CN115294678A - Door lock control method and device, electronic equipment and related products - Google Patents

Door lock control method and device, electronic equipment and related products Download PDF

Info

Publication number
CN115294678A
CN115294678A CN202210886160.5A CN202210886160A CN115294678A CN 115294678 A CN115294678 A CN 115294678A CN 202210886160 A CN202210886160 A CN 202210886160A CN 115294678 A CN115294678 A CN 115294678A
Authority
CN
China
Prior art keywords
door lock
current
target door
target
distance
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210886160.5A
Other languages
Chinese (zh)
Inventor
王妙玉
方新华
吴宁泉
李昌
周亮
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Hotata Smart Home Co Ltd
Original Assignee
Guangdong Hotata Smart Home Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Hotata Smart Home Co Ltd filed Critical Guangdong Hotata Smart Home Co Ltd
Priority to CN202210886160.5A priority Critical patent/CN115294678A/en
Publication of CN115294678A publication Critical patent/CN115294678A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • H04M1/72418User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality for supporting emergency services
    • H04M1/72421User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality for supporting emergency services with automatic activation of emergency service functions, e.g. upon sensing an alarm
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72448User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions
    • H04M1/72457User interfaces specially adapted for cordless or mobile telephones with means for adapting the functionality of the device according to specific conditions according to geographic location
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • G07C2009/00365Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks in combination with a wake-up circuit

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Human Computer Interaction (AREA)
  • Signal Processing (AREA)
  • Business, Economics & Management (AREA)
  • Emergency Management (AREA)
  • Environmental & Geological Engineering (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The embodiment of the application provides a door lock control method and device, electronic equipment, a computer readable storage medium and a computer program product, and relates to the field of door locks. The method comprises the following steps: acquiring a current first position and determining a current distance according to the first position; and if the current distance meets the preset door lock opening condition, executing prompt operation in a preset mode, and after a user executes door lock control operation according to the prompt, controlling the target door lock to be opened according to the door lock control operation. According to the scheme provided by the embodiment of the application, the current distance from the target door lock is obtained through the current position, and the door lock control operation is implemented to open the target door lock when the current distance meets the preset door lock opening condition, so that the aim of efficiently opening the door is fulfilled.

Description

Door lock control method and device, electronic equipment and related products
Technical Field
The present application relates to the field of door lock technologies, and in particular, to a door lock control method, an apparatus, an electronic device, a computer-readable storage medium, and a computer program product.
Background
With the dependence of users on mobile terminals (such as mobile phones), people can drown in the mobile phones whenever having an opportunity. For example, in a scene that a user goes home, the user is drowned in a mobile phone, so that the user cannot think about opening the door until the user comes home, and then the user moves attention from the mobile phone to a door lock to perform door opening operation. In the operation of opening the door, generally can take the fingerprint to open the door, the password opens the door and the key opens the door etc. and the fingerprint opens the door, the password opens the door and has the failure rate, and the key process of opening the door is more loaded down with trivial details, for example carry the key, look for the key, the existence forgets moreover and carries the key and lead to the unable condition of opening the door.
Therefore, the existing door opening mode has low efficiency.
Disclosure of Invention
An embodiment of the present application provides a door lock control method, a door lock control device, an electronic device, and a related product, so as to solve one of the above technical problems. In order to achieve the purpose, the embodiments of the present application provide the following solutions.
In one aspect, an embodiment of the present application provides a door lock control method, where the method includes:
obtaining a current distance determined based on a current first position; the current distance is the distance between the first position and the second position of the target door lock; if the current distance meets the preset door lock opening condition, executing prompt operation in a preset mode; and receiving the door lock control operation input based on the prompt operation, and controlling the target door lock.
Optionally, obtaining the current distance determined based on the current first position comprises:
determining that the positioning notification is in an on state; calling a cloud computing service to carry out computing according to the first position and the second position to obtain a current distance;
and the current distance is obtained by processing the first position and the second position through a distance algorithm by the cloud computing service.
Optionally, before obtaining the current distance determined based on the current first position, the method further comprises:
responding to a configuration instruction carrying the door lock information of the target door lock, and configuring the target door lock; the door lock information comprises a second position of the target door lock and a wake-up distance for the target door lock to enter a waiting-to-open state; and associating the cloud computing service with the configuration information of the target door lock.
Wherein, confirm that the present distance accords with predetermined lock opening condition, include: determining that the current distance is not greater than the wake-up distance.
Optionally, receiving a door lock control operation based on the prompt operation input, and controlling the target door lock, including any one of:
receiving an input first password; comparing the first password with a second password of the target door lock; and if the comparison is successful, triggering a starting instruction aiming at the target door lock.
Or, receiving an entered password; comparing the input password with a preset door lock password of the target door lock; and if the comparison is successful, triggering a starting instruction aiming at the target door lock.
Or receiving an input door opening instruction; and triggering a starting instruction aiming at the target door lock.
Wherein the start instruction is for starting the target door lock.
Optionally, after entering the area protected by the target door lock through the unlocked target door lock, the method further comprises:
acquiring a current position according to a preset frequency; and if the current position is within the preset range, updating the positioning notice into a closed state.
Optionally, the target door lock further includes corresponding scene information; and executing a prompt operation in a preset mode, wherein the prompt operation comprises at least one of the following steps:
playing prompt information related to the scene information; popping up a notification box related to scene information on an interactive interface; and displaying a prompt page related to the scene information.
After the prompt operation is executed, the method further comprises the following steps: and displaying an operation control to receive the door lock control operation.
On the other hand, an embodiment of the present application provides a door lock control device, including:
an obtaining module for obtaining a current distance determined based on a current first position; the current distance is the distance between the first position and the second position of the target door lock.
And the prompting module is used for executing prompting operation in a preset mode if the current distance meets the preset door lock opening condition.
And the control module is used for receiving the door lock control operation input based on the prompt operation and controlling the target door lock.
In another aspect, an embodiment of the present application provides an electronic device, including: the door lock control method comprises a memory, a processor and a computer program stored on the memory, wherein the processor executes the computer program to realize the steps of the door lock control method provided by the embodiment of the application.
The embodiment of the present application further provides a computer-readable storage medium, on which a computer program is stored, and when the computer program is executed by a processor, the steps of the door lock control method provided by the embodiment of the present application are implemented.
According to an aspect of the embodiments of the present application, a computer program is included, and when being executed by a processor, the computer program realizes the steps of a door lock control method provided by the embodiments of the present application.
The technical scheme provided by the embodiment of the application has the following beneficial effects:
the embodiment of the application provides a door lock control method, which comprises the following steps: acquiring a current first position, and determining a current distance according to the first position and a second position of a target door lock; and if the current distance meets the preset door lock opening condition, executing prompt operation in a preset mode, and after a user executes door lock control operation according to the prompt, controlling the target door lock to be opened according to the door lock control operation. According to the scheme provided by the embodiment of the application, the current distance from the target door lock is obtained through the current position, and the door lock control operation is implemented to open the target door lock when the current distance meets the preset door lock opening condition, so that the aim of efficiently opening the door is fulfilled.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings used in the description of the embodiments of the present application will be briefly described below.
Fig. 1 is a schematic flowchart of a door lock control method according to an embodiment of the present application;
fig. 2a is a schematic application scenario diagram of a door lock control method according to an embodiment of the present application;
fig. 2b is a schematic view of an application scenario of another door lock control method according to an embodiment of the present application;
fig. 3a is a schematic structural diagram of a door lock control device according to an embodiment of the present application;
fig. 3b is a schematic structural diagram of another door lock control device provided in the embodiment of the present application;
fig. 4 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
Embodiments of the present application are described below in conjunction with the drawings in the present application. It should be understood that the embodiments set forth below in connection with the drawings are exemplary descriptions for explaining technical solutions of the embodiments of the present application, and do not limit the technical solutions of the embodiments of the present application.
As used herein, the singular forms "a", "an", "the" and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It should be further understood that the terms "comprises" and/or "comprising," when used in this specification in connection with embodiments of the present application, specify the presence of stated features, information, data, steps, operations, elements, and/or components, but do not preclude the presence or addition of other features, information, data, steps, operations, elements, components, and/or groups thereof, as embodied in the art. It will be understood that when an element is referred to as being "connected" or "coupled" to another element, it can be directly connected or coupled to the other element or intervening elements may be present. Further, "connected" or "coupled" as used herein may include wirelessly connected or wirelessly coupled. The term "and/or" as used herein indicates at least one of the items defined by the term, e.g., "a and/or B" may be implemented as "a", or as "B", or as "a and B".
To make the objects, technical solutions and advantages of the present application more clear, embodiments of the present application will be described in further detail below with reference to the accompanying drawings.
On one hand, with the improvement of living standard, the requirements of people on living experience are gradually improved, and the requirements on clothes and eating and housing are more and more focused on comfort and efficiency. On the other hand, with the rapid rise of the field of big data, the combination of big data and people's clothing and clothing inhabitants is becoming more and more compact. Data related to the user can be acquired through channels such as a third-party platform, and then the mass data is stored and processed through the cloud platform, so that information related to the user is obtained and reused aiming at the information, and the requirements of people on comfort and efficiency are met.
It should be noted that, in alternative embodiments of the present application, the related data (such as the first location, the second location, the door lock information) and the like are required to obtain permission or consent of the user when the embodiments of the present application are applied to specific products or technologies, and the collection, use and processing of the related data are required to comply with the relevant laws and regulations and standards of the relevant countries and regions. That is, if data related to the subject is referred to in the embodiments of the present application, the data needs to be obtained through approval by the subject and in compliance with relevant laws and regulations and standards of countries and regions.
The door lock control method provided by the embodiment of the application is realized based on big data, and specifically is realized based on cloud platform processing big data. If the positioning notification service is started through the user terminal, the current position is continuously sent to a cloud platform providing cloud computing service, the cloud platform calculates the current distance according to the current position and the door lock position and feeds the current distance back to the user terminal, so that the user terminal judges whether the door lock control operation can be carried out according to the distance and then controls the door lock to be opened. In addition, the positions of a plurality of door locks and the historical positions of the users can be stored in the cloud platform, and the target door lock is accurately positioned by acquiring the current position of the user, so that the door lock control operation is performed.
Optionally, the door lock control method provided in the embodiment of the present application is executed by a mobile terminal, such as a mobile phone of a user. Specifically, the user terminal starts a positioning service and feeds back position data of the user terminal to the cloud platform in real time, the cloud platform obtains a current distance after calculation and feeds back the current distance to the user terminal, the user terminal judges whether the current distance meets a preset door lock opening condition or not, and if the current distance meets the preset door lock opening condition, a user is prompted in a preset mode to perform door lock control operation; and controlling the target door lock after receiving the door lock control operation input by the user.
Optionally, the door lock control method provided in the embodiment of the present application may also be executed by a user terminal and a server serving the mobile terminal in a coordinated manner. Specifically, the user terminal starts a positioning service and sends position data of the user terminal to the cloud platform in real time, and the cloud platform calculates to obtain a current distance and feeds the current distance back to the server; the server judges whether the current distance meets a preset door lock opening condition or not, and if so, sends a door opening notice to the user terminal; after receiving the door opening notification, the user terminal prompts a user that door lock control operation can be performed in a preset mode, after receiving information which is input by the user and related to the door lock, the user terminal sends the input information which is related to the door lock to the server, and the server determines whether the door lock control operation is performed or not according to the input information which is related to the door lock.
Optionally, the user terminal may be a mobile phone terminal, a tablet terminal, or a wearable terminal.
Optionally, the method provided in the embodiment of the present application may be implemented as an independent application program or a functional module/plug-in of an application program, or may also be implemented as an application program or a functional module/plug-in of an application program respectively configured at the client and the server. For example, the application program may be a dedicated door lock control or another application program having a door lock control function, and the door lock control can be realized by the application program.
In order to better explain and understand the scheme provided by the present application, the technical solutions of the embodiments of the present application and the technical effects produced by the technical solutions of the present application will be explained below through the description of several exemplary embodiments. It should be noted that the following embodiments may be referred to, referred to or combined with each other, and the description of the same terms, similar features, similar implementation steps and the like in different embodiments is not repeated.
Fig. 1 shows a flow chart of a door lock control method provided by an embodiment of the application. As shown in fig. 1, the method includes steps S110 to S130.
S110, acquiring a current distance determined based on a current first position; the current distance is the distance between the first position and the second position of the target door lock.
The user terminal is provided with a positioning module, and the current position of the user terminal, namely the first position, can be obtained through the positioning module. A location notification may also be set based on the location module to send the first location to a server or cloud platform.
Optionally, the first location may include data expressed in longitude/latitude form, such as: point (x) 1 =39.901527,x 2 = 166.389917). The first location may also include other identifiers of the corresponding location, such as point (x), based on analysis of the latitude and longitude data 1 =39.901527,x 2 = 166.389917) is "YY garden cell". The first location may also include location data represented in a multi-dimensional form. For the form of the first position, reference may also be made to other presentation forms in the related art, and details are not described herein for simplicity and convenience of description.
Optionally, the user terminal is configured with a cloud computing service, a positioning service, and a positioning notification service. After the user terminal is started, connection with the cloud platform is established; acquiring a current first position under the condition of determining the starting of the positioning service; and sending the current first position to the cloud platform under the condition that the positioning notification service is started.
Optionally, a second location of at least one door lock associated with the user terminal is also configured on the cloud platform. Historical location data associated with the user terminal is also stored on the cloud platform, such as: and storing the specific position of the user terminal every day by taking one day as a basic unit. And after the cloud platform acquires the first position of the user terminal, storing the first position according to the acquired time.
Optionally, a distance algorithm, such as an euclidean distance algorithm and a mahalanobis distance algorithm, is also configured on the cloud platform. Wherein, the algorithm for calculating the distance between the user terminal and the target door lock based on the Euclidean distance algorithm is shown as formula (1), 1-n correspond to n dimensions respectively, and x 1 ~x n Then corresponding to the distance difference in n dimensions, | x | represents the distance between the user terminal and the target door lock.
Figure BDA0003765715840000071
Since a position is composed of multiple dimensions, there is a problem that the dimensions are not uniform. To solve this problem, the mahalanobis distance algorithm may also be used to calculate the distance between the user terminal and the target door lock. The mahalanobis distance algorithm can be expressed by equation (2).
Figure BDA0003765715840000072
Where there are m sample vectors x 1 ~x m ,x 1 ~x m The covariance matrix is denoted as S, the mean value is the vector mu, and any sample x therein i The mahalanobis distance d to μ can be obtained by the above equation (2). The first position of the user terminal is a set of consecutive position data, which is understood as a current vector x i History vectors of a plurality of user terminals are prestored. Each history vector is also formed by a set of successive history position data of the user terminal, and each set of history positions corresponds to a door lock. Will be the current vector x i And each history vectorInputting the vector into the formula, and calculating the current vector x i Correlation with history vectors; and screening the history vectors in positive correlation, and determining that the user is near a door lock corresponding to the history vectors in positive correlation, wherein the door lock is the target door lock.
And S120, if the current distance meets the preset door lock opening condition, executing prompt operation in a preset mode.
Optionally, each door lock corresponds to a piece of scene information, i.e. a scene corresponding to an area protected by the door lock. The cloud platform stores a second position of at least one door lock associated with the user terminal and a unique identifier of each door lock. After receiving the first position, the cloud platform respectively calculates according to the second position of at least one door lock to obtain the distance from the user terminal to each door lock, and determines the corresponding door lock with the minimum distance as a target door lock. When the current distance is fed back, the unique identification of the target door lock can be fed back.
Optionally, the context information may be stored in the cloud platform, may also be stored in the user terminal, and may also be stored in the server. For example, if the target door lock protects "YY garden cell" 3 1203 rooms, the scene information includes "YY garden cell 3 1203 rooms".
Optionally, the user terminal may further obtain, when obtaining the first location, an area where the first location is located according to the positioning service, so as to obtain scene information of the target door lock. If the first position is point (x) 1 =39.901527,x 2 = 166.389917), the scene information is "YY garden cell 3".
Optionally, the performing the prompt operation in a preset manner includes at least one of:
and playing prompt information related to the scene information. For example, the text "you have entered the vicinity of the 1203 room in the YY garden cell 3" is processed as voice information, and then the voice information is subjected to voice broadcast.
And popping up a notification box related to the scene information on the interactive interface. For example, a notification box in which "you have entered the vicinity of the YY garden cell 3 1203 room" is displayed pops up on the interactive interface of the user terminal. Optionally, in this manner, an alert tone may also accompany the user terminal.
And displaying a prompt page related to the scene information. For example, a prompt page is directly displayed on the current page, and the text "you have entered the vicinity of the 3 rd year 1203 room in the YY garden cell" is displayed on the prompt page.
After the prompt operation is executed, the method further comprises displaying an operation control so as to receive a door lock control operation implemented by a user.
Optionally, a "confirm", "cancel" control pops up on the interactive interface or display page. And if the 'determination' control triggered by the user is received, popping up the input box again so that the user can perform input operation. If a cancel control triggered by a user is received, the subsequent operation of door lock control can be determined to be cancelled.
Alternatively, an input box can also be popped up directly on the interactive interface or the display interface so that the user can enter the input operation.
And S130, receiving the door lock control operation input based on the prompt operation, and controlling the target door lock.
Optionally, receiving a first password input by a user based on the popped input box; comparing the first password with a second password of the target door lock; and if the comparison is successful, triggering a starting instruction aiming at the target door lock.
The unique identification of the target door lock and corresponding door lock password information are prestored in the user terminal. And obtaining the door lock password information of the target door lock from the storage area through the position identification.
Optionally, receiving a password input by a user based on the popped-up input box; comparing the input password with a preset door lock password of the target door lock; and if the comparison is successful, triggering a starting instruction aiming at the target door lock.
The temporary password of the password can be set for the door lock, and the temporary password has a time limit function, such as being valid only within one day. The temporary password may be referred to as a preset door lock password.
Optionally, an input door opening instruction is received, and a starting instruction is triggered for the target door lock. Specifically, after the user triggers the "determine" control, it indicates that the user has input a door open instruction.
Wherein the start instruction is used to start the target door lock. Optionally, in response to the starting instruction, the user terminal sends a door opening notification to the control terminal of the target door lock, so that the control terminal controls the target door lock to be opened. Or responding to the starting instruction, the user terminal sends a confirmation message to the server, and the server sends a door opening notification to the control terminal of the target door lock according to the confirmation message, so that the control terminal controls the target door lock to be opened.
Alternatively, the control terminal for controlling the target door lock may be an IOT (Internet of Things) control terminal. Specifically, after receiving the door opening notification, the IOT control terminal triggers a door opening event, where the door opening event specifically is: the target door lock is unlocked.
According to the scheme provided by the embodiment of the application, the current distance from the target door lock is obtained through the current position, and the door lock control operation is implemented to open the target door lock when the current distance meets the preset door lock opening condition, so that the aim of efficiently opening the door is fulfilled. For example, in a scene that a user goes home, if the position of the user is within a certain range of the door lock, the user can be prompted to input the door lock control operation through the mobile phone, and the user can easily open the door lock by using the mobile phone before reaching the door lock and enter the home, so that the purpose of efficiently opening the door is achieved.
When the first position is uploaded, the current distance, such as the position data of the door lock, can be calculated only by configuring the information of the door lock in the cloud platform. Next, an embodiment of configuring a door lock will be provided.
In an optional embodiment, before obtaining the current distance determined based on the current first position, the method further comprises:
responding to a configuration instruction carrying the door lock information of the target door lock, and configuring the target door lock; the door lock information includes a second position of the target door lock and a wake-up distance for the target door lock to enter a wait-to-unlock state. Wherein the door lock information may further comprise a unique identification of the target door lock.
And associating the cloud computing service with the configuration information of the target door lock. Specifically, the configuration information of the target door lock is sent to the cloud platform. And the cloud platform stores the configuration information of the door lock after receiving the configuration information of the door lock.
Wherein, confirm that the present distance accords with predetermined lock opening condition, include:
determining that the current distance is not greater than the wake-up distance.
After entering the area protected by the target door lock, the mobile phone may continue to pop up the notification because the current distance between the user terminal and the target door lock will be less than the wake-up distance.
Optionally, the door lock information further includes information of an area protected by the target door lock. The protected area may be a residential area protected by a target door lock, a protected room area, a protected office area, etc. Any area that can be safely managed by the door lock may be referred to as a door lock protection area.
In an optional embodiment, after entering the area protected by the target door lock through the unlocked target door lock, the method further comprises the following steps:
acquiring a current position according to a preset frequency; and if the current position is within the preset range, updating the positioning notice to be in a closing state.
Optionally, each area protected by the door lock further comprises at least one reference position, a reference radius is set for the reference position, and a range with the center and the radius as the reference position and the reference radius respectively is set as a preset range.
Optionally, after the current position is obtained according to the preset frequency and sent to the cloud platform, the cloud platform calculates a reference distance between the first position and the reference position and feeds the reference distance back to the user terminal, and the user terminal compares the received reference distance with the reference radius to determine whether the first position is within the preset range. And if the comparison result is not greater than the preset range, determining that the comparison result is within the preset range.
After the location notification service is turned off, the user terminal no longer communicates the first location to the cloud platform. If the user comes out of the area protected by the target door lock again and closes the target door lock, the user cannot control the door lock through the positioning service again.
In an optional embodiment, the method further comprises:
and starting a positioning notification service according to a preset frequency, and acquiring the distance between the first position and the reference position to determine whether the user terminal is still in a preset range.
And if the location information is within the preset range, closing the location notification service. If not, keeping the positioning notification service in an open state.
The scheme provided by the embodiment of the application can be suitable for any scene needing convenient door opening, such as a scene of returning home, a scene of going to work of a company and the like. In order to more clearly understand the value of the solution provided by the embodiment of the present application, the embodiment of the present application further provides two examples to illustrate specific steps required to be implemented based on different architectures.
Fig. 2a shows the main architecture of example 1, mainly dominated by the interaction of the handset and the cloud platform.
Firstly, a mobile phone terminal sets a wake-up distance and starts a positioning notification service.
And secondly, the mobile phone terminal acquires the current first position and feeds the current first position back to the cloud platform.
And thirdly, after the cloud platform receives the first position, calculating the current distance according to the second position of each door lock, and determining a target door lock. And feeding back the current distance and the target door lock information to the mobile phone terminal.
And fourthly, if the mobile phone terminal determines that the current distance meets the condition of unlocking the door lock, the mobile phone terminal executes prompt operation to prompt a user to input door lock control operation. For example, inputting an opening command, for example, inputting a first password, for example, inputting a password.
And fifthly, the mobile phone terminal determines whether to send a command for unlocking the door lock according to the received door lock control operation.
Fig. 2b shows the main architecture of example 2, mainly based on the interaction of the handset, the server and the cloud platform. In this example, the mobile phone is provided with an App corresponding to the scheme provided in the embodiment of the present application, and the server provides a corresponding background service for the App.
Firstly, a mobile phone terminal sets a wake-up distance and starts a positioning notification service.
And secondly, the mobile phone terminal acquires the current first position and feeds the current first position back to the cloud platform.
And thirdly, after the cloud platform receives the first position, calculating the current distance according to the second position of each door lock, and determining a target door lock. And feeding back the current distance and the target door lock information to the server.
And fourthly, if the server determines that the current distance meets the condition of unlocking the door lock, sending a door opening notice to the mobile phone terminal.
And fifthly, the mobile phone terminal executes prompt operation to prompt the user to input the door lock control operation. For example, inputting an opening instruction, for example, inputting a first password, for example, inputting a password. Further, the received opening instruction, the first password or the password are fed back to the server.
And sixthly, the server determines whether to trigger a door opening event according to the received information. If the door opening event is sent to the IOT controlling the target door lock; the IOT unlocks the target door lock based on the door open event.
Fig. 3a shows a structural schematic diagram of a door lock control device provided by the embodiment of the application. As shown in fig. 3a, the apparatus comprises: an acquisition module 310, a prompt module 320, and a control module 330.
An obtaining module 310, configured to obtain a current distance determined based on a current first position; the current distance is the distance between the first position and the second position of the target door lock.
The prompt module 320 is configured to execute a prompt operation in a preset manner if the current distance meets a preset door lock unlocking condition.
And the control module 330 is configured to receive a door lock control operation input based on the prompt operation and control the target door lock.
Optionally, the obtaining module 310 is specifically configured to, in obtaining the current distance determined based on the current first position:
determining that the positioning notification is in an on state; and calling the cloud computing service to carry out computing according to the first position and the second position to obtain the current distance. And the current distance is obtained by processing the first position and the second position through a distance algorithm by the cloud computing service.
Optionally, as shown in fig. 3b, the apparatus 300 further comprises a configuration module 340. Before obtaining the current distance determined based on the current first position, the configuration module 340 is specifically configured to:
responding to a configuration instruction carrying the door lock information of the target door lock, and configuring the target door lock; the door lock information comprises a second position of the target door lock and a wake-up distance for the target door lock to enter a waiting-to-open state; and associating the cloud computing service with the configuration information of the target door lock.
Wherein, confirm that the present distance accords with predetermined lock opening condition, include: determining that the current distance is not greater than the wake-up distance.
Optionally, the control module 330 receives a door lock control operation based on the prompt operation input, and controls the target door lock to perform any one of the following:
receiving an input first password; comparing the first password with a second password of the target door lock; and if the comparison is successful, triggering a starting instruction aiming at the target door lock.
Alternatively, the first and second electrodes may be,
receiving an input password; comparing the input password with a preset door lock password of the target door lock; and if the comparison is successful, triggering a starting instruction aiming at the target door lock.
Alternatively, the first and second liquid crystal display panels may be,
receiving an input door opening instruction; and triggering a starting instruction for the target door lock.
Wherein the start command is used to start the target door lock.
Optionally, after entering the area protected by the target door lock through the unlocked target door lock, the configuration module may be further configured to:
acquiring a current position according to a preset frequency; and if the current position is within the preset range, updating the positioning notice to be in a closing state.
Optionally, the target door lock further includes corresponding scene information; the prompting module 320 performs the prompting operation in at least one of the following manners in performing the prompting operation in a preset manner:
playing prompt information related to the scene information; popping up a notification box related to scene information on an interactive interface; and displaying a prompt page related to the scene information.
Wherein, after the prompt operation is executed, the method further comprises: and displaying an operation control to receive the door lock control operation.
The apparatus of the embodiment of the present application may execute the method provided by the embodiment of the present application, and the implementation principle is similar, the actions executed by the modules in the apparatus of the embodiments of the present application correspond to the steps in the method of the embodiments of the present application, and for the detailed functional description of the modules of the apparatus, reference may be specifically made to the description in the corresponding method shown in the foregoing, and details are not repeated here.
The embodiment of the application provides electronic equipment which comprises a memory, a processor and a computer program stored on the memory, wherein the processor executes the computer program to realize the steps of the door lock control method.
In an alternative embodiment, an electronic device is provided, as shown in fig. 4, the electronic device 4000 shown in fig. 4 comprising: a processor 4001 and a memory 4003. Processor 4001 is coupled to memory 4003, such as via bus 4002. Optionally, the electronic device 4000 may further include a transceiver 4004, and the transceiver 4004 may be used for data interaction between the electronic device and other electronic devices, such as transmission of data and/or reception of data. In addition, the transceiver 4004 is not limited to one in practical applications, and the structure of the electronic device 4000 is not limited to the embodiment of the present application.
The Processor 4001 may be a CPU (Central Processing Unit), a general-purpose Processor, a DSP (Digital Signal Processor), an ASIC (Application Specific Integrated Circuit), an FPGA (Field Programmable Gate Array), or other Programmable logic device, transistor logic device, hardware component, or any combination thereof. Which may implement or perform the various illustrative logical blocks, modules, and circuits described in connection with the disclosure. The processor 4001 may also be a combination that performs a computing function, e.g., comprising one or more microprocessors, a combination of DSPs and microprocessors, etc.
Bus 4002 may include a path that carries information between the aforementioned components. The bus 4002 may be a PCI (Peripheral Component Interconnect) bus, an EISA (Extended Industry Standard Architecture) bus, or the like. The bus 4002 may be divided into an address bus, a data bus, a control bus, and the like. For ease of illustration, only one thick line is shown in FIG. 4, but this does not indicate only one bus or one type of bus.
The Memory 4003 may be a ROM (Read Only Memory) or other types of static storage devices that can store static information and instructions, a RAM (Random Access Memory) or other types of dynamic storage devices that can store information and instructions, an EEPROM (Electrically Erasable Programmable Read Only Memory), a CD-ROM (Compact Disc Read Only Memory) or other optical Disc storage, optical Disc storage (including Compact Disc, laser Disc, optical Disc, digital versatile Disc, blu-ray Disc, etc.), a magnetic Disc storage medium, other magnetic storage devices, or any other medium that can be used to carry or store a computer program and that can be Read by a computer, without limitation.
The memory 4003 is used for storing computer programs for executing the embodiments of the present application, and is controlled by the processor 4001 to execute. The processor 4001 is used to execute computer programs stored in the memory 4003 to implement the steps shown in the foregoing method embodiments.
Among them, electronic devices include but are not limited to: cell-phone terminal, panel terminal, wearable equipment.
The embodiments of the present application provide a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, can implement the steps of the foregoing method embodiments and corresponding content.
Embodiments of the present application further provide a computer program product, which includes a computer program, and when the computer program is executed by a processor, the steps and corresponding contents of the foregoing method embodiments can be implemented.
The terms "first," "second," "third," "fourth," "1," "2," and the like in the description and in the claims of the present application and in the above-described drawings (if any) are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It should be understood that the data so used are interchangeable under appropriate circumstances such that the embodiments of the application described herein are capable of operation in other sequences than described or illustrated herein.
It should be understood that, although each operation step is indicated by an arrow in the flowchart of the embodiment of the present application, the implementation order of the steps is not limited to the order indicated by the arrow. In some implementation scenarios of the embodiments of the present application, the implementation steps in the flowcharts may be performed in other sequences as desired, unless explicitly stated otherwise herein. In addition, some or all of the steps in each flowchart may include multiple sub-steps or multiple stages based on an actual implementation scenario. Some or all of these sub-steps or stages may be performed at the same time, or each of these sub-steps or stages may be performed at different times, respectively. In a scenario where execution times are different, an execution sequence of the sub-steps or the phases may be flexibly configured according to requirements, which is not limited in the embodiment of the present application.
The foregoing is only an optional implementation manner of a part of implementation scenarios in this application, and it should be noted that, for those skilled in the art, other similar implementation means based on the technical idea of this application are also within the protection scope of the embodiments of this application without departing from the technical idea of this application.

Claims (10)

1. A method of controlling a door lock, the method comprising:
obtaining a current distance determined based on a current first position; the current distance is the distance between the first position and the second position of the target door lock;
if the current distance meets the preset door lock opening condition, executing prompt operation in a preset mode;
and receiving a door lock control operation based on the prompt operation input, and controlling the target door lock.
2. The method of claim 1, wherein obtaining the current distance determined based on the current first position comprises:
determining that the positioning notification is in an on state;
calling cloud computing service to carry out computing according to the first position and the second position to obtain the current distance;
and the current distance is obtained by processing the first position and the second position through a distance algorithm by the cloud computing service.
3. The method of claim 2, wherein prior to obtaining the current distance determined based on the current first location, the method further comprises:
responding to a configuration instruction carrying the door lock information of the target door lock, and configuring the target door lock; the door lock information comprises a second position of the target door lock and a wake-up distance for the target door lock to enter a waiting-to-open state;
associating the cloud computing service with configuration information of the target door lock;
wherein, confirm that the present distance accords with preset lock opening condition, include:
determining that the current distance is not greater than the wake-up distance.
4. The method according to claim 1, wherein the receiving of the door lock control operation based on the prompt operation input and the controlling of the target door lock comprise any one of:
receiving an input first password;
comparing the first password with a second password of the target door lock; if the comparison is successful, triggering a starting instruction aiming at the target door lock;
alternatively, the first and second electrodes may be,
receiving an input password;
comparing the input password with a preset door lock password of the target door lock; if the comparison is successful, triggering a starting instruction aiming at the target door lock;
alternatively, the first and second electrodes may be,
receiving an input door opening instruction;
triggering a starting instruction aiming at a target door lock;
wherein the starting instruction is used for starting the target door lock.
5. The method of claim 2, wherein after entering an area protected by the target door lock through the unlocked target door lock, the method further comprises:
acquiring a current position according to a preset frequency;
and if the current position is within the preset range, updating the positioning notice to be in a closing state.
6. The method of claim 1, wherein the target door lock further comprises corresponding context information; the prompt operation is executed in a preset mode, and comprises at least one of the following steps:
playing prompt information related to the scene information;
popping up a notification box related to the scene information on an interactive interface;
displaying a prompt page related to the scene information;
wherein, after the prompt operation is executed, the method further comprises: and displaying an operation control to receive the door lock control operation.
7. A door lock control apparatus, characterized in that the apparatus comprises:
an obtaining module for obtaining a current distance determined based on a current first position; the current distance is the distance between the first position and the second position of the target door lock;
the prompting module is used for executing prompting operation in a preset mode if the current distance meets a preset door lock opening condition;
and the control module is used for receiving the door lock control operation input based on the prompt operation and controlling the target door lock.
8. An electronic device comprising a memory, a processor and a computer program stored on the memory, characterized in that the processor executes the computer program to implement the steps of the method of any of claims 1-6.
9. A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the steps of the method according to any one of claims 1 to 6.
10. A computer program product comprising a computer program, wherein the computer program when executed by a processor performs the steps of the method of any one of claims 1 to 6.
CN202210886160.5A 2022-07-26 2022-07-26 Door lock control method and device, electronic equipment and related products Pending CN115294678A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210886160.5A CN115294678A (en) 2022-07-26 2022-07-26 Door lock control method and device, electronic equipment and related products

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210886160.5A CN115294678A (en) 2022-07-26 2022-07-26 Door lock control method and device, electronic equipment and related products

Publications (1)

Publication Number Publication Date
CN115294678A true CN115294678A (en) 2022-11-04

Family

ID=83824410

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210886160.5A Pending CN115294678A (en) 2022-07-26 2022-07-26 Door lock control method and device, electronic equipment and related products

Country Status (1)

Country Link
CN (1) CN115294678A (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105574962A (en) * 2015-06-19 2016-05-11 宇龙计算机通信科技(深圳)有限公司 Door access control management method and mobile terminal
CN109816832A (en) * 2019-02-01 2019-05-28 北京华大智宝电子系统有限公司 A kind of method for unlocking and device
CN109887131A (en) * 2019-01-22 2019-06-14 胡渐佳 Intelligent door lock unlocking information is stolen recognition methods
CN109920114A (en) * 2019-03-13 2019-06-21 广州市和声信息技术有限公司 A kind of control method for door lock and system based on geographical location
US10447864B1 (en) * 2015-12-28 2019-10-15 Amazon Technologies, Inc. Remote access control
CN111489478A (en) * 2020-04-24 2020-08-04 英华达(上海)科技有限公司 Access control method, system, device and storage medium
CN111508107A (en) * 2020-03-12 2020-08-07 深圳市科信通信技术股份有限公司 Intelligent door lock control method and device, computer equipment and storage medium
CN113223215A (en) * 2021-05-21 2021-08-06 歌尔股份有限公司 Awakening method of intelligent door lock, terminal equipment and intelligent door lock
CN113329079A (en) * 2021-05-27 2021-08-31 宝能(广州)汽车研究院有限公司 Vehicle unlocking method, server and terminal

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105574962A (en) * 2015-06-19 2016-05-11 宇龙计算机通信科技(深圳)有限公司 Door access control management method and mobile terminal
US10447864B1 (en) * 2015-12-28 2019-10-15 Amazon Technologies, Inc. Remote access control
CN109887131A (en) * 2019-01-22 2019-06-14 胡渐佳 Intelligent door lock unlocking information is stolen recognition methods
CN109816832A (en) * 2019-02-01 2019-05-28 北京华大智宝电子系统有限公司 A kind of method for unlocking and device
CN109920114A (en) * 2019-03-13 2019-06-21 广州市和声信息技术有限公司 A kind of control method for door lock and system based on geographical location
CN111508107A (en) * 2020-03-12 2020-08-07 深圳市科信通信技术股份有限公司 Intelligent door lock control method and device, computer equipment and storage medium
CN111489478A (en) * 2020-04-24 2020-08-04 英华达(上海)科技有限公司 Access control method, system, device and storage medium
CN113223215A (en) * 2021-05-21 2021-08-06 歌尔股份有限公司 Awakening method of intelligent door lock, terminal equipment and intelligent door lock
CN113329079A (en) * 2021-05-27 2021-08-31 宝能(广州)汽车研究院有限公司 Vehicle unlocking method, server and terminal

Similar Documents

Publication Publication Date Title
US10885218B2 (en) Privacy protection method and terminal device
CN108847242B (en) Electronic device control method, electronic device control device, storage medium and electronic device
CN106993168B (en) A kind of monitoring method, device, electronic equipment and system
EP3249570B1 (en) Method and device for providing prompt indicating loss of terminal
CN104363205B (en) Using login method and device
EP3403210B1 (en) User interface for a mobile device
US20180084420A1 (en) Method and device for switching user mode of intelligent terminal, and intelligent terminal
EP3249960A1 (en) Method and device for identifying a short message
CN106778208A (en) The access processing method and device of application program
US20170205983A1 (en) User interface for a mobile device
KR20200031275A (en) Electronic device for performing authorization using accessory and method for the same
CN111090866A (en) Application authority management method, mobile terminal and computer readable storage medium
CN115075691A (en) Information processing apparatus, information processing method, and system
US20180262873A1 (en) Secure mobile device recovery
CN105530129B (en) Router resetting method and device
CN106603817A (en) Incoming call processing method and device and electronic equipment
CN105430639B (en) Information processing method and device
CN115294678A (en) Door lock control method and device, electronic equipment and related products
CN114519906A (en) Building entrance guard control method and system based on smart home
CN106791145A (en) Short message management method and device
US9043882B2 (en) Integration of home security into existing infrastructure
CN106028297B (en) Carry the SMS processing method and device of network address
CN106408304B (en) Account security management method and device
CN109740361B (en) Data processing method, device and computer readable storage medium
CN114995167A (en) Control method, device and equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination