CN104167040B - The long-range control method of a kind of electronic lock and system - Google Patents
The long-range control method of a kind of electronic lock and system Download PDFInfo
- Publication number
- CN104167040B CN104167040B CN201410441926.4A CN201410441926A CN104167040B CN 104167040 B CN104167040 B CN 104167040B CN 201410441926 A CN201410441926 A CN 201410441926A CN 104167040 B CN104167040 B CN 104167040B
- Authority
- CN
- China
- Prior art keywords
- electronic lock
- configuration file
- user
- cloud server
- intelligent terminal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Abstract
The open a kind of electronic lock long-range control method of the present invention and system, the method is particularly as follows: edit configuration file on intelligent terminal, and editor's configuration file is stored in Cloud Server, configuration file includes user and the control corresponding relation of electronic lock, user right and authentication detection pattern;The electronic lock remote control notification of intelligent terminal for reception user instructs and sends Cloud Server to;Cloud Server sends mandate input instruction to intelligent terminal;The authorized order that user inputs is fed back to Cloud Server by intelligent terminal, and authorized order includes electronic lock information to be controlled, control authority and authentication password;Authorized order is authenticated by Cloud Server according to configuration file, if authenticating successfully, performs instruction by wireless network accordingly to electronic lock transmission.The application present invention, under the conditions of the physical arrangement not changing existing electronic lock, by wirelessly accessing the internet, electronic lock is remotely controlled by user by intelligent terminal, application variation, and user experience is good, and safety is high.
Description
Technical field
The present invention relates to security protection and Internet of Things applied technical field, be specifically related to the long-range of a kind of electronic lock
Control method and system.
Background technology
Owing to electronic lock is easy to use, replace traditional mechanical lock in many application scenarios.For
Different application scenarios, electronic lock has many different modes of unblanking, including numerical ciphers, smart card
(IC-card, RF-SIM card, RFID etc.), bio-identification (fingerprint, face) etc., but the most only limit
In this locality.
Traditional mechanical lock and electronic lock all can only be unblanked in this locality, and office's labor turnover or tenant are more
When changing, generally require replacing lockset.When key loss or people go out, special circumstances and guest
Time visiting, will be unable to unblank;If key or password being used to other people, answering of the most uncontrollable key
System and the leakage of password, form potential safety hazard.Unblank simultaneously for improper, it is impossible to carry out effectively
Early warning and tracking.As there is abnormal and loss, information also cannot be recalled, it is impossible to location suspect.
The product of the existing remote unlocking controlled by mobile phone dialing phone and transmission note, can be sent
Improper unblanking is reported to the police, and solves the problem of remote unlocking when people goes out.But apply single, user's body
Testing difference, safe class is low, if mobile phone is lost, it is easy to form economic loss.Improper unblanking is reported to the police
Poor information, it is impossible to provide client's information for tracing.
Summary of the invention
For disadvantages described above or the Improvement requirement of prior art, the present invention proposes the long-range of a kind of electronic lock
Control method and system, it is intended that under the conditions of the physical arrangement not changing existing electronic lock,
By wirelessly accessing the internet, user carries out condition monitoring by intelligent terminal and remotely controls electronic lock
System, application variation, user experience is good, and safety is high.
The concrete technical scheme of the present invention is as follows:
A kind of electronic lock long-range control method, particularly as follows:
Intelligent terminal edits configuration file, and by editor's configuration file transmission and be stored in cloud service
Device, configuration file includes user and the control corresponding relation of electronic lock, user right and authentication detection mould
Formula;
Intelligent terminal provides authorized order inputting interface, and the authorized order that user inputs feeds back to cloud clothes
Business device, authorized order includes electronic lock information to be controlled, control authority and authentication password;
Cloud Server judges whether user is present in configuration literary composition with the control corresponding relation of electronic lock to be controlled
In part, if existing, the most whether judgement control authority is in the user right that configuration file is specified,
If in user right, then authentication detection Pattern recognition authentication password is the most correct further, if mirror
Power password is correct, then authenticate successfully;If authenticating successfully, transmit corresponding to electronic lock by wireless network
Perform instruction.
Further, what authorized order was authenticated by described Cloud Server foundation configuration file is concrete real
Existing mode is:
The control corresponding relation of the electronic lock to be controlled that Cloud Server judgement user specifies with authorized order is
No being present in configuration file, if existing, judging that the control authority that authorized order is specified is the most further
No in the user right that configuration file is specified, if in user right, use configuration the most further
The authentication password that the authentication detection Pattern recognition authorized order that file limits is specified is the most correct, if authentication
Password is correct, then authenticate successfully.
Further, also can be at described electronic lock this locality editor and storage configuration file, electronic lock is automatic
With the comparison and detection that Cloud Server carries out configuration file, if the local configuration file version of electronic lock is more
Newly, then upload configuration file is to update the configuration file of Cloud Server storage, if the joining of Cloud Server
Put file version updating, then from Cloud Server download configuration file to update local profile.
Further, described authentication password is user biological feature or password or a combination of both, described
User biological is characterized as the one in face, voice, fingerprint and iris or combination.
Further, photographic head is set near electronic lock, for the image information of shooting is passed through nothing
Gauze network sends Cloud Server to, and Cloud Server relays to intelligent terminal and checks for user.
A kind of electronic lock tele-control system, including
Wireless communication module, for the switching-state information from electronic lock is sent to Cloud Server,
The execution receiving Cloud Server instructs and is sent to electronic lock;
Cloud Server, is used for storing configuration file, and configuration file includes that user is right with the control of electronic lock
Should be related to, user right and authentication detection pattern;Receive the authorized order from intelligent terminal, award
Power instruction includes electronic lock information to be controlled, control authority and authentication password;Intelligent terminal compiles
Volume configuration file, and by editor configuration file transmission and be stored in Cloud Server, configuration file includes use
Family and the control corresponding relation of electronic lock, user right and authentication detection pattern;
Intelligent terminal provides authorized order inputting interface, and the authorized order that user inputs feeds back to cloud clothes
Business device, authorized order includes electronic lock information to be controlled, control authority and authentication password;
Cloud Server judges whether user is present in configuration literary composition with the control corresponding relation of electronic lock to be controlled
In part, if existing, the most whether judgement control authority is in the user right that configuration file is specified,
If in user right, then authentication detection Pattern recognition authentication password is the most correct further, if mirror
Power password is correct, then authenticate successfully;If authenticating successfully, transmit corresponding to electronic lock by wireless network
Perform instruction, and electronic lock switch state is transmitted to intelligent terminal;
Intelligent terminal, for sending the authorized order that user inputs to Cloud Server, receives and presents logical
Cross the electronic lock switch state that Cloud Server forwards.
Further, described Cloud Server is loaded with user management module, device management module, authentication
Authorization module, operational control module and database storage module;
Database storage module, is used for storing configuration file, and configuration file includes user and electronic lock
Control corresponding relation, user right and authentication detection pattern;
User management module, instructs for receiving the electronic lock remote control notification of intelligent terminal and transfers
To operational control module, receive the mandate from operational control module and input instruction and be transmitted to intelligence eventually
End, is received the authorized order that inputted by intelligent terminal of user and transfers to operational control module;
Operational control module, for receive from user management module electronic lock remotely control please
After asking instruction, start Authentication Authorization module, and it is logical that the mandate from Authentication Authorization module is inputted instruction
Cross user management module and be transmitted to intelligent terminal, and the authorized order that intelligent terminal feeds back is transmitted to mirror
Power authorization module;Receive after the authentication successful information of Authentication Authorization module feedback to device management module
Send and perform instruction;
Authentication Authorization module, for receiving the authorized order of operational control module forwards, it is determined that Yong Huyu
Whether the control corresponding relation of the electronic lock to be controlled that authorized order is specified is present in configuration file, if
Exist, judge that the control authority specified of authorized order is whether at the user right of configuration file the most further
In, if control authority is in the user right of configuration file, use configuration file to limit the most further
The authentication detection authentication password specified of Pattern recognition authorized order the most correct, if authentication password is correct,
Then authenticate successfully, and authentication successful information is fed back to operational control module;
Device management module instructs and is assigned to electronic lock to hold for the execution receiving operational control module
Row corresponding operating, receives the execution result of electronic lock feedback and manages mould through operational control module, user
Block feeds back to intelligent terminal.
Further, configuration file can be edited and store in described electronic lock this locality, and electronic lock is automatically and cloud
Server carries out the comparison and detection of configuration file, if the configuration file version updating that electronic lock is local,
Then upload configuration file is to update the configuration file of Cloud Server storage, if the configuration literary composition of Cloud Server
Part version updating, then from Cloud Server download configuration file to update local profile.
Further, described authentication password is user biological feature or password or a combination of both, described
User biological is characterized as the one in face, voice, fingerprint and iris or combination.
Further, near electronic lock, also it is provided with photographic head, for the image information of shooting being led to
Crossing wireless network and send Cloud Server to, Cloud Server relays to intelligent terminal and checks for user.
The Advantageous Effects of the present invention embodies as follows:
The application present invention does not affect the user habit of ordinary electronic lock, directly can pass through numeral in this locality
Password, smart card (IC-card, RF-SIM card, RFID etc.), bio-identification (fingerprint, face) etc.
Authorization is unblanked.
When user goes out, can remotely monitor family door interlock switch situation;When other donor unblanks
Time, record can be formed, and notify user by intelligent terminal;Unblank if any guest's needs of coming to visit,
Can be after determining one's identity, by intelligent terminal's remote unlocking.
Intelligent terminal's application directly can enable mandate by extraction biological characteristic.Simple, safety
Protection level is high.
Compatible traditional password, gesture password authorization mode, user can carry out independent assortment according to demand.
Occur improper unblank report to the police time, client's image or video can be captured, and sent out by intelligent terminal
Give user, it is simple to trace afterwards.Meanwhile, by using the remote authorization mode of biological identification technology,
Unblank to authorize personal identification to be directly bound, ensure the safety of remote application.
Accompanying drawing explanation
Fig. 1 be Fig. 1 be the system block diagram of the present invention;
Fig. 2 is the structured flowchart of Cloud Server.
Detailed description of the invention
In order to make the purpose of the present invention, technical scheme and advantage clearer, below in conjunction with accompanying drawing
And embodiment, the present invention is further elaborated.Should be appreciated that described herein specifically
Embodiment only in order to explain the present invention, is not intended to limit the present invention.Additionally, it is disclosed below
Just may be used as long as technical characteristic involved in each embodiment of the present invention does not constitutes conflict each other
To be mutually combined.
Electronic lock long-range control method of the present invention, particularly as follows:
Intelligent terminal edits configuration file, and by editor's configuration file transmission and be stored in cloud service
Device, configuration file includes user and the control corresponding relation of electronic lock, user right and authentication detection mould
Formula;
Intelligent terminal provides authorized order inputting interface, and the authorized order that user inputs feeds back to cloud clothes
Business device, authorized order includes electronic lock information to be controlled, control authority and authentication password;
Authorized order is authenticated by Cloud Server according to configuration file, if authenticating successfully, passes through wireless network
Transmit to electronic lock and perform instruction accordingly.
Referring to Fig. 1, the present invention realizes the electronic lock tele-control system of said method and includes radio communication
Module, Cloud Server and intelligent terminal.
Wireless communication module, its one end connects electronics by serial ports (RS232, RS485, Modbus)
Lock, the other end connects Cloud Server by wireless network.Wireless communication module is used for electronic lock, video
Data between acquisition module and Cloud Server forward.Communication pattern can be WIFI pattern, it is also possible to
For GPRS/3G/4G pattern, or support both of which simultaneously.It is embedded with and leads to Cloud Server
The protocol stack of letter.Wireless communication module is sent by serial ports during electronic locking or in real time by current state,
State, via Cloud Server, is pushed to user intelligent terminal, thus user is permissible by wireless communication module
Intelligent terminal is used to apply real time inspection electronic lock switch state.It addition, receive the execution of Cloud Server
Instruct and send to electronic lock to perform corresponding operating.
Cloud Server, its one end connects wireless communication module by wireless network, and the other end is by wired
Or wireless network connects intelligent terminal.For storing configuration file, configuration file includes user and electronics
The control corresponding relation of lock, user right and authentication detection pattern;Receive awarding from intelligent terminal
Power instruction, authorized order includes electronic lock information to be controlled, control authority and authentication password;Foundation
Authorized order row is identified by configuration file, if identifying successfully, is then sent to electronic lock by wireless network
Perform instruction, and electronic lock switch state is transmitted to intelligent terminal.
Intelligent terminal, it connects Cloud Server by wired or wireless network, for user inputted
Authorized order sends Cloud Server to, receives and be presented by the electronic lock switch shape that Cloud Server forwards
State.
Referring to Fig. 2, Cloud Server is loaded with user management module, device management module, Authentication Authorization
Module, operational control module and database storage module.
Database storage module, is used for storing configuration file, profile information include (1) user with
The control corresponding relation of electronic lock, can be one-to-many, many-one, it is also possible to be can also be according to answering
By demand, user is divided into some groups, different groups is carried out the Authorized operation of entirety;(2)
Intelligent terminal to the authority of association electronic lock (could remote unlocking, the running status etc. of lock could be checked
Deng);(3) authentication that intelligent terminal unblanks to ask detects pattern (password, recognition of face, speech recognition
One in Deng or combination).Above-mentioned configuration information is necessary information but is not limited to this, and user is all right
It is defined as required or increases, hardware configuration information the most also can be set and i.e. connect the electronics of carry
Lock ardware model number and activation bit.
User management module, instructs for receiving the electronic lock remote control notification of intelligent terminal and transfers
To operational control module, receive the mandate from operational control module and input instruction and be transmitted to intelligence eventually
End, is received the authorized order that inputted by intelligent terminal of user and transfers to operational control module;
Operational control module, for receive from user management module electronic lock remotely control please
After asking instruction, start Authentication Authorization module, and it is logical that the mandate from Authentication Authorization module is inputted instruction
Cross user management module and be transmitted to intelligent terminal, and the authorized order that intelligent terminal feeds back is transmitted to mirror
Power authorization module;Receive after the authentication successful information of Authentication Authorization module feedback to device management module
Send and perform instruction;
Authentication Authorization module, for receiving the authorized order of operational control module forwards, it is determined that Yong Huyu
Whether the control corresponding relation of the electronic lock to be controlled that authorized order is specified is present in configuration file, if
Exist, judge that the control authority specified of authorized order is whether at the user right of configuration file the most further
In, if control authority is in the user right of configuration file, use configuration file to limit the most further
The authentication detection authentication password specified of Pattern recognition authorized order the most correct, if authentication password is correct,
Then authenticate successfully, and authentication successful information is fed back to operational control module;
Device management module instructs and is assigned to electronic lock to hold for the execution receiving operational control module
Row corresponding operating, receives the execution result of electronic lock feedback and manages mould through operational control module, user
Block feeds back to intelligent terminal.
First system configuration is carried out:
When present system first powers on use, system can be automatically into the ap mode of WIFI, intelligence
Energy terminal obtains the special ID (preset unique mark) of talk back entrance guard device.Intelligent terminal's radio configuration
The network access parameters of native system, application model parameter.And by special ID, user and native system
Electrical lock apparatus forms association, can associate one or more user simultaneously.All users must take at cloud
User account registered by business device;Manager creates user and manages group, and all users add pipe
Reason group.Manager, for different users, edits this user on intelligent terminal and authorizes exercisable
Electronic lock, authorization mechanism, authentication detection pattern etc..User after obtaining authority and initial password,.
The configuration of user with associate authorization message, network connect after, can be recorded in cloud database storage
Module.
Also can be locally configured at electronic lock, when each electronic lock is after locally configured change, can be to electricity
In son lock, corresponding configuration file is modified.Electronic lock meeting is automatically and Cloud Server carries out configuration file
Comparison and detection, if the configuration file version updating that electronic lock is local, then upload configuration file, more
The profile information of new Cloud Server storage.Meanwhile, Cloud Server can configure by log history, when needing
When carrying out configuring rollback, administrator can be configured by intelligent terminal.Reset at electronic lock,
Or when other surprisingly causes lockset factory reset, electronic lock can be the most Tong Bu with Cloud Server,
Original configuration information is downloaded to this locality.Thus need not again carry out the locally configured of complexity.It is correlated with
Configuration file can cryptographically store, and transmitting procedure also can be encrypted again, to ensure that user profile is pacified
Entirely.The intelligent terminal user of present system acquiescence configuration for the first time is administrator.As other is used
Family needs to use, then need the permission of manager to use.
The application present invention can perform remote unlocking, check that the instructions such as electronic lock state control electronic lock,
It is not limited to this, control authority can be extended according to electronic lock function extension.
The application present invention carries out the process of remote unlocking:
Association electronic lock is initiated to unblank request instruction by user by intelligent terminal, and user management module connects
Instructed by this, and instruction is mail to operational control module simultaneously;Operational control module notice Authentication Authorization
Module authenticates.Authentication Authorization module, according to the mandate requirement of this instruction, is initiated to obtain user cipher
Mandate input instruction, this instruction is sent to intelligent terminal through user management module, notifies that user inputs
Authorized order, authorized order includes electronic lock ID to be controlled, unblank instruction and authentication detection pattern;Intelligence
After energy terminal completes operation, by authorized order through user management module, it is back to Authentication Authorization module;
The information of storage in the authorized order of return and database storage module is carried out by Authentication Authorization module
Join, such as result display coupling, then return to operational control module, authenticate and successfully instruct;Otherwise, return
Return failed authentication instruction;Operational control module receives to authenticate and successfully instructs, then through device management module,
Instruction of unblanking is initiated to the electronic lock of association;Simultaneously through user management module, notify that intelligent terminal " opens
In lock ";As received failed authentication instruction, then only through user management module, notify intelligent terminal's " authentication
Failure " instruction;After the electronic lock of association receives instruction of unblanking, carry out unlocking operation.If unblanked into
Merit, then through device management module, return operational control module and " unblank successfully " to instruct, and this instruction is again
Through user management module, notify intelligent terminal, otherwise return " unblanking unsuccessfully " instruction.This operated
Journey, operational control module can form record, be stored in database storage module.
The application present invention carry out checking the process of electronic lock state substantially with unblank similar, simply authorize
Control authority in instruction is converted to by unblanking check electronic lock status command.
Particularly, need to use the scene of multiple electronic lock for multi-user, such as office.Manager
Can directly pass through intelligent terminal, remotely all users be carried out grouping authorization setting.When authorized user exists
Time being unblanked by normal mode in this locality, electronic lock sends relevant user information to radio communication by serial ports
Module, and be eventually sent to Cloud Server, Cloud Server can by relevant information real-time informing intelligent terminal,
And it is stored in high in the clouds.Occur surprisingly as follow-up, need backtracking investigation, high in the clouds record can be transferred.In case
Subsequent query.
Photographic head also can be installed further near electronic lock.As improper unblanking occurs, electronic lock meeting
Actively pass through serial ports send warning message to wireless module, wireless module triggers photographic head simultaneously and grabs
Clap.Image or video information are pushed to user intelligent terminal by Cloud Server in the lump with warning message.
It can be that keyboard, mouse or screen are hand-written defeated that the present invention authenticates the authentication password of detection pattern employing
Enter the password of character combination, it is possible to gather the subsequent operation key that biological characteristic is formed.
When using living things feature recognition authorization, physical characteristics collecting also need to be installed on intelligent terminal
Device, physical characteristics collecting device, for gathering the biological characteristic of user, is sent to by intelligent terminal
Cloud Server;Cloud Server and intelligent terminal carry out network interaction, receive the biology that intelligent terminal sends
Characteristic parameter, and send relevant prompting and authorized order.Cloud Server storage has the biology of initial setting
Characteristic parameter, the biological characteristic parameter that the characteristic parameter received is stored with biological characteristic memory element
Comparing coupling, if the match is successful, then regard as authentication success, Cloud Server is according to unblanking
Instruction is sent to electronic lock by wireless module.Described physical characteristics collecting device is face information gathering
One or more in device, voice acquisition device, fingerprint acquisition device, iris collection device.
When using password identification authorization, cipher input also need to be installed on intelligent terminal,
The password of intelligent terminal for reception user input, and send Cloud Server, cloud service to by intelligent terminal
Device determines whether authorization unlocking according to password, and instruction of unblanking is sent to electronic lock by wireless module.
User can select remote authorization to unblank mode according to different application, can be different biological to know
Other method, it is also possible to for the combination of several biometric discrimination methods, it is also possible to know with password for bio-identification
The combination of other method.
As it will be easily appreciated by one skilled in the art that and the foregoing is only presently preferred embodiments of the present invention,
Not in order to limit the present invention, all made within the spirit and principles in the present invention any amendment, etc.
With replacement and improvement etc., should be included within the scope of the present invention.
Claims (7)
1. an electronic lock long-range control method, it is characterised in that particularly as follows:
Intelligent terminal edits configuration file, and by editor's configuration file transmission and be stored in cloud service
Device, configuration file includes user and the control corresponding relation of electronic lock, user right and authentication detection mould
Formula;
Intelligent terminal provides authorized order inputting interface, and the authorized order that user inputs feeds back to cloud clothes
Business device, authorized order includes electronic lock information to be controlled, control authority and authentication password;
Cloud Server judges whether user is present in configuration literary composition with the control corresponding relation of electronic lock to be controlled
In part, if existing, the most whether judgement control authority is in the user right that configuration file is specified,
If in user right, then authentication detection Pattern recognition authentication password is the most correct further, if mirror
Power password is correct, then authenticate successfully;If authenticating successfully, transmit corresponding to electronic lock by wireless network
Perform instruction;
Also can be at described electronic lock this locality editor and storage configuration file, electronic lock is automatically and Cloud Server
Carry out the comparison and detection of configuration file, if the configuration file version updating that electronic lock is local, then upload
Configuration file is to update the configuration file of Cloud Server storage, if the configuration file version of Cloud Server
Update, then from Cloud Server download configuration file to update local profile.
Electronic lock long-range control method the most according to claim 1, it is characterised in that described mirror
Power password is user biological feature or password or a combination of both, described user biological be characterized as face,
One in voice, fingerprint and iris or combination.
Electronic lock long-range control method the most according to claim 1, it is characterised in that at electronics
Lock and photographic head is closely set, for sending the image information of shooting to Cloud Server by wireless network,
Cloud Server relays to intelligent terminal and checks for user.
4. an electronic lock tele-control system, it is characterised in that include
Wireless communication module, instructs and is sent to electronic lock for receiving the execution of Cloud Server, in the future
It is sent to Cloud Server from the switching-state information of electronic lock;
Cloud Server, is used for storing configuration file, and configuration file includes that user is right with the control of electronic lock
Should be related to, user right and authentication detection pattern;Receive the authorized order from intelligent terminal, award
Power instruction includes electronic lock information to be controlled, control authority and authentication password;Judge that user is with to be controlled
Whether the control corresponding relation of electronic lock processed is present in configuration file, if existing, judges the most further
Whether control authority is in the user right that configuration file is specified, if in user right, then enters one
Step authentication detection Pattern recognition authentication password is the most correct, if authentication password is correct, then authenticates successfully;
If authenticating successfully, being transmitted to electronic lock by wireless network and performing instruction accordingly, and will receive
Electronic lock switch state is transmitted to intelligent terminal;
Intelligent terminal, for sending the authorized order that user inputs to Cloud Server, receives and presents logical
Cross the electronic lock switch state that Cloud Server forwards;
Configuration file can be edited and store in described electronic lock this locality, and electronic lock is carried out with Cloud Server automatically
The comparison and detection of configuration file, if the configuration file version updating that electronic lock is local, then upload configuration
File is to update the configuration file of Cloud Server storage, if the configuration file version updating of Cloud Server,
Then from Cloud Server download configuration file to update local profile.
A kind of electronic lock tele-control system the most according to claim 4, it is characterised in that institute
State Cloud Server and be loaded with user management module, device management module, Authentication Authorization module, business pipe
Reason module and database storage module;
Database storage module, is used for storing configuration file, and configuration file includes user and electronic lock
Control corresponding relation, user right and authentication detection pattern;
User management module, instructs for receiving the electronic lock remote control notification of intelligent terminal and transfers
To operational control module, receive the mandate from operational control module and input instruction and be transmitted to intelligence eventually
End, is received the authorized order that inputted by intelligent terminal of user and transfers to operational control module;
Operational control module, for receive from user management module electronic lock remotely control please
After asking instruction, start Authentication Authorization module, and it is logical that the mandate from Authentication Authorization module is inputted instruction
Cross user management module and be transmitted to intelligent terminal, and the authorized order that intelligent terminal feeds back is transmitted to mirror
Power authorization module;Receive after the authentication successful information of Authentication Authorization module feedback to device management module
Send and perform instruction;
Authentication Authorization module, for receiving the authorized order of operational control module forwards, it is determined that Yong Huyu
Whether the control corresponding relation of the electronic lock to be controlled that authorized order is specified is present in configuration file, if
Exist, judge that the control authority specified of authorized order is whether at the user right of configuration file the most further
In, if control authority is in the user right of configuration file, use configuration file to limit the most further
The authentication detection authentication password specified of Pattern recognition authorized order the most correct, if authentication password is correct,
Then authenticate successfully, and authentication successful information is fed back to operational control module;
Device management module instructs and is assigned to electronic lock to hold for the execution receiving operational control module
Row corresponding operating, receives the execution result of electronic lock feedback and manages mould through operational control module, user
Block feeds back to intelligent terminal.
Electronic lock tele-control system the most according to claim 4, it is characterised in that described mirror
Power password is user biological feature or password or a combination of both, described user biological be characterized as face,
One in voice, fingerprint and iris or combination.
7. according to the electronic lock tele-control system described in claim 4 or 5 or 6, it is characterised in that
Near electronic lock, also it is provided with photographic head, for the image information of shooting is passed through wireless network transmission
To Cloud Server, Cloud Server relays to intelligent terminal and checks for user.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410441926.4A CN104167040B (en) | 2014-09-02 | 2014-09-02 | The long-range control method of a kind of electronic lock and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410441926.4A CN104167040B (en) | 2014-09-02 | 2014-09-02 | The long-range control method of a kind of electronic lock and system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104167040A CN104167040A (en) | 2014-11-26 |
CN104167040B true CN104167040B (en) | 2016-11-02 |
Family
ID=51910827
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410441926.4A Active CN104167040B (en) | 2014-09-02 | 2014-09-02 | The long-range control method of a kind of electronic lock and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104167040B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106887067A (en) * | 2017-03-31 | 2017-06-23 | 深圳市银河风云网络系统股份有限公司 | Wireless fingerprint recognizes the method that door lock is unlocked with wireless fingerprint identification |
Families Citing this family (52)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105989651A (en) * | 2015-02-16 | 2016-10-05 | 中兴通讯股份有限公司 | Method for controlling electronic lock and cloud terminal device |
CN104660719B (en) * | 2015-03-20 | 2018-11-27 | 云丁网络技术(北京)有限公司 | A kind of electronic lock system and its intelligent management implementation method |
CN104898507B (en) * | 2015-04-29 | 2018-09-18 | 德施曼机电(中国)有限公司 | A kind of blue-tooth intelligence cloud lock system and blue-tooth intelligence lock working method |
CN106204810A (en) * | 2015-05-07 | 2016-12-07 | 上海诚壹网络科技有限公司 | A kind of intelligent access control system |
CN105049469A (en) * | 2015-05-21 | 2015-11-11 | 广州市纬志电子科技有限公司 | Method and apparatus controlling controlled equipment through central control host |
CN106302973B (en) * | 2015-06-11 | 2019-04-23 | 一德金属工业股份有限公司 | Take concerted action the control system of device |
CN104952130A (en) * | 2015-06-16 | 2015-09-30 | 广州杰赛科技股份有限公司 | Intelligent lock control method and device as well as system |
CN105608354A (en) * | 2015-07-01 | 2016-05-25 | 南京酷派软件技术有限公司 | Authentication method and system, terminal and server |
CN105447933A (en) * | 2015-08-31 | 2016-03-30 | 深圳市启虹智能科技有限公司 | Non-contact biological recognition safety box |
CN105405185B (en) * | 2015-10-23 | 2018-10-26 | 东莞酷派软件技术有限公司 | Safe verification method and device |
CN106710032B (en) * | 2015-11-13 | 2021-04-06 | 北京奇虎科技有限公司 | Entrance guard opening method and device |
CN106710033B (en) * | 2015-11-13 | 2021-04-06 | 北京奇虎科技有限公司 | Entrance guard opening method and device |
CN105577805A (en) * | 2015-12-29 | 2016-05-11 | 宁波艾谱实业有限公司 | Remote control method of safe box and control system for realizing the method |
CN105681278A (en) * | 2015-12-29 | 2016-06-15 | 福建星网锐捷通讯股份有限公司 | Registering method and system of face identification access control |
CN105809787A (en) * | 2016-03-09 | 2016-07-27 | 海星客企业发展(上海)有限公司 | WiFi-based gesture unlocking device and control method thereof |
CN106023369B (en) * | 2016-05-19 | 2018-02-06 | 重庆理工大学 | Composite type safety lock system and its control method based on cloud platform |
CN105976476A (en) * | 2016-06-24 | 2016-09-28 | 赛酷特(北京)信息技术有限公司 | System and method for remotely controlling intelligent lock |
CN105957214A (en) * | 2016-06-27 | 2016-09-21 | 王宏钧 | Remote-control door control equipment, door control system thereof and control method |
CN106157403A (en) * | 2016-06-30 | 2016-11-23 | 大连楼兰科技股份有限公司 | Intelligent monitoring and controlling device based on PKE system and application thereof |
CN106209900B (en) * | 2016-08-02 | 2019-11-05 | 成都荷码科技有限公司 | A kind of method that smart lock is registered to repeater |
CN106131212A (en) * | 2016-08-18 | 2016-11-16 | 安居慧云(厦门)科技有限公司 | A kind of intelligence community based on Internet of Things controls Apparatus and system |
CN106327644A (en) * | 2016-08-26 | 2017-01-11 | 江西百胜智能科技股份有限公司 | Intelligent gate control equipment system and control method thereof |
CN106875523A (en) * | 2017-01-12 | 2017-06-20 | 深圳达实信息技术有限公司 | A kind of Yunmen access control system and its management method |
CN106919788B (en) * | 2017-02-14 | 2023-08-01 | 杭州爱钥医疗健康科技有限公司 | Method and device for processing data of glucometer |
CN107170084B (en) * | 2017-05-11 | 2019-07-02 | 广东汇泰龙科技有限公司 | A kind of method and system using fingerprint remote unlocking, terminal |
CN107170083B (en) * | 2017-05-11 | 2019-08-09 | 广东汇泰龙科技有限公司 | A kind of method and system, terminal that a long-range key is unlocked |
CN108171035A (en) * | 2017-08-08 | 2018-06-15 | 王俊芝 | Big data processing platform |
CN107633584B (en) * | 2017-10-09 | 2024-01-12 | 雅固拉国际精密工业(苏州)有限公司 | Intelligent access control system for industrial and commercial storage cabinet and control method thereof |
CN107909682A (en) * | 2017-10-23 | 2018-04-13 | 林楚莲 | A kind of access control method, device and antitheft door |
CN109887127A (en) * | 2017-12-06 | 2019-06-14 | 深圳中智科创机器人有限公司 | A kind of intelligent door lock and its control method and system |
CN108122314B (en) * | 2017-12-14 | 2020-12-22 | 深圳市天和荣科技有限公司 | Doorbell call processing method, cloud server, medium and system |
CN108230493A (en) * | 2017-12-19 | 2018-06-29 | 资密科技有限公司 | The control method and intelligent lock system of intelligent lock system |
CN108230495A (en) * | 2017-12-21 | 2018-06-29 | 广东汇泰龙科技有限公司 | A kind of the remote unlocking method and its system of the infrared human body sensing based on cloud lock |
CN108198299A (en) * | 2017-12-29 | 2018-06-22 | 泸州市恒安智能云服务有限公司 | A kind of Multifunction open door system |
CN108537927B (en) * | 2018-04-09 | 2021-09-07 | 安恒世通(北京)网络科技有限公司 | Lockset terminal and method for controlling lockset terminal through regional management |
CN108537929B (en) * | 2018-04-12 | 2021-10-15 | 京东方科技集团股份有限公司 | Remote unlocking system and remote unlocking method |
CN108419391A (en) * | 2018-04-25 | 2018-08-17 | 安徽沃屹智能装备有限公司 | A kind of intelligent recognition switch board |
CN108648376A (en) * | 2018-04-27 | 2018-10-12 | 常州信息职业技术学院 | Identity identifying method and device |
CN108846925A (en) * | 2018-06-04 | 2018-11-20 | 深圳云天励飞技术有限公司 | Face recognition door control system |
CN109035501A (en) * | 2018-07-03 | 2018-12-18 | 广东工业大学 | A kind of intelligent door lock and intelligent door lock system |
WO2020007339A1 (en) | 2018-07-04 | 2020-01-09 | Yunding Network Technology (Beijing) Co., Ltd. | Method and system for operating an electronic device |
CN109191649B (en) * | 2018-10-26 | 2021-01-29 | 珠海格力电器股份有限公司 | Method and device for sharing control authority of intelligent door lock |
CN109636954A (en) * | 2018-10-26 | 2019-04-16 | 杭州云时智创科技有限公司 | A kind of the smart lock control system and control method of based on SMS |
CN110020824A (en) * | 2019-04-09 | 2019-07-16 | 张�浩 | Product stream information management system and method |
CN110533800B (en) * | 2019-05-10 | 2021-08-31 | 深圳爱根斯通科技有限公司 | Intelligent door lock control method and device, electronic equipment and storage medium |
CN110349302A (en) * | 2019-05-29 | 2019-10-18 | 巫协森 | One kind can program intelligent entrance guard control protection operational method and its system |
WO2021023276A1 (en) * | 2019-08-06 | 2021-02-11 | 云丁网络技术(北京)有限公司 | Smart lock control method and device |
CN111161454A (en) * | 2020-01-09 | 2020-05-15 | 广州微盾科技股份有限公司 | Intelligent lock safety networking and control method |
CN112104500A (en) * | 2020-09-15 | 2020-12-18 | 苏州市楼上楼信息科技有限公司 | Cloud server remote management system and method and cloud server |
CN112598827B (en) * | 2020-12-25 | 2023-01-20 | 北京智芯微电子科技有限公司 | Intelligent lock authentication method, security chip, intelligent lock and management system thereof |
CN114050973A (en) * | 2021-10-28 | 2022-02-15 | 浙江恒强科技股份有限公司 | Method for realizing flat knitting machine component binding and intelligent management through network |
CN117596237B (en) * | 2024-01-19 | 2024-04-19 | 安擎计算机信息股份有限公司 | Mobile terminal-based server remote control system and method |
Family Cites Families (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2839833B1 (en) * | 2002-05-15 | 2004-11-19 | Cogelec | ACCESS CONTROL SYSTEM, PORTABLE PROGRAMMING TERMINAL, AND METHOD FOR PROGRAMMING THE ACCESS CONTROL SYSTEM |
US20040189439A1 (en) * | 2003-03-28 | 2004-09-30 | Cansino Juan Miguel Dominguez | Local and remote management of lock systems from a network |
CN2916773Y (en) * | 2006-05-04 | 2007-06-27 | 张万明 | Access control system |
CN201810164U (en) * | 2010-04-20 | 2011-04-27 | 陈浩 | Automatic upgrading door control system |
CN102629930A (en) * | 2011-07-30 | 2012-08-08 | 上海安吉星信息服务有限公司 | Method and system for remotely controlling opening and closing of door lock of vehicle by utilizing mobile terminal |
CN102747891B (en) * | 2012-07-13 | 2015-08-19 | 深圳市悦德智能科技有限公司 | A kind of smart lock |
TW201349133A (en) * | 2012-07-17 | 2013-12-01 | Ege Technology Co Ltd | Cloud control the access control management system and the authentication method |
CN103985170B (en) * | 2014-05-12 | 2016-06-08 | 深圳市威富多媒体有限公司 | A kind of cloud garage management method and device |
-
2014
- 2014-09-02 CN CN201410441926.4A patent/CN104167040B/en active Active
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106887067A (en) * | 2017-03-31 | 2017-06-23 | 深圳市银河风云网络系统股份有限公司 | Wireless fingerprint recognizes the method that door lock is unlocked with wireless fingerprint identification |
Also Published As
Publication number | Publication date |
---|---|
CN104167040A (en) | 2014-11-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104167040B (en) | The long-range control method of a kind of electronic lock and system | |
CN204143429U (en) | A kind of tele-control system of electronic lock | |
CN105405296B (en) | Wagon control disengaging system and method based on Car license recognition | |
CN103578169B (en) | Intelligent information passive electronic lockset | |
CN111986355A (en) | Power distribution room access control verification system | |
KR101211477B1 (en) | Method for mobile-key service | |
CN107967741A (en) | Double-channel testimony of a witness in-one intelligent lock control method and system | |
CN105427413A (en) | Intelligent unlocking method and intelligent lock | |
CN104157029A (en) | Access control system, mobile terminal based control method thereof and mobile terminal | |
US20200242863A1 (en) | Method and system for controlling a smart lock | |
CN105321240A (en) | Control method and device of intelligent door lock and intelligent door control system | |
US20160328903A1 (en) | Remote electronic physical layer access control using an automated infrastructure management system | |
CN106204867A (en) | Gate control system and access control management method that visitor opens the door authority can be authorized | |
CN106652109A (en) | Intelligent lock control method, device and lock management server | |
CN106355708A (en) | Door control system capable of conferring opening authority to visitors and door control management method | |
CN109448175A (en) | The control method and fingerprint lock administration system of Fingerprint Lock | |
CN103489233A (en) | Electronic door control system with dynamic password | |
CN106877508A (en) | A kind of grid switching operation monitor in real time anti-error system and its control method | |
CN105261100A (en) | Entrance guard unlocking method and system | |
CN105574967A (en) | Intelligent access control system and operation method thereof | |
CN106296946A (en) | Visitor's gate control system based on wechat and visitor's door opening method | |
CN107622547A (en) | Method, apparatus, storage medium and the computer equipment that terminal is unlocked | |
CN110660145A (en) | Lock control method, system, lock and storage medium based on mobile terminal | |
KR101765080B1 (en) | smart door lock system based on iot and the method thereof | |
CN109102605A (en) | A kind of intelligent lock system opened based on permission |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right |
Effective date of registration: 20170608 Address after: Xueyuan Road in Shenzhen city Guangdong province 518055 No. 1068 Shenzhen Institute of advanced technology F504 Patentee after: Shenzhen one shot union Technology Co., Ltd. Address before: 518052, Guangdong, Shenzhen province Nanshan District Shennan Road No. 10128 Nanshan digital cultural industry base 2 building incubator base 3A Patentee before: SHENZHEN PANDUO IOT TECHNOLOGY CO., LTD. |
|
TR01 | Transfer of patent right |