CN112562122A - Remote unlocking method, device, terminal, storage medium and system - Google Patents

Remote unlocking method, device, terminal, storage medium and system Download PDF

Info

Publication number
CN112562122A
CN112562122A CN201910905281.8A CN201910905281A CN112562122A CN 112562122 A CN112562122 A CN 112562122A CN 201910905281 A CN201910905281 A CN 201910905281A CN 112562122 A CN112562122 A CN 112562122A
Authority
CN
China
Prior art keywords
communication module
unlocking
terminal
lock
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910905281.8A
Other languages
Chinese (zh)
Inventor
余朝东
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Aoyi Electronic Technology Co ltd
Original Assignee
Shanghai Aoyi Electronic Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Aoyi Electronic Technology Co ltd filed Critical Shanghai Aoyi Electronic Technology Co ltd
Priority to CN201910905281.8A priority Critical patent/CN112562122A/en
Publication of CN112562122A publication Critical patent/CN112562122A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/009Security arrangements; Authentication; Protecting privacy or anonymity specially adapted for networks, e.g. wireless sensor networks, ad-hoc networks, RFID networks or cloud networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Lock And Its Accessories (AREA)
  • Selective Calling Equipment (AREA)

Abstract

The application provides a remote unlocking method, a device, a terminal, a storage medium and a system, which comprises the following steps: activating the communication module after being triggered by a near field communication event so as to initiate an unlocking request outwards through the communication module; and executing unlocking action after receiving a second key matched with the first key. The invention aims to provide the electronic intelligent lock which works only after being activated by the near field communication event, so that the intelligent lock with low power consumption, low maintenance cost and low replacement frequency is realized, and the application experience is improved.

Description

Remote unlocking method, device, terminal, storage medium and system
Technical Field
The present application relates to the field of network technologies, and in particular, to a remote unlocking method, apparatus, terminal, storage medium, and system.
Background
Electronic keys have a long history of use, and symmetric encryption and asymmetric encryption technologies have become popular in the field of information security. The application of electronic key technology to door locks to form intelligent locks relying on electronic information technology has gradually become a development trend in the household field.
The intelligent lock based on the electronic key technology is internally provided with a communication module (such as a Wi-Fi module), the communication module needs to passively and continuously receive instructions from the outside, and even if no person enters or exits the intelligent lock for a long time, the intelligent lock still needs to continuously work, so that the energy consumption of the intelligent lock is serious, the maintenance and replacement frequency is high, and the user requirements cannot be met.
Content of application
In view of the above drawbacks of the prior art, the present application aims to provide a remote unlocking method, device, terminal, storage medium, and system, which are used to solve the technical problems of high power consumption, high maintenance and replacement frequency, and the like of the intelligent door lock in the prior art.
In order to achieve the above and other related objects, a first aspect of the present application provides a remote unlocking method, which is applied to a lock terminal, and has a first secret key pre-stored therein and a communication module; the method comprises the following steps: activating the communication module after being triggered by a near field communication event so as to initiate an unlocking request outwards through the communication module; and executing unlocking action after receiving a second key matched with the first key.
In some embodiments of the first aspect of the present application, the near field communication event comprises: a doorbell signal transmitting device installed at the lock terminal is operated to send out a doorbell signal; and/or receiving a doorbell signal from a public barrier gate.
In some embodiments of the first aspect of the present application, the method comprises: the communication module establishes a communication path to the external terminal through a cloud network so as to send an unlocking request to the external terminal; after unlocking is completed, the communication module closes the communication path.
In order to achieve the above and other related objects, a second aspect of the present application provides a remote unlocking method, applied to a user terminal, which pre-stores a second key; the method comprises the following steps: receiving an unlocking request; the unlocking request is initiated by a lock terminal pre-storing a first secret key matched with the second secret key after being triggered by a near field communication event and activating a communication module of the lock terminal; and sending the second key outwards.
In order to achieve the above and other related objects, a third aspect of the present application provides a remote unlocking method, applied to a service terminal, where an association relationship between key pairs is prestored; the method comprises the following steps: determining a user terminal where a second key matched with a first key is located according to the first key prestored in a lock terminal which currently initiates an unlocking request; the unlocking request is initiated by the lock terminal after the lock terminal activates a communication module of the lock terminal after being triggered by a near field communication event; and sending the unlocking request to the user terminal, and forwarding the unlocking request to the lock terminal after receiving the second secret key from the user terminal.
To achieve the above and other related objects, a fourth aspect of the present application provides a lock device including: the storage module is used for storing a first secret key; the communication module is used for being in communication connection with the outside; the processing module is used for activating the communication module after being triggered by a near field communication event so as to initiate an unlocking request outwards through the communication module; and the unlocking execution module is used for executing unlocking action after receiving the second secret key matched with the first secret key.
To achieve the above and other related objects, a fifth aspect of the present application provides a user equipment comprising: the storage module is used for storing a second key; the communication module is used for being in communication connection with the outside; the processing module is used for sending the second secret key to the outside through the communication module after being triggered by an unlocking approval request; the unlocking request is initiated by a lock device prestored with a first secret key matched with the second secret key after a communication module of the lock device is activated after being triggered by a near field communication event.
To achieve the above and other related objects, a sixth aspect of the present application provides a service apparatus comprising: the storage module is used for storing the incidence relation between the key pairs; the communication module is used for being in communication connection with the outside; the processing module is used for determining a user device where a second secret key matched with the first secret key is located according to the first secret key prestored in the lock device which currently initiates the unlocking request, sending the unlocking request to the user device through the communication module, and forwarding the unlocking request to the lock device after receiving the second secret key from the user device; wherein the unlocking request is initiated by the lock device after activating its communication module after being triggered by a near field communication event.
To achieve the above and other related objects, a seventh aspect of the present application provides a lock terminal including: a processor, a memory, a communicator; the memory is used for storing a computer program; the communicator is used for establishing communication connection with the outside; the processor is configured to execute the computer program stored in the memory to cause the lock terminal to perform: activating the communication module after being triggered by a near field communication event so as to initiate an unlocking request outwards through the communication module; and initiating an unlocking instruction after receiving a second secret key matched with the first secret key.
To achieve the above and other related objects, an eighth aspect of the present application provides a computer-readable storage medium having stored thereon at least one of the following computer programs: a first computer program that, when executed by a processor, implements a remote unlocking method applied to a lock terminal; a second computer program which, when executed by the processor, implements a remote unlocking method applied to the user terminal; and a third computer program which, when executed by the processor, implements a remote unlocking method applied to the service terminal.
To achieve the above and other related objects, a ninth aspect of the present application provides a remote unlocking system, which includes a lock device, a service device, and a user device.
As described above, the remote unlocking method, device, terminal, storage medium, and system of the present application have the following beneficial effects: the invention aims to provide the electronic intelligent lock which works only after being activated by the near field communication event, so that the intelligent lock with low power consumption, low maintenance cost and low replacement frequency is realized, and the application experience is improved.
Drawings
Fig. 1 is a schematic diagram illustrating a scene application according to an embodiment of the present invention.
Fig. 2 is a schematic diagram illustrating a scene application according to an embodiment of the invention.
Fig. 3 is a flowchart illustrating a remote unlocking method according to an embodiment of the present invention.
Fig. 4 is a flowchart illustrating a remote unlocking method according to an embodiment of the present invention.
Fig. 5 is a flowchart illustrating a remote unlocking method according to an embodiment of the present invention.
Fig. 6 is a schematic structural diagram of a lock device according to an embodiment of the present invention.
Fig. 7 is a schematic structural diagram of a user equipment according to an embodiment of the invention.
Fig. 8 is a schematic structural diagram of a service device according to an embodiment of the invention.
FIG. 9 is a schematic diagram of a lock terminal according to an embodiment of the present invention.
Detailed Description
The following description of the embodiments of the present application is provided by way of specific examples, and other advantages and effects of the present application will be readily apparent to those skilled in the art from the disclosure herein. The present application is capable of other and different embodiments and its several details are capable of modifications and/or changes in various respects, all without departing from the spirit of the present application. It is to be noted that the features in the following embodiments and examples may be combined with each other without conflict.
It is noted that the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context indicates otherwise. It will be further understood that the terms "comprises," "comprising," and/or "comprising," when used in this specification, specify the presence of stated features, operations, elements, components, items, species, and/or groups, but do not preclude the presence, or addition of one or more other features, operations, elements, components, items, species, and/or groups thereof. The terms "or" and/or "as used herein are to be construed as inclusive or meaning any one or any combination. Thus, "A, B or C" or "A, B and/or C" means "any of the following: a; b; c; a and B; a and C; b and C; A. b and C ". An exception to this definition will occur only when a combination of elements, functions or operations are inherently mutually exclusive in some way.
An intelligent lock integrates an electronic technology, an integrated circuit design, a large number of electronic components, a plurality of identification technologies (including a computer network technology, a built-in software card, a network alarm, a mechanical design of a lock body) and the like, and an electronic key lock is a device applying the electronic key technology to the intelligent lock. However, the smart lock based on the electronic key technology generally has a communication module (such as a Wi-Fi module) built therein, and such a communication module needs to passively and continuously receive instructions from the outside, resulting in large power consumption and high maintenance and replacement frequency.
In view of this, the present invention provides a remote unlocking method, device, terminal, storage medium, and system, and aims to provide an electronic intelligent lock that operates only after being activated by a near field communication event, so as to implement an intelligent lock with low power consumption, low maintenance cost, and low replacement frequency, thereby improving application experience.
It should be noted that the remote unlocking scheme described in the present invention is applicable to various scenarios where the unlocking authorized party is not in the unlocking site, and does not limit the distance between the unlocking authorized party and the unlocking site. Hereinafter, the technical solution of the present invention will be explained and illustrated in detail with reference to a plurality of embodiments.
Example one
Fig. 1 shows a schematic view of a scene application in an embodiment of the present invention. The scenario of the embodiment includes a lock terminal 11, a user terminal 12, and a cloud network 13, and the lock terminal 11 has a communication module, not shown, built therein. The lock terminal 11 pre-stores a half key (referred to as a first key) of the key pair, and the user terminal 12 pre-stores the other half key (referred to as a second key) of the key pair.
The communication module of the lock terminal 11 is in an inactive state in the absence of a near field communication event and is only activated when a near field communication event occurs. After the communication module of the lock terminal 11 is activated by the near field communication event, a communication path is established to the associated user terminal 12 through the cloud network 13, and an unlocking request is sent. After receiving the unlocking request, the user terminal 12 sends a second key to the lock terminal 11 through the communication path, so that the lock terminal 11 executes an unlocking action after the key pairing is successful, thereby realizing remote unlocking based on the electronic key.
The communication module of the present embodiment includes but is not limited to: a Wi-Fi module, a 2G/3G/4G/5G cellular network communication module, an NB-IoT communication module, a LoRA communication module, a ZigBee communication module, or an eMTC communication module, among others.
The user terminal 12 of this embodiment includes, but is not limited to, a smart phone, a tablet computer, an intelligent wearable device, a notebook computer, a desktop computer, a smart television, a Personal Digital Assistant (PDA), and other devices.
The cloud network 13 of the present embodiment includes a plurality of Base Stations (BSs) deployed in the radio access network for providing wireless communication functions for the UE, which include but are not limited to macro base stations, micro base stations, relay stations, access points, and the like. In systems using different radio access technologies, names of devices having base station functions may be different, for example, in an LTE network, the device is called an evolved Node B (eNB or eNode B), in 3G, 4G, and 5G networks, the device is called a Node B (Node B), and so on.
It should be understood that the above examples are provided for illustrative purposes and should not be construed as limiting. Likewise, the inventive arrangements may additionally or alternatively include other features or include fewer features without departing from the scope of the present application.
In addition, the technical solution of the present embodiment can be applied to various types of scenes, for example: after the owner goes out, the owner remotely unlocks for service personnel such as takeout, express delivery, carriers, decoration personnel, clockwork and the like and authorizes the owner to enter the house for service, and the owner of the house to be sold authorizes the owner to enter the house for house watching after remotely unlocking for house keeper, or enters the house for other family members to go home after unlocking (for example, the other family members forget to take keys, forget unlocking passwords, turn off mobile phones for unlocking and the like). The application scenarios of remote unlocking are many, and are not listed here.
Therefore, the technical scheme of the invention has the greatest difference from the existing scheme that although the communication module is provided, the lock terminal actively initiates an unlocking request to the cloud according to a local event instead of passively continuously enabling the communication module to work to receive a command of the cloud, and the lock terminal cannot be activated by events except near field communication, so that the power consumption is greatly saved, and the frequency of maintenance and replacement of the lock terminal is reduced.
Example two
As shown in fig. 2, a schematic diagram of a scene application in another embodiment of the present invention is shown. The scenario of the present embodiment includes a lock terminal 21 and a user terminal 22, and the lock terminal 21 establishes a communication connection with the user terminal 22 through a communication module (not shown) built in the lock terminal. The lock terminal 21 prestores a part of the key (referred to as a first key) in the key pair, and the user terminal 22 prestores the remaining part of the key (referred to as a second key) in the key pair.
The communication module of the lock terminal 21 is in an inactive state in the absence of a near field communication event and is only activated when a near field communication event occurs. After the communication module of the lock terminal 21 is activated by the nfc event, a communication path is directly established to the user terminal 22 and an unlock request is sent. After receiving the unlocking request, the user terminal 22 sends a second key to the lock terminal 21 through the communication path, so that the lock terminal 21 executes an unlocking action after the key pairing is successful, thereby realizing remote unlocking based on the electronic key.
The communication module of the present embodiment includes but is not limited to: bluetooth module, infrared module, NFC communication module, etc.
The user terminal 22 of this embodiment includes, but is not limited to, a smart phone, a tablet computer, an intelligent wearable device, a notebook computer, a desktop computer, a smart television, a Personal Digital Assistant (PDA), and other devices.
It should be understood that the above examples are provided for illustrative purposes and should not be construed as limiting. Likewise, the inventive arrangements may additionally or alternatively include other features or include fewer features without departing from the scope of the present application.
In addition, the technical solution of the present embodiment can be applied to various types of scenes, for example: the supervisor in the workplace remotely opens the door lock of the workstation for the staff, the doctor in the operating room remotely opens the door lock of the operating room for outdoor personnel, or the patient with inconvenient mobility in the ward remotely opens the door lock of the ward for personnel outside the ward, and the like. The application scenarios of remote unlocking are many, and are not listed here.
EXAMPLE III
Fig. 3 is a schematic flow chart showing a remote unlocking method according to an embodiment of the present invention. The remote unlocking method of the embodiment is applied to a lock terminal, and mainly comprises steps S31 and S32.
In step S31, the communication module is activated after being triggered by the near field communication event to initiate an unlocking request outwards through the communication module.
It should be noted that the communication module includes, but is not limited to: a Wi-Fi module, a cellular mobile communication (3G, 4G, 5G) module, a bluetooth communication module, an NB-IoT communication module, a LoRa communication module, or a zigbee communication module, etc., which is not limited in this embodiment.
In some optional implementations, the near field communication event comprises: and the doorbell signal transmitting device installed at the lock terminal sends out a doorbell signal after being operated. That is, the lock terminal is equipped with a doorbell device which, when pressed, issues a doorbell signal to form a near field communication event trigger to activate the communication module.
Alternatively, the doorbell device may be a device dedicated to activating the communication module, such as: a doorbell signal transmitter is specially arranged on the lock terminal, and a doorbell signal is sent out to activate a communication module of the lock terminal after being pressed by a current visitor; for example: an RFID code reader is specially arranged in the lock terminal, and is triggered after receiving the RFID identification code of the current visitor, so that the communication module of the lock terminal is activated; for another example: the lock terminal is provided with a vibration sensor, and the vibration sensor is triggered after receiving the knock vibration of the current visitor, and then activates a communication module of the lock terminal, and the like.
Optionally, the doorbell device may also be shared with existing devices on the lock terminal. For example, the fingerprint identification device provided on the lock terminal can be shared with the doorbell device for use, and if the fingerprint of the current user is successfully paired with the preset authorization fingerprint, the lock can be unlocked directly, and if the fingerprint of the current user is unsuccessfully paired with the preset authorization fingerprint, the event can activate the communication module, so as to realize remote unlocking. For another example, the handle of the lock terminal may be shared with the doorbell device, and if the current user presses the unlocked lock terminal, the lock may be unlocked directly, and if the current user presses the locked lock terminal, the event may activate the communication module in order to achieve remote unlocking. There are many ways to share the doorbell device for use, and they are not listed here.
In some optional implementations, the near field communication event comprises: receiving a doorbell signal from a public barrier gate. Typically, the door lock of each house will be in communication/electrical connection with the doorbell of the public barrier, in which case the doorbell signal of the public barrier may also be used as a near field communication event to trigger the communication module that activates the lock terminal.
In some optional implementation manners, the communication module establishes a communication path to the external terminal through a cloud network to send an unlocking request to the external terminal; after unlocking is completed, the communication module closes the communication path.
Specifically, a first key is stored in the lock terminal, and a second key matched with the first key is stored in the user terminal. The user terminal can log in a management page after performing near field communication (such as Bluetooth connection) with the lock terminal through an administrator key, can designate a first key as an object for receiving a doorbell in a management background, establishes a key pair (KID) comprising the first key and a second key, establishes an association relation between the key pair and a User (UID) and searches for a corresponding user terminal.
After a communication module of the lock terminal is activated, a communication path is actively established to the associated user terminal through the cloud network according to the mark of the KID, and an unlocking request is sent based on the communication path. And after the user terminal agrees to the unlocking request, the second secret key is forwarded to the lock terminal through the communication path, so that remote unlocking is realized. The communication module of the lock terminal actively initiates and establishes a communication path after being activated, and the communication path is closed after each interaction is finished, so that electric energy is saved to the maximum extent, and external attack is avoided to enhance safety.
In some optional implementations, the communication module sends an unlocking request to the external terminal by directly establishing a communication path to the external terminal, and closes the communication path after unlocking is completed.
Specifically, a first key is stored in the lock terminal, and a second key matched with the first key is stored in the user terminal. The user terminal can log in a management page after performing near field communication (such as Bluetooth connection) with the lock terminal through an administrator key, can designate a first key as an object for receiving a doorbell in a management background, establishes a key pair (KID) comprising the first key and a second key, establishes an association relation between the key pair and a User (UID) and searches for a corresponding user terminal.
And after the communication module of the lock terminal is activated, actively establishing a communication path to the associated user terminal according to the mark of the KID, and sending an unlocking request based on the communication path. And after the user terminal agrees with the unlocking request, the second secret key is sent to the lock terminal through the communication path, so that remote unlocking is realized. The communication module of the lock terminal actively initiates and establishes a communication path after being activated, and the communication path is closed after each interaction is finished, so that electric energy is saved to the maximum extent, and external attack is avoided to enhance safety.
In step S32, an unlocking action is performed after receiving a second key that matches the first key.
That is, the lock terminal prestores the first key in the key pair, and cannot meet the unlocking condition, and matches the first key after receiving the second key authorized by the user terminal, so as to meet the unlocking condition, further execute the unlocking action, and authorize the visitor to enter the home.
Example four
Fig. 4 is a schematic flow chart showing a remote unlocking method according to an embodiment of the present invention. The remote unlocking method of the embodiment is applied to the user terminal and comprises the steps S41 and S42.
It should be noted that the user terminal may be a computer that includes components such as memory, a memory controller, one or more processing units (CPUs), a peripheral interface, RF circuitry, audio circuitry, speakers, a microphone, an input/output (I/O) subsystem, a display screen, other output or control devices, and external ports; the computer includes, but is not limited to, a Personal computer such as a desktop computer, a notebook computer, a tablet computer, a smart phone, a smart television, a Personal Digital Assistant (PDA), and the like, and the present embodiment is not limited thereto.
In step S41, an unlocking request is received; the unlocking request is initiated by a lock terminal prestored with a first secret key matched with the second secret key after being triggered by a near field communication event and activating a communication module of the lock terminal.
In step S42, the second key is sent out.
It should be noted that, the implementation of the remote unlocking method applied to the user terminal in this embodiment is similar to the implementation of the remote unlocking method applied to the lock terminal in the foregoing embodiment, and therefore, the detailed description is omitted.
EXAMPLE five
Fig. 5 is a schematic flow chart showing a remote unlocking method according to an embodiment of the present invention. The remote unlocking method of the embodiment is applied to a service terminal, and the association relationship between the key pairs is prestored, and the method comprises the steps of S51 and S52.
It should be noted that the service terminal in this embodiment is, for example, a server, and the server may be arranged on one or more entity servers according to various factors such as functions, loads, and the like, or may be formed by a distributed or centralized server cluster, which is not limited in this embodiment.
In step S51, determining, according to a first key prestored in a lock terminal that currently initiates an unlocking request, a user terminal where a second key that matches the first key is located; the unlocking request is initiated by the lock terminal after the lock terminal activates the communication module of the lock terminal after being triggered by the near field communication event.
In step S52, the unlocking request is sent to the user terminal, and after receiving the second key from the user terminal, the unlocking request is forwarded to the lock terminal.
It should be noted that, the implementation of the remote unlocking method applied to the service terminal in this embodiment is similar to the implementation of the remote unlocking method applied to the lock terminal in the foregoing embodiment, and therefore, the detailed description is omitted.
EXAMPLE six
Fig. 6 shows a schematic structural diagram of a lock device according to an embodiment of the present invention. The lock device of the present embodiment includes a storage module 61, a communication module 62, a processing module 63, and an unlocking execution module 64.
The storage module 61 is used for storing a first key; the communication module 62 is used for connecting with external communication; the processing module 63 is configured to activate the communication module after being triggered by a near field communication event, so as to initiate an unlocking request outwards through the communication module; for performing an unlocking action upon receiving a second key that matches the first key.
The storage module 61 is, for example, a ROM, a RAM, a magnetic disk, an optical disk, or various other modules capable of storing program codes.
The communication module 62 is, for example, a Wi-Fi module, a 2G/3G/4G/5G cellular network communication module, an NB-IoT communication module, a LoRA communication module, a ZigBee communication module, or an eMTC communication module, etc.
The processing module 63 is, for example, an arm (advanced RISC machines) controller, an fpga (field Programmable Gate array) controller, an soc (system on chip) controller, a dsp (digital Signal processing) controller, or an mcu (micro controller unit) controller.
The unlocking performing module 64 may be, for example, a door lock structure in the prior art, which is not described in detail herein.
It should be noted that the implementation of the lock device of this embodiment is similar to the implementation of the remote unlocking method applied to the lock terminal in the above embodiments, and therefore, the detailed description is omitted.
EXAMPLE seven
Fig. 7 is a schematic structural diagram of a user equipment according to an embodiment of the present invention. The user device of the present embodiment includes a storage module 71, a communication module 72, and a processing module 73.
The storage module 71 is configured to store a second key; the communication module 72 is used for communication connection with the outside; the processing module 73 is configured to send the second key to the outside through the communication module after being triggered by an approval of an unlocking request; the unlocking request is initiated by a lock device prestored with a first secret key matched with the second secret key after a communication module of the lock device is activated after being triggered by a near field communication event.
The storage module 71 is, for example, various modules such as ROM, RAM, magnetic disk or optical disk, which can store program codes.
The communication module 72 is, for example, a Wi-Fi module, a 2G/3G/4G/5G cellular network communication module, an NB-IoT communication module, a LoRA communication module, a ZigBee communication module, or an eMTC communication module, among others.
The processing module 73 is, for example, an arm (advanced RISC machines) controller, an fpga (field Programmable Gate array) controller, an soc (system on chip) controller, a dsp (digital Signal processing) controller, or an mcu (micro controller unit) controller.
It should be noted that, the implementation of the user device in this embodiment is similar to the implementation of the remote unlocking method applied to the user terminal in the foregoing embodiments, and therefore, the detailed description is omitted.
Example eight
Fig. 8 is a schematic structural diagram of a service apparatus according to an embodiment of the present invention. The service device of the present embodiment includes a storage module 81, a communication module 82, and a processing module 83.
The storage module 81 is used for storing the association relationship between the key pairs; the communication module 82 is used for connecting with external communication; the processing module 83 is configured to determine, according to a first secret key prestored in a lock device that currently initiates an unlocking request, a user device where a second secret key that matches the first secret key is located, send the unlocking request to the user device through the communication module, and forward the unlocking request to the lock device after receiving the second secret key from the user device; wherein the unlocking request is initiated by the lock device after activating its communication module after being triggered by a near field communication event.
The storage module 81 is, for example, various modules such as ROM, RAM, magnetic disk, or optical disk that can store program codes.
The communication module 82 is, for example, a Wi-Fi module, a 2G/3G/4G/5G cellular network communication module, an NB-IoT communication module, a LoRA communication module, a ZigBee communication module, or an eMTC communication module, among others.
The processing module 83 is, for example, an arm (advanced RISC machines) controller, an fpga (field Programmable Gate array) controller, an soc (system on chip) controller, a dsp (digital Signal processing) controller, or an mcu (micro controller unit) controller.
It should be noted that, the implementation of the service apparatus of this embodiment is similar to the implementation of the remote unlocking method applied to the service terminal in the foregoing embodiment, and therefore, the description is omitted.
It should be understood that, in the apparatuses provided in the sixth, seventh, and eighth embodiments, the division of each module is only a division of a logical function, and the actual implementation may be wholly or partially integrated into one physical entity, or may be physically separated. Moreover, these modules may all be implemented in the form of software calls by processing elements; or may be implemented entirely in hardware; and part of the modules can be realized in the form of calling software by the processing element, and part of the modules can be realized in the form of hardware. For example, the processing module may be a processing element separately set up, or may be implemented by being integrated in a chip of the apparatus, or may be stored in a memory of the apparatus in the form of program code, and a function of the processing module may be called and executed by a processing element of the apparatus. Other modules are implemented similarly. In addition, all or part of the modules can be integrated together or can be independently realized. The processing element described herein may be an integrated circuit having signal processing capabilities. In implementation, each step of the above method or each module above may be implemented by an integrated logic circuit of hardware in a processor element or an instruction in the form of software.
For example, the above modules may be one or more integrated circuits configured to implement the above methods, such as: one or more Application Specific Integrated Circuits (ASICs), or one or more microprocessors (DSPs), or one or more Field Programmable Gate Arrays (FPGAs), among others. For another example, when one of the above modules is implemented in the form of a Processing element scheduler code, the Processing element may be a general-purpose processor, such as a Central Processing Unit (CPU) or other processor capable of calling program code. For another example, these modules may be integrated together and implemented in the form of a system-on-a-chip (SOC).
Example nine
Fig. 9 is a schematic structural diagram of a lock terminal according to an embodiment of the present invention. This example provides a lock terminal, includes: a processor 91, a memory 92, a communicator 93; the memory 92 is connected with the processor 91 and the communicator 93 through a system bus and completes mutual communication, the memory 92 is used for storing computer programs, the communicator 93 is used for communicating with other devices, and the processor 91 is used for operating the computer programs to enable the electronic terminal to execute: activating the communication module after being triggered by a near field communication event so as to initiate an unlocking request outwards through the communication module; and initiating an unlocking instruction after receiving a second secret key matched with the first secret key.
The above-mentioned system bus may be a Peripheral Component Interconnect (PCI) bus, an Extended Industry Standard Architecture (EISA) bus, or the like. The system bus may be divided into an address bus, a data bus, a control bus, and the like. For ease of illustration, only one thick line is shown, but this does not mean that there is only one bus or one type of bus. The communication interface is used for realizing communication between the database access device and other equipment (such as a client, a read-write library and a read-only library). The Memory may include a Random Access Memory (RAM), and may further include a non-volatile Memory (non-volatile Memory), such as at least one disk Memory.
The Processor may be a general-purpose Processor, and includes a Central Processing Unit (CPU), a Network Processor (NP), and the like; the Integrated Circuit may also be a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other Programmable logic device, a discrete Gate or transistor logic device, or a discrete hardware component.
Example ten
The present embodiment also provides a computer-readable storage medium having stored thereon at least one of the following computer programs: a first computer program that, when executed by a processor, implements a remote unlocking method applied to a lock terminal; a second computer program which, when executed by the processor, implements a remote unlocking method applied to the user terminal; and a third computer program which, when executed by the processor, implements a remote unlocking method applied to the service terminal.
Those of ordinary skill in the art will understand that: all or part of the steps for implementing the above method embodiments may be performed by hardware associated with a computer program. The aforementioned computer program may be stored in a computer readable storage medium. When executed, the program performs steps comprising the method embodiments described above; and the aforementioned storage medium includes: various media that can store program codes, such as ROM, RAM, magnetic or optical disks.
EXAMPLE eleven
The present embodiment also provides a remote unlocking system, which includes the lock device in the sixth embodiment, the user device in the seventh embodiment, and the service device in the eighth embodiment. The implementation of the remote unlocking system of this embodiment is similar to that of the remote unlocking method in the above embodiments, and therefore, the detailed description is omitted.
In summary, the present application provides a remote unlocking method, device, terminal, storage medium, and system, and aims to provide an electronic intelligent lock that operates only after being activated by a near field communication event, so as to implement an intelligent lock with low power consumption, low maintenance cost, and low replacement frequency, thereby improving application experience. Therefore, the application effectively overcomes various defects in the prior art and has high industrial utilization value.
The above embodiments are merely illustrative of the principles and utilities of the present application and are not intended to limit the application. Any person skilled in the art can modify or change the above-described embodiments without departing from the spirit and scope of the present application. Accordingly, it is intended that all equivalent modifications or changes which can be made by those skilled in the art without departing from the spirit and technical concepts disclosed in the present application shall be covered by the claims of the present application.

Claims (11)

1. A remote unlocking method is characterized in that the method is applied to a lock terminal, a first secret key is prestored, and a communication module is arranged; the method comprises the following steps:
activating the communication module after being triggered by a near field communication event so as to initiate an unlocking request outwards through the communication module;
and executing unlocking action after receiving a second key matched with the first key.
2. The method of claim 1, wherein the near field communication event comprises:
a doorbell signal transmitting device installed at the lock terminal is operated to send out a doorbell signal; and/or
Receiving a doorbell signal from the public barrier gate.
3. The method according to claim 1, characterized in that it comprises:
the communication module establishes a communication path to the external terminal through a cloud network so as to send an unlocking request to the external terminal;
after unlocking is completed, the communication module closes the communication path.
4. A remote unlocking method is characterized in that the method is applied to a user terminal, and a second secret key is prestored; the method comprises the following steps:
receiving an unlocking request; the unlocking request is initiated by a lock terminal pre-storing a first secret key matched with the second secret key after being triggered by a near field communication event and activating a communication module of the lock terminal;
and sending the second key outwards.
5. A remote unlocking method is characterized in that the method is applied to a service terminal, and the incidence relation between key pairs is prestored; the method comprises the following steps:
determining a user terminal where a second key matched with a first key is located according to the first key prestored in a lock terminal which currently initiates an unlocking request; the unlocking request is initiated by the lock terminal after the lock terminal activates a communication module of the lock terminal after being triggered by a near field communication event;
and sending the unlocking request to the user terminal, and forwarding the unlocking request to the lock terminal after receiving the second secret key from the user terminal.
6. A lock device, comprising:
the storage module is used for storing a first secret key;
the communication module is used for being in communication connection with the outside;
the processing module is used for activating the communication module after being triggered by a near field communication event so as to initiate an unlocking request outwards through the communication module;
and the unlocking execution module is used for executing unlocking action after receiving the second secret key matched with the first secret key.
7. A user device, comprising:
the storage module is used for storing a second key;
the communication module is used for being in communication connection with the outside;
the processing module is used for sending the second secret key to the outside through the communication module after being triggered by an unlocking approval request; the unlocking request is initiated by a lock device prestored with a first secret key matched with the second secret key after a communication module of the lock device is activated after being triggered by a near field communication event.
8. A service device, comprising:
the storage module is used for storing the incidence relation between the key pairs;
the communication module is used for being in communication connection with the outside;
the processing module is used for determining a user device where a second secret key matched with the first secret key is located according to the first secret key prestored in the lock device which currently initiates the unlocking request, sending the unlocking request to the user device through the communication module, and forwarding the unlocking request to the lock device after receiving the second secret key from the user device; wherein the unlocking request is initiated by the lock device after activating its communication module after being triggered by a near field communication event.
9. A lock terminal, comprising: a processor, a memory, a communicator;
the memory is used for storing a computer program;
the communicator is used for establishing communication connection with the outside;
the processor is configured to execute the computer program stored in the memory to cause the lock terminal to perform: activating the communication module after being triggered by a near field communication event so as to initiate an unlocking request outwards through the communication module; and initiating an unlocking instruction after receiving a second secret key matched with the first secret key.
10. A computer-readable storage medium, having stored thereon at least one of the following computer programs:
a first computer program which, when executed by a processor, implements the remote unlocking method of any one of claims 1 to 3;
a second computer program which, when executed by a processor, implements the remote unlocking method of claim 4;
a third computer program which, when executed by a processor, implements the remote unlocking method of claim 5.
11. A remote unlocking system, comprising the lock device according to claim 6, the user device according to claim 7, and the service device according to claim 8.
CN201910905281.8A 2019-09-24 2019-09-24 Remote unlocking method, device, terminal, storage medium and system Pending CN112562122A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910905281.8A CN112562122A (en) 2019-09-24 2019-09-24 Remote unlocking method, device, terminal, storage medium and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910905281.8A CN112562122A (en) 2019-09-24 2019-09-24 Remote unlocking method, device, terminal, storage medium and system

Publications (1)

Publication Number Publication Date
CN112562122A true CN112562122A (en) 2021-03-26

Family

ID=75028989

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910905281.8A Pending CN112562122A (en) 2019-09-24 2019-09-24 Remote unlocking method, device, terminal, storage medium and system

Country Status (1)

Country Link
CN (1) CN112562122A (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2015023737A1 (en) * 2013-08-15 2015-02-19 Unikey Technologies, Inc. Wireless access control system and related methods
CN205531763U (en) * 2016-03-25 2016-08-31 广州国保科技有限公司 Lock accuse mechanism of electric control lock that use mobile terminal controlled
CN107038777A (en) * 2017-03-29 2017-08-11 云丁网络技术(北京)有限公司 A kind of safety communicating method and its intelligent door lock system based on intelligent door lock system
US20170337755A1 (en) * 2016-05-23 2017-11-23 Fuji Xerox Co., Ltd. Systems and methods for location enabled electronic lock controls
CN108492409A (en) * 2018-03-01 2018-09-04 中船重工(武汉)凌久信息技术有限公司 A kind of low power-consumption intelligent cloud lock system, method for unlocking and the equipment of easy care
CN108547514A (en) * 2018-04-13 2018-09-18 珠海格力电器股份有限公司 A kind of open method and device of intelligent door lock
CN109361642A (en) * 2017-12-29 2019-02-19 广州Tcl智能家居科技有限公司 A kind of method and system that remote authorization is unlocked
CN110005266A (en) * 2018-01-05 2019-07-12 深圳市欧瑞博科技有限公司 Control method, device and its relevant device of intelligent door lock

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2015023737A1 (en) * 2013-08-15 2015-02-19 Unikey Technologies, Inc. Wireless access control system and related methods
CN205531763U (en) * 2016-03-25 2016-08-31 广州国保科技有限公司 Lock accuse mechanism of electric control lock that use mobile terminal controlled
US20170337755A1 (en) * 2016-05-23 2017-11-23 Fuji Xerox Co., Ltd. Systems and methods for location enabled electronic lock controls
CN107038777A (en) * 2017-03-29 2017-08-11 云丁网络技术(北京)有限公司 A kind of safety communicating method and its intelligent door lock system based on intelligent door lock system
CN109361642A (en) * 2017-12-29 2019-02-19 广州Tcl智能家居科技有限公司 A kind of method and system that remote authorization is unlocked
CN110005266A (en) * 2018-01-05 2019-07-12 深圳市欧瑞博科技有限公司 Control method, device and its relevant device of intelligent door lock
CN108492409A (en) * 2018-03-01 2018-09-04 中船重工(武汉)凌久信息技术有限公司 A kind of low power-consumption intelligent cloud lock system, method for unlocking and the equipment of easy care
CN108547514A (en) * 2018-04-13 2018-09-18 珠海格力电器股份有限公司 A kind of open method and device of intelligent door lock

Similar Documents

Publication Publication Date Title
US11451950B2 (en) Indirect registration method and apparatus
US10380815B2 (en) Transient asset management systems and methods
CN106157390B (en) Visual building talkback access control system with safety certification and working method thereof
KR101470747B1 (en) Method and apparatus for implementing doorlock system using mobile terminal
US20150235496A1 (en) Systems and methods for lock access management using wireless signals
CN104134253A (en) Entrance guard system and entrance guard opening method
CN105474275A (en) Owner access point to control the unlocking of an entry
CN104050742A (en) Intelligent door and control method and system thereof
CN104751032A (en) Authentication method and authentication device
CN205121680U (en) Bluetooth lock system based on intelligent terminal
CN206515936U (en) Three-dimension code gate control system
US20200228981A1 (en) Authentication method and device
US11049342B1 (en) Intelligent lock credential validation
US20160065383A1 (en) Home control gateway and gateway connection method thereof
CN205080626U (en) Intelligence lock system based on thing networking
CN104038613A (en) Method and apparatus for information security management
CN206292898U (en) A kind of multiple-authentication safety-protection system
KR20100116994A (en) Entry device, entry management server and entry management system
Prakash et al. Smart bluetooth low energy security system
CN104640112A (en) Authentication method, device and system
Gadupu et al. ACCESS-IoT enabled smart lock
CN210895580U (en) Mobile terminal dynamic modification intelligent door lock password
CN112562122A (en) Remote unlocking method, device, terminal, storage medium and system
US20220215707A1 (en) Multi-device electronic access control application, system and method
Jeong et al. A remote lock system using Bluetooth communication

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20210326

WD01 Invention patent application deemed withdrawn after publication