CN104091376A - Intelligent lock control method and apparatus thereof - Google Patents

Intelligent lock control method and apparatus thereof Download PDF

Info

Publication number
CN104091376A
CN104091376A CN201410268572.8A CN201410268572A CN104091376A CN 104091376 A CN104091376 A CN 104091376A CN 201410268572 A CN201410268572 A CN 201410268572A CN 104091376 A CN104091376 A CN 104091376A
Authority
CN
China
Prior art keywords
key
smart lock
terminal
verified
user
Prior art date
Application number
CN201410268572.8A
Other languages
Chinese (zh)
Other versions
CN104091376B (en
Inventor
张晓丹
马百鸣
王巍
余明阳
Original Assignee
小米科技有限责任公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 小米科技有限责任公司 filed Critical 小米科技有限责任公司
Priority to CN201410268572.8A priority Critical patent/CN104091376B/en
Publication of CN104091376A publication Critical patent/CN104091376A/en
Application granted granted Critical
Publication of CN104091376B publication Critical patent/CN104091376B/en

Links

Abstract

The invention discloses an intelligent lock control method and an apparatus thereof, and belongs to the terminal application field. The method comprises the following steps: obtaining verification information of a user when a first terminal is positioned in a preset range of an intelligent lock; and sending the verification information to the intelligent lock used for verifying the identity of the user according to the verification information, and executing an unlocking operation when the user passes through the verification. The method and the apparatus enable a door to be not opened by anyone when a visitor visits, and provide convenience for residents and visitors.

Description

Smart lock control method and apparatus
Technical field
The disclosure relates to terminal applies field, relates in particular to a kind of smart lock control method and apparatus.
Background technology
The general key that adopts is opened the lock being arranged on door at present, and key is the entity that metal is moulded, and key is by the work that has suited switch lock of lines.Corresponding one to four key of next lock of normal condition, the people who holds key can open the door, and the people who needs to have key in the time having visitor opens the door for visitor, and resident family and visitor be inconvenience.
Summary of the invention
Open the door for visitor in order to overcome the people that there is a key needing of existing in correlation technique in the time having visitor, all inconvenient problems of user and visitor, the disclosure provides a kind of smart lock control method and apparatus.Described technical scheme is as follows:
According to the first aspect of disclosure embodiment, a kind of smart lock control method is provided, described method comprises:
In the time that first terminal is positioned at the setting range of smart lock, obtain user's authorization information;
Described authorization information is sent to described smart lock, and described smart lock is for verify described user's identity according to described authorization information, when described user carries out unlock operation during by checking.
In a kind of possible implementation of the present disclosure, described in obtain user's authorization information, comprising:
Output input key dialog box;
The key to be verified that receives user's input, described key to be verified is to send to the key that arranges of described first terminal to obtain according to the second terminal.
In the possible implementation of another kind of the present disclosure, described described authorization information is sent to described smart lock, comprising:
Described key to be verified is sent to described smart lock, described smart lock describedly arranges key to be verified described in key authentication for what adopt that described the second terminal sends to described smart lock, when described key to be verified is carried out unlock operation when identical with the described key that arranges.
In another possible implementation of the present disclosure, described in obtain user's authorization information, comprising:
Gather user's image.
In another possible implementation of the present disclosure, described described authorization information is sent to described smart lock, comprising:
Described user's image is sent to described smart lock, and described smart lock is for adopting the image of user described in the image authentication prestoring, when described user's image with described in the image that prestores carry out unlock operation when identical.
In another possible implementation of the present disclosure, described method also comprises:
By being set, key sends to third terminal, described third terminal is in the time that described third terminal is positioned at the setting range of smart lock, key to be verified is sent to described smart lock, and described key to be verified is to send to the described key that arranges of described third terminal to obtain according to described first terminal;
The described key that arranges is sent to described smart lock, and described smart lock is for adopting the described key described to be verified that third terminal sends described in key authentication that arranges, when described key to be verified is carried out unlock operation when identical with the described key that arranges.
In another possible implementation of the present disclosure, described method also comprises:
Setting-up time is sent to described smart lock, described smart lock is for adopting the described mistiming that key is set and receive between described key to be verified of described setting-up time and reception to compare, be less than or equal to described setting-up time when the described mistiming, and described key to be verified is carried out unlock operation when identical with the described key that arranges.
In another possible implementation of the present disclosure, described method also comprises:
Authorization message is sent to described smart lock, described authorization message comprises terminal iidentification, described smart lock for when receive that other-end except described first terminal sends key is set time, according to described terminal iidentification judge described other-end transmission whether key is set effective.
According to the second aspect of disclosure embodiment, a kind of smart lock control device is provided, described device comprises:
Acquisition module, when being positioned at the setting range of smart lock when first terminal, obtains user's authorization information;
Sending module, for described authorization information is sent to described smart lock, described smart lock is for verify described user's identity according to described authorization information, when described user carries out unlock operation during by checking.
In a kind of possible implementation of the present disclosure, described acquisition module comprises:
Output unit, for exporting input key dialog box;
Input block, for receiving the key to be verified of user's input, described key to be verified is to send to the key that arranges of described first terminal to obtain according to the second terminal.
In the possible implementation of another kind of the present disclosure, described sending module is used for,
Described key to be verified is sent to described smart lock, described smart lock describedly arranges key to be verified described in key authentication for what adopt that described the second terminal sends to described smart lock, when described key to be verified is carried out unlock operation when identical with the described key that arranges.
In another possible implementation of the present disclosure, described acquisition module comprises:
Collecting unit, for gathering user's image.
In another possible implementation of the present disclosure, described sending module is used for,
Described user's image is sent to described smart lock, and described smart lock is for adopting the image of user described in the image authentication prestoring, when described user's image with described in the image that prestores carry out unlock operation when identical.
In another possible implementation of the present disclosure, described sending module also for,
By being set, key sends to third terminal, described third terminal is in the time that described third terminal is positioned at the setting range of smart lock, key to be verified is sent to described smart lock, and described key to be verified is to send to the described key that arranges of described third terminal to obtain according to described first terminal;
The described key that arranges is sent to described smart lock, and described smart lock is for adopting the described key described to be verified that third terminal sends described in key authentication that arranges, when described key to be verified is carried out unlock operation when identical with the described key that arranges.
In another possible implementation of the present disclosure, described sending module also for,
Setting-up time is sent to described smart lock, described smart lock is for adopting the described mistiming that key is set and receive between described key to be verified of described setting-up time and reception to compare, be less than or equal to described setting-up time when the described mistiming, and described key to be verified is carried out unlock operation when identical with the described key that arranges.
In another possible implementation of the present disclosure, described sending module also for,
Authorization message is sent to described smart lock, described authorization message comprises terminal iidentification, described smart lock for when receive that other-end except described first terminal sends key is set time, according to described terminal iidentification judge described other-end transmission whether key is set effective.
According to the third aspect of disclosure embodiment, a kind of smart lock control device is provided, described device comprises:
Processor;
For the storer of storage of processor executable instruction;
Wherein, described processor is configured to:
In the time that first terminal is positioned at the setting range of smart lock, obtain user's authorization information;
Described authorization information is sent to described smart lock, and described smart lock is for verify described user's identity according to described authorization information, when described user carries out unlock operation during by checking.
The technical scheme that embodiment of the present disclosure provides can comprise following beneficial effect: when being positioned at the setting range of smart lock when first terminal, obtain user's authorization information, and authorization information is sent to smart lock, smart lock is used for according to the identity of authorization information authentication of users, when user carries out unlock operation by when checking, therefore in the time having visitor, open the door for visitor without the need for people, simultaneously for resident family and visitor provide convenience.
Should be understood that, it is only exemplary and explanatory that above general description and details are hereinafter described, and can not limit the disclosure.
Brief description of the drawings
Accompanying drawing is herein merged in instructions and forms the part of this instructions, shows embodiment according to the invention, and is used from and explains principle of the present invention with instructions one.
Fig. 1 is according to the application scenarios figure of the smart lock control method shown in an exemplary embodiment;
Fig. 2 is according to the process flow diagram of a kind of smart lock control method shown in an exemplary embodiment;
Fig. 3 is according to the process flow diagram of the another kind of smart lock control method shown in an exemplary embodiment;
Fig. 4 is the terminal interface figure while inputting key dialog box according to the output shown in an exemplary embodiment;
Fig. 5 is according to the block diagram of a kind of smart lock control device shown in an exemplary embodiment;
Fig. 6 a is according to the block diagram of the another kind of smart lock control device shown in an exemplary embodiment;
Fig. 6 b is according to the block diagram of the another kind of smart lock control device shown in an exemplary embodiment;
Fig. 7 is according to the block diagram of a kind of smart lock control device shown in an exemplary embodiment.
Embodiment
Here will at length describe exemplary embodiment, its sample table shows in the accompanying drawings.When description below relates to accompanying drawing, unless separately there is expression, the same numbers in different accompanying drawings represents same or analogous key element.Embodiment described in following exemplary embodiment does not represent all embodiments consistent with the present invention.On the contrary, they are only and the example of apparatus and method as consistent in some aspects that described in detail in appended claims, of the present invention.
Fig. 1 is according to the application scenarios figure of the smart lock control method shown in an exemplary embodiment, and as shown in Figure 1, this application scenarios comprises dweller 1, smart lock 2 and visitor 3.Dweller 1 and visitor 3 all hold terminal 4, and this terminal 4 can be the smart machines such as smart mobile phone, panel computer, bracelet.Terminal 4 threes that terminal 4, smart lock 2, the visitor 3 that dweller 1 holds holds connect between two.
In addition, can also be these smart lock 2 configuration servers 5, terminal 4, smart lock 2 that this server 5 is held with dweller 1 are respectively connected, the data transmission between terminal 4 and the smart lock 2 of holding for dweller 1.
The terminal 4 that dweller 1 holds can be by radio communication and network and smart lock 2, the terminal 4 that visitor 3 holds is communicated by letter, this radio communication can be used arbitrary communication standard or agreement, include but not limited to GSM (Global System of Mobile communication, global system for mobile communications), GPRS (General Packet Radio Service, general packet radio service), CDMA (Code Division Multiple Access, CDMA), WCDMA (Wideband Code Division Multiple Access, Wideband Code Division Multiple Access (WCDMA)), LTE (Long Term Evolution, Long Term Evolution), Email, SMS (Short Messaging Service, Short Message Service) etc.Between the terminal 4 that smart lock 2 and visitor 3 hold, can adopt the data connection approach such as bluetooth, wifi (Wireless Fidelity, Wireless Fidelity) to communicate.
Understandably, the device category shown in Fig. 1, annexation and connected mode are only for giving an example, and the disclosure is not limited to this.
Fig. 2 is according to the process flow diagram of a kind of smart lock control method shown in an exemplary embodiment, and as shown in Figure 2, this smart lock control method is applied in first terminal, comprises the following steps.
In step S101, in the time that first terminal is positioned at the setting range of smart lock, obtain user's authorization information.
In the present embodiment, authorization information can be key, can be also image.In the time that authorization information is key, the terminal that first terminal can be held for visitor, the terminal that also can hold for dweller.In the time that authorization information is image, first terminal is generally the terminal that dweller holds.
In step S102, authorization information is sent to smart lock, smart lock is for according to the identity of authorization information authentication of users, when user carries out unlock operation during by checking.
Disclosure embodiment is when being positioned at the setting range of smart lock when first terminal, obtain user's authorization information, and authorization information is sent to smart lock, smart lock is used for according to the identity of authorization information authentication of users, when user carries out unlock operation by when checking, therefore in the time having visitor, open the door for visitor without the need for people.
Fig. 3 is according to the process flow diagram of the another kind of smart lock control method shown in an exemplary embodiment, and as shown in Figure 3, this smart lock control method is applied in first terminal, and authorization information is key, comprises the following steps.
In step S201, in the time that first terminal is positioned at the setting range of smart lock, output input key dialog box.
In actual applications, setting range can be determined according to the effective communication distance between terminal and smart lock.For example, directly adopt Bluetooth communication between terminal and smart lock, setting range is centered by smart lock, the border circular areas that 8m is radius; Between terminal and smart lock, directly adopt NFC (Near Field Communication, near field communication (NFC)) communication, setting range is the region of touching with lock; Between terminal and smart lock, adopt wifi to access same WLAN (wireless local area network), the overlay area that setting range is this WLAN (wireless local area network).
Terminal interface figure when Fig. 4 is output input key dialog box, only, for giving an example, the disclosure is not restricted to this.
In step S202, receive the key to be verified of user's input, key to be verified is to send to the key that arranges of first terminal to obtain according to the second terminal.
In actual applications, when first terminal be visitor hold terminal time, the second terminal is the terminal that dweller holds.
The terminal that dweller holds can be divided into two kinds: super keeper and common management person.Super keeper can send to smart lock by authorization message, authorization message comprises terminal iidentification, smart lock when receive that other-end except super keeper sends key is set time, can judge that other-end sends according to terminal iidentification whether key is set effective; Super keeper can also send to smart lock by key is set, and smart lock can adopt the key to be verified that the other-end of key authentication except super keeper sends is set, when key to be verified with key be set carry out unlock operation when identical.Common management person is only to send to smart lock by key is set, so that smart lock adopts, the key to be verified that the other-end of key authentication except super keeper sends is set, when key to be verified with key be set carry out unlock operation when identical.That is to say, authorization message for arranging common management person on smart lock, and the key that key is used to smart lock verification terminal to send provides foundation.
Each smart lock is generally equipped with an initial password (to be similar to every the original key of mechanical lock, only has one, and follow-up all keys opening the door all come from original key), terminal sends to initial password after smart lock, if be proved to be successful, smart lock will be by corresponding with super keeper the mark of the terminal of transmission initial password, make the terminal of this mark have super keeper authority (by authorization message and key send to smart lock can, be similar to bitting).Certainly, initial password is generally fairly simple, so after being proved to be successful, terminal can be revised initial password, to avoid initial password easily to crack and to reveal and the insecurity that causes.
The terminal with super administrator right sends after authorization message to smart lock, the mark of the terminal that smart lock can comprise authorization message is corresponding with common management person, makes the terminal of these marks have common management person's authority (key can be sent to smart lock).
So when first terminal be dweller hold terminal time, can be divided into two kinds of situations:
The first, in the time that first terminal is common management person, the second terminal is super keeper.
The second, in the time that first terminal is super keeper, the supplier that the second terminal is smart lock, now arranges the initial password that key is smart lock.
When first terminal be visitor hold terminal time, the restriction that key has service time conventionally (be similar to and joined finishing key, only within the specific time effectively) is set, arrange as sent since the second terminal in a day of key.That is to say, first terminal only uses and key is set just can opens smart lock within the time of restriction, exceedes the time of restriction, even if first terminal has the key of setting, sets it as key to be verified and sends to smart lock, can not open smart lock.
When first terminal be dweller hold terminal time, key is set does not have the restriction of service time conventionally.That is to say, the use of first terminal any time arranges key and can open smart lock.
Understandably, by performing step successively S201-S202, can realize in the time that first terminal is positioned at the setting range of smart lock, obtain user's authorization information.
In step S203, key to be verified is sent to smart lock, smart lock arranges key authentication key to be verified for what adopt that the second terminal sends to smart lock, when key to be verified with key be set carry out unlock operation when identical.
Understandably, by execution step S203, can realize authorization information is sent to smart lock, smart lock is for according to the identity of authorization information authentication of users, when user carries out unlock operation during by checking.
At first terminal, for the first time by after the checking of smart lock, terminal can arrange the sending mode of key to be verified, and sending mode comprises automatic connection mode and manual input mode.In the time that sending mode is automatic connection mode, the key that first terminal meeting recording user is inputted for the first time, in the time that first terminal connects with smart lock again, does not need to input key again, directly the key of record is sent to smart lock.In the time that sending mode is manual input mode, first terminal can recording user the key of input, in the time that first terminal is each and smart lock connects, user needs to input a secondary key and sends to smart lock.
In a kind of implementation of the present embodiment, the method can also comprise:
Send to third terminal by key is set, third terminal, in the time that third terminal is positioned at the setting range of smart lock, sends to smart lock by key to be verified, and key to be verified is to send to the key that arranges of third terminal to obtain according to first terminal;
Send to smart lock by key is set, smart lock arranges for adopting the key to be verified that key authentication third terminal sends, when key to be verified is demonstrate,proved key and carried out unlock operation when identical with arranging.
Understandably, in this kind of implementation, first terminal is generally the terminal that dweller holds, and has super keeper or common management person's authority, when terminal that third terminal can be held for visitor, and the terminal that also can hold for dweller.
First terminal can simultaneously or successively send to smart lock and visitor by secret key remote is set.Key can exist with the form of character string, and the send mode of key can pass through internet, also can pass through cordless communication network, and the disclosure is not restricted this.For example, first terminal can the JICQ such as be chatted by short message, rice key is sent to smart lock and third terminal.
In this kind of implementation, the method can also comprise:
Setting-up time is sent to smart lock, smart lock compared for the mistiming that adopts setting-up time and reception that key is set and to receive between key to be verified, be less than or equal to setting-up time when this mistiming, and key to be verified with key be set carry out unlock operation when identical.
Understandably, set by the user of first terminal effective time.By arranging, can to make key have effective time ageing, and within effective time, visitor can repeatedly use this key to open the door, and exceedes effective time, and this key ceases to be in force automatically, and has improved the security of smart lock.
In this kind of implementation, the method can also comprise:
Authorization message is sent to smart lock, and authorization message comprises terminal iidentification, smart lock for when receive that other-end except first terminal sends key is set time, according to terminal iidentification judge other-end transmission whether key is set effective.
Understandably, in this kind of implementation, first terminal is generally super keeper, because super keeper generally only has one, by authorization terminal as common management person, can be to share the control work of super keeper to smart lock, and common management person's quantity can increase and reduce according to actual conditions, and user experience is good.
In actual applications, smart lock, carrying out after unlock operation, can be pushed door open, and user experiences.Then in the time detecting that door is shut, illustrate that visitor or dweller enter, now automatically lock cuts out, prevent that undelegated stranger from entering, and improved the security of smart lock.In addition, in the time that the opening time of smart lock reaches setting-up time, smart lock can be reported to the police, and plays the effect of reminding dweller and visitor, the security that has further improved smart lock.Wherein, setting-up time can be set by keeper, as 10 minutes.What report to the police can be one or more in following mode: sound, light is reminded, to keeper's terminal transmits information.And when smart lock be not while opening by the mode (relatively key) of checking, smart lock also can be reported to the police.Wherein, the mode of warning can be one or more in following mode: sound, light is reminded, to keeper's terminal transmits information, dial the police emergency number.
In other exemplary embodiment, authorization information can be image.When being positioned at the setting range of smart lock when first terminal, gather user's image, realize in the time that first terminal is positioned at the setting range of smart lock, obtain user's authorization information; By user's image is sent to smart lock, smart lock is for adopting the image authentication user's who prestores image, in the time that user's image is identical with the image prestoring, carry out unlock operation, realize authorization information is sent to smart lock, smart lock is for according to the identity of authorization information authentication of users, when user carries out unlock operation during by checking.
Understandably, above-mentioned implementation is generally the situation of the terminal held of dweller for first terminal, the terminal of holding due to dweller can not be subject to time restriction and open smart lock, the security requirement of the terminal of therefore dweller being held is higher, adopt the mode of Real-time Collection user's image to open smart lock, the situation that can effectively avoid the user of non-first terminal to use first terminal to open smart lock occurs, safe.And the general little use smart lock of visitor now adopts to have ageing key, to limiting visitor's service time, in being applicable to visitor and seldom using the feature of smart lock, the security that has also improved smart lock, and cost is lower.
Disclosure embodiment is when being positioned at the setting range of smart lock when first terminal, obtain user's authorization information, and authorization information is sent to smart lock, smart lock is used for according to the identity of authorization information authentication of users, when user carries out unlock operation by when checking, therefore in the time having visitor, open the door for visitor without the need for people.And key has ageing, within effective time, visitor can repeatedly use this key to open the door, and exceedes effective time, and this key ceases to be in force automatically, and has improved the security of smart lock.
Fig. 5 is that this application of installation is in first terminal according to the block diagram of a kind of smart lock control device shown in an exemplary embodiment.With reference to Fig. 5, this device comprises acquisition module 301 and sending module 302.
This acquisition module 301 is configured to, in the time that first terminal is positioned at the setting range of smart lock, obtain user's authorization information.
This sending module 302 is configured to authorization information to send to smart lock, and smart lock is for according to the identity of authorization information authentication of users, when user carries out unlock operation during by checking.
In the present embodiment, authorization information can be key, can be also image.In the time that authorization information is key, the terminal that first terminal can be held for visitor, the terminal that also can hold for dweller.In the time that authorization information is image, first terminal is generally the terminal that dweller holds.
Disclosure embodiment is when being positioned at the setting range of smart lock when first terminal, obtain user's authorization information, and authorization information is sent to smart lock, smart lock is used for according to the identity of authorization information authentication of users, when user carries out unlock operation by when checking, therefore in the time having visitor, open the door for visitor without the need for people.
Fig. 6 is that this application of installation is in first terminal according to the block diagram of the another kind of smart lock control device shown in an exemplary embodiment.With reference to Fig. 6 a and Fig. 6 b, this device comprises acquisition module 401 and sending module 402.
This acquisition module 401 is configured to, in the time that first terminal is positioned at the setting range of smart lock, obtain user's authorization information.
This sending module 402 is configured to authorization information to send to smart lock, and smart lock is for according to the identity of authorization information authentication of users, when user carries out unlock operation during by checking.
In the present embodiment, authorization information can be key, can be also image.In the time that authorization information is key, the terminal that first terminal can be held for visitor, the terminal that also can hold for dweller.In the time that authorization information is image, first terminal is the terminal that dweller holds.
In a kind of implementation of the present embodiment, authorization information is key, and with reference to Fig. 6 a, this acquisition module 401 can comprise output unit 4011 and input block 4012.
This output unit 4011 is configured to output input key dialog box.
This input block 4012 is configured to receive the key to be verified of user's input, and key to be verified is to send to the key that arranges of first terminal to obtain according to the second terminal.
In this kind of implementation, this sending module 402 is configured to key to be verified to send to smart lock, smart lock arranges key authentication key to be verified for what adopt that the second terminal sends to smart lock, when key to be verified with key be set carry out unlock operation when identical.
In the another kind of implementation of the present embodiment, authorization information is image, and with reference to Fig. 6 b, this acquisition module 401 can comprise collecting unit 4013.
This collecting unit 4013 is configured to gather user's image.
In this kind of implementation, this sending module 402 is configured to user's image to send to smart lock, and smart lock is for adopting the image authentication user's who prestores image, carries out unlock operation in the time that user's image is identical with the image prestoring.
In another implementation of the present embodiment, this sending module 402 can also be configured to send to third terminal by key is set, third terminal is in the time that third terminal is positioned at the setting range of smart lock, key to be verified is sent to smart lock, and key to be verified is to send to the key that arranges of third terminal to obtain according to first terminal; Send to smart lock by key is set, smart lock arranges for adopting the key to be verified that key authentication third terminal sends, when key to be verified with key be set carry out unlock operation when identical.
In this kind of implementation, this sending module 402 can also be configured to setting-up time to send to smart lock, smart lock compared for the mistiming that adopts setting-up time and reception that key is set and to receive between key to be verified, be less than or equal to setting-up time when this mistiming, and key to be verified with key be set carry out unlock operation when identical.
In this kind of implementation, this sending module 402 can also be configured to authorization message to send to smart lock, authorization message comprises terminal iidentification, smart lock for when receive that other-end except first terminal sends key is set time, according to terminal iidentification judge other-end transmission whether key is set effective.
Disclosure embodiment is when being positioned at the setting range of smart lock when first terminal, obtain user's authorization information, and authorization information is sent to smart lock, smart lock is used for according to the identity of authorization information authentication of users, when user carries out unlock operation by when checking, therefore in the time having visitor, open the door for visitor without the need for people.And key has ageing, within effective time, visitor can repeatedly use this key to open the door, and exceedes effective time, and this key ceases to be in force automatically, and has improved the security of smart lock.
About the device in above-described embodiment, wherein the concrete mode of modules executable operations have been described in detail in the embodiment about the method, will not elaborate explanation herein.
Fig. 7 is according to the block diagram of a kind of smart lock control device 800 shown in an exemplary embodiment.For example, device 800 can be mobile phone, computing machine, digital broadcast terminal, information receiving and transmitting equipment, game console, flat-panel devices, Medical Devices, body-building equipment, personal digital assistant etc.
With reference to Fig. 7, device 800 can comprise following one or more assembly: processing components 802, storer 804, power supply module 806, multimedia groupware 808, audio-frequency assembly 810, I/O (Input/Output, I/O) interface 812, sensor module 814, and communications component 816.
The integrated operation of processing components 802 common control device 800, such as with demonstration, call, data communication, the operation that camera operation and record operation are associated.Treatment element 802 can comprise that one or more processors 820 carry out instruction, to complete all or part of step of above-mentioned method.In addition, processing components 802 can comprise one or more modules, is convenient to mutual between processing components 802 and other assemblies.For example, processing element 802 can comprise multi-media module, to facilitate mutual between multimedia groupware 808 and processing components 802.
Storer 804 is configured to store various types of data to be supported in the operation of equipment 800.The example of these data comprises for any application program of operation on device 800 or the instruction of method, contact data, telephone book data, message, picture, video etc.Storer 804 can be realized by the volatibility of any type or non-volatile memory device or their combination, as SRAM (Static Random Access Memory, static RAM), EEPROM (Electrically Erasable Programmable Read-Only Memory, Electrically Erasable Read Only Memory), EPROM (Erasable Programmable Read Only Memory, Erasable Programmable Read Only Memory EPROM), PROM (Programmable Read-Only Memory, programmable read only memory), ROM (Read-Only Memory, ROM (read-only memory)), magnetic store, flash memory, disk or CD.
Electric power assembly 806 provides electric power for installing 800 various assemblies.Electric power assembly 806 can comprise power-supply management system, one or more power supplys, and other and the assembly that generates, manages and distribute electric power to be associated for device 800.
Multimedia groupware 808 is included in the screen that an output interface is provided between this device 800 and user.In certain embodiments, screen can comprise LCD (Liquid Crystal Display, liquid crystal display) and TP (Touch Panel, touch panel).If screen comprises touch panel, screen may be implemented as touch-screen, to receive the input signal from user.Touch panel comprises that one or more touch sensors are with the gesture on sensing touch, slip and touch panel.This touch sensor is the border of sensing touch or sliding action not only, but also detects duration and the pressure relevant to this touch or slide.In certain embodiments, multimedia groupware 808 comprises a front-facing camera and/or post-positioned pick-up head.When equipment 800 is in operator scheme, during as screening-mode or video mode, front-facing camera and/or post-positioned pick-up head can receive outside multi-medium data.Each front-facing camera and post-positioned pick-up head can be fixing optical lens systems or have focal length and optical zoom ability.
Audio-frequency assembly 810 is configured to output and/or input audio signal.For example, audio-frequency assembly 810 comprises a MIC (Microphone, microphone), and when device 800 is in operator scheme, during as call model, logging mode and speech recognition mode, microphone is configured to receive external audio signal.The sound signal receiving can be further stored in storer 804 or be sent via communications component 816.In certain embodiments, audio-frequency assembly 810 also comprises a loudspeaker, for output audio signal.
I/O interface 812 is for providing interface between processing components 802 and peripheral interface module, and above-mentioned peripheral interface module can be keyboard, some striking wheel, button etc.These buttons can include but not limited to: home button, volume button, start button and locking press button.
Sensor module 814 comprises one or more sensors, is used to device 800 that the state estimation of various aspects is provided.For example, sensor module 814 can detect the opening/closing state of equipment 800, the relative positioning of assembly, for example this assembly is display and the keypad of device 800, the position of all right pick-up unit 800 of sensor module 814 or 800 1 assemblies of device changes, user is with device 800 existence that contact or do not have the temperature variation of device 800 orientation or acceleration/deceleration and device 800.Sensor module 814 can comprise proximity transducer, be configured to without any physical contact time detect near the existence of object.Sensor module 814 can also comprise optical sensor, as CMOS (Complementary Metal Oxide Semiconductor, complementary metal oxide semiconductor (CMOS)) or CCD (Charge-coupled Device, charge coupled cell) imageing sensor, for using in imaging applications.In certain embodiments, this sensor module 814 can also comprise acceleration transducer, gyro sensor, Magnetic Sensor, pressure transducer or temperature sensor.
Communications component 816 is configured to be convenient to the communication of wired or wireless mode between device 800 and other equipment.Device 800 wireless networks that can access based on communication standard, as WiFi (Wireless Fidelity, adopting wireless fidelity technology), 2G (Second Generation mobile communication technology, second generation mobile communication technology) or 3G (3rd Generation mobile communication technology, third generation mobile technology), or their combination.In one exemplary embodiment, communication component 816 receives broadcast singal or the broadcast related information from external broadcasting management system via broadcast channel.In one exemplary embodiment, this communication component 816 also comprises NFC (Near Field Communication, near-field communication) module, to promote junction service.For example, can be based on RFID (Radio Frequency Identification in NFC module, radio-frequency (RF) identification) technology, IrDA (Infrared Data Association, Infrared Data Association) technology, UWB (Ultra Wideband, ultra broadband) technology, BT (Blue Tooth, bluetooth) technology and other technologies realize.
In the exemplary embodiment, device 800 can be by one or more ASIC (Application Specific Integrated Circuit, application specific integrated circuit), DSP (Digital Signal Processing, digital signal processor), DSPD (Digital Signal Processing Device, digital signal processing appts), PLD (Programmable Logic Device, programmable logic device (PLD)), FPGA (Field-Programmable Gate Array, field programmable gate array), controller, microcontroller, microprocessor or other electronic components are realized, be used for carrying out said method.
In the exemplary embodiment, also provide a kind of non-provisional computer-readable recording medium that comprises instruction, for example, comprised the storer 804 of instruction, above-mentioned instruction can have been carried out said method by the processor 820 of device 800.For example, this non-provisional computer-readable recording medium can be ROM, RAM (Ramdom Access Memory, random access memory), CD-ROM (Compact Disc Read-Only Memory, compact disc read-only memory), tape, floppy disk and optical data storage equipment etc.
A kind of non-provisional computer-readable recording medium, in the time that the instruction in this storage medium is carried out by the processor of terminal, makes terminal can carry out a kind of smart lock control method, and the method comprises:
In the time that first terminal is positioned at the setting range of smart lock, obtain user's authorization information;
Authorization information is sent to smart lock, and smart lock is for according to the identity of authorization information authentication of users, when user carries out unlock operation during by checking.
Those skilled in the art, considering instructions and putting into practice after invention disclosed herein, will easily expect other embodiment of the present invention.The application is intended to contain any modification of the present invention, purposes or adaptations, and these modification, purposes or adaptations are followed general principle of the present invention and comprised undocumented common practise or the conventional techniques means in the art of the disclosure.Instructions and embodiment are only regarded as exemplary, and true scope of the present invention and spirit are pointed out by claim below.
Should be understood that, the present invention is not limited to precision architecture described above and illustrated in the accompanying drawings, and can carry out various amendments and change not departing from its scope.Scope of the present invention is only limited by appended claim.

Claims (17)

1. a smart lock control method, is characterized in that, described method comprises:
In the time that first terminal is positioned at the setting range of smart lock, obtain user's authorization information;
Described authorization information is sent to described smart lock, and described smart lock is for verify described user's identity according to described authorization information, when described user carries out unlock operation during by checking.
2. method according to claim 1, is characterized in that, described in obtain user's authorization information, comprising:
Output input key dialog box;
The key to be verified that receives user's input, described key to be verified is to send to the key that arranges of described first terminal to obtain according to the second terminal.
3. method according to claim 2, is characterized in that, described described authorization information is sent to described smart lock, comprising:
Described key to be verified is sent to described smart lock, described smart lock describedly arranges key to be verified described in key authentication for what adopt that described the second terminal sends to described smart lock, when described key to be verified is carried out unlock operation when identical with the described key that arranges.
4. method according to claim 1, is characterized in that, described in obtain user's authorization information, comprising:
Gather user's image.
5. method according to claim 4, is characterized in that, described described authorization information is sent to described smart lock, comprising:
Described user's image is sent to described smart lock, and described smart lock is for adopting the image of user described in the image authentication prestoring, when described user's image with described in the image that prestores carry out unlock operation when identical.
6. according to the method described in claim 1-5 any one, it is characterized in that, described method also comprises:
By being set, key sends to third terminal, described third terminal is in the time that described third terminal is positioned at the setting range of smart lock, key to be verified is sent to described smart lock, and described key to be verified is to send to the described key that arranges of described third terminal to obtain according to described first terminal;
The described key that arranges is sent to described smart lock, and described smart lock is for adopting the described key described to be verified that third terminal sends described in key authentication that arranges, when described key to be verified is carried out unlock operation when identical with the described key that arranges.
7. method according to claim 6, is characterized in that, described method also comprises:
Setting-up time is sent to described smart lock, described smart lock is for adopting described setting-up time and the described mistiming that key is set and receive between described key to be verified of reception to compare, be less than or equal to described setting-up time when the described mistiming, and described key to be verified is carried out unlock operation when identical with the described key that arranges.
8. method according to claim 6, is characterized in that, described method also comprises:
Authorization message is sent to described smart lock, described authorization message comprises terminal iidentification, described smart lock for when receive that other-end except described first terminal sends key is set time, according to described terminal iidentification judge described other-end transmission whether key is set effective.
9. a smart lock control device, is characterized in that, described device comprises:
Acquisition module, when being positioned at the setting range of smart lock when first terminal, obtains user's authorization information;
Sending module, for described authorization information is sent to described smart lock, described smart lock is for verify described user's identity according to described authorization information, when described user carries out unlock operation during by checking.
10. device according to claim 9, is characterized in that, described acquisition module comprises:
Output unit, for exporting input key dialog box;
Input block, for receiving the key to be verified of user's input, described key to be verified is to send to the key that arranges of described first terminal to obtain according to the second terminal.
11. devices according to claim 10, is characterized in that, described sending module is used for,
Described key to be verified is sent to described smart lock, described smart lock describedly arranges key to be verified described in key authentication for what adopt that described the second terminal sends to described smart lock, when described key to be verified is carried out unlock operation when identical with the described key that arranges.
12. devices according to claim 9, is characterized in that, described acquisition module comprises:
Collecting unit, for gathering user's image.
13. devices according to claim 12, is characterized in that, described sending module is used for,
Described user's image is sent to described smart lock, and described smart lock is for adopting the image of user described in the image authentication prestoring, when described user's image with described in the image that prestores carry out unlock operation when identical.
14. according to the device described in claim 9-13, it is characterized in that, described sending module also for,
By being set, key sends to third terminal, described third terminal is in the time that described third terminal is positioned at the setting range of smart lock, key to be verified is sent to described smart lock, and described key to be verified is to send to the described key that arranges of described third terminal to obtain according to described first terminal;
The described key that arranges is sent to described smart lock, and described smart lock is for adopting the described key described to be verified that third terminal sends described in key authentication that arranges, when described key to be verified is carried out unlock operation when identical with the described key that arranges.
15. devices according to claim 14, is characterized in that, described sending module also for,
Setting-up time is sent to described smart lock, described smart lock is for adopting the described mistiming that key is set and receive between described key to be verified of described setting-up time and reception to compare, be less than or equal to described setting-up time when the described mistiming, and described key to be verified is carried out unlock operation when identical with the described key that arranges.
16. devices according to claim 14, is characterized in that, described sending module also for,
Authorization message is sent to described smart lock, described authorization message comprises terminal iidentification, described smart lock for when receive that other-end except described first terminal sends key is set time, according to described terminal iidentification judge described other-end transmission whether key is set effective.
17. 1 kinds of smart lock control devices, is characterized in that, described device comprises:
Processor;
For the storer of storage of processor executable instruction;
Wherein, described processor is configured to:
In the time that first terminal is positioned at the setting range of smart lock, obtain user's authorization information;
Described authorization information is sent to described smart lock, and described smart lock is for verify described user's identity according to described authorization information, when described user carries out unlock operation during by checking.
CN201410268572.8A 2014-06-16 2014-06-16 Intelligent lock control method and apparatus thereof CN104091376B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410268572.8A CN104091376B (en) 2014-06-16 2014-06-16 Intelligent lock control method and apparatus thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410268572.8A CN104091376B (en) 2014-06-16 2014-06-16 Intelligent lock control method and apparatus thereof

Publications (2)

Publication Number Publication Date
CN104091376A true CN104091376A (en) 2014-10-08
CN104091376B CN104091376B (en) 2017-02-08

Family

ID=51639090

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410268572.8A CN104091376B (en) 2014-06-16 2014-06-16 Intelligent lock control method and apparatus thereof

Country Status (1)

Country Link
CN (1) CN104091376B (en)

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104601331A (en) * 2014-12-26 2015-05-06 深圳市科陆电子科技股份有限公司 System and method for monitoring and controlling charging pile
CN106097494A (en) * 2016-06-03 2016-11-09 北京小米移动软件有限公司 The method for unlocking of smart lock and device
CN106127888A (en) * 2016-06-14 2016-11-16 天津宅美智能科技有限公司 Smart lock operational approach and smart lock operating system
CN106157394A (en) * 2015-04-24 2016-11-23 胡飞虎 Community's networked door access control system and community based on this system access method
CN106355717A (en) * 2016-09-05 2017-01-25 惠州Tcl移动通信有限公司 Mobile terminal unlocking method and system based on fingerprint recognition and NFC (near field communication)
CN107093228A (en) * 2016-02-17 2017-08-25 腾讯科技(深圳)有限公司 Authorization method, apparatus and system applied to electric lockset
CN107967732A (en) * 2017-10-31 2018-04-27 美的智慧家居科技有限公司 Intelligent door lock and voice method for burn-recording
CN108022349A (en) * 2017-12-22 2018-05-11 北京小米移动软件有限公司 Information input method, equipment, smart lock and storage medium
CN108416874A (en) * 2018-01-18 2018-08-17 新开普电子股份有限公司 A kind of quick authentication access control system based on recognition of face
CN108932779A (en) * 2018-07-17 2018-12-04 叶春林 Prevent Household door lock by pirate of the open or the mode of exception
CN109191649A (en) * 2018-10-26 2019-01-11 珠海格力电器股份有限公司 A kind of method and device that intelligent door lock control authority is shared
CN109215178A (en) * 2017-07-04 2019-01-15 华为技术有限公司 Method for generating cipher code, device, storage medium, electronic lock, server and terminal
CN109243018A (en) * 2018-08-23 2019-01-18 杭州立为科技有限公司 Automatic encryption method, smart lock and storage medium between intelligent lock control system module

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101630422A (en) * 2009-08-31 2010-01-20 天津工业大学 Intelligent electronic access control system
EP2207147A1 (en) * 2009-01-02 2010-07-14 Johnson Controls Technology Company System for causing garage door opener to open garage door and method
CN101833826A (en) * 2009-03-13 2010-09-15 上海永久自行车有限公司 Vehicle rental system and vehicle rental method thereof
CN102262793A (en) * 2010-05-26 2011-11-30 中兴通讯股份有限公司 Entrance guard control method and entrance guard control system
CN102864984A (en) * 2012-09-19 2013-01-09 重庆和航科技股份有限公司 Smart door lock, unlocking system and unlocking method
CN103236094A (en) * 2013-03-29 2013-08-07 东莞宇龙通信科技有限公司 Door control system and method of unlocking door control equipment by mobile terminal
CN203361799U (en) * 2013-05-22 2013-12-25 荀亮 Lock with wireless communication element

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2207147A1 (en) * 2009-01-02 2010-07-14 Johnson Controls Technology Company System for causing garage door opener to open garage door and method
CN101833826A (en) * 2009-03-13 2010-09-15 上海永久自行车有限公司 Vehicle rental system and vehicle rental method thereof
CN101630422A (en) * 2009-08-31 2010-01-20 天津工业大学 Intelligent electronic access control system
CN102262793A (en) * 2010-05-26 2011-11-30 中兴通讯股份有限公司 Entrance guard control method and entrance guard control system
CN102864984A (en) * 2012-09-19 2013-01-09 重庆和航科技股份有限公司 Smart door lock, unlocking system and unlocking method
CN103236094A (en) * 2013-03-29 2013-08-07 东莞宇龙通信科技有限公司 Door control system and method of unlocking door control equipment by mobile terminal
CN203361799U (en) * 2013-05-22 2013-12-25 荀亮 Lock with wireless communication element

Cited By (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104601331B (en) * 2014-12-26 2018-05-08 深圳市科陆电子科技股份有限公司 Charging pile monitor control system and method
CN104601331A (en) * 2014-12-26 2015-05-06 深圳市科陆电子科技股份有限公司 System and method for monitoring and controlling charging pile
CN106157394A (en) * 2015-04-24 2016-11-23 胡飞虎 Community's networked door access control system and community based on this system access method
CN107093228B (en) * 2016-02-17 2020-09-01 腾讯科技(深圳)有限公司 Authorization method, device and system applied to electronic lock
US10586415B2 (en) 2016-02-17 2020-03-10 Tencent Technology (Shenzhen) Company Limited Authorization method, apparatus, and system applied to electronic lock
CN107093228A (en) * 2016-02-17 2017-08-25 腾讯科技(深圳)有限公司 Authorization method, apparatus and system applied to electric lockset
CN106097494A (en) * 2016-06-03 2016-11-09 北京小米移动软件有限公司 The method for unlocking of smart lock and device
CN106127888B (en) * 2016-06-14 2019-06-11 天津宅美智能科技有限公司 Intelligent lock operation method and smart lock operating system
CN106127888A (en) * 2016-06-14 2016-11-16 天津宅美智能科技有限公司 Smart lock operational approach and smart lock operating system
CN106355717A (en) * 2016-09-05 2017-01-25 惠州Tcl移动通信有限公司 Mobile terminal unlocking method and system based on fingerprint recognition and NFC (near field communication)
CN109215178A (en) * 2017-07-04 2019-01-15 华为技术有限公司 Method for generating cipher code, device, storage medium, electronic lock, server and terminal
CN107967732A (en) * 2017-10-31 2018-04-27 美的智慧家居科技有限公司 Intelligent door lock and voice method for burn-recording
CN108022349A (en) * 2017-12-22 2018-05-11 北京小米移动软件有限公司 Information input method, equipment, smart lock and storage medium
CN108416874A (en) * 2018-01-18 2018-08-17 新开普电子股份有限公司 A kind of quick authentication access control system based on recognition of face
CN108932779A (en) * 2018-07-17 2018-12-04 叶春林 Prevent Household door lock by pirate of the open or the mode of exception
CN109243018A (en) * 2018-08-23 2019-01-18 杭州立为科技有限公司 Automatic encryption method, smart lock and storage medium between intelligent lock control system module
CN109191649A (en) * 2018-10-26 2019-01-11 珠海格力电器股份有限公司 A kind of method and device that intelligent door lock control authority is shared
CN109191649B (en) * 2018-10-26 2021-01-29 珠海格力电器股份有限公司 Method and device for sharing control authority of intelligent door lock

Also Published As

Publication number Publication date
CN104091376B (en) 2017-02-08

Similar Documents

Publication Publication Date Title
KR101693130B1 (en) Information interaction method and device
CN104243250B (en) Access authorization methods, device and equipment based on intelligent domestic system
CN104850769B (en) Operation executes method and device
CN104503688B (en) The control method and device of intelligent hardware devices
CN104038263B (en) Method and device for establishing Bluetooth connection
CN104159226B (en) Method for connecting network and device
CN104008635B (en) Apparatus control method and device
CN104866750B (en) Using startup method and apparatus
CN104158946B (en) A kind of method and device controlling terminal
CN104159275B (en) Method for connecting network and device
CN103916233B (en) A kind of information ciphering method and device
CN104765990B (en) The setting method and device of intelligent device management account
CN104219058B (en) Authentication, identification authorization method and device
CN104933351B (en) The treating method and apparatus of information security
CN104202306B (en) Access authentication method, Apparatus and system
CN105474275A (en) Owner access point to control the unlocking of an entry
CN104980580B (en) Short message inspection method and device
CN104159255A (en) Method of sharing network among terminals and device
CN104780155B (en) Apparatus bound method and device
CN104714414A (en) Smart home equipment control method and device and electronic equipment
CN104469714B (en) Note transmission method and device
CN110113427A (en) Relay services for the communication between controller and attachment
CN104065836A (en) Method and device for monitoring calls
CN103926890A (en) Intelligent terminal control method and device
CN104992091A (en) Method and apparatus for accessing terminal end

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant