CN113793439B - Intelligent lock control method and system, intelligent lock and storage medium - Google Patents

Intelligent lock control method and system, intelligent lock and storage medium Download PDF

Info

Publication number
CN113793439B
CN113793439B CN202111358603.5A CN202111358603A CN113793439B CN 113793439 B CN113793439 B CN 113793439B CN 202111358603 A CN202111358603 A CN 202111358603A CN 113793439 B CN113793439 B CN 113793439B
Authority
CN
China
Prior art keywords
client
unlocking
intelligent lock
user
intelligent
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202111358603.5A
Other languages
Chinese (zh)
Other versions
CN113793439A (en
Inventor
孟凡超
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Junwei Technology Co.,Ltd.
Original Assignee
Shenzhen Sn Wulian Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Sn Wulian Technology Co ltd filed Critical Shenzhen Sn Wulian Technology Co ltd
Priority to CN202111358603.5A priority Critical patent/CN113793439B/en
Publication of CN113793439A publication Critical patent/CN113793439A/en
Application granted granted Critical
Publication of CN113793439B publication Critical patent/CN113793439B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00563Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys using personal physical data of the operator, e.g. finger prints, retinal images, voicepatterns

Abstract

The invention discloses an intelligent lock control method, an intelligent lock control system, an intelligent lock and a storage medium, wherein the intelligent lock control method comprises the following steps: the method comprises the steps that an intelligent place Internet of things is added through a management client and at least one wireless access point; acquiring and storing at least one group of user authentication information sent by a management client; if the use client corresponding to the authorized user sends a terminal installation request, generating a unique installation invitation code based on the terminal installation request so as to enable the use client to activate the use client; if the unlocking request is sent by the client, an unlocking characteristic interface is returned to the client; acquiring unlocking characteristics to be verified returned by a client based on an unlocking characteristic interface; and if the matching is successful, the intelligent lock is unlocked. The method ensures the use safety of the user, and simultaneously does not need to be provided with a password panel module or a fingerprint input module, thereby effectively reducing the production cost of the intelligent lock and reducing the volume of the intelligent lock.

Description

Intelligent lock control method and system, intelligent lock and storage medium
Technical Field
The invention relates to the technical field of Internet of things, in particular to an intelligent lock control method and system, an intelligent lock and a storage medium.
Background
The intelligent lock becomes a popular safety device at present, and has the characteristics of convenience in use, simplicity in setting, safety and effectiveness. Compared with the traditional mechanical lock, the traditional mechanical lock only has a lockset consisting of a mechanical device, so that the entrance guard function can be realized only by a matched key. The intelligent lock adopts an informatization technology to improve the lockset, so that the lockset has more flexible intelligent functions in the aspects of user identification, safety and manageability, and the most important functional characteristic is that the intelligent lock can be remotely controlled by mobile terminal equipment such as a mobile phone and the like and can realize a linkage function with an intelligent home. Generally, the smart lock generally comprises an APP, a monitor and a lock, wherein the APP is composed of a cloud service and a mobile device. The cloud service can store the basic information of the user in the cloud, manage the lockset, store the backup of the safety information for executing the unlocking and closing functions of the lockset, such as passwords, and the user can find the backup information in some conditions. The APP of the mobile equipment end mainly comprises an information management and information collection module, and a user can verify identity, modify or reset a password or update biological information such as fingerprints and face information by using a sensor of the mobile equipment end through remote operation. The monitor is mainly composed of units such as a singlechip, a network adapter, a keyboard or a biosensor, a display screen, line detection, A/D conversion and the like. The lockset mainly comprises an intelligent part and a mechanical part, wherein the intelligent part issues an instruction to drive a steering engine and control the closing and opening states of the lockset. The singlechip receives the safety information such as the input password or biological information (fingerprints and the like), compares the safety information with the stored safety information, controls the steering engine of the intelligent lock to unlock if the safety information is correct, and otherwise re-inputs, locks or alarms according to the predetermined program requirement. It can be seen that one of the most important differences between smart locks and traditional mechanical locks is: the key component of the traditional mechanical lock is upgraded by adopting the safety information which can be processed by the information technology.
Most of safety information of the existing intelligent lock is provided with a digital character password keyboard and a biological information sensor to acquire information such as passwords and fingerprints. However, the password information of the numeric characters has the defects of difficult definition, difficult memory and easy cracking. In addition, the difference of the character keyboard layout of the numeric character password keyboard has great difficulty for the disabled or injured people to use. And can be observed and memorized by passers-by, so that the safety risk exists. Still increase the construction cost, increase the volume of intelligent lock, cause the intelligent lock on the current market all to have big and massive problem. Biological information such as fingerprints overcomes the defects of digital password information, but the biological information needs to be supported by a biological information sensor. Since the biometric information sensor is easily affected by the environment or damaged by human beings. Once damaged, the smart lock may be disabled.
How to ensure the use intelligence and the security of the intelligent lock and reduce the construction cost and the volume of the intelligent lock become problems to be solved urgently.
Disclosure of Invention
The embodiment of the invention provides an intelligent lock control method, an intelligent lock control system, an intelligent lock and a storage medium, and aims to solve the problems of construction cost and size reduction of the intelligent lock while the use intelligence and safety of the intelligent lock are ensured.
An intelligent lock control method comprising:
establishing internal connection with a management client through a wireless module, and joining the Internet of things of the intelligent place through the management client and at least one wireless access point;
the method comprises the steps that at least one group of user authentication information sent by a management client side is obtained and stored through the Internet of things of an intelligent place, wherein the group of user authentication information comprises an authorized user, at least one authentication unlocking characteristic, an unlocking permission and authorized use time;
if the use client corresponding to the authorized user sends the terminal installation request, generating a unique installation invitation code based on the terminal installation request, and sending the installation invitation code to the use client so that the use client activates the use client;
if the unlocking request is sent by the client, returning an unlocking characteristic interface to the client based on the unlocking authority corresponding to the authorized user in the user authentication information table;
acquiring unlocking characteristics to be verified returned by a client based on an unlocking characteristic interface;
and matching the authentication unlocking characteristics corresponding to the authorized user in the user authentication information table with the unlocking characteristics to be verified, and if the matching is successful, unlocking the intelligent lock.
An intelligent lock control system comprising:
the intelligent site internet of things system comprises an internet of things adding module, a management client and at least one wireless access point, wherein the internet of things adding module is used for establishing internal connection with the management client through a wireless module and adding the internet of things into an intelligent site through the management client and the at least one wireless access point;
the system comprises a sending authentication information module, a receiving authentication information module and a management client side, wherein the sending authentication information module is used for obtaining and storing at least one group of user authentication information (including a long-term password, a temporary password and a biological identification characteristic) sent by the management client side through the Internet of things of an intelligent place, and the group of user authentication information comprises an authorized user, at least one authentication unlocking characteristic, an unlocking authority and authorized use time;
the activation client module is used for generating a unique installation invitation code based on the terminal installation request and sending the installation invitation code to the use client if the use client corresponding to the authorized user sends the terminal installation request so as to enable the use client to activate the use client;
the return unlocking interface module is used for returning an unlocking characteristic interface to the user client based on the unlocking authority corresponding to the authorized user in the user authentication information table if the unlocking request is sent by the user client;
the unlocking characteristic obtaining module is used for obtaining unlocking characteristics to be verified returned by the client based on the unlocking characteristic interface;
and the intelligent lock unlocking module is used for matching the authentication unlocking characteristics corresponding to the authorized user in the user authentication information table with the unlocking characteristics to be verified, and unlocking the intelligent lock if the matching is successful.
An intelligent lock comprises a memory, a processor and a computer program which is stored in the memory and can run on the processor, wherein the processor executes the computer program to realize the intelligent lock control method.
A computer-readable storage medium storing a computer program which, when executed by a processor, implements the above-described intelligent lock control method.
According to the intelligent lock control method, the intelligent lock control system, the intelligent lock and the storage medium, the unlocking request sent by the use client corresponding to the authorized user authorized by the management client can be verified by the unlocking request through the user authentication information, the user identity authentication is not required to be carried out through the password panel or the fingerprint input module on the intelligent lock, the intelligent lock is guaranteed in the use safety of the user, meanwhile, the password panel module or the fingerprint input module is not required to be equipped, the production cost of the intelligent lock can be effectively reduced, the purchase cost of the terminal user is reduced, the size of the intelligent lock is reduced, and the intelligent lock is light and flexible.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the description of the embodiments of the present invention will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art that other drawings can be obtained according to these drawings without inventive labor.
FIG. 1 is a flow chart of an intelligent lock control method in an embodiment of the present invention;
FIG. 2 is a second flowchart of the intelligent lock control method in one embodiment of the present invention;
FIG. 3 is a third flowchart of the intelligent lock control method according to an embodiment of the present invention;
FIG. 4 is a fourth flowchart of an intelligent lock control method according to an embodiment of the present invention;
FIG. 5 is a fifth flowchart of an intelligent lock control method according to an embodiment of the present invention;
FIG. 6 is a sixth flowchart of an intelligent lock control method in an embodiment of the present invention;
FIG. 7 is a seventh flowchart of an intelligent lock control method according to an embodiment of the present invention;
FIG. 8 is a schematic diagram of an intelligent lock control system in an embodiment of the present invention;
FIG. 9 is a diagram of an intelligent lock according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
In an embodiment, as shown in fig. 1, an intelligent lock control method is provided, which is described by taking an example that the method is applied to a server in fig. 1, and specifically includes the following steps:
s10, establishing internal connection with a management client through a wireless module, and joining the Internet of things of the intelligent place through the management client and at least one wireless access point.
The management client is a client which has administrator authority, namely the highest authority and can carry out global setting on the intelligent lock. In this embodiment, the client may be a dedicated web page, a dedicated APP, or the like, and is not limited herein.
Specifically, the wireless module includes a commercially available wireless connection module, including a bluetooth module, and the like, and is not limited specifically herein. The wireless access point is a wireless hotspot for connecting the intelligent lock to the Internet.
The intelligent place internet of things is a wireless network which wirelessly connects intelligent homes in places where intelligent locks are located and can carry out overall control through the internet of things.
S20, at least one group of user authentication information sent by the management client side is obtained and stored through the Internet of things of the intelligent place, and the group of user authentication information comprises an authorized user, at least one authentication unlocking characteristic, an unlocking permission and authorized use time.
Specifically, the user authentication information includes a user personal ID and its corresponding biometric features, such as facial recognition features, fingerprint features, vein features, and the like, and also includes a password, such as a long-term public password, a time-limited password, a one-time password, and the like.
Further, the unlocking feature authority which can be used by the user can be limited according to the personal ID of the user, for example, the user A can unlock the lock by using any one of the biometric feature, the time limit password and the long-term public password, the user B has the authority of unlocking the lock by using the long-term public password and the time limit password, the user C has the authority of unlocking the lock by using the one-time password only once, and the like.
The authorized use time is the valid unlocking time corresponding to each user personal ID. When the system time exceeds the effective unlocking time corresponding to the personal ID of a certain user, the user can not unlock the intelligent lock any more.
Through the setting of the management client in the S20, the unlocking authority of each user is flexibly set, and the unlocking safety of the intelligent lock is effectively guaranteed.
And S30, if the use client corresponding to the authorized user sends the terminal installation request, generating a unique installation invitation code based on the terminal installation request, and sending the installation invitation code to the use client so that the use client activates the use client.
Specifically, the client is used for enabling a user to log in a special webpage or a special APP of the intelligent lock control system through the terminal.
And only if the user authorized by the management client is an authorized user, the installation invitation code can be acquired, and the client corresponding to the intelligent lock is installed and activated. Even if the client corresponding to the intelligent lock is installed, the user which is not authorized by the management client cannot be activated for use. Through the setting of this step, further guarantee the safety in utilization of intelligent lock.
And S40, if the unlocking request is sent by the client, returning an unlocking characteristic interface to the client based on the unlocking authority corresponding to the authorized user in the user authentication information table.
Specifically, the intelligent lock acquires an unlocking request sent by a client, confirms a user personal ID, and pushes a corresponding unlocking characteristic interface to the user based on an unlocking authority corresponding to the user personal ID, so that the user can quickly select the unlocking request based on personal preferences. For example, the user a is a user who has the biometric feature, the time limit password and the long-term public password right at the same time, and the system pushes a page which loads the three features at the same time to the user for selection. If the user selects facial recognition in the biometric features, the system asks the user to continue inputting facial features, etc.
The opening flexibility of the intelligent lock is enhanced, a user can flexibly select the intelligent lock based on the current state, and the situation that the intelligent lock cannot be unlocked due to unclear information such as fingerprints during unlocking is avoided.
And S50, acquiring unlocking characteristics to be verified returned by the client based on the unlocking characteristic interface.
Specifically, the unlocking feature to be verified is a biometric feature and a long-term public password input by the user through using the client.
And S60, matching the authentication unlocking characteristics corresponding to the authorized user in the user authentication information table with the unlocking characteristics to be verified, and if the matching is successful, unlocking the intelligent lock.
According to the intelligent lock control method provided by the embodiment, the unlocking request sent by the client side is used corresponding to the authorized user authorized by the management client side, the unlocking request can be verified by the intelligent lock through the user authentication information, the user identity authentication does not need to be carried out through a password panel or a fingerprint input module on the intelligent lock, namely, the intelligent lock is not required to be provided with the password panel module or the fingerprint input module while the use safety of the user is ensured, the production cost of the intelligent lock can be effectively reduced, the purchase cost of a terminal user is reduced, the size of the intelligent lock is reduced, and the intelligent lock is light and flexible.
In a specific embodiment, as shown in fig. 2, before step S20, that is, before acquiring and storing at least one set of user authentication information sent by the management client, the method further includes the following steps:
and S2011, the user information input request sent by the management client is obtained by the client, and the user information input request comprises a user to be authorized and unlocking characteristics to be input, so that the user information to be confirmed is returned by the client based on the input user information request.
Specifically, the embodiment realizes that the user does not need to enter the information on the site of the intelligent lock when entering the information of the user. As long as the user authentication is realized between the user and the administrator corresponding to the management user terminal, the administrator can remotely confirm the identity of the user and then open the unlocking authority for the user. The inconvenience that a user needs to go to the site of the intelligent lock to enter information is reduced.
And S2012, the management client performs information verification based on the information of the user to be confirmed and acquires a verification result.
Specifically, if the intelligent lock control system obtains the identity database reading right of the public security department. The corresponding matching can be carried out based on the biological information such as the identity card, the fingerprint and the like of the user, and the verification result can be obtained. If the intelligent lock control system does not acquire the reading right of the identity database of the public security department, the step can be realized based on the confirmation of the administrator to the identity information of the user, so that the unlocking safety is further improved.
S2013, if the verification result is successful, generating user authentication information based on the user information to be confirmed.
In a particular embodiment, the smart lock includes a microphone. As shown in fig. 3, after step S20, that is, after at least one set of user authentication information sent by the management client is acquired and stored through the internet of things in the smart place, the method further includes the following steps:
s2021, if the talkback module of the intelligent lock is activated, the positioning result of each client side is obtained.
Specifically, in life, express delivery or other guests often get on the door, and people in the house need to talk and then unlock the door. And the indoor people have to move to the doorway to talk with people, and in order to accelerate the confirmation speed of the two parties, the intelligent lock can be additionally provided with the microphone to realize remote talkback without the need of close-range talk between the two parties of the host and the guest.
And S2022, if the client with the positioning result of being smaller than the preset distance is used as the target client, sending an intercom request to the target client, wherein the intercom request comprises intercom voice input through a microphone.
Specifically, the preset distance may be set according to practical applications, such as 5 meters, 10 meters, and the like, and is not limited herein.
Furthermore, in the embodiment, only after the user outside the door initiates the talkback request, the voice is recorded, so that the privacy of the user is guaranteed.
And S2023, acquiring an unlocking confirmation instruction returned by the target client based on the talkback request, and if the unlocking confirmation instruction is confirmation, unlocking the intelligent lock.
And S2024, if the client with the positioning result smaller than the preset distance does not exist, sending an intercom request to the management client, wherein the intercom request comprises intercom voice input through a microphone.
And S2025, acquiring an unlocking confirmation instruction returned by the management client based on the talkback request, and if the unlocking confirmation instruction is confirmation, unlocking the intelligent lock.
In a particular embodiment, the smart lock includes a wide-angle camera. As shown in fig. 4, before step S20, that is, after at least one set of user authentication information sent by the management client is acquired and stored through the internet of things of the smart location, the method further includes the following steps:
s2031, if the magnetic card confirmation module of the intelligent lock is activated, obtaining the foreground image through the wide-angle camera.
Specifically, because the magnetic card of unblanking now is no main type, also promptly anyone just can take the magnetic card contact intelligent lock and unblank, it is new to be difficult to guarantee the use safety of intelligent lock. On this basis, the embodiment adds the facial recognition authentication mechanism of wide-angle camera, and only if the authorized user adopts the magnetic card of intelligence lock to unblank, just can open the intelligence lock, further guarantees the security of opening of intelligence lock.
S2032, if the face in the foreground image is one of the authorized users, the intelligent lock is opened.
In a specific embodiment, as shown in fig. 5, after step S10, that is, after joining the smart premises internet of things with at least one wireless access point through the management client, the method further includes the following steps:
s1011, detecting the current electric quantity of the intelligent lock and obtaining an electric quantity value.
S1012, if the electric quantity value is greater than the first warning threshold value and smaller than the second warning threshold value, sending an electric quantity shortage prompt to the management client.
S1013, when the electric quantity value is equal to the first warning threshold value, sending a prompt for suspending the intelligent unlocking mode and only supporting the mechanical unlocking mode to the management client.
Specifically, in order to ensure the openability and the perfection of self-functions of the intelligent lock, a user needs to be reminded of detecting the electric quantity of the intelligent lock in time. The first alarm threshold is the minimum power for ensuring the smart lock system is normal, such as 15%, and is not limited herein. The second alarm threshold is a prompt power, such as 20%, given to the user when the power of the smart lock approaches the first alarm threshold.
In a specific embodiment, as shown in fig. 6, after step S10, that is, after joining the smart premises internet of things with at least one wireless access point through the management client, the method further includes the following steps:
and S1021, scanning all intelligent homes belonging to the same wireless network to generate a home control table to be confirmed.
Specifically, the home control table to be confirmed is an aggregate table that aggregates all homes that can realize intelligent control in the current same wireless local area network, such as an intelligent air conditioner, an intelligent curtain, an intelligent gas stove, an intelligent water heater, an intelligent sweeper, and the like.
Because the user individual use hobby can carry out personalized setting to the house in the intelligent place, need not all to control, consequently, this embodiment can provide and waits to confirm the house control table, is convenient for the user to carry out selective control.
And S1022, sending a home control request carrying a home control table to be confirmed to the management client, so that the management client returns control confirmation information based on the home control table to be confirmed.
Specifically, the control confirmation information is the home information to be controlled, which is confirmed by the administrator.
And S1023, generating and storing a household control table based on the control confirmation information.
Specifically, the home control table is a home summary table that can be intelligently controlled by the intelligent lock control system.
In an embodiment, as shown in fig. 7, after step S60, that is, after unlocking the smart lock, the method further includes:
s601, sending a user state confirmation request to the user client so that the user client returns a user state, wherein the user state comprises a leaving state or a returning state.
Specifically, the home control type needs to be pushed based on the user state in this embodiment, for example, when the user is in a away state, the smart home that needs to be closed needs to be further confirmed to the user; when the user is in a home-returning state, the user needs to be further confirmed to the intelligent home needing to be opened, and the intelligence, convenience and flexibility of home control are improved.
S602, if the household control table comprises an automatic execution instruction, starting the automatic execution instruction based on the user state.
Specifically, this embodiment can also realize the intelligent house that automatic opening or closing after the switch intelligence lock, for example the user leaves the house after automatic shutdown intelligent air conditioner, or the user enters the house after automatic opening intelligent air conditioner etc..
The automatic execution instruction is an instruction of changing the state of the intelligent home, which is automatically executed after the opening and closing state of the intelligent lock is followed.
And S603, sending an intelligent home control request to the client, wherein the intelligent home control request comprises a home control table.
And S604, receiving a control instruction returned by the use client to control the use state of at least one smart home in the home control table.
It should be understood that, the sequence numbers of the steps in the foregoing embodiments do not imply an execution sequence, and the execution sequence of each process should be determined by its function and inherent logic, and should not constitute any limitation to the implementation process of the embodiments of the present invention.
According to the intelligent lock control method provided by the embodiment, the unlocking request sent by the client side is used corresponding to the authorized user authorized by the management client side, the unlocking request can be verified by the intelligent lock through the user authentication information, the user identity authentication does not need to be carried out through a password panel or a fingerprint input module on the intelligent lock, namely, the intelligent lock is not required to be provided with the password panel module or the fingerprint input module while the use safety of the user is ensured, the production cost of the intelligent lock can be effectively reduced, the purchase cost of a terminal user is reduced, the size of the intelligent lock is reduced, and the intelligent lock is light and flexible.
In an embodiment, an intelligent lock control system is provided, and the intelligent lock control system corresponds to the intelligent lock control methods in the above embodiments one to one. As shown in fig. 8, the intelligent lock control system includes a joining internet of things module 10, a sending authentication information module 20, an activating client module 30, a returning unlocking interface module 40, an acquiring unlocking feature module 50, and an unlocking intelligent lock module 60. The functional modules are explained in detail as follows:
and the joining Internet of things module 10 is used for establishing internal connection with the management client through the wireless module and joining the Internet of things of the intelligent place through the management client and at least one wireless access point.
And the authentication information sending module 20 is configured to obtain and store at least one set of user authentication information (including a long-term password, a temporary password, and a biometric feature) sent by the management client through the internet of things in the smart place, where the set of user authentication information includes an authorized user, at least one authentication unlocking feature, an unlocking permission, and authorized use time.
And the activation client module 30 is configured to, if the usage client corresponding to the authorized user sends the terminal installation request, generate a unique installation invitation code based on the terminal installation request, and send the installation invitation code to the usage client, so that the usage client activates the usage client.
And the return unlocking interface module 40 is used for returning an unlocking characteristic interface to the client based on the unlocking authority corresponding to the authorized user in the user authentication information table if the client sends an unlocking request.
And the unlocking characteristic obtaining module 50 is used for obtaining the unlocking characteristics to be verified returned by the client based on the unlocking characteristic interface.
And the intelligent lock unlocking module 60 is used for matching the authentication unlocking characteristics corresponding to the authorized user in the user authentication information table with the unlocking characteristics to be verified, and unlocking the intelligent lock if the matching is successful.
For specific limitations of the intelligent lock control system, reference may be made to the above limitations of the intelligent lock control method, which are not described herein again. All or part of each module in the intelligent lock control system can be realized by software, hardware and a combination thereof. The modules can be embedded in a hardware form or independent of a processor in the intelligent lock, and can also be stored in a memory in the intelligent lock in a software form, so that the processor can call and execute the corresponding operations of the modules.
In one embodiment, a device is provided, which may be a server, and its internal structure diagram may be as shown in fig. 9. The device includes a processor, a memory, a network interface, and a database connected by a system bus. Wherein the processor of the device is configured to provide computing and control capabilities. The memory of the device comprises a nonvolatile storage medium and an internal memory. The non-volatile storage medium stores an operating system, a computer program, and a database. The internal memory provides an environment for the operation of an operating system and computer programs in the non-volatile storage medium. The database of the device is used for data related to the intelligent lock control method. The network interface of the device is used for communicating with an external terminal through a network connection. The computer program is executed by a processor to implement an intelligent lock control method.
In one embodiment, an intelligent lock is provided, which includes a memory, a processor, and a computer program stored in the memory and executable on the processor, and when the processor executes the computer program, the intelligent lock control method of the above embodiment is implemented, for example, in steps S10 to S60 shown in fig. 1. Alternatively, the processor, when executing the computer program, implements the functions of the modules/units of the intelligent lock control system in the above-described embodiment, such as the functions of the modules 10 to 60 shown in fig. 8. To avoid repetition, further description is omitted here.
In one embodiment, a computer-readable storage medium is provided, on which a computer program is stored, and the computer program, when executed by a processor, implements the intelligent lock control method of the above-described embodiments, for example, steps S10 to S60 shown in fig. 1. Alternatively, the computer program, when executed by the processor, implements the functions of each module/unit in the intelligent lock control system in the above-described system embodiment, for example, the functions of the modules 10 to 60 shown in fig. 8. To avoid repetition, further description is omitted here.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by hardware instructions of a computer program, which can be stored in a non-volatile computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. Any reference to memory, storage, database, or other medium used in the embodiments of the present application may include non-volatile and/or volatile memory, among others. Non-volatile memory can include read-only memory (ROM), Programmable ROM (PROM), Electrically Programmable ROM (EPROM), Electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), Dynamic RAM (DRAM), Synchronous DRAM (SDRAM), Double Data Rate SDRAM (DDRSDRAM), Enhanced SDRAM (ESDRAM), Synchronous Link DRAM (SLDRAM), Rambus Direct RAM (RDRAM), direct bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM).
It will be apparent to those skilled in the art that, for convenience and brevity of description, only the above-mentioned division of the functional units and modules is illustrated, and in practical applications, the above-mentioned function distribution may be performed by different functional units and modules according to needs, that is, the internal structure of the system is divided into different functional units or modules to perform all or part of the above-mentioned functions.
The above examples are only intended to illustrate the technical solution of the present invention, but not to limit it; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; such modifications and substitutions do not substantially depart from the spirit and scope of the embodiments of the present invention, and are intended to be included within the scope of the present invention.

Claims (10)

1. An intelligent lock control method, comprising:
establishing internal connection with a management client through a wireless module, and joining the Internet of things of the intelligent place through the management client and at least one wireless access point;
acquiring and storing at least one group of user authentication information sent by the management client through the Internet of things of the intelligent place, wherein one group of user authentication information comprises an authorized user, at least one authentication unlocking characteristic, an unlocking permission and authorized use time, and the intelligent lock comprises a microphone;
if the use client corresponding to the authorized user sends a terminal installation request, generating a unique installation invitation code based on the terminal installation request, and sending the installation invitation code to the use client so that the use client activates the use client;
if the user client sends an unlocking request, returning an unlocking characteristic interface to the user client based on the unlocking authority corresponding to the authorized user in the user authentication information table;
acquiring unlocking characteristics to be verified, returned by the client based on the unlocking characteristic interface;
matching the authentication unlocking characteristics corresponding to the authorized user in the user authentication information table with the unlocking characteristics to be verified, and if the matching is successful, unlocking the intelligent lock;
if the intercom module of the intelligent lock is activated, acquiring a positioning result of each client;
if the use client with the positioning result smaller than the preset distance does not exist, sending an intercom request to the management client, wherein the intercom request comprises intercom voice input through the microphone;
and acquiring an unlocking confirmation instruction returned by the management client based on the talkback request, and if the unlocking confirmation instruction is confirmation, unlocking the intelligent lock.
2. The intelligent lock control method according to claim 1, further comprising, before the acquiring and storing at least one set of user authentication information sent by the management client:
the user client side obtains a user information input request sent by the management client side, wherein the user information input request comprises a user to be authorized and unlocking characteristics to be input, so that the user client side returns user information to be confirmed based on the user information input request;
the management client side carries out information verification based on the user information to be confirmed and acquires a verification result;
and if the verification result is successful, generating the user authentication information based on the user information to be confirmed.
3. The intelligent lock control method according to claim 1, wherein the intelligent lock includes a microphone;
after the at least one set of user authentication information sent by the management client is acquired and stored through the smart site internet of things, the method further comprises the following steps:
if the intercom module of the intelligent lock is activated, acquiring a positioning result of each client;
if the client end with the positioning result smaller than the preset distance serves as a target client end, sending an intercom request to the target client end, wherein the intercom request comprises intercom voice input through the microphone;
and acquiring an unlocking confirmation instruction returned by the target client based on the talkback request, and if the unlocking confirmation instruction is confirmation, unlocking the intelligent lock.
4. The intelligent lock control method according to claim 1, wherein the intelligent lock includes a wide-angle camera;
after the at least one set of user authentication information sent by the management client is acquired and stored through the smart site internet of things, the method further comprises the following steps:
if the magnetic card confirmation module of the intelligent lock is activated, acquiring a foreground image through the wide-angle camera;
and if the face included in the foreground image is one of the authorized users, opening the intelligent lock.
5. The intelligent lock control method according to claim 1, further comprising, after the joining of the smart premises internet of things with the at least one wireless access point through the management client:
detecting the current electric quantity of the intelligent lock to obtain an electric quantity value;
if the electric quantity value is larger than a first warning threshold value and smaller than a second warning threshold value, sending an electric quantity shortage prompt to the management client;
when the electric quantity value is equal to the first warning threshold value, sending a prompt for suspending the intelligent unlocking mode and only supporting the mechanical unlocking mode to the management client.
6. The intelligent lock control method according to claim 1, further comprising, after the joining of the smart premises internet of things with the at least one wireless access point through the management client:
scanning all intelligent homes belonging to the same wireless network to generate a home control table to be confirmed;
sending a home control request carrying the home control table to be confirmed to the management client so that the management client returns control confirmation information based on the home control table to be confirmed;
and generating and storing a household control table based on the control confirmation information.
7. The intelligent lock control method according to claim 6, further comprising, after the unlocking of the intelligent lock:
sending a user state confirmation request to the user client so as to enable the user client to return a user state, wherein the user state comprises a leaving state or a returning state;
if the home control table comprises an automatic execution instruction, starting the automatic execution instruction based on the user state;
sending an intelligent home control request to the use client, wherein the intelligent home control request comprises the home control table;
and receiving a control instruction returned by the use client to control the use state of at least one smart home in the home control table.
8. An intelligent lock control system, comprising:
the intelligent site internet of things system comprises an internet of things joining module, a management client and at least one wireless access point, wherein the internet of things joining module is used for establishing internal connection with the management client through a wireless module and joining the internet of things of an intelligent site through the management client and the at least one wireless access point;
the system comprises a management client, an authentication information sending module and an intelligent lock, wherein the management client sends at least one group of user authentication information to the intelligent lock, the authentication information sending module is used for acquiring and storing the at least one group of user authentication information sent by the management client through the Internet of things of the intelligent place, the group of user authentication information comprises an authorized user, at least one authentication unlocking characteristic, an unlocking authority and authorized use time, and the intelligent lock comprises a microphone;
an activation client module, configured to generate a unique installation invitation code based on a terminal installation request if the terminal installation request is sent by a use client corresponding to the authorized user, and send the installation invitation code to the use client, so that the use client activates the use client;
the unlocking return interface module is used for returning an unlocking characteristic interface to the use client based on the unlocking authority corresponding to the authorized user in the user authentication information table if the use client sends an unlocking request;
the unlocking characteristic obtaining module is used for obtaining unlocking characteristics to be verified, returned by the client based on the unlocking characteristic interface;
the intelligent lock unlocking module is used for matching the authentication unlocking characteristics corresponding to the authorized user in the user authentication information table with the unlocking characteristics to be verified, and if the authentication unlocking characteristics are matched successfully, the intelligent lock is unlocked;
if the intercom module of the intelligent lock is activated, acquiring a positioning result of each client;
if the use client with the positioning result smaller than the preset distance does not exist, sending an intercom request to the management client, wherein the intercom request comprises intercom voice input through the microphone;
and acquiring an unlocking confirmation instruction returned by the management client based on the talkback request, and if the unlocking confirmation instruction is confirmation, unlocking the intelligent lock.
9. An intelligent lock comprising a memory, a processor and a computer program stored in the memory and executable on the processor, wherein the processor implements the intelligent lock control method according to any one of claims 1 to 7 when executing the computer program.
10. A computer-readable storage medium storing a computer program, wherein the computer program, when executed by a processor, implements the intelligent lock control method according to any one of claims 1 to 7.
CN202111358603.5A 2021-11-17 2021-11-17 Intelligent lock control method and system, intelligent lock and storage medium Active CN113793439B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111358603.5A CN113793439B (en) 2021-11-17 2021-11-17 Intelligent lock control method and system, intelligent lock and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111358603.5A CN113793439B (en) 2021-11-17 2021-11-17 Intelligent lock control method and system, intelligent lock and storage medium

Publications (2)

Publication Number Publication Date
CN113793439A CN113793439A (en) 2021-12-14
CN113793439B true CN113793439B (en) 2022-04-12

Family

ID=78877355

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111358603.5A Active CN113793439B (en) 2021-11-17 2021-11-17 Intelligent lock control method and system, intelligent lock and storage medium

Country Status (1)

Country Link
CN (1) CN113793439B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114913629A (en) * 2022-03-22 2022-08-16 广东好太太智能家居有限公司 Intelligent linkage interaction method and system for intelligent lock
CN115331343A (en) * 2022-08-01 2022-11-11 南京智创网络科技有限公司 Intelligent management system

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1744100A (en) * 2004-09-01 2006-03-08 微软公司 Licensing the use of software to a particular user
CN104854815A (en) * 2012-12-13 2015-08-19 三星电子株式会社 Method and apparatus for controlling devices in home network system
CN105072511A (en) * 2015-08-29 2015-11-18 安徽味唯网络科技有限公司 Internet intelligent building intercom system and device
CN105654580A (en) * 2015-07-28 2016-06-08 宇龙计算机通信科技(深圳)有限公司 Access control method and system, electronic lock, and management and visitor terminal
CN107231797A (en) * 2017-04-19 2017-10-03 深圳市汇顶科技股份有限公司 A kind of unlocking method of vehicle and vehicle system for unlocking
US10134212B1 (en) * 2017-06-20 2018-11-20 Amazon Technologies, Inc. Text-based structure access
CN109712293A (en) * 2018-12-28 2019-05-03 深圳市简工智能科技有限公司 Control method, mobile terminal and the readable storage medium storing program for executing of smart lock
CN209129520U (en) * 2018-08-21 2019-07-19 重庆雅典娜电子科技有限公司 A kind of intelligent anti-theft system and security door
CN213582292U (en) * 2020-09-21 2021-06-29 浙江威欧希科技股份有限公司 Intelligent lock for public rental houses based on face recognition

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8325033B2 (en) * 2009-09-25 2012-12-04 At&T Intellectual Property I, L.P. Systems and methods for remote building security and automation
US10742938B2 (en) * 2015-03-07 2020-08-11 Skybell Technologies Ip, Llc Garage door communication systems and methods
CN106652106A (en) * 2015-10-29 2017-05-10 中兴通讯股份有限公司 Door lock control method, device and terminal

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1744100A (en) * 2004-09-01 2006-03-08 微软公司 Licensing the use of software to a particular user
CN104854815A (en) * 2012-12-13 2015-08-19 三星电子株式会社 Method and apparatus for controlling devices in home network system
CN105654580A (en) * 2015-07-28 2016-06-08 宇龙计算机通信科技(深圳)有限公司 Access control method and system, electronic lock, and management and visitor terminal
CN105072511A (en) * 2015-08-29 2015-11-18 安徽味唯网络科技有限公司 Internet intelligent building intercom system and device
CN107231797A (en) * 2017-04-19 2017-10-03 深圳市汇顶科技股份有限公司 A kind of unlocking method of vehicle and vehicle system for unlocking
US10134212B1 (en) * 2017-06-20 2018-11-20 Amazon Technologies, Inc. Text-based structure access
CN209129520U (en) * 2018-08-21 2019-07-19 重庆雅典娜电子科技有限公司 A kind of intelligent anti-theft system and security door
CN109712293A (en) * 2018-12-28 2019-05-03 深圳市简工智能科技有限公司 Control method, mobile terminal and the readable storage medium storing program for executing of smart lock
CN213582292U (en) * 2020-09-21 2021-06-29 浙江威欧希科技股份有限公司 Intelligent lock for public rental houses based on face recognition

Also Published As

Publication number Publication date
CN113793439A (en) 2021-12-14

Similar Documents

Publication Publication Date Title
CN113793439B (en) Intelligent lock control method and system, intelligent lock and storage medium
US7205882B2 (en) Actuating a security system using a wireless device
CN104167040B (en) The long-range control method of a kind of electronic lock and system
US8933777B2 (en) Gate control system and method of remote unlocking by validated users
CN105741395A (en) Entrance guard access method and system based on two-dimension code and face identification
CN110021086B (en) Openid-based temporary authorization access control method
KR102085975B1 (en) System for Managing Door Lock information of Accommodation And Driving Method Thereof
CN113053013B (en) Access control method and device based on face recognition, computer equipment and medium
US20220198863A1 (en) Authentication input device
CN110211267A (en) Indoor openings control method, the configuration method of permission, device and storage medium
CN112907788A (en) Door lock control method and device, door lock and storage medium
CN105574967A (en) Intelligent access control system and operation method thereof
CN104574616A (en) Intelligent electronic door lock control method and control device
CN106157409A (en) Communication means between intelligent terminal and gate inhibition and device
CN109859350B (en) Remote authorized fingerprint self-service entry method and hotel self-service check-in method
KR101396411B1 (en) Access and management system using pin and biometric and method thereof
JP6218671B2 (en) Automatic door electronic lock control system
CN111047750A (en) Method, device and system for controlling offline access control device
CN112863016A (en) Intelligent unlocking method, system, server and storage medium
KR20160010009A (en) System and method for managing remote entrance of person
CN111192386A (en) Intelligent lock system and unlocking method of intelligent lock
CN106056731A (en) Entrance guard for rental houses
JP6131512B2 (en) Electronic lock management system
CN107222465B (en) Network access control system of intelligent gateway
WO2018176759A1 (en) Dual password-based access control authentication method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20231124

Address after: Building A, Building 4, No. 16 South Industrial Avenue, Baofeng Community, Xiaolan Town, Zhongshan City, Guangdong Province, 528400, Room 9A01

Patentee after: Guangdong Junwei Technology Co.,Ltd.

Address before: 518000 301, floor 3, building 15, zone 1, Malan Jiade Industrial Park, No. 67, Tongfu West Road, tangkeng community, biling street, Pingshan District, Shenzhen City, Guangdong Province

Patentee before: SHENZHEN SN-WULIAN TECHNOLOGY Co.,Ltd.