terminal receives unlocking information fed back by the unlocking mode combination, the unlocking information is matched with prestored unlocking information associated with the unlocking mode combination, and unlocking operation is executed when the matching is successful. Through the combination of the unlocking modes, the user can unlock the door lock by randomly using various different modes, and the unlocking mode is not limited to a single unlocking mode, so that the problem that the safety of the door lock is low due to the fact that the door lock is easily and directly unlocked by the door lock key or the unlocking password when other people obtain the door lock key or the unlocking password in the prior art is solved.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the structures shown in the drawings without creative efforts.
Fig. 1 is a schematic terminal structure diagram of a hardware operating environment according to an embodiment of the present invention;
fig. 2 is a schematic flow chart of embodiment 1 of the unlocking method of the present invention;
fig. 3 is a schematic flow chart of embodiment 2 of the unlocking method of the present invention;
fig. 4 is a schematic flow chart of embodiment 3 of the unlocking method of the present invention;
fig. 5 is a schematic flow chart of embodiment 4 of the unlocking method of the present invention;
fig. 6 is a schematic flow chart of embodiment 5 of the unlocking method of the present invention;
fig. 7 is a schematic flow chart of embodiment 6 of the unlocking method of the present invention;
fig. 8 is a schematic flow chart of embodiment 7 of the unlocking method of the present invention;
fig. 9 is a flowchart of an unlocking method embodiment 8 of the present invention.
The implementation, functional features and advantages of the objects of the present invention will be further explained with reference to the accompanying drawings.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It should be noted that all the directional indicators (such as up, down, left, right, front, and rear … …) in the embodiment of the present invention are only used to explain the relative position relationship between the components, the movement situation, etc. in a specific posture (as shown in the drawing), and if the specific posture is changed, the directional indicator is changed accordingly.
In addition, the descriptions related to "first", "second", etc. in the present invention are only for descriptive purposes and are not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defined as "first" or "second" may explicitly or implicitly include at least one such feature. In the description of the present invention, "a plurality" means at least two, e.g., two, three, etc., unless specifically limited otherwise.
In the present invention, unless otherwise expressly stated or limited, the terms "connected," "secured," and the like are to be construed broadly, and for example, "secured" may be a fixed connection, a removable connection, or an integral part; can be mechanically or electrically connected; they may be directly connected or indirectly connected through intervening media, or they may be connected internally or in any other suitable relationship, unless expressly stated otherwise. The specific meanings of the above terms in the present invention can be understood by those skilled in the art according to specific situations.
In addition, the technical solutions in the embodiments of the present invention may be combined with each other, but it must be based on the realization of those skilled in the art, and when the technical solutions are contradictory or cannot be realized, such a combination of technical solutions should not be considered to exist, and is not within the protection scope of the present invention.
As shown in fig. 1, fig. 1 is a schematic device structure diagram of a hardware operating environment according to an embodiment of the present invention.
As shown in fig. 1, the apparatus may include: a controller 1001, such as a CPU, a network interface 1004, a user interface 1003, a memory 1005, and a communication bus 1002. Wherein a communication bus 1002 is used to enable connective communication between these components. The user interface 1003 may include a Display screen (Display), an input unit such as a Keyboard (Keyboard), and the optional user interface 1003 may also include a standard wired interface, a wireless interface. The network interface 1004 may optionally include a standard wired interface, a wireless interface (e.g., WI-FI interface). The memory 1005 may be a high-speed RAM memory or a non-volatile memory (non-volatile memory), such as a magnetic disk memory. The memory 1005 may alternatively be a storage device separate from the controller 1001 described above.
Those skilled in the art will appreciate that the configuration of the device shown in fig. 1 is not intended to be limiting of the device and may include more or fewer components than those shown, or some components may be combined, or a different arrangement of components.
As shown in fig. 1, the memory 1005, which is a kind of computer storage medium, may include therein an operating system, a network communication module, a user interface module, and an application program.
In the server shown in fig. 1, the user interface 1003 is mainly used to provide an interactive function for the door lock, and the controller 1001 may be used to call an application program stored in the memory 1005 and perform the following operations:
when an unlocking instruction is received, an unlocking mode combination is obtained;
sending the unlocking mode combination to a target mobile terminal;
receiving unlocking information fed back by the target mobile terminal according to the unlocking mode combination;
and matching the received unlocking information with prestored unlocking information associated with the unlocking mode combination, and executing unlocking operation when the matching is successful.
Further, the controller 1001 may call an application program stored in the memory 1005, and also perform the following operations:
when the unlocking instruction is received, a target mobile terminal corresponding to the unlocking instruction is obtained;
and acquiring an unlocking mode combination according to the target mobile terminal.
Further, the controller 1001 may call an application program stored in the memory 1005, and also perform the following operations:
when the unlocking instruction is received, identity identification information corresponding to the unlocking instruction is determined;
matching the identity identification information with preset identification information;
and when the matching is successful, taking the mobile terminal corresponding to the preset identification information matched with the identity identification information as the target mobile terminal.
Further, the controller 1001 may call an application program stored in the memory 1005, and also perform the following operations:
when the unlocking instruction is received, determining a triggering mode of the unlocking instruction;
when the triggering mode is voice triggering, performing voice recognition on the unlocking instruction to determine voice recognition information;
and determining the identity recognition information according to the voice recognition information.
Further, the controller 1001 may call an application program stored in the memory 1005, and also perform the following operations:
when the matching fails, acquiring a mobile terminal in the same network environment where the door lock is located;
sending unlocking confirmation information to the mobile terminal;
and after receiving the confirmation feedback information sent by the mobile terminal, determining a target mobile terminal according to the mobile terminal sending the confirmation feedback information.
Further, the controller 1001 may call an application program stored in the memory 1005, and also perform the following operations:
after the confirmation feedback information sent by the plurality of mobile terminals is obtained, determining the sending time of the unlocking confirmation feedback information sent by the plurality of mobile terminals;
and taking the mobile terminal with the earliest sending time as the target mobile terminal.
Further, the controller 1001 may call an application program stored in the memory 1005, and also perform the following operations:
after receiving the confirmation feedback information sent by the mobile terminal, sending the equipment information and the authorized unlocking information of the mobile terminal to a preset mobile terminal;
and when the authorization confirmation information fed back by the preset mobile terminal is acquired, taking the mobile terminal sending the confirmation feedback information as the target mobile terminal.
Further, the controller 1001 may call an application program stored in the memory 1005, and also perform the following operations:
when the matching of the unlocking information and the prestored unlocking information associated with the unlocking mode combination fails, recording the failure times;
and outputting alarm information when the failure times exceed a threshold value.
The invention provides an unlocking method, a door lock and a computer readable storage medium.
Referring to fig. 2, the unlocking method is applied to a door lock, and the unlocking method includes:
s100, acquiring an unlocking mode combination when an unlocking instruction is received;
the unlocking instruction is used for triggering the door lock in a closed state to be unlocked, the receiving mode of the unlocking instruction can be a contact type triggering instruction or a non-contact type triggering instruction, specifically, the contact type triggering instruction can be that an unlocking button on the door lock is pressed, or a fingerprint sensor on the door lock detects fingerprint information, and the non-contact type triggering instruction can be that a voice instruction sent by a user is received, or an unlocking instruction sent by an associated mobile terminal is received.
The unlocking mode combination of the door lock includes but is not limited to one or more of password unlocking, bluetooth unlocking, Near Field Communication (NFC) unlocking, fingerprint identification unlocking, face identification unlocking, iris identification unlocking, verification code unlocking or other unlocking modes capable of identifying a user.
When the door lock receives the unlocking instruction, when the door lock only comprises a single unlocking mode or can select the unlocking mode by a user, the user can unlock according to the unlocking mode of mastered unlocking information, after other people obtain the unlocking information, the unlocking mode can reduce the safety of the door lock, so that in order to improve the safety of the door lock, the unlocking is executed in the mode of unlocking mode combination, specifically, when unlocking is carried out at every time, the door lock randomly selects one or more unlocking modes in the default unlocking mode to form the unlocking mode combination, and the unlocking mode is randomly selected, so that the problem that the safety of the door lock is low due to the fact that the door lock is directly unlocked after the user obtains the unlocking information of one unlocking mode can be avoided.
S200, sending the unlocking mode combination to a target mobile terminal;
s300, receiving unlocking information fed back by the target mobile terminal according to the unlocking mode combination;
and S400, matching the received unlocking information with prestored unlocking information associated with the unlocking mode combination, and executing unlocking operation when matching is successful.
In a specific embodiment, when the door lock receives the unlocking instruction, the door lock randomly selects a password for unlocking from the existing unlocking modes, the unlocking modes of Bluetooth unlocking and face recognition unlocking are used as the unlocking mode combination, the unlocking mode combination is sent to a target mobile terminal of a user, the target mobile terminal respectively unlocks according to three unlocking modes in the unlocking mode combination after receiving the unlocking mode combination, and when three unlocking information input by the user and the prestored unlocking information associated with the unlocking mode combination are successfully matched, the door lock executes unlocking operation, so that the unlocking process of the door lock is completed.
According to the technical scheme, after the door lock receives an unlocking instruction, an unlocking mode combination can be obtained, the door lock is determined, after the unlocking mode combination, the unlocking mode combination is sent to the target mobile terminal, the target mobile terminal receives unlocking information fed back by the unlocking mode combination, the unlocking information is matched with prestored unlocking information associated with the unlocking mode combination, and unlocking operation is executed when the matching is successful. Through the combination of the unlocking modes, the user can unlock the door lock by randomly using various different modes, and the unlocking mode is not limited to a single unlocking mode, so that the problem that the safety of the door lock is low due to the fact that the door lock is easily and directly unlocked by the door lock key or the unlocking password when other people obtain the door lock key or the unlocking password in the prior art is solved.
Example 2
Referring to fig. 3, in embodiment 1, the step S100 includes:
s110, when the unlocking instruction is received, a target mobile terminal corresponding to the unlocking instruction is obtained;
and S120, acquiring an unlocking mode combination according to the target mobile terminal.
After the door lock receives the unlocking instruction, a target mobile terminal which sends the unlocking instruction needs to be determined, and the unlocking mode combination is determined according to the target mobile terminal. Specifically, for the convenience of the user right the lock uses, usually save in the lock the user information of the user that the lock is correlated with, the lock is according to the unblock instruction is confirmed corresponding target mobile terminal, works as target mobile terminal with the mobile terminal that the lock prestores is the same, the lock can select to the target mobile terminal sends the unblock mode that is correlated with user information, for example fingerprint unblock, face identification unblock or iris unblock, as the lock is confirmed target mobile terminal with the mobile terminal that the lock prestores is different, the lock can select the unblock mode that is not correlated with user information completely, for example unblock through the password or unblock through the identifying code. And after the door lock determines the unlocking mode combination, the unlocking mode combination is sent to the target mobile terminal, so that a user can input unlocking information according to different unlocking modes through the mobile terminal, and the door lock unlocking operation is completed.
Example 3
Referring to fig. 4, in embodiment 2, the step S110 includes:
s111, when the unlocking instruction is received, identity identification information corresponding to the unlocking instruction is determined;
the identification information refers to information content that can be used for identifying the target mobile terminal, and specifically, the identification information may be network card address information or Internet Protocol (IP) address information of the target mobile terminal, and since the network card address information or the IP address information corresponding to different mobile terminals are different, the target mobile terminal may be identified by the identification information.
S112, matching the identity identification information with preset identification information;
and S113, when the matching is successful, taking the mobile terminal corresponding to the preset identification information matched with the identity identification information as the target mobile terminal.
After the door lock acquires the identity identification information, matching the identity identification information with the preset identification information stored in the door lock, and when the matching is successful, indicating that the mobile terminal sending the unlocking instruction is the mobile terminal stored with the user information in the door lock. And when the matching fails, the mobile terminal sending the unlocking instruction does not perform unlocking operation on the door lock. After the mobile terminal is determined through the identity identification information, the unlocking mode selectively sent to the mobile terminal can be determined according to the matching result, and therefore different users can be helped to unlock the door lock.
Example 4
Referring to fig. 5, in embodiment 3, the step S111 includes:
s1111, when the unlocking instruction is received, determining a trigger mode of the unlocking instruction;
the method comprises the following steps that a trigger mode comprises but is not limited to key triggering, fingerprint identification triggering, voice triggering, gesture triggering and password triggering, specifically, when the trigger mode is key triggering, an unlocking key used for key triggering is arranged on the door lock, and when a user presses the unlocking key, the door lock receives an unlocking instruction;
when the triggering mode is fingerprint identification triggering, the door lock comprises a fingerprint identification module, when a user presses a finger on the fingerprint identification module, the door lock scans the fingerprint of the finger of the user through the fingerprint identification module, and the unlocking instruction is determined;
when the triggering mode is voice triggering, the door lock comprises a voice recognition module, and the voice recognition module is used for recognizing voice information sent by a user, determining the voice recognition information and determining the unlocking instruction according to the voice recognition information;
when the triggering mode is gesture triggering, the door lock comprises a gesture recognition module, and the gesture recognition module can recognize through gesture information of a user so as to determine the unlocking instruction;
when the trigger mode is password trigger, the door lock can detect password information input by a user, and when the password information input by the user is the same as the password information triggering the unlocking instruction, the door lock determines the unlocking instruction.
S1112, when the triggering mode is voice triggering, performing voice recognition on the unlocking instruction, and determining voice recognition information;
s1113, determining the identity recognition information according to the voice recognition information.
When the triggering mode is voice triggering, the door lock recognizes the voice information acquired during voice triggering, determines the voice recognition information, performs voiceprint matching on the voice recognition information and the pre-stored voice information in the door lock, and when the matching is successful, determines the corresponding identity recognition information according to the pre-stored voice information successfully matched, so as to help the door lock determine the corresponding target mobile terminal according to the identity recognition information.
Example 5
Referring to fig. 6, in embodiment 3, after the step S112, the method further includes:
s500, when the matching fails, acquiring the mobile terminal in the same network environment where the door lock is located;
s600, sending unlocking confirmation information to the mobile terminal;
when the matching between the identity identification information and the preset identification information fails, it indicates that the unlocking instruction received by the door lock is not sent by a user pre-stored in the door lock, and therefore, in order to determine the mobile terminal sending the unlocking instruction conveniently, the door lock is required to determine the mobile terminal in the same network environment, and unlock confirmation information is sent to the mobile terminal in the same network environment.
S700, after receiving the confirmation feedback information sent by the mobile terminal, determining a target mobile terminal according to the mobile terminal sending the confirmation feedback information.
When the mobile terminal of the user needing to be unlocked receives the unlocking confirmation information sent by the door lock, the unlocking confirmation information is replied through the operation of the user on the mobile terminal, and after the door lock receives the confirmation feedback information of the mobile terminal, the mobile terminal sending the confirmation feedback information is determined to be the target mobile terminal needing to be unlocked, so that the unlocking mode combination is sent to the target mobile terminal, and a stranger can conveniently unlock the door lock through the target mobile terminal.
Example 6
Referring to fig. 7, in embodiment 5, the step S700 includes:
s710, after the confirmation feedback information sent by the plurality of mobile terminals is obtained, determining the sending time of the unlocking confirmation feedback information sent by the plurality of mobile terminals;
s720, the mobile terminal with the earliest transmission time is taken as the target mobile terminal.
Wherein, when a plurality of mobile terminals are connected in the network environment where the door lock is located, the door lock sends the unlocking confirmation information to the plurality of mobile terminals in order to confirm the target mobile terminal which sends the unlocking request, and acquiring acknowledgement feedback information fed back by a plurality of mobile terminals in the same network environment, the acknowledgement feedback information including transmission time of the acknowledgement feedback information, when the door lock receives the confirmation feedback information sent by a plurality of mobile terminals, the target mobile terminal that issued the unlock instruction may be confirmed according to the transmission time, and when the sending time of the mobile terminal is earliest, determining that the mobile terminal is the target mobile terminal which sends the unlocking instruction, and sending the unlocking scheme to the target mobile terminal by the door lock.
In addition, the door lock only sends an unlocking scheme to one target mobile terminal in a single unlocking process, and unlocking is carried out according to unlocking information fed back by the target mobile terminal, so that the problem that the door lock is unlocked by a plurality of target mobile terminals simultaneously, and the unlocking process of the door lock is disordered is solved.
Example 7
Referring to fig. 8, in embodiment 5, the step S700 includes:
s730, after the confirmation feedback information sent by the mobile terminal is received, sending the equipment information and the authorized unlocking information of the mobile terminal to a preset mobile terminal;
and S740, when the authorization confirmation information fed back by the preset mobile terminal is acquired, taking the mobile terminal sending the confirmation feedback information as the target mobile terminal.
In order to ensure that a stranger unlocks the door lock through multiple attempts after obtaining unlocking information, when the door lock detects that a mobile terminal of the stranger sends an unlocking instruction, equipment information and authorized unlocking information of the mobile terminal of the stranger can be sent to a preset mobile terminal, wherein the equipment information can comprise network card address information or IP address information in movement and also can comprise mobile phone number information of the mobile terminal, the preset mobile terminal is a mobile terminal prestored by the door lock, the prestored mobile terminal is used for managing and controlling unlocking operation of the door lock, the equipment information and the authorized unlocking information of the mobile terminal are sent to the preset mobile terminal, a user of the preset mobile terminal judges identity information of the stranger according to the equipment information, and when the user of the preset mobile terminal can confirm the unlocking safety of the person who sends the unlocking instruction, the method comprises the steps that a user of the preset mobile terminal sends authorization confirmation information to the door lock, the door lock confirms that the mobile terminal is the target mobile terminal, and sends the unlocking mode combination to the mobile terminal to continue unlocking operation, and through the mode, unlocking operation of strangers can be confirmed through the user of the preset mobile terminal every time, so that the safety of the door lock is improved, and the problem that the strangers unlock the door lock without authorization is solved.
Example 8
Referring to fig. 9, in embodiment 1, after the step S300, the method further includes:
s800, when the unlocking information associated with the unlocking mode combination fails to be matched with the unlocking information, recording failure times;
and S900, outputting alarm information when the failure times exceed a threshold value.
When the user inputs the unlocking information, the situation that the user inputs the unlocking information wrongly or forgets the unlocking information often occurs, the failure times of matching failure of the user in unlocking the door lock can be recorded in order to avoid that the door lock is cracked by multiple attempts of strangers, and when the failure times exceed a threshold value, the user is indicated that the correct unlocking information is not input after multiple attempts of unlocking, so that the door lock sends alarm information to the user. In addition, when the failure times exceed the threshold value, the door lock can send alarm information to the preset mobile terminal and also can send equipment information of the mobile terminal which is performing unlocking operation to the preset mobile terminal, so that a user can conveniently confirm the mobile terminal which is performing unlocking operation according to the equipment information.
The application also provides a door lock, which comprises a memory, a processor and an unlocking program which is stored on the memory and can run on the processor, wherein the processor executes the unlocking program to realize the unlocking method according to any one of the above embodiments.
The present application further provides a computer-readable storage medium, on which an unlocking program is stored, which, when executed by a processor, implements the steps of the unlocking method according to any one of the above embodiments.
In some alternative embodiments, the Processor may be a Central Processing Unit (CPU), other general purpose Processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other Programmable logic device, a discrete Gate or transistor logic device, a discrete hardware component, or the like. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The storage may be an internal storage unit of the device, such as a hard disk or a memory of the device. The memory may also be an external storage device of the device, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), etc. provided on the device. Further, the memory may also include both internal and external storage units of the device. The memory is used for storing the computer program and other programs and data required by the device. The memory may also be used to temporarily store data that has been output or is to be output.
It will be apparent to those skilled in the art that, for convenience and brevity of description, only the above-mentioned division of the functional units and modules is illustrated, and in practical applications, the above-mentioned function distribution may be performed by different functional units and modules according to needs, that is, the internal structure of the apparatus is divided into different functional units or modules to perform all or part of the above-mentioned functions. Each functional unit and module in the embodiments may be integrated in one processing unit, or each unit may exist alone physically, or two or more units are integrated in one unit, and the integrated unit may be implemented in a form of hardware, or in a form of software functional unit. In addition, specific names of the functional units and modules are only for convenience of distinguishing from each other, and are not used for limiting the protection scope of the present application. The specific working processes of the units and modules in the system may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
The above description is only a preferred embodiment of the present invention, and is not intended to limit the scope of the present invention, and all modifications and equivalents of the present invention, which are made by the contents of the present specification and the accompanying drawings, or directly/indirectly applied to other related technical fields, are included in the scope of the present invention.

Claims (9)

1. An unlocking method is characterized by being applied to a door lock, and comprises the following steps:
when an unlocking instruction is received, a target mobile terminal corresponding to the unlocking instruction is obtained;
when the target mobile terminal is the same as a mobile terminal prestored in the door lock, acquiring an unlocking mode combination associated with user information, wherein the unlocking mode combination associated with the user information comprises at least one of fingerprint unlocking, face recognition unlocking and iris unlocking;
sending the unlocking mode combination to a target mobile terminal;
receiving unlocking information fed back by the target mobile terminal according to the unlocking mode combination;
and matching the received unlocking information with prestored unlocking information associated with the unlocking mode combination, and executing unlocking operation when the matching is successful.
2. The unlocking method according to claim 1, wherein the step of obtaining the target mobile terminal corresponding to the unlocking instruction when receiving the unlocking instruction comprises:
when the unlocking instruction is received, identity identification information corresponding to the unlocking instruction is determined;
matching the identity identification information with preset identification information;
and when the matching is successful, taking the mobile terminal corresponding to the preset identification information matched with the identity identification information as the target mobile terminal.
3. The unlocking method according to claim 2, wherein the step of determining the identification information corresponding to the unlocking instruction when receiving the unlocking instruction comprises:
when the unlocking instruction is received, determining a triggering mode of the unlocking instruction;
when the triggering mode is voice triggering, performing voice recognition on the unlocking instruction to determine voice recognition information;
and determining the identity recognition information according to the voice recognition information.
4. The unlocking method according to claim 2, wherein the step of matching the identification information with preset identification information further comprises:
when the matching fails, acquiring a mobile terminal in the same network environment where the door lock is located;
sending unlocking confirmation information to the mobile terminal;
and after receiving the confirmation feedback information sent by the mobile terminal, determining a target mobile terminal according to the mobile terminal sending the confirmation feedback information.
5. The unlocking method according to claim 4, wherein the step of determining the target mobile terminal according to the mobile terminal transmitting the confirmation feedback information comprises:
after the confirmation feedback information sent by the plurality of mobile terminals is obtained, determining the sending time of the unlocking confirmation feedback information sent by the plurality of mobile terminals;
and taking the mobile terminal with the earliest sending time as the target mobile terminal.
6. The unlocking method according to claim 4, wherein the step of determining the target mobile terminal according to the mobile terminal transmitting the confirmation feedback information comprises:
after receiving the confirmation feedback information sent by the mobile terminal, sending the equipment information and the authorized unlocking information of the mobile terminal to a preset mobile terminal;
and when the authorization confirmation information fed back by the preset mobile terminal is acquired, taking the mobile terminal sending the confirmation feedback information as the target mobile terminal.
7. The unlocking method according to claim 1, wherein the step of receiving the unlocking information fed back by the mobile terminal is followed by further comprising:
when the matching of the unlocking information and the prestored unlocking information associated with the unlocking mode combination fails, recording the failure times;
and outputting alarm information when the failure times exceed a threshold value.
8. A door lock, characterized in that it comprises a processor, a memory and a computer program stored on the memory and executable on the processor, which computer program, when executed by the processor, further carries out the steps of the unlocking method according to any one of claims 1 to 7.
9. A computer-readable storage medium, characterized in that the computer-readable storage medium has stored thereon an unlocking program which, when executed by a processor, implements the steps of the unlocking method according to any one of claims 1-7.
CN202010135372.0A 2020-02-28 2020-02-28 Unlocking method, door lock and computer readable storage medium Active CN111369716B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010135372.0A CN111369716B (en) 2020-02-28 2020-02-28 Unlocking method, door lock and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010135372.0A CN111369716B (en) 2020-02-28 2020-02-28 Unlocking method, door lock and computer readable storage medium

Publications (2)

Publication Number Publication Date
CN111369716A CN111369716A (en) 2020-07-03
CN111369716B true CN111369716B (en) 2022-01-11

Family

ID=71210246

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010135372.0A Active CN111369716B (en) 2020-02-28 2020-02-28 Unlocking method, door lock and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN111369716B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112422377A (en) * 2020-10-26 2021-02-26 深圳Tcl新技术有限公司 Intelligent terminal control method and device and computer readable storage medium

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102841755A (en) * 2012-08-28 2012-12-26 广东欧珀移动通信有限公司 Method and system for unlocking mobile communication terminal
CN103236094A (en) * 2013-03-29 2013-08-07 东莞宇龙通信科技有限公司 Door control system and method of unlocking door control equipment by mobile terminal
CN104217147A (en) * 2014-09-24 2014-12-17 中国联合网络通信集团有限公司 Method for switching unlocking modes of intelligent terminal and intelligent terminal
CN105138871A (en) * 2015-06-29 2015-12-09 努比亚技术有限公司 Unlocking method and apparatus for mobile terminal and mobile terminal
CN107729742A (en) * 2017-10-11 2018-02-23 广州视源电子科技股份有限公司 Equipment solution lock control method, device, equipment and storage medium
CN107845165A (en) * 2017-08-31 2018-03-27 郑州云海信息技术有限公司 A kind of server cabinet door control method, device and terminal
CN109360299A (en) * 2017-12-29 2019-02-19 广州Tcl智能家居科技有限公司 A kind of control method of WIFI module, door lock control system and intelligent door lock
CN110335372A (en) * 2019-05-09 2019-10-15 百度在线网络技术(北京)有限公司 Unlocking method of vehicle, device and terminal
CN110673725A (en) * 2019-09-18 2020-01-10 努比亚技术有限公司 Wearable device control method, wearable device, and computer-readable storage medium
CN110728774A (en) * 2019-09-04 2020-01-24 深圳酷派技术有限公司 Intelligent lock unlocking method, device and system, storage medium and electronic equipment

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP3562178B2 (en) * 1996-10-23 2004-09-08 オムロン株式会社 Non-contact medium processing device and entry / exit management device, and non-contact medium processing method and entry / exit management method
JP6595551B2 (en) * 2017-09-20 2019-10-23 株式会社東海理化電機製作所 Car sharing system
CN108734826B (en) * 2018-04-08 2020-11-17 珠海市芸鼎电子科技有限公司 Mixed-mode Bluetooth automatic unlocking verification method

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102841755A (en) * 2012-08-28 2012-12-26 广东欧珀移动通信有限公司 Method and system for unlocking mobile communication terminal
CN103236094A (en) * 2013-03-29 2013-08-07 东莞宇龙通信科技有限公司 Door control system and method of unlocking door control equipment by mobile terminal
CN104217147A (en) * 2014-09-24 2014-12-17 中国联合网络通信集团有限公司 Method for switching unlocking modes of intelligent terminal and intelligent terminal
CN105138871A (en) * 2015-06-29 2015-12-09 努比亚技术有限公司 Unlocking method and apparatus for mobile terminal and mobile terminal
CN107845165A (en) * 2017-08-31 2018-03-27 郑州云海信息技术有限公司 A kind of server cabinet door control method, device and terminal
CN107729742A (en) * 2017-10-11 2018-02-23 广州视源电子科技股份有限公司 Equipment solution lock control method, device, equipment and storage medium
CN109360299A (en) * 2017-12-29 2019-02-19 广州Tcl智能家居科技有限公司 A kind of control method of WIFI module, door lock control system and intelligent door lock
CN110335372A (en) * 2019-05-09 2019-10-15 百度在线网络技术(北京)有限公司 Unlocking method of vehicle, device and terminal
CN110728774A (en) * 2019-09-04 2020-01-24 深圳酷派技术有限公司 Intelligent lock unlocking method, device and system, storage medium and electronic equipment
CN110673725A (en) * 2019-09-18 2020-01-10 努比亚技术有限公司 Wearable device control method, wearable device, and computer-readable storage medium

Also Published As

Publication number Publication date
CN111369716A (en) 2020-07-03

Similar Documents

Publication Publication Date Title
KR101926052B1 (en) System and method for managing going and coming
US7882541B2 (en) Authentication system in information processing terminal using mobile information processing device
US9378346B2 (en) Optimized biometric authentication method and system
US8838989B2 (en) Optimized biometric authentication method and system
CN111835689A (en) Identity authentication method of digital key, terminal device and medium
US8448875B2 (en) Secure use of externally stored data
US9111084B2 (en) Authentication platform and related method of operation
KR101436760B1 (en) Communication Terminal of Pairing a Bluetooth and Method of the Same
CN107704759A (en) Control method, device, storage medium and the electronic equipment of sensitive operation
CN111369716B (en) Unlocking method, door lock and computer readable storage medium
CN111586074B (en) Communication method, server, Internet of things system and readable storage medium
KR101407443B1 (en) User authentication system and method using near field communication
KR20180009278A (en) Method for authenticating opening of digital doorlock
CN110838196B (en) Intelligent door lock control method, intelligent door lock control system and intelligent door lock
JP6901307B2 (en) User authentication system and user authentication method
JP2004126698A (en) Individual authentication system and method
JP2022130087A (en) Authentication device, method, program, and vehicle
CA2712525C (en) Optimized biometric authentication method and system
KR20080040859A (en) User authentication system using human body communication
JP7164052B2 (en) Biometric authentication system and biometric authentication device
CN115565268B (en) Automobile control method and system based on wireless automobile key, electronic equipment and storage medium
KR102529737B1 (en) Apparatus for service vehicle starting and method thereof
KR102340398B1 (en) Apparatus, system, and control method for access control
KR20100052261A (en) Channel control method and system for managing settopbox and similar electronics appliances using face recognition
CN115817405A (en) Information processing apparatus and information processing method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant