CN114743294A - Unlocking device, shared device unlocking method, device and storage medium - Google Patents

Unlocking device, shared device unlocking method, device and storage medium Download PDF

Info

Publication number
CN114743294A
CN114743294A CN202210320491.2A CN202210320491A CN114743294A CN 114743294 A CN114743294 A CN 114743294A CN 202210320491 A CN202210320491 A CN 202210320491A CN 114743294 A CN114743294 A CN 114743294A
Authority
CN
China
Prior art keywords
unlocking
identification information
key
server
equipment identification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210320491.2A
Other languages
Chinese (zh)
Inventor
林晗
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Automotive Innovation Co Ltd
Original Assignee
China Automotive Innovation Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Automotive Innovation Co Ltd filed Critical China Automotive Innovation Co Ltd
Priority to CN202210320491.2A priority Critical patent/CN114743294A/en
Publication of CN114743294A publication Critical patent/CN114743294A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00896Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit

Abstract

The present application relates to the field of shared device technologies, and in particular, to an unlocking apparatus, an unlocking method for a shared device, a device, and a storage medium. The unlocking device comprises a processor; the storage module of the processor stores the device identification information and the unlocking key; the unlocking request module of the processor is used for sending an unlocking request to the intelligent lock on the shared equipment, wherein the unlocking request carries equipment identification information and an unlocking secret key; the unlocking request is used for enabling the intelligent lock to send the equipment identification information and the unlocking key to the server so that the server can verify the equipment identification information and the unlocking key, and the intelligent lock is unlocked when the equipment identification information and the unlocking key are verified and verified successfully. The unlocking device is used for unlocking without depending on mobile terminals such as a mobile phone, and the user can use the mobile terminal conveniently in various scenes. In addition, when unlocking, the server performs double verification on the equipment identification information and the unlocking key in the unlocking device, so that the unlocking safety can be ensured.

Description

Unlocking device, shared device unlocking method, device and storage medium
Technical Field
The present application relates to the field of shared device technologies, and in particular, to an unlocking apparatus, a shared device unlocking method, a device, and a storage medium.
Background
At present, the unlocking mode of the shared vehicle generally adopts an Application (APP) of a mobile terminal such as a mobile phone to scan a two-dimensional code for unlocking. The APP communicates with the background server through a network, and the use data of each user is recorded. Since the APP used by the shared vehicle of different merchants is different, it is inconvenient to require the user to download different APP application software.
In addition, the battery of the shared vehicle only has a common charging and discharging function, and can be rarely directly used for charging digital products such as mobile phones and the like. When the user's cell phone is out of power, the user cannot use the cell phone to run the APP software to use the shared vehicle. Therefore, a safe and convenient unlocking method without using a mobile phone APP needs to be designed for the user to select and use.
Disclosure of Invention
The application provides a shared device unlocking method, a device, equipment and a storage medium, a user uses an unlocking device to unlock an intelligent lock on a shared vehicle, a mobile phone APP is not needed, and the method, the device, the equipment and the storage medium are safe and convenient.
In a first aspect, an embodiment of the present application discloses an unlocking device, which includes a processor;
the processor comprises a storage module and an unlocking request module;
the storage module stores the equipment identification information and the unlocking key;
the unlocking request module is used for sending an unlocking request to the intelligent lock on the sharing equipment under the condition of establishing communication connection with the intelligent lock on the sharing equipment, wherein the unlocking request carries equipment identification information and an unlocking key;
the unlocking request is used for enabling the intelligent lock to send the equipment identification information and the unlocking key to the server so that the server can verify the equipment identification information and the unlocking key, and the intelligent lock is unlocked when the equipment identification information and the unlocking key are verified and verified successfully.
Furthermore, the unlocking key is burned in the storage module at one time through an encryption method.
Furthermore, the unlocking device further comprises a serial communication interface, and the processor is communicated with the intelligent lock through the serial communication interface.
Furthermore, the unlocking device further comprises a power supply module, and the power supply module is used for supplying power to the unlocking device.
In a second aspect, an embodiment of the present application discloses a method for unlocking a shared device, which is applied to an unlocking apparatus, and includes:
sending an unlocking request to an intelligent lock on the sharing equipment under the condition of establishing communication connection with the intelligent lock on the sharing equipment; the unlocking request carries equipment identification information and an unlocking key; the unlocking request is used for enabling the intelligent lock to send the equipment identification information and the unlocking key to the server so that the server can verify the equipment identification information and the unlocking key, and the intelligent lock is unlocked when the equipment identification information and the unlocking key are verified and verified successfully.
In a third aspect, an embodiment of the present application discloses a sharing device smart lock, including:
the unlocking request receiving module is used for receiving an unlocking request sent by an unlocking device, wherein the unlocking request carries equipment identification information of the unlocking device and an unlocking key corresponding to the terminal;
the information sending module is used for sending the equipment identification information and the unlocking key to the server so that the server can verify the equipment identification information and the unlocking key to obtain a verification result;
the unlocking instruction receiving module is used for receiving an unlocking instruction sent by the server under the condition that the verification result indicates that the equipment identification information and the unlocking key are successfully verified;
and the unlocking module is used for unlocking according to the unlocking instruction.
In a fourth aspect, an embodiment of the present application discloses another unlocking method for a shared device, which is applied to an intelligent lock of the shared device, and the method includes:
receiving an unlocking request sent by an unlocking device corresponding to a terminal; the unlocking request carries equipment identification information of an unlocking device and an unlocking key corresponding to the terminal;
sending the equipment identification information and the unlocking key to a server so that the server verifies the equipment identification information and the unlocking key to obtain a verification result;
receiving an unlocking instruction sent by a server under the condition that the verification result indicates that the equipment identification information and the unlocking key are successfully verified;
and unlocking according to the unlocking instruction.
Further, receiving an unlocking request sent by an unlocking device corresponding to the terminal includes:
receiving a connection establishment request sent by an unlocking device; the connection establishment request carries hardware information of the unlocking device;
sending the hardware information to a server so that the server verifies the hardware information to obtain a verification result;
and under the condition that the verification result indicates that the hardware information is verified successfully, receiving an unlocking request sent by an unlocking device corresponding to the terminal.
In a fifth aspect, an embodiment of the present application discloses another unlocking method for a shared device, which is applied to a server, and the method includes:
receiving equipment identification information of an unlocking device and an unlocking key corresponding to a terminal, which are sent by an intelligent lock of the shared equipment; the equipment identification information and the unlocking key are carried in an unlocking request, and the unlocking request is sent to the intelligent lock by an unlocking device corresponding to the terminal;
verifying the equipment identification information and the unlocking key to obtain a verification result;
and sending an unlocking instruction to the intelligent lock under the condition that the verification result is that the equipment identification information and the unlocking key are successfully verified, so that the intelligent lock is unlocked according to the unlocking instruction.
Further, the verification result comprises an identification verification result and a key verification result; verifying the equipment identification information and the unlocking key to obtain a verification result, wherein the verification result comprises the following steps:
verifying the equipment identification information with preset equipment identification information of preset equipment in the server to obtain an identification verification result;
and under the condition that the identification verification result indicates that the equipment identification information is successfully verified with the preset equipment identification information, verifying the unlocking key with a preset key in the server to obtain a key verification result.
In a sixth aspect, an embodiment of the present application discloses a shared device unlocking apparatus, which is applied to a server, and includes;
the information receiving module is used for receiving equipment identification information of the unlocking device and an unlocking key corresponding to the terminal, wherein the equipment identification information is sent by an intelligent lock of the sharing equipment; the equipment identification information and the unlocking key are carried in an unlocking request, and the unlocking request is sent to the intelligent lock by an unlocking device corresponding to the terminal;
the verification module is used for verifying the equipment identification information and the unlocking key to obtain a verification result;
and the unlocking instruction sending module is used for sending an unlocking instruction to the intelligent lock under the condition that the verification result is that the equipment identification information and the unlocking key are successfully verified, so that the intelligent lock is unlocked according to the unlocking instruction.
In some optional embodiments, the verification result comprises an identification verification result and a key verification result; the verification module may include:
the identification verification unit is used for verifying the equipment identification information with preset equipment identification information of preset equipment in the server to obtain an identification verification result;
and the key verification unit is used for verifying the unlocking key and a preset key in the server under the condition that the identification verification result indicates that the equipment identification information and the preset equipment identification information are successfully verified, so that a key verification result is obtained.
In other alternative embodiments, the verification module may include:
the device information set acquisition unit is used for acquiring a device information set maintained by the server;
a key verification information acquisition unit configured to acquire key verification information corresponding to the device identification information in a case where it is determined that the device information corresponding to the device identification information exists in the device information set;
and the key verification unit is used for verifying the unlocking key according to the key verification information to obtain a verification result.
In a seventh aspect, an embodiment of the present application further discloses an unlocking system for shared devices, where the intelligent lock system includes an unlocking device, an intelligent lock, and a server, and the unlocking device, the intelligent lock, and the server are connected to communicate with each other to implement the unlocking method for shared devices.
In an eighth aspect, an embodiment of the present application discloses an electronic device, where the electronic device includes a processor and a memory, where at least one instruction or at least one program is stored in the memory, and the at least one instruction or the at least one program is loaded by the processor and executes the shared device unlocking method described above.
In a ninth aspect, an embodiment of the present application discloses a computer-readable storage medium, in which at least one instruction or at least one program is stored, and the at least one instruction or the at least one program is loaded and executed by a processor to implement the method for unlocking a shared device as described above.
The technical scheme provided by the embodiment of the application has the following technical effects:
according to the unlocking device, the processor is arranged in the unlocking device, and the device identification information and the unlocking key are stored in the storage module in the processor. When a user unlocks the shared equipment by using the unlocking device, the unlocking request module in the processor sends an unlocking request carrying equipment identification information and an unlocking key to the intelligent lock on the shared equipment, the intelligent lock sends the equipment identification information and the unlocking key in the unlocking device to the server for verification, and the server sends an unlocking instruction to the intelligent lock under the condition that the verification is passed, so that the intelligent lock on the shared vehicle is unlocked. The intelligent lock on the sharing equipment is unlocked through the unlocking device, and the intelligent lock is not dependent on mobile terminals such as a mobile phone and the like, so that the intelligent lock is convenient for users to use in various scenes. In addition, when unlocking, the server performs double verification on the equipment identification information and the unlocking key in the unlocking device, so that the unlocking safety can be ensured.
Drawings
In order to more clearly illustrate the technical solutions and advantages of the embodiments of the present application or the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present application, and other drawings can be obtained by those skilled in the art without creative efforts.
Fig. 1 is a schematic structural diagram of an unlocking device provided in an embodiment of the present application;
fig. 2 is an application environment schematic diagram of a method for unlocking a shared device according to an embodiment of the present application;
fig. 3 is a schematic flowchart of a method for unlocking a shared device according to an embodiment of the present application;
fig. 4 is a schematic flowchart of a method for unlocking a shared device with an intelligent lock as an execution subject according to an embodiment of the present application;
fig. 5 is a schematic flowchart of a method for unlocking a shared device by using a server as an execution subject according to an embodiment of the present application;
fig. 6 is a schematic structural diagram of an unlocking apparatus for a shared device according to an embodiment of the present application;
fig. 7 is a schematic structural diagram of another unlocking apparatus for a shared device according to an embodiment of the present application;
fig. 8 is a hardware structure block diagram of a server for a shared device unlocking method according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
It should be noted that the terms "first," "second," and the like in the description and claims of the embodiments of the present application and in the drawings described above are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments of the application described herein are capable of operation in sequences other than those illustrated or otherwise described herein. Moreover, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or server that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
In order to make the objects, technical solutions and advantages disclosed in the embodiments of the present application more clearly apparent, the embodiments of the present application are described in further detail below with reference to the accompanying drawings and the embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and do not delimit the present application.
In the following, the terms "first", "second" are used for descriptive purposes only and are not to be understood as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defined as "first" or "second" may explicitly or implicitly include one or more of that feature. In the description of the present embodiment, "a plurality" means two or more unless otherwise specified. In order to facilitate understanding of the technical solutions and the technical effects thereof described above in the embodiments of the present application.
At present, the unlocking mode of the sharing device is generally unlocked by scanning a two-dimensional code on an intelligent lock through an APP on a mobile terminal. When the mobile terminal is powered off or the network communication of the mobile terminal is poor, the user cannot use the mobile terminal to unlock the intelligent lock, so that the user cannot use the shared vehicle anytime and anywhere.
In view of this, embodiments of the present application provide an unlocking device, an unlocking method for a shared device, a device, and a storage medium, where the unlocking device is used to unlock an intelligent lock on the shared device, and a mobile terminal such as a mobile phone is not required during unlocking, and the mobile terminal is not in communication with the intelligent lock through a network, so that a user can use a shared vehicle at any time and any place conveniently. In addition, the unlocking method adopts various safety measures and adopts multiple verifications during unlocking, thereby ensuring the unlocking safety.
Referring to fig. 1, fig. 1 is a schematic structural diagram of an unlocking device according to an embodiment of the present disclosure. As shown in fig. 1, the unlocking device includes a processor.
In the embodiment of the present application, the processor may be a single chip microcomputer, a microcontroller (Micro-controller Unit, MCU), or a microcontroller chip. The processor is provided with a storage module, and the storage module stores the equipment identification information of the unlocking device and the unlocking key corresponding to the user. The equipment identification information is used for identifying the unlocking device, and the authenticity of the unlocking device can be determined according to the equipment identification information. The unlocking keys correspond to users, and each user has a special unlocking key. Optionally, the unlocking key is unique, encrypted, and burned into the memory module of the processor at one time.
In the embodiment of the application, the processor further comprises an unlocking request module, and the unlocking request module is used for sending an unlocking request to the intelligent lock. When the unlocking request module sends an unlocking request to the intelligent lock, communication connection is established with the intelligent lock. As an optional implementation manner, the unlocking device further includes a serial communication interface, and the unlocking device communicates with the smart lock on the shared device through the serial bus communication interface. The serial bus communication safety is high, and the safety of the unlocking process can be ensured due to the non-invasiveness. Optionally, the Serial Bus communication Interface may be RS232, RS485, ethernet, General-Purpose Interface Bus (GPIB), Universal Serial Bus (USB), wireless, optical fiber, or the like. The serial bus communication interface adopts a serial bus communication protocol established by independent encryption, when the unlocking device communicates with the intelligent lock, the intelligent lock performs hardware identification on the unlocking device, and under the condition that the hardware identification is passed, the intelligent lock identifies the communication instruction sent by the unlocking request module.
In the embodiment of the application, the unlocking device further comprises a power supply module, and the power supply module is used for supplying power to the unlocking device. Optionally, the power supply module is a lithium battery pack. The lithium battery pack has high energy density, so that the unlocking device is integrated and designed into a portable multifunctional charger. The lithium battery pack can be used for supplying power to the processor, can also be used for charging mobile terminals such as mobile phones and the like, and can even be used for directly supplying power to the electric sharing vehicle.
In the embodiment of the present application, the unlocking device may be an independent physical device dedicated to unlocking, or may be a physical device with other functions. For example, the battery module in the unlocking device can be used as a mobile power supply to charge a mobile terminal such as a mobile phone. The storage module in the unlocking device can be used as a mobile memory, and a user can use the unlocking device as a memory such as a USB flash disk. The unlocking device can also be arranged into a mobile phone shell, a key ring, a card and the like, and is convenient for a user to carry.
The embodiment of the application also provides an intelligent lock for the sharing equipment, and the intelligent lock is used for locking the sharing equipment. The intelligent lock is unlocked through the unlocking device.
The embodiment of the application also provides an intelligent lock system of the sharing equipment, the intelligent lock system comprises an intelligent lock and an unlocking device, the intelligent lock is used for locking the sharing equipment, the unlocking device is used for unlocking the intelligent lock, and the unlocking device is the unlocking device.
Fig. 2 is a schematic view of an application environment of the unlocking method for a shared device provided in the embodiment of the present application, and as shown in fig. 2, the application environment may include an unlocking apparatus 201, a shared device 203, and a server 205.
In the embodiment of the present application, the shared device 203 is a shared rental device. The sharing device 203 is provided with an intelligent lock, and the intelligent lock is used for locking the sharing device 203. Optionally, the smart lock includes a processor, a communication module and an unlocking module. The processor can be a single chip microcomputer, a microcontroller or a micro control chip and the like. The communication module is used for realizing communication between the unlocking device 201 and the server 205. The intelligent lock and the unlocking device 201 adopt a serial bus communication interface for communication. The smart lock communicates with the server 205 using a wireless link. For example, the communication module is a General Packet Radio Service (GPRS) communication module, and the smart lock and the server 205 communicate with each other through a GPRS network. The smart lock may also include a location module to provide location information for the shared vehicle. Optionally, the positioning module is a Beidou satellite navigation positioning module, a Glonass navigation positioning module, a global navigation positioning module, a quasi-zenith satellite positioning module, or the like.
In this embodiment, the server 205 is an operator background server of the shared device 203, and optionally, the server may include an independent physical server, or a server cluster or a distributed system formed by a plurality of physical servers, or may be a cloud server that provides basic cloud computing services such as cloud service, a cloud database, cloud computing, cloud functions, cloud storage, Network service, cloud communication, middleware service, domain name service, security service, a Content Delivery Network (CDN), and a big data and artificial intelligence platform.
In the embodiment of the present application, the user uses the unlocking device 201 to unlock the smart lock on the shared device 203, thereby achieving the purpose of using the shared device 203. Specifically, the user inserts the unlocking device 201 into the smart lock on the sharing device 203, and the unlocking device 201 is connected to the smart lock through the serial bus communication interface. The intelligent lock firstly judges whether the hardware information is correct or not and whether the hardware information is matched with the intelligent unlocking device or not according to an encryption protocol of serial bus communication, and when the hardware information of the unlocking device 201 is judged to be passed, the intelligent lock then identifies a communication instruction. The intelligent lock uploads the device identification information carried in the unlocking instruction sent by the unlocking device and the unlocking key corresponding to the terminal user to the server 205 through the GPRS communication module, the server 205 checks the device identification information and the unlocking key corresponding to the terminal user after receiving the device identification information and the unlocking key corresponding to the terminal user, the unlocking instruction is sent to the intelligent lock after checking and matching, and the intelligent lock unlocks after receiving the unlocking instruction. When the intelligent lock is unlocked, timing and charging can be started by the server 205, and when the intelligent lock detects that the processor of the unlocking device 201 is disconnected from the intelligent lock, an instruction is sent to the server 205, and charging is stopped by the background server.
It should be understood that fig. 2 shows only one application environment of the unlocking method for the shared device provided by the present disclosure, and in practical applications, other application environments may also be included, for example, in practical applications, the shared device 203 may also be a shared device such as a shared rental car, a shared bicycle, a shared electric vehicle, and the like.
A specific embodiment of a method of the present application is described below, and fig. 3 is a flowchart of a method for unlocking a shared device provided in the embodiment of the present application, where the method operation steps are provided as in the embodiment or the flowchart, but more or less operation steps may be included based on conventional or non-inventive labor. The order of steps recited in the embodiments is merely one manner of performing the steps in a multitude of orders and does not represent the only order of execution. In practice, the system or server product may be implemented in a sequential or parallel manner (e.g., parallel processor or multi-threaded environment) according to the embodiments or methods shown in the figures. As shown in fig. 3 in detail, the unlocking method may be applied to a smart lock, and may also be applied to a server, that is, the two interactive ends of the method are the smart lock and the server. The method can comprise the following steps:
s301: and the unlocking device sends an unlocking request to the intelligent lock.
In the embodiment of the application, when a user needs to use the shared device, the intelligent lock on the shared device is unlocked by using the unlocking device. The user inserts the unlocking device into the intelligent lock, the unlocking device and the intelligent lock are firstly in serial bus communication to establish connection, and then an unlocking request is sent to the intelligent lock. Specifically, the user inserts the unlocking device into the smart lock, and the unlocking device sends a connection establishment request to the smart lock. The connection establishment request carries hardware information of the unlocking device. Optionally, the hardware information is a hardware identification code, and is used to identify the unlocking device. And the intelligent lock sends the hardware information to the server. And the server verifies the hardware information to obtain a verification result. And the server sends the verification result to the intelligent lock, and the intelligent lock receives an unlocking request sent by an unlocking device corresponding to the terminal user under the condition that the verification result indicates that the hardware information of the intelligent lock is successfully verified.
In some embodiments, the unlocking device may also establish a connection with the smart lock by triggering the authentication, and then send an unlocking request to the smart lock. Specifically, when a user inserts the unlocking device into the shared vehicle, the unlocking device is connected with the intelligent lock through the serial bus communication interface, and then an unlocking request is sent to the intelligent lock. The intelligent lock identifies and verifies the hardware information of the unlocking device according to an encryption protocol of serial bus communication. And the intelligent lock sends the hardware information to the server. And the server verifies the hardware information to obtain a verification result. And the server sends the verification result to the intelligent lock, and under the condition that the verification result indicates that the hardware information of the intelligent lock is successfully verified, the intelligent lock identifies the communication instruction and receives and analyzes the unlocking request. And the server sends the verification result to the intelligent lock, and if the verification result indicates that the hardware information of the intelligent lock is not verified successfully, the intelligent lock ignores the unlocking request.
In the embodiment of the application, the unlocking request carries equipment identification information of the unlocking device and an unlocking key corresponding to the terminal user. The equipment identification information is an equipment identity of the unlocking device and is used for uniquely identifying the unlocking device. Optionally, the device identity information may be a character string, and the character string may be generated randomly or according to a certain rule or algorithm. Optionally, the device identity information may also be an identifier in the form of a picture, such as a barcode, a two-dimensional code, a barcode, a three-dimensional code, or the like. Optionally, the identifier in the form of the picture may be generated randomly, or may be generated according to hardware information, for example, according to a hardware identification code of the unlocking device. The unlocking key corresponds to a user account, and one user account can correspond to one unique unlocking key.
S303: the smart lock sends the device identification information and the unlocking key to the server.
In the embodiment of the application, after receiving the unlocking request, the intelligent lock sends the device identification information and the unlocking key carried in the unlocking request to the server, so that the server verifies the device identification information and the unlocking key. The server verifies the equipment identification information and the unlocking key, so that on one hand, the verification accuracy can be ensured, and the unlocking safety is improved. On the other hand, the processor performance requirement on the intelligent lock can be reduced, and the cost of the shared equipment is reduced.
S305: and the server verifies the equipment identification information and the unlocking key to obtain a verification result.
In the embodiment of the application, the smart lock sends the device identification information and the unlocking key to the server, and accordingly, the server receives the device identification information and the unlocking key. And after receiving the equipment identification information and the unlocking key, the server verifies the equipment identification information and the unlocking key received by the server, and then obtains a verification result.
As an alternative, the server checks the device identification information and the unlock key separately. Specifically, the server verifies the device identification information and the unlock key, and obtaining a verification result may include: and the server verifies the equipment identification information with the preset equipment identification information of the preset equipment in the server to obtain an identification verification result. And under the condition that the identification verification result indicates that the equipment identification information is successfully verified with the preset equipment identification information, the server verifies the unlocking key with a preset key in the server to obtain a key verification result. In this embodiment, the preset device is an unlocking apparatus recorded in the server. The preset device identification information is the device identification information of the unlocking device prestored in the server. The preset key is an unlocking key prestored in the server. After the server acquires the equipment identification information and the unlocking key sent by the intelligent lock, the equipment identification information is compared with preset equipment identification information prestored in the server to obtain an identification verification result. And under the condition that the equipment identification information is consistent with the preset equipment identification information prestored in the server, indicating that the unlocking device for unlocking is the safety equipment and is not counterfeited. The server can also compare the unlocking key with a preset key prestored in the server to obtain a key verification result. And under the condition that the equipment identification information is consistent with a preset key prestored in the server, indicating that the unlocking key for unlocking is a safe key. In this embodiment, when the server verifies the device identification information and the unlocking key, if any one of the device identification information and the unlocking key fails, it indicates that the unlocking is not safe, and the server does not send an unlocking instruction to the smart lock. And only when the equipment identification information and the unlocking key are verified successfully, the server sends an unlocking instruction to the intelligent lock.
As another alternative, the server performs joint verification of the device identification information and the unlock key. Specifically, the server verifies the device identification information and the unlock key, and obtaining a verification result may include: the server obtains a set of device information maintained by the server. And under the condition that the server determines that the equipment information corresponding to the equipment identification information exists in the equipment information set, acquiring the key verification information corresponding to the equipment identification information. And the server verifies the unlocking key according to the key verification information to obtain a verification result. In this embodiment, the server stores in advance device information of a plurality of unlocking devices that it maintains, where the device information includes device identification information, and key verification information, an unlocking key, and the like corresponding to the device identification information. When the server acquires the equipment identification information and the unlocking key sent by the intelligent lock, the server firstly acquires an equipment information set maintained by the server, determines whether the equipment identification information for unlocking exists in the equipment information set, and indicates that the unlocking device for unlocking is the safety equipment and is not counterfeited under the condition that the equipment identification information exists in the equipment information set. And the server further determines key verification information corresponding to the equipment identification information in the equipment information set according to the equipment identification information, and verifies the unlocking key sent by the intelligent lock by using the key verification information. Optionally, the key verification information and the unlocking key are set in a symmetric encryption or asymmetric encryption manner. And verifying the unlocking key through a decryption algorithm to obtain a verification result. And when the unlocking key is successfully verified, the server sends an unlocking instruction to the intelligent lock. When the equipment identification information does not exist in the equipment information set or the unlocking key does not correspond to the key verification information, the unlocking device for unlocking is not legal, the unlocking is unsafe, and the server does not send an unlocking instruction to the intelligent lock.
In some embodiments, in some cases, the server may also perform other forms of verification on the unlocking device, further improving the security of unlocking. As an example, the server may also determine information such as a common area or a history of use of the unlocking apparatus according to the device identification information. When the server determines that the current unlocking position is not in the common area of the unlocking device or the unlocking device is used abnormally frequently, the server can perform further real-time verification on the unlocking device. Under the condition, the server sends a real-time verification instruction to the intelligent lock, and the real-time verification instruction carries data information to be collected. The intelligent lock sends data information to be collected to the unlocking device through the serial bus communication interface. The acquisition module in the unlocking device acquires data information to be acquired in real time, the acquired data information is sent to the intelligent lock, and the intelligent lock sends the acquired data information to the server for further verification. Optionally, the acquired data information includes, but is not limited to, face data, iris data, fingerprint data, sound ray data, and the like. And after the server acquires the data information acquired in real time, comparing the data information with the relevant information prestored in the server for verification, and sending an unlocking instruction to the intelligent lock under the condition that the verification is passed. The unlocking is unsafe under the condition that the verification is not passed, and the server does not send an unlocking instruction to the intelligent lock.
S307: and under the condition that the verification result indicates that the equipment identification information and the unlocking key are verified successfully, the intelligent lock receives an unlocking instruction sent by the server.
In the embodiment of the application, when the server successfully verifies the equipment identification information and the unlocking key, the server sends an unlocking instruction to the intelligent lock to indicate the intelligent lock to unlock. Optionally, under the condition that the verification result indicates that the verification of the device identification information and the unlocking key is successful, the server verifies the result to the intelligent lock, and the verification result carries an unlocking instruction. When the server fails to verify the equipment identification information and the unlocking key, the server sends prompt information of verification failure to the intelligent lock, and the intelligent lock sends the prompt information of verification failure to the unlocking device.
S309: and the intelligent lock unlocks according to the unlocking instruction.
In the embodiment of the application, the server sends the unlocking instruction to the intelligent lock, and correspondingly, the intelligent lock receives the unlocking instruction sent by the server. After the intelligent lock receives the unlocking instruction sent by the server, the processor in the intelligent lock unlocks the sharing equipment, so that the user can use the sharing equipment. In some embodiments, after the smart lock unlocks the shared device, a feedback message of successful unlocking may be sent to the unlocking apparatus to remind the user that the shared device may be used.
In some optional embodiments, after the smart lock is unlocked according to the unlocking instruction, timing information and/or charging information may be sent to the unlocking device, so that the user may know the usage duration and the generated cost of using the sharing device. Optionally, the server has higher computational power and higher security than the smart lock. To ensure the accuracy of the timing or charging, the timing information and/or the charging information may be counted by the server. Specifically, after the intelligent lock is unlocked, feedback information of successful unlocking can be sent to the server, after the server receives the feedback information, the server can determine account information corresponding to the unlocking key according to the unlocking key, and the server can start timing and charging for the account information, so that abnormal timing/charging caused by unlocking faults can be avoided, and user experience is improved. When the intelligent lock detects that the processor of the unlocking device is disconnected with the intelligent lock, namely the unlocking device is pulled out of the sharing equipment, and the serial bus communication interface between the unlocking device and the intelligent lock is disconnected, the intelligent lock sends unlocking device disconnection information to the server, and the server stops timing or charging after receiving the unlocking device disconnection information. And after the server stops timing or charging, sending a locking instruction to the intelligent lock, and locking the shared equipment after the intelligent lock receives the locking instruction. Meanwhile, the server sends the timing information and/or the charging information to the intelligent lock, and the intelligent lock receives the timing information and/or the charging information sent by the server and sends the timing information and/or the charging information to the unlocking device. In the process, because the serial bus communication is disconnected between the unlocking device and the intelligent lock, the timing information and/or the charging information can be sent to the unlocking device in a wireless communication mode. In some embodiments, the timing information and/or billing information may also be sent directly to the unlocking device by the server.
In the embodiment of the application, in order to ensure the safety of the user using the shared device, when the serial bus communication interface between the unlocking device and the intelligent lock is disconnected, the intelligent lock sends prompt information to the user to prompt the user that the unlocking device is disconnected from the intelligent lock, namely the shared device is about to be locked. If the intelligent lock locks the shared equipment within a preset time period, such as 5s-60s, after the intelligent lock sends the prompt message, the intelligent lock prevents the false touch operation caused by loosening or poor contact of a serial bus communication interface between the unlocking device and the intelligent lock.
In the embodiment of the application, the unlocking device may further include a display module, and after the unlocking device receives the timing information and/or the billing information, the unlocking device may display the timing information and/or the billing information through the display module, so that a user can conveniently view the timing information and/or the billing information. In addition, the storage module can also store the usage record of the shared device.
The unlocking method of the sharing equipment provides a brand-new unlocking mode for a user, and the serial bus communication interface is adopted to send the unlocking key to the intelligent lock of the sharing equipment, so that the user can achieve the function of unlocking the intelligent lock without scanning the two-dimensional code by using a mobile phone APP. The unlocking method ensures safe and reliable unlocking through various encryption modes. The unlocking device can be integrated with a lithium battery pack, and is portable, rechargeable and multifunctional. The method can be used for unlocking the intelligent locks of various shared devices such as bicycles, electric bicycles and the like.
Based on the above description, a specific embodiment of the unlocking method for the shared device according to the present application is described below with an unlocking apparatus as an execution subject, where the method may include:
sending an unlocking request to an intelligent lock on the sharing equipment; the unlocking request carries equipment identification information and an unlocking key; the unlocking request is used for enabling the intelligent lock to send the equipment identification information and the unlocking key to the server so that the server can verify the equipment identification information and the unlocking key, and the intelligent lock is unlocked when the equipment identification information and the unlocking key are verified and verified successfully.
Based on the above description, a specific embodiment of the method for unlocking a shared device according to the present application is described below with an intelligent lock as an execution subject, and fig. 4 is a schematic flow diagram of the method for unlocking a shared device with an intelligent lock as an execution subject according to the present application, where as shown in fig. 4, the method may include:
s401: and receiving an unlocking request sent by an unlocking device corresponding to the terminal. The unlocking request carries equipment identification information of the unlocking device and an unlocking key corresponding to the terminal.
S403: and sending the equipment identification information and the unlocking key to the server so that the server verifies the equipment identification information and the unlocking key to obtain a verification result.
S405: and receiving an unlocking instruction sent by the server under the condition that the verification result indicates that the equipment identification information and the unlocking key are successfully verified.
S407: and unlocking according to the unlocking instruction.
In an optional embodiment, receiving an unlocking request sent by an unlocking device corresponding to a terminal includes: and receiving a connection establishment request sent by the unlocking device. The connection establishment request carries hardware information of the unlocking device. And sending the hardware information to a server so that the server verifies the hardware information to obtain a verification result. And under the condition that the verification result indicates that the hardware information is verified successfully, receiving an unlocking request sent by an unlocking device corresponding to the terminal.
In an optional embodiment, after the unlocking according to the unlocking instruction, the method further includes: and receiving the timing information and/or the charging information sent by the server, and sending the timing information and/or the charging information to the unlocking device.
Based on the above description, a specific embodiment of the method for unlocking a shared device according to the present application is described below with a server as an execution subject, and fig. 5 is a schematic flowchart of the method for unlocking a shared device with a server as an execution subject according to the embodiment of the present application, where as shown in fig. 5, the method may include:
s501: and receiving equipment identification information of the unlocking device sent by the intelligent lock of the sharing equipment and an unlocking key corresponding to the terminal. The equipment identification information and the unlocking secret key are carried in the unlocking request, and the unlocking request is sent to the intelligent lock by the unlocking device corresponding to the terminal.
S503: and verifying the equipment identification information and the unlocking secret key to obtain a verification result.
S505: and sending an unlocking instruction to the intelligent lock under the condition that the verification result is that the equipment identification information and the unlocking key are successfully verified, so that the intelligent lock is unlocked according to the unlocking instruction.
In an alternative embodiment, the verification result includes an identification verification result and a key verification result. Verifying the equipment identification information and the unlocking secret key to obtain a verification result, wherein the verification result comprises the following steps: and verifying the equipment identification information with the preset equipment identification information of the preset equipment in the server to obtain an identification verification result. And under the condition that the identification verification result indicates that the equipment identification information is successfully verified with the preset equipment identification information, verifying the unlocking key with a preset key in the server to obtain a key verification result.
In another optional implementation, verifying the device identification information and the unlock key to obtain a verification result includes: a set of device information maintained by a server is obtained. And under the condition that the equipment information corresponding to the equipment identification information exists in the equipment information set, acquiring the key verification information corresponding to the equipment identification information. And verifying the unlocking key according to the key verification information to obtain a verification result.
The embodiment of the present application further discloses an unlocking device for shared devices, that is, an intelligent lock for shared devices, fig. 6 is a schematic structural diagram of the unlocking device for shared devices provided in the embodiment of the present application, and as shown in fig. 6, the unlocking device for shared devices includes:
an unlocking request receiving module 601, configured to receive an unlocking request sent by an unlocking device corresponding to the terminal. The unlocking request carries equipment identification information of the unlocking device and an unlocking key corresponding to the terminal.
The information sending module 603 is configured to send the device identification information and the unlocking key to the server, so that the server verifies the device identification information and the unlocking key to obtain a verification result.
An unlocking instruction receiving module 605, configured to receive an unlocking instruction sent by the server under the condition that the verification result indicates that the device identification information and the unlocking key are successfully verified.
And the unlocking module 607 is used for unlocking according to the unlocking instruction.
In some optional embodiments, the unlocking request receiving module comprises:
and the connection establishment request receiving unit is used for receiving the connection establishment request sent by the unlocking device. The connection establishment request carries hardware information of the unlocking device.
And the hardware information sending unit is used for sending the hardware information to the server so that the server verifies the hardware information to obtain a verification result.
And the unlocking request receiving unit is used for receiving the unlocking request sent by the unlocking device corresponding to the terminal under the condition that the verification result indicates that the hardware information is verified successfully.
In some optional embodiments, the apparatus further comprises:
and the statistical information receiving module is used for receiving the timing information and/or the charging information sent by the server and sending the timing information and/or the charging information to the unlocking device.
The device in the embodiment of the application is based on the same application concept as the embodiment of the method for unlocking the shared equipment with the intelligent lock as an execution main body.
The embodiment of the present application further discloses another unlocking device for shared devices, that is, a server, fig. 7 is a schematic structural diagram of another unlocking device for shared devices provided in the embodiment of the present application, and as shown in fig. 7, the unlocking device includes:
the information receiving module 701 is configured to receive device identification information of an unlocking apparatus and an unlocking key corresponding to the terminal, where the device identification information is sent by the smart lock of the shared device. The equipment identification information and the unlocking key are carried in the unlocking request, and the unlocking request is sent to the intelligent lock by the unlocking device corresponding to the terminal.
The verification module 703 is configured to verify the device identification information and the unlock key to obtain a verification result.
And an unlocking instruction sending module 705, configured to send an unlocking instruction to the smart lock when the verification result is that the device identification information and the unlocking key are successfully verified, so that the smart lock unlocks according to the unlocking instruction.
In some optional embodiments, the verification result comprises an identification verification result and a key verification result. The verification module may include:
and the identification verification unit is used for verifying the equipment identification information with the preset equipment identification information of the preset equipment in the server to obtain an identification verification result.
And the key verification unit is used for verifying the unlocking key and a preset key in the server under the condition that the identification verification result indicates that the equipment identification information and the preset equipment identification information are successfully verified, so that a key verification result is obtained.
In other alternative embodiments, the verification module may include:
and the equipment information set acquisition unit is used for acquiring the equipment information set maintained by the server.
And a key verification information acquisition unit configured to acquire the key verification information corresponding to the device identification information, in a case where it is determined that the device information corresponding to the device identification information exists in the device information set.
And the key verification unit is used for verifying the unlocking key according to the key verification information to obtain a verification result.
The device in the embodiment of the application is based on the same application concept as the shared device unlocking method embodiment taking the server as an execution main body.
The embodiment of the application discloses a shared device unlocking system, the intelligent lock system comprises an unlocking device, an intelligent lock and a server, and the unlocking device, the intelligent lock and the server are connected with each other for communication so as to realize the shared device unlocking method.
The embodiment of the application discloses an electronic device, which comprises a processor and a memory, wherein at least one instruction or at least one program is stored in the memory, and the at least one instruction or the at least one program is loaded by the processor and executes the shared device unlocking method.
The method provided by the embodiment of the application can be executed in a mobile terminal, a computer terminal, a server or a similar operation device. Taking the operation on the server as an example, fig. 8 is a hardware structure block diagram of the server of the unlocking method for the shared device according to the embodiment of the present application. As shown in fig. 8, the server 800 may have a relatively large difference due to different configurations or performances, and may include one or more Central Processing Units (CPUs) 810 (the processors 810 may include but are not limited to a Processing device such as a microprocessor MCU or a Programmable logic device (FPGA)), a memory 830 for storing data, one or more storage media 820 (e.g., one or more mass storage devices) for storing applications 823 or data 822. Memory 830 and storage medium 820 may be, among other things, transient or persistent storage. The program stored in storage medium 820 may include one or more modules, each of which may include a series of instruction operations for a server. Still further, the central processor 810 may be configured to communicate with the storage medium 820 to execute a series of instruction operations in the storage medium 820 on the server 800. The server 800 may also include one or more power supplies 870, one or more wired or wireless network interfaces 850, one or more input-output interfaces 840, and/or one or more operating systems 821 such as Windows Server, Mac OS XTM, UnixTM, LinuxTM, FreeBSDTM, etc.
The input-output interface 840 may be used to receive or transmit data via a network. Specific examples of the network described above may include a wireless network provided by a communication provider of the server 800. In one example, i/o Interface 840 includes a Network adapter (NIC) that may be coupled to other Network devices via a base station to communicate with the internet. In one example, the input/output interface 840 may be a Radio Frequency (RF) module, which is used to communicate with the internet in a wireless manner.
It will be understood by those skilled in the art that the structure shown in fig. 8 is only an illustration and is not intended to limit the structure of the electronic device. For example, server 800 may also include more or fewer components than shown in FIG. 8, or have a different configuration than shown in FIG. 8.
The embodiment of the application discloses a computer-readable storage medium, wherein at least one instruction or at least one program is stored in the storage medium, and the at least one instruction or the at least one program is loaded and executed by a processor to realize the unlocking method of the shared device.
In an embodiment of the present application, the computer storage medium may be located in at least one network server of a plurality of network servers of a computer network. Optionally, the computer-readable storage medium may include: a Read Only Memory (ROM), a Random Access Memory (RAM), a Solid State Drive (SSD), or an optical disc, etc. The random access memory may include a resistive random access memory (ReRAM) and a Dynamic Random Access Memory (DRAM).
It should be noted that: the sequence of the embodiments of the present application is only for description, and does not represent the advantages and disadvantages of the embodiments. And specific embodiments thereof have been described above. Other embodiments are within the scope of the following claims. In some cases, the actions or steps recited in the claims may be performed in a different order than in the embodiments and still achieve desirable results. In addition, the processes depicted in the accompanying figures do not necessarily require the particular order shown, or sequential order, to achieve desirable results. In some embodiments, multitasking and parallel processing may also be possible or may be advantageous.
The embodiments in the present specification are described in a progressive manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, for the apparatus embodiment, since it is substantially similar to the method embodiment, the description is relatively simple, and for the relevant points, reference may be made to the partial description of the method embodiment.
It will be understood by those skilled in the art that all or part of the steps for implementing the above embodiments may be implemented by hardware, or may be implemented by a program instructing relevant hardware, where the program may be stored in a computer-readable storage medium, and the above-mentioned storage medium may be a read-only memory, a magnetic disk or an optical disk, etc.
The above description is only exemplary of the present application and should not be taken as limiting the present application, as any modification, equivalent replacement, or improvement made within the spirit and principle of the present application should be included in the protection scope of the present application.

Claims (13)

1. An unlocking device, characterized in that the unlocking device comprises a processor;
the processor comprises a storage module and an unlocking request module;
the storage module stores equipment identification information and an unlocking key;
the unlocking request module is used for sending an unlocking request to the intelligent lock on the sharing equipment under the condition of establishing communication connection with the intelligent lock on the sharing equipment, and the unlocking request carries the equipment identification information and the unlocking key;
the unlocking request is used for enabling the intelligent lock to send the equipment identification information and the unlocking secret key to the server so that the server can verify the equipment identification information and the unlocking secret key, and the intelligent lock is unlocked under the condition that the server verifies and verifies the equipment identification information and the unlocking secret key successfully.
2. The unlocking device of claim 1, wherein the unlocking key is burned in the storage module at one time by an encryption method.
3. The delatch device of claim 2 further comprising a serial communication interface, wherein the processor is configured to communicate with the smart lock via the serial communication interface.
4. The unlocking device of claim 1, further comprising a power module configured to provide power to the unlocking device.
5. A method for unlocking shared equipment is applied to an unlocking device, and comprises the following steps:
sending an unlocking request to an intelligent lock on the sharing equipment under the condition of establishing communication connection with the intelligent lock on the sharing equipment; the unlocking request carries the equipment identification information and the unlocking key; the unlocking request is used for enabling the intelligent lock to send the equipment identification information and the unlocking key to a server so that the server can verify the equipment identification information and the unlocking key, and the intelligent lock is unlocked under the condition that the server successfully verifies the equipment identification information and the unlocking key.
6. An intelligent lock for sharing a device, comprising:
the unlocking request receiving module is used for receiving an unlocking request sent by an unlocking device, wherein the unlocking request carries equipment identification information of the unlocking device and an unlocking key corresponding to the terminal;
the information sending module is used for sending the equipment identification information and the unlocking key to the server so that the server can verify the equipment identification information and the unlocking key to obtain a verification result;
the unlocking instruction receiving module is used for receiving an unlocking instruction sent by the server under the condition that the verification result indicates that the equipment identification information and the unlocking key are successfully verified;
and the unlocking module is used for unlocking according to the unlocking instruction.
7. A method for unlocking a shared device is characterized in that the method is applied to an intelligent lock of the shared device, and comprises the following steps:
receiving an unlocking request sent by an unlocking device; the unlocking request carries equipment identification information of the unlocking device and an unlocking key corresponding to the terminal;
sending the equipment identification information and the unlocking key to a server so that the server verifies the equipment identification information and the unlocking key to obtain a verification result;
receiving an unlocking instruction sent by the server under the condition that the verification result indicates that the equipment identification information and the unlocking key are successfully verified;
and unlocking according to the unlocking instruction.
8. The method according to claim 7, wherein the receiving of the unlocking request sent by the unlocking device corresponding to the terminal comprises:
receiving a connection establishment request sent by the unlocking device; the connection establishment request carries hardware information of the unlocking device;
sending the hardware information to the server so that the server verifies the hardware information to obtain a verification result;
and receiving an unlocking request sent by an unlocking device under the condition that the verification result indicates that the hardware information is verified successfully.
9. A method for unlocking a shared device is applied to a server, and comprises the following steps:
receiving equipment identification information of an unlocking device and an unlocking key corresponding to a terminal, which are sent by an intelligent lock of the shared equipment; the equipment identification information and the unlocking secret key are carried in an unlocking request, and the unlocking request is sent to the intelligent lock by the unlocking device corresponding to the terminal;
verifying the equipment identification information and the unlocking key to obtain a verification result;
and sending an unlocking instruction to the intelligent lock under the condition that the verification result is that the equipment identification information and the unlocking key are verified successfully, so that the intelligent lock is unlocked according to the unlocking instruction.
10. The method of claim 9, wherein the verification result comprises an identification verification result and a key verification result; the verifying the device identification information and the unlocking key to obtain a verification result includes:
verifying the equipment identification information with preset equipment identification information of preset equipment in the server to obtain an identification verification result;
and under the condition that the identification verification result indicates that the equipment identification information and the preset equipment identification information are successfully verified, verifying the unlocking key and a preset key in the server to obtain a key verification result.
11. A shared device unlocking system, wherein the smart lock system comprises an unlocking device, a smart lock and a server, and the unlocking device, the smart lock and the server are connected and communicated with each other to realize the shared device unlocking method according to any one of claims 5 and 7-10.
12. An electronic device, comprising a processor and a memory, wherein the memory stores at least one instruction or at least one program, and the at least one instruction or the at least one program is loaded by the processor and executes the method for unlocking a shared device according to claim 5, the method for unlocking a shared device according to any one of claims 7 to 8, or the method for unlocking a shared device according to any one of claims 9 to 10.
13. A computer-readable storage medium, wherein at least one instruction or at least one program is stored in the storage medium, and the at least one instruction or the at least one program is loaded by a processor and executed to implement the method for unlocking a shared device according to claim 5, the method for unlocking a shared device according to any one of claims 7 to 8, or the method for unlocking a shared device according to any one of claims 9 to 10.
CN202210320491.2A 2022-03-29 2022-03-29 Unlocking device, shared device unlocking method, device and storage medium Pending CN114743294A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210320491.2A CN114743294A (en) 2022-03-29 2022-03-29 Unlocking device, shared device unlocking method, device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210320491.2A CN114743294A (en) 2022-03-29 2022-03-29 Unlocking device, shared device unlocking method, device and storage medium

Publications (1)

Publication Number Publication Date
CN114743294A true CN114743294A (en) 2022-07-12

Family

ID=82277903

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210320491.2A Pending CN114743294A (en) 2022-03-29 2022-03-29 Unlocking device, shared device unlocking method, device and storage medium

Country Status (1)

Country Link
CN (1) CN114743294A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116484352A (en) * 2023-04-21 2023-07-25 贵州电网有限责任公司 Management method of power grid equipment information model library and design access network platform

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102075327A (en) * 2010-12-21 2011-05-25 北京握奇数据系统有限公司 Method, device and system for unlocking electronic key
CN104234523A (en) * 2014-09-09 2014-12-24 黄伟仁 Key, energy-saving electronic burglarproof lock and energy-saving electronic burglarproof lockset
CN104652936A (en) * 2013-11-25 2015-05-27 天津祥源汽车配件有限公司 Automobile key
CN105488871A (en) * 2014-09-18 2016-04-13 腾讯科技(深圳)有限公司 Entrance guard control method, apparatus, terminal and control server
CN105488870A (en) * 2014-09-18 2016-04-13 腾讯科技(深圳)有限公司 Entrance guard control method, apparatus, terminal and control server
CN106373228A (en) * 2016-08-29 2017-02-01 杭州巴玺电子科技有限公司 Intelligent safe passive lockset system and unlocking method thereof
CN107646127A (en) * 2015-06-02 2018-01-30 索尼公司 Lock control control equipment, information processing method, program and communication equipment
CN109493498A (en) * 2018-12-26 2019-03-19 无锡卓信信息科技股份有限公司 Electron key and electronic lock
CN109754505A (en) * 2018-12-19 2019-05-14 广州羊城通有限公司 A kind of method for unlocking and device based on IC card
CN111192393A (en) * 2019-09-19 2020-05-22 腾讯科技(深圳)有限公司 Network door opening method and device and computer equipment

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102075327A (en) * 2010-12-21 2011-05-25 北京握奇数据系统有限公司 Method, device and system for unlocking electronic key
CN104652936A (en) * 2013-11-25 2015-05-27 天津祥源汽车配件有限公司 Automobile key
CN104234523A (en) * 2014-09-09 2014-12-24 黄伟仁 Key, energy-saving electronic burglarproof lock and energy-saving electronic burglarproof lockset
CN105488871A (en) * 2014-09-18 2016-04-13 腾讯科技(深圳)有限公司 Entrance guard control method, apparatus, terminal and control server
CN105488870A (en) * 2014-09-18 2016-04-13 腾讯科技(深圳)有限公司 Entrance guard control method, apparatus, terminal and control server
CN107646127A (en) * 2015-06-02 2018-01-30 索尼公司 Lock control control equipment, information processing method, program and communication equipment
CN106373228A (en) * 2016-08-29 2017-02-01 杭州巴玺电子科技有限公司 Intelligent safe passive lockset system and unlocking method thereof
CN109754505A (en) * 2018-12-19 2019-05-14 广州羊城通有限公司 A kind of method for unlocking and device based on IC card
CN109493498A (en) * 2018-12-26 2019-03-19 无锡卓信信息科技股份有限公司 Electron key and electronic lock
CN111192393A (en) * 2019-09-19 2020-05-22 腾讯科技(深圳)有限公司 Network door opening method and device and computer equipment

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116484352A (en) * 2023-04-21 2023-07-25 贵州电网有限责任公司 Management method of power grid equipment information model library and design access network platform
CN116484352B (en) * 2023-04-21 2024-03-15 贵州电网有限责任公司 Management method of power grid equipment information model library and design access network system

Similar Documents

Publication Publication Date Title
CN112822630B (en) Data processing method of device and computer-readable storage medium
CN110766524B (en) Online booking self-service check-in method and storage device
CN102754132B (en) In order to booking center to be identified method and the device of electric motor car
CN107627867A (en) Object charging authorization method to be charged, charging equipment automatic authorization method and system
CN111572493B (en) Vehicle keyless entry and starting system and method based on Internet of vehicles
CN107277033B (en) Charging and battery replacing equipment and authentication method and system for object to be charged and battery replaced
CN114743294A (en) Unlocking device, shared device unlocking method, device and storage medium
CN112248844A (en) Charging starting method of charging pile, intelligent terminal and charging system
JP5309590B2 (en) Information processing apparatus and secondary battery pack authentication method for information processing apparatus
CN112776649B (en) Charging method for electric vehicle, charging pile, battery management system and medium
JP2018045304A (en) Power supply system
CN109492865A (en) Anti- check card cheat method, device, computer installation and storage medium
CN112581233A (en) Method, device, equipment and computer-readable storage medium for order offline operation
CN111770087A (en) Service node verification method and related equipment
CN114157693A (en) Power-on authentication method of communication equipment, communication module and server
JP2013027249A (en) Portable terminal, portable terminal charging system, portable terminal charging method, and program
EP3696011B1 (en) Charging system and method of a battery of an electric vehicle
CN111163432B (en) Battery anti-theft method, management equipment, battery and server
CN111277622B (en) Vehicle sharing method and device, vehicle, computer equipment and storage medium
JP4883778B2 (en) Authentication method and authentication system for authenticating information device by authentication device
CN111833485B (en) Unlocking method and device for vehicle, electronic equipment and storage medium
CN111310130A (en) Authorization authentication processing method, device, storage medium and electronic device
CN213847026U (en) ETC safety certification equipment and system based on position information
CN111152866A (en) Method and system for replacing battery for vehicle
WO2017181691A1 (en) Secure communication method and device, system, and secure server

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination