CN105991776A - Method, device and system for cipher lock control - Google Patents
Method, device and system for cipher lock control Download PDFInfo
- Publication number
- CN105991776A CN105991776A CN201610500751.9A CN201610500751A CN105991776A CN 105991776 A CN105991776 A CN 105991776A CN 201610500751 A CN201610500751 A CN 201610500751A CN 105991776 A CN105991776 A CN 105991776A
- Authority
- CN
- China
- Prior art keywords
- unlocking cipher
- coded lock
- unlocking
- cipher
- password
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 102
- 238000004891 communication Methods 0.000 claims abstract description 37
- 238000003860 storage Methods 0.000 claims description 68
- 238000012795 verification Methods 0.000 claims description 36
- 239000003607 modifier Substances 0.000 claims description 15
- 230000008878 coupling Effects 0.000 claims description 14
- 238000010168 coupling process Methods 0.000 claims description 14
- 238000005859 coupling reaction Methods 0.000 claims description 14
- 230000005540 biological transmission Effects 0.000 claims description 11
- 238000001514 detection method Methods 0.000 claims description 11
- 230000005856 abnormality Effects 0.000 abstract description 4
- 230000000875 corresponding effect Effects 0.000 description 94
- 238000010586 diagram Methods 0.000 description 17
- 230000008569 process Effects 0.000 description 17
- 230000006870 function Effects 0.000 description 9
- 230000008859 change Effects 0.000 description 7
- 230000003993 interaction Effects 0.000 description 5
- 230000007246 mechanism Effects 0.000 description 5
- 230000004048 modification Effects 0.000 description 5
- 238000012986 modification Methods 0.000 description 5
- 239000003795 chemical substances by application Substances 0.000 description 3
- 230000005611 electricity Effects 0.000 description 3
- 230000002093 peripheral effect Effects 0.000 description 3
- 238000012545 processing Methods 0.000 description 3
- 230000033228 biological regulation Effects 0.000 description 2
- 238000004590 computer program Methods 0.000 description 2
- 238000009826 distribution Methods 0.000 description 2
- 230000014759 maintenance of location Effects 0.000 description 2
- 238000012544 monitoring process Methods 0.000 description 2
- 230000002159 abnormal effect Effects 0.000 description 1
- 230000009471 action Effects 0.000 description 1
- 230000006399 behavior Effects 0.000 description 1
- 230000008901 benefit Effects 0.000 description 1
- 230000015572 biosynthetic process Effects 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 238000006243 chemical reaction Methods 0.000 description 1
- 230000001276 controlling effect Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 230000009977 dual effect Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 239000000686 essence Substances 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 230000002452 interceptive effect Effects 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 238000012423 maintenance Methods 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 230000013011 mating Effects 0.000 description 1
- 230000004044 response Effects 0.000 description 1
- 239000007787 solid Substances 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
- 238000010200 validation analysis Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/02—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Lock And Its Accessories (AREA)
Abstract
The invention discloses a method, a device and a system for cipher lock control, which belong to the field of cipher lock control. The cipher lock control method comprises steps: a cipher request sent by a user terminal is acquired and an unlocking cipher is acquired according to the cipher request, wherein the unlocking cipher is one selected from multiple pre-generated unlocking ciphers sent to the cipher lock and stored by the cipher lock, and the cipher lock is bound with the user terminal; and the acquired unlocking cipher is sent to the user terminal. Thus, the phenomenon that in the case of cipher lock and server communication abnormalities, the user can not unlock the cipher lock through an unlocking cipher inputting mode can be effectively avoided.
Description
Technical field
The invention belongs to control field, be specifically related to a kind of coded lock control method, device and system.
Background technology
The existing coding lock system based on internet, after typically being generated by coded lock, gateway and password
Platform forms.User is when coded lock to be opened, and needing first to generate backstage transmission password to password please
Asking, password generates backstage and sends to user terminal according to password request one password of generation and pass through net
Close and send password to coded lock.Coded lock is according to the password configuration coded lock obtaining, and user passes through institute
Coded lock opened by the password receiving.
The coded lock being arranged on door typically uses battery to power, and therefore, is limited to the battery of coded lock
Electricity, coded lock needs to generate backstage by gateway and password and realizes communication connection, and non-immediate and close
Code generates backstage and realizes communication connection.
Communication link between coded lock and gateway and gateway and password generate the communication between backstage
When link breaks down, password generates backstage and will be unable to be given birth to according to the password request of user terminal transmission
The unlocking cipher becoming sends to coded lock, and then can cause the user cannot be according to the unlocking cipher being received
Open the door corresponding to coded lock.
Content of the invention
It is an object of the invention to provide a kind of auth method and system, to improve above-mentioned problem.
First aspect, embodiments provides a kind of coded lock control method, comprising: obtain and use
The password request that family terminal sends, obtains a unlocking cipher, described unlocking according to described password request
Password is previously generating and being sent in multiple unlocking ciphers that coded lock is stored by described coded lock
Individual, described coded lock is bound with described user terminal phase;Acquired unlocking cipher is sent extremely described
User terminal.
Second aspect, the embodiment of the present invention additionally provides another kind of coded lock control method, comprising: obtain
Take the verification password of family input;Verification password and the multiple unlocking ciphers being stored when user's input
In at least one unlocking cipher coupling when, send open command to corresponding electric lockset, wherein,
The multiple unlocking ciphers being stored are the unlocking cipher being generated by server.
The third aspect, the embodiment of the present invention additionally provides a kind of coded lock control system, including server,
Coded lock and gateway.Described server is used for generating multiple unlocking cipher, it is thus achieved that user terminal sends
Password request, obtains a unlocking cipher according to described password request, sends out acquired unlocking cipher
Deliver to user terminal.Described gateway is used for obtaining the plurality of unlocking cipher in described server, and
Send acquired the plurality of unlocking cipher to described coded lock.Described coded lock is for being connect
The plurality of unlocking cipher storage received, receives the verification password of user's input, when the school of user's input
When at least one unlocking cipher mates in the multiple unlocking ciphers tested password and stored, send unlatching and refer to
Order is to corresponding electric lockset.
Fourth aspect, the embodiment of the present invention additionally provides a kind of coded lock control device, comprising: password
Setup unit and transmitting element.Password setting unit is used for obtaining the password request that user terminal sends,
Obtaining a unlocking cipher according to described password request, described unlocking cipher is for prestoring and being sent to
One of multiple unlocking ciphers that coded lock is stored by described coded lock.Transmitting element is for being obtained
The unlocking cipher taking sends to described user terminal.
5th aspect, the embodiment of the present invention additionally provides a kind of coded lock control device, comprising: verification
Password acquiring unit and authentication unit.Verification password acquiring unit is close for the verification obtaining user's input
Code.Authentication unit for when in verification password and multiple unlocking ciphers of being stored of user's input at least
During one unlocking cipher coupling, open corresponding door, wherein, multiple unlocking ciphers of being stored
For the unlocking cipher being generated by server.
In the embodiment of the present invention, at coded lock initial phase, generate multiple unlocking at server in advance
Password, and sent the multiple unlocking cipher being generated to coded lock, password by gateway by server
Multiple unlocking cipher storage that lock will be received.Thus, multiple unlocking ciphers that server will be generated
Corresponding with coded lock, and the password that coded lock is stored also is stored in server.
Server, after receiving the password request that user terminal sends, finds according to the ID of user terminal
The coded lock of the ID binding with user terminal, finds this coded lock institute right further according to bound coded lock
The multiple unlocking ciphers answered, according to default unlocking cipher search rule many corresponding to this coded lock
Individual unlocking cipher obtains a unlocking cipher, sends acquired unlocking cipher to user terminal.
User can obtain unlocking cipher by user terminal, inputs password, work as input at coded lock
Password and coded lock in storage multiple unlocking ciphers at least one when mating, open coded lock
Corresponding electric lockset.Unlocking cipher compared with coded lock of the prior art, acquired in user
Store in coded lock when coded lock is initialized, and without unlocking cipher being sent out at server
While delivering to user terminal send unlocking cipher to coded lock, so that user terminal and coded lock
Password is consistent.Therefore, even if the communication link between coded lock and server breaks down and cannot be just
Normal open is believed, nor affecting on server is that user terminal assigns lock cipher and user is beaten by unlocking cipher
Open coded lock.When effectively prevent coded lock and server communication abnormality, user cannot be opened by input
The mode of lock cipher opens coded lock.
Brief description
In order to be illustrated more clearly that the embodiment of the present invention or technical scheme of the prior art, below by right
In embodiment, the accompanying drawing of required use is briefly described, it should be apparent that, below describe in attached
Figure is only some embodiments of the present invention, for those of ordinary skill in the art, is not paying
On the premise of creative work, other accompanying drawing can also be obtained according to these accompanying drawings.By accompanying drawing institute
Showing, the above and other purpose of the present invention, feature and advantage will become apparent from.Phase in whole accompanying drawings
With the reference identical part of instruction.Deliberately do not draw accompanying drawing by actual size equal proportion scaling,
Focus on illustrating the purport of the present invention.
The mutual schematic diagram of a kind of coded lock control system that Fig. 1 provides for one embodiment of the invention;
The mutual schematic diagram of a kind of coded lock control system that Fig. 2 provides for another embodiment of the present invention;
The structured flowchart of the coded lock that Fig. 3 provides for one embodiment of the invention;
The method flow diagram of a kind of coded lock control method that Fig. 4 provides for one embodiment of the invention;
The method flow diagram of a kind of coded lock control method that Fig. 5 provides for another embodiment of the present invention;
In a kind of coded lock control method that Fig. 6 provides for another embodiment of the present invention, coded lock initializes
Method flow diagram;
The method flow diagram of a kind of coded lock control method that Fig. 7 provides for another embodiment of the present invention;
The renewal side of the unlocking cipher of a kind of coded lock control method that Fig. 8 provides for the embodiment of the present invention
The method flow diagram of method;
Disabling of the unlocking cipher of a kind of coded lock control method that Fig. 9 provides for the embodiment of the present invention
The method flow diagram of journey;
The method flow diagram of a kind of coded lock control method that Figure 10 provides for another embodiment of the present invention;
The structured flowchart of a kind of coded lock control device that Figure 11 provides for one embodiment of the invention;
A kind of coded lock control apparatus structure block diagram that Figure 12 provides for another embodiment of the present invention;
A kind of coded lock control apparatus structure block diagram that Figure 13 provides for another embodiment of the present invention;
A kind of coded lock control apparatus structure block diagram that Figure 14 provides for another embodiment of the present invention.
Detailed description of the invention
Below in conjunction with accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out
Clearly and completely describe, it is clear that described embodiment is only a part of embodiment of the present invention,
Rather than whole embodiments.The generally group of the embodiment of the present invention described and illustrated in accompanying drawing herein
Part can be arranged with various different configurations and design.Therefore, below to the basis providing in the accompanying drawings
The detailed description of inventive embodiment is not intended to limit the scope of claimed invention, but only
Only represent the selected embodiment of the present invention.Based on embodiments of the invention, those skilled in the art are not having
There is the every other embodiment being obtained on the premise of making creative work, broadly fall into present invention protection
Scope.
It should also be noted that similar label and letter represent similar terms, therefore, one in following accompanying drawing
A certain Xiang Yi the accompanying drawing of denier is defined, does not then need to carry out it further in accompanying drawing subsequently
Definition and explanation.Meanwhile, in describing the invention, term " first ", " second " etc. are only used
Describe in distinguishing, and it is not intended that indicate or hint relative importance.
Refer to Fig. 1, show a kind of coded lock control system 100.Coded lock control system 100 is wrapped
Include coded lock the 110th, gateway the 120th, server 130 and user terminal 140.Coded lock 110 and gateway
120 couplings, gateway 120 and server 130 couple.Leading between coded lock 110 and gateway 120
When letter link is normal, coded lock 110 and gateway 120 can carry out data interaction, in like manner, work as gateway
When communication link between 120 and server 130 is normal, gateway 120 can be carried out with server 130
Data interaction.
Coded lock 110 can drive the executing agency opening and closing for controlling door to perform corresponding
Action, to control the opening and closing of corresponding door.As a kind of embodiment, coded lock 110
Including controller, memory and electric lockset, memory is used for storing the unlocking cipher that server sends,
Controller sends open command for the matching result of the password according to input and its unlocking cipher storing
To electric lockset.Electric lockset is for opening according to open command.Coded lock 110 can include defeated
Entering button, this load button inputs unlocking cipher for user.
Gateway 120 for being used for realizing communication Protocol Conversion before coded lock 110 and server 130 so that
The computer equipment of coded lock 110 and server 130 network interconnection or system.As a kind of embodiment party
Formula, coded lock 110 uses battery to power, and therefore, is limited to the electricity of battery, and coded lock 110 needs
To be communicated with server 130 by gateway 120.It should be noted that each password shown in Fig. 1
The corresponding gateway 120 of lock 110, certainly, in application scenes, for example close together multiple close
Code lock 110 can share a gateway 120.Gateway 120 connects different passwords by different ports
Lock 110.
Server 130 can be the webserver or database server, is used for generating unlocking cipher simultaneously
Unlocking cipher is sent to coded lock 110 by gateway 120.Preferably, it is equipped with in server 130
Password Management backstage, this Password Management backstage is for generating unlocking cipher and asking according to the password being received
Ask transmission unlocking cipher to user.As a kind of embodiment, server 130 generated each open
Lock cipher is all to there being the information such as use state, mark and the term of validity, and server 130 is by unlocking cipher
And the unlocking cipher corresponding use state of lock, mark is corresponding with the term of validity is stored in a tables of data.
In addition, server 130 is responsible for the password configuration of multiple coded lock, therefore, also set in this tables of data
There is coded lock label.Wherein, coded lock label can be the device id of coded lock 110, certainly also may be used
To be the room number corresponding to coded lock 110.
As a kind of embodiment, this tables of data can be as shown in table 1:
Table 1
By " the coded lock label A " of table 1 it can be seen that multiple unlocking ciphers in table 1 are corresponding is
Coded lock is numbered the coded lock of A.The coded lock 110 that server 130 is managed can have multiple,
Coded lock corresponding to coded lock label B and coded lock label C as shown in Figure 1, server 130
All set up a tables of data for each coded lock 110.All can use the form shown in table 1, just
Modify for the unlocking cipher of coded lock 110 and the management operation such as lookup in server 130.
Wherein, in table 1, the different state of the different numeric representation unlocking ciphers of state, example are used
As use state 0 represents that unlocking cipher " does not uses ", and use state 1 represents that unlocking cipher " uses
In ", use state 2 represents that unlocking cipher " uses ".Wherein, unlocking cipher " using " is
Refer to that this unlocking cipher has been used and user has abandoned using or have passed through validity period
Limit, and in view of the security of password, the unlocking cipher using state to be " using " should be by more
Change, and should not come into operation again.
In table 1, being designated position in tables of data for the unlocking cipher, for example, mark can be each
Physical address in the memory space at tables of data place for the unlocking cipher or the finger of sensing storage address
Pin.Identified by arranging, it is simple to the unlocking cipher in tables of data is made a look up and changes by server,
The unlocking cipher being stored in also allowing for server update coded lock.Due in the embodiment of the present invention, pin
To same coded lock label, in needing to keep server, stored multiple unlocking cipher and password as far as possible
The unlocking cipher being stored in Suo is consistent, therefore, when updating in server or change unlock code,
The unlocking cipher storing in needing corresponding Modify password lock.Server comprises to be changed by sending one
The modification instruction of the corresponding mark of unlocking cipher to coded lock, coded lock is after receiving this modification instruction
Corresponding for the mark being received unlocking cipher is sent out by the instruction instructing according to this modification according to server
The unlocking cipher sending is modified.
In addition, in table 1, the term of validity is that unlocking cipher can be used in opening the door corresponding to coded lock
Time limit.When arranging new unlocking cipher for the first time, the term of validity of unlocking cipher is used as default.
Wherein, default value can be a timing node or time numerical value.Such as 12 days, the date of start of calculation was for just
The time point of secondary generation unlocking cipher.It should be noted that generating unlocking cipher for the first time can be system
The unlocking cipher generating for the first time during initialization, it is also possible to be that old unlocking cipher is updated to new opening
Lock cipher.In addition, " T1 " in table 1 represents the term of validity of the unlocking cipher manually arranging.Manually
The start time of the term of validity arranging can be dual lock password when the term of validity is manually set when segmentum intercalaris
Point, the end time of the term of validity manually arranging can set according to actually used demand.
User terminal 140 is used for sending password request to server, and wherein, password request includes using
The identity information of family terminal and coded lock label.Wherein, the identity information of user terminal and coded lock mark
Number binding mutually, the identity information of user terminal can be the MAC Address of user terminal or user passes through
The login account being used during the application program login service device installed on user terminal.Real as one
Executing mode, the identity information of user terminal is login account.Application program is installed on the subscriber terminal,
This application program is logged in by this application program as the interaction platform of user terminal and server, user
Server, send password request to server and from server obtain unlocking cipher.
Refer to Fig. 2, a kind of coded lock control system 100 providing for the embodiment of the present invention.With Fig. 1
Except for the difference that, the coded lock control system shown in Fig. 2 is applied to be provided with the locker of coded lock.This
When, corresponding coded lock 110 can drive and perform for the executing agency that switch board door opens and closes
Corresponding action, to control the opening and closing of corresponding cabinet door.In embodiment shown in Fig. 2,
Coded lock label is the cabinet door number of locker, such as G1, G2 and the G3 etc. in Fig. 2.Need explanation
, coded lock 110 may be mounted at the parts such as door, cabinet door, chamber door or drawer.Wherein, electricity
Sub-lockset seals device as the parts such as door, cabinet door, chamber door or drawer.In the embodiment of the present invention,
The application scenarios of coded lock 110 is defined as door or cabinet door so that coded lock control method, device to be described
And the detailed description of the invention of system, and not the application scenarios of coded lock is limited.
As it is shown on figure 3, be the structured flowchart of coded lock 110.Coded lock 110 includes: lock pin control
Device processed 111st, memory the 112nd, storage control the 113rd, processor the 114th, Peripheral Interface is the 115th, defeated
Enter output unit 116 and display unit 117.
Coded lock control device the 111st, memory the 112nd, storage control the 113rd, processor is the 114th, outer
If interface the 115th, input-output unit 116 and each element of display unit 117 are direct or indirect each other
Ground is electrically connected with, to realize the transmission of data or mutual.For example, these elements can pass through each other
One or more communication bus or holding wire realize being electrically connected with.Described coded lock control device 111 wraps
Include at least one to be stored in described memory with the form of software or firmware (firmware) or solid
Change the software function in the operating system (operating system, OS) of described coded lock 110
Module.Described processor 114 is for performing the executable module of storage in memory, for example described close
The code software function module that includes of lock control device 111 or computer program.
Wherein, memory 112 may be, but not limited to, random access memory
(Random Access Memory, RAM), read-only storage (Read Only Memory, ROM),
Programmable read only memory (Programmable Read-Only Memory, PROM), erasable
Read memory (Erasable Programmable Read-Only Memory, EPROM), electrically erasable
Except read-only storage (Electric Erasable Programmable Read-Only Memory,
EEPROM) etc..Wherein, memory 112 is used for storing program, and described processor 114 is receiving
After performing instruction, performing described program, what aforementioned embodiment of the present invention any embodiment disclosed flows through journey
The method performed by server 130 of definition can apply in processor 114, or by processor
114 realize.It in addition, memory 113 is as the storage medium of coded lock, is used for storing server and sends
Unlocking cipher and the data such as the corresponding mark of unlocking cipher, the term of validity and use state.
Processor 114 is probably a kind of IC chip, has the disposal ability of signal.Above-mentioned
Processor can be general processor, including central processing unit (Central Processing Unit,
Be called for short CPU), network processing unit (Network Processor, be called for short NP) etc.;Can also is that numeral
Signal processor (DSP), special IC (ASIC), ready-made programmable gate array (FPGA) or its
His PLD, discrete gate or transistor logic, discrete hardware components.Can be real
Disclosed each method now or in the execution embodiment of the present invention, step and logic diagram.General procedure
The processor etc. that device can be microprocessor or this processor also can be any routine.
Various input/output devices are coupled to processor 114 and memory by described Peripheral Interface 115
112.In certain embodiments, Peripheral Interface, processor 114 and storage control 113 can be
One single chip realizes.In some other example, they can be realized by independent chip respectively.
Input unit 116 realizes the mutual of user and coded lock 110 for being supplied to user input data.
Described input-output unit 116 may be, but not limited to, keyboard etc..
Display 117 provides an interactive interface (such as user behaviour between coded lock 110 and user
Make interface) or be used for showing view data to user's reference.In the present embodiment, described display unit
117 can be liquid crystal display.
It should be noted that when the virtual key that input unit 116 is display on display 117,
Input unit 116 and display 117 are integrated into touch control display.Then in this touch control display, aobvious
Show that device 117 can be for supporting capacitance type touch control screen or the resistance type touch control screen etc. of single-point and multi-point touch operation.
Support that single-point and multi-point touch operation refer to that touch control display can sense on this touch control display one
The touch control operation that individual or multiple positions produce simultaneously, and the touch control operation that this is sensed transfer to process
Device calculates and processes.
Fig. 4 shows a kind of coded lock control method that the embodiment of the present invention provides, and the method is applied to
Said system and device.Coded lock control method at least includes: step S301 and step S302.Below
The step being comprised by the method to the present embodiment for the executive agent with server 130 is described in detail.
Step S301, it is thus achieved that the password request that user terminal sends, obtains one according to described password request
Individual unlocking cipher, described unlocking cipher generates and sends to coded lock by described coded lock for prestoring
One of multiple unlocking ciphers of storage, described coded lock is bound with described user terminal phase.
The multiple unlocking ciphers being stored in coded lock 110 be coded lock 110 when initializing, by taking
Business device 130 generates and sends to coded lock 110 storage.It is to say, in step S301
Before, coded lock 110 needs first to initialize.By the initialization of coded lock 110, server 130
To be given birth in the case of server the 130th, the communication link between gateway 120 and coded lock 110 is normal
The multiple unlocking cipher becoming sends to coded lock 110, so that multiple unlockings that coded lock 110 will be received
Password stores.Thus, multiple unlocking cipher that coded lock 110 is stored is stored with server 130
Multiple unlocking ciphers consistent.After coded lock 110 successful initialization, coded lock 110 just can
Input password as user to be used to open the control device of door.Namely coded lock 110 is becoming
Before work(initializes, user cannot subscribe the room corresponding to coded lock 110, and server 130 is not yet
Response user is for the password request of this coded lock 110.
Coded lock 110 and user terminal 140 are corresponding, and this corresponding relation can user eventually
Generate, by user terminal 140 by predetermined room during the end 140 reservation corresponding room of this coded lock
Coded lock label send to server 130, by server 130 by user terminal with by user terminal institute
The phase-locked binding of password in predetermined room.Also can be user when sending password request, server 130
According to password request, coded lock 110 is bound with user terminal 140.Wherein, user terminal 140 institute
The password request sending can be the request of the acquisition password that user sends when reservation, it is also possible to
It is when the formality that user moves in reservation has been handled complete, the acquisition sending to server 130
The request of password.
For example, the password request sending at user terminal 140 includes coded lock label and user terminal
Identity information.Wherein, coded lock label can represent the room label representated by coded lock 110,
The identity information of user terminal 140 can be user account information, it is also possible to be user terminal 140
MAC Address or SIM number.Wherein, the label in room can be the number in room or room institute is right
The geographical position answered.Server 130 is after receiving password request, by the data to password request
Resolve and obtain the identity information including coded lock label in password request and user terminal, by close
The identity information binding of code lock label and user terminal.I.e. can be by the identity letter of table 1 and user terminal
Breath correspondence.When user terminal 140 needs to change corresponding coded lock, after including replacing
The replacement request of coded lock label is sent to server 130, so that server 130 is by the body of user terminal
Part corresponding coded lock of information is revised as the coded lock label after changing.
Again for example, user terminal 140 is when server 130 logs in or registers, and server 130 can
Obtain the identity information of user terminal.When user terminal 140 is reserved a room, user terminal 140 will
The room label subscribed sends to server 130.Be stored with on server 130 multiple coded lock label
And with the room label corresponding to this coded lock label.Obtain user terminal institute at server 130 pre-
During the room label booked, obtain and this room label corresponding coded lock label according to this room label,
Coded lock is bound with user terminal.
Server 130, after receiving password request, is obtained by the parsing of the data to password request
Including the identity information of coded lock label in password request and user terminal.According to coded lock label
Find corresponding multiple unlocking ciphers under this coded lock label, opened by the plurality of further according to preset rules
Lock cipher obtains a unlocking cipher.Wherein, preset rules can be that one unlocking of random acquisition is close
Code, it is also possible to obtain unlocking cipher according to certain strategy, will be described in detail in follow-up embodiment.
Step S302: send acquired unlocking cipher to described user terminal.
Server 130 obtains coded lock mark according to the binding relationship of coded lock 110 and user terminal 140
The identity information of the user terminal corresponding to number, sends acquired unlocking cipher to user terminal
User terminal 140 corresponding to identity information.
User obtains unlocking cipher by user terminal 140, according to the unlocking cipher being obtained at password
Lock input validation password at 110, the verification password that user is inputted by coded lock 110 and storage in it
Multiple unlocking ciphers match, if the verification password of user's input and its interior multiple unlocking ciphers storing
In at least one is consistent, then coded lock 110 controls its corresponding door and opens.
As a kind of embodiment, it is as follows that coded lock 110 controls the mode that its corresponding door opens:
The controller of coded lock 110 sends open command to the electric lockset of coded lock 110, with control
Electric lockset is opened, thus opens door.Specifically, electric lockset includes drive mechanism and execution
Mechanism, wherein, drive mechanism can be the device that motor etc. is capable of output mechanical energy, executing agency
Set according to the lock core structure of electric lockset, for example, it may be pole, will by way of spacing
Puzzle lock fastening.Open command can control the duty of the drive mechanism in electric lockset, for example,
Rotating and reverse of motor, thus drive the movement of executing agency, and then control executing agency opens
Coded lock.
Therefore, before coded lock 110 i.e. obtains password request when initialized, server is completed
The storage of the multiple unlocking ciphers between 130 and coded lock 110 and setting.Obtain at server 130
During to the password request of user, server 130 is without depending on the unlocking to coded lock 110 for the network again
Password is configured.Avoid after user sends password request, coded lock 110 and gateway 120 or
Communication link between person's gateway 120 and server 130 is abnormal, causes server 130 to configure
The unlocking cipher of coded lock, causes user cannot open coded lock by input unlocking cipher.
In order to keep coded lock 110 multiple unlocking cipher of being stored and server 130 when initializing
The unlocking cipher strict conformance being stored, server 130 needs the feedback according to coded lock 110 to deposit
Store up generated password.
As it is shown in figure 5, a kind of coded lock control method that the embodiment of the present invention provides, at least include:
Step S401, step S402, step S403, step S404 and step S405.Below will be with service
The step that device 130 is comprised by the method to the present embodiment for the executive agent describes in detail.
Step S401: generate multiple unlocking cipher.
The multiple mutual unduplicated unlocking cipher of server 130 stochastic generation, each unlocking cipher is all right
Answer a mark, use state and the term of validity, for example, use the form in table 1.
Step S402: send the plurality of unlocking cipher to described coded lock, so that described coded lock
The multiple unlocking cipher storage that will be received.
In the case of server 130 and coded lock 110 communication link are normal, server 130 will be many
Individual unlocking cipher sends to coded lock 110.The multiple unlocking ciphers being received are stored in by coded lock 110
In the memory of coded lock 110.
Step S403: obtain and obtain the life after the received unlocking cipher of successfully storage of described coded lock
The plurality of unlocking cipher is stored by the first instruction becoming.
Coded lock 110, when memory space inadequate or internal hardware fault, can cause unlocking cipher
Storage failure or loss of data, if now server 130 is by close for the multiple unlockings corresponding to coded lock
Code storage, may result in server 130 unlocking cipher being stored and opening that coded lock 110 is stored
Lock cipher is inconsistent.
Therefore, coded lock 110 is after obtaining unlocking cipher and successfully storing, and feedback the first instruction is extremely
Server 130.Wherein, the first instruction is for representing coded lock 110 successfully by acquired unlocking
Password stores.Specifically, coded lock 110 generates first after obtaining unlocking cipher and successfully storing
Instruction, and the first instruction is sent to gateway, gateway sends the first instruction to server.Server
130 after receiving the first instruction, by multiple unlocking ciphers that are that generated and that be sent to coded lock 110
Storage, it is preferable that with the form storage of the tables of data shown in table 1.Specifically, server by more
New unlocking cipher storage it can be understood as server update after unlocking cipher replace renewal before
Unlocking cipher simultaneously stores, and now, in server, multiple unlocking ciphers corresponding with this coded lock just become
Unlocking cipher after renewal.Do not store if server only updates unlocking cipher, then can be understood as clothes
Business device have updated unlocking cipher, but the unlocking cipher after not updating is stored in the memory of server
In (for example, hard disk), the unlocking cipher before i.e. not updating covers;It is also understood that will more
Unlocking cipher after Xin is revised as the unlocking cipher before updating and stores.
First instruction can be an operational order for making server perform corresponding actions, it is also possible to
It is the description information of multiple unlocking ciphers that coded lock 110 is stored, for example, multiple unlocking ciphers
Metadata.If first instruction include that this describes information, server 130 obtain described first instruction after,
Resolve the described first instruction and obtain the description information of multiple unlocking ciphers that coded lock 110 successfully stores.
According to described description information, server 130 can interpolate that whether described coded lock 110 is given birth to server
That become and send to multiple unlocking ciphers of coded lock and all successfully store, when server 130 judges password
Locking when successfully storing the plurality of unlocking cipher, the plurality of unlocking cipher is also stored by server 130.
Preferably, the multiple unlocking ciphers for the ease of server 130, coded lock 110 being stored
Management, multiple unlocking ciphers that coded lock 110 is stored also can use the form of table 1, and service
The unlocking cipher of device 130 drawback lock password interior storage with the corresponding relation of mark and the term of validity and coded lock
Identical with the corresponding relation of mark and the term of validity.
Step S404: obtain the password request that user terminal sends, obtains one according to described password request
Individual unlocking cipher, described unlocking cipher generates and sends to coded lock by described coded lock for prestoring
One of multiple unlocking ciphers of storage, described coded lock is bound with described user terminal phase.
Step S405: send acquired unlocking cipher to described user terminal.
The implementation process of above-mentioned steps S404 and S405 is referred to corresponding step S301 of Fig. 4 and step
Rapid S302, does not repeats them here.
Above-mentioned steps S401, step S402 and step S403 are that coded lock initializes, real as one
Executing mode, coded lock initializes and can use in the method flow of the coded lock control method shown in Fig. 6
Step S502 to S506.
As shown in Figure 6, coded lock control method at least includes: step S501 is to step S508.
Step S501: generate multiple unlocking cipher.
The detailed description of the invention of step S501 is referred to corresponding step S401 of Fig. 5.
Step S502: server sends the plurality of unlocking cipher to described gateway.
Server, after execution of step S501, sends the multiple unlocking cipher being generated to gateway
120。
Step S503: whether gateway is properly received the plurality of unlocking cipher?
Gateway 120 can feed back the when being successfully received multiple unlocking cipher that server 130 sends
Two instructions are to described server 130.Wherein, the second instruction represents that gateway 120 has been successfully received service
Multiple unlocking ciphers that device 130 sends.
If gateway 120 is properly received the plurality of unlocking cipher, then step S504.If gateway 120
It is not successfully received the plurality of unlocking cipher, then step S502.Gateway 120 is not properly received
The plurality of unlocking cipher is probably due to the connection fault of gateway 120 and server 130, it is also possible to
Data transmission procedure has the problem such as active or gateway hardware fault.At this point it is possible to attempt returning step
Rapid S502, server 130 reattempts transmission once multiple unlocking ciphers to gateway 120.If repeatedly
Sending, gateway 120 does not all return the second instruction to server 130, i.e. gateway 120 is all not successfully received
Multiple unlocking ciphers that server 130 sends, then initialize unsuccessfully, after pending fault is got rid of, again holds
Row step S502.
Step S504: gateway sends the plurality of unlocking cipher to coded lock.
If gateway 120 is properly received the plurality of unlocking cipher, then multiple unlocking ciphers are sent extremely close
Code lock 110.
As a kind of embodiment, multiple unlocking ciphers are sent out by server 130 by the form of packet
Give gateway 120, then gateway 120 is transmitted to coded lock 110.Wherein, packet includes source address
With destination address, multiple unlocking cipher and the corresponding term of validity of each unlocking cipher and mark etc..Its
In, source address is the mailing address of server 130, for example, can be IP address, and destination address is close
The mailing address of code lock 110.Source address according to included by packet for the gateway 120 and destination address,
Lead to the port of coded lock 110 in finding gateway 120, send multiple unlocking ciphers to coded lock 110.
Step S505: whether coded lock successfully stores the plurality of unlocking cipher?
Coded lock 110 is successfully storing multiple unlocking ciphers that server 130 is sent by gateway 120
When, feedback the first instruction is to described server 130.Specifically, coded lock 110 can will received
Multiple unlocking ciphers send the first instruction extremely when being successfully stored in the corresponding memory of coded lock 110
Server 130.Certainly, in order to keep the data of transmission between coded lock 110 and server 130
Integrality, coded lock 110 also can be to institute after receiving multiple unlocking ciphers that gateway 120 sends
The integrality of the multiple unlocking ciphers receiving is verified.As a kind of embodiment, coded lock 110
And can verify that coded lock 110 is received by the data check of communication protocol between server 130
The integrality of data.For example, the corresponding data of multiple unlocking ciphers that server 130 sends include one
Individual check bit, this check bit generates according to the standard of communication protocol according to multiple unlocking ciphers.Password
Lock 110 receive server 130 send multiple unlocking ciphers after, according to received data with
And calculate a check value according to the standard meter of the communication protocol arranged with server 130, if being counted
The check value calculated is consistent with the check value of the data that server 130 sends, then show that coded lock 110 is complete
Have received multiple unlocking ciphers that server 130 sends wholely.
If coded lock 110 successfully stores the plurality of unlocking cipher, then step S505.If password
Lock the 110 the plurality of unlocking ciphers of unsuccessful storage, then step S501.Server 130 is tasted again
Examination sends once multiple unlocking ciphers to coded lock 110.
Step S506: coded lock sends first and instructs to server, so that the multiple unlocking of server storage
Password.
Server 130 receives what coded lock 110 sent after successfully storing the plurality of unlocking cipher
First instruction, the multiple unlocking cipher storage that will be generated, thus, initialization terminates.Pass through password
The initialization of lock 110, the multiple unlocking cipher making coded lock 110 be stored is deposited with server 130
Multiple unlocking ciphers of storage.Further, it is possible to before server 130 receives the password request of user,
Complete to initialize so that the configuration of the unlocking cipher of coded lock 110 be independent of its with server 130 it
Between communication conditions.
Step S507: obtain the password request that user terminal sends, obtains one according to described password request
Individual unlocking cipher, described unlocking cipher generates and sends to coded lock by described coded lock for prestoring
One of multiple unlocking ciphers of storage, described coded lock is bound with described user terminal phase.
Step S508: send acquired unlocking cipher to described user terminal.
The detailed description of the invention of step S507 and step 508 is referred to step S404 of previous embodiment
And S405, do not repeat them here.
For reasonable distribution unlocking cipher, the embodiment of the present invention is reasonable according to the use state of unlocking cipher
Assign lock cipher for user terminal, as it is shown in fig. 7, a kind of coded lock that the embodiment of the present invention provides
Control method, comprising: step 601 is to step S610.
Step S601: obtain the password request that user terminal sends.
Step S601 and the password request obtaining user terminal transmission in step S301 in Fig. 4
Step is consistent, does not repeats them here.
Step S602: whether there is the unlocking cipher of the first state in server?
Wherein, the first state is the use state of unlocking cipher, " making in the corresponding table 1 of the first state
By state 0 ", represent that this unlocking cipher is also not used by.There is opening of the first state in server 130
The corresponding multiple unlockings of coded lock 110 in lock cipher refers to server 130 and bound in user terminal
In password, at least the use state of a unlocking cipher is the first state, i.e. in server 130
Multiple unlocking ciphers corresponding to coded lock 110 there is untapped unlocking cipher.
If there is the unlocking cipher of the first state, then step S603 in server 130.If service
There is not the unlocking cipher of the first state, then step S604 in device 130.
Step S603: server obtains the unlocking cipher of first state.
Server 130 obtains from the unlocking cipher of multiple first states finding step S602 at random
Take the unlocking cipher of first state, by the use state of the unlocking cipher of the first acquired state
It is revised as the second state.Wherein, this unlocking cipher of the second state representation is in " in use ", its implication
Consistent with " using state 1 " in table 1.Only find in step S602 it should be noted that work as
The unlocking cipher of one the first state, then, in step S603, server 130 directly obtains in step
The unlocking cipher of the first state finding in S602.
The password request that user terminal sends includes that user moves in the time range in this room, for example, move in
Time is 12:00 on June 8,12:00 to 2016 year on the 6th June in 2016.Server 130 exists
When obtaining the unlocking cipher of the first state, can be according to password request having acquired unlocking cipher
The effect phase is set to Preset Time.Wherein, Preset Time refers to move in the time according to user or is server
Move in the time for what user specified and time of generating.For example, server 130 is by acquired first
The term of validity of the unlocking cipher of state is set to 12:00 on June 8th, 2016.
It should be noted that the unlocking cipher when coded lock initializes or in coded lock 110 is updated
When, the term of validity of the unlocking cipher in coded lock 110 is default value.If server 130 is by institute
The unlocking cipher of the first state obtaining sends after user terminal 140, server 130 and password
Lock 110 is unanimously in communication abnormality state, server 130 cannot update in coded lock with send extremely
The term of validity of the unlocking cipher corresponding to the unlocking cipher of user terminal, then user institute in coded lock 110
The term of validity of the unlocking cipher using is still default value.If the time of default value is more than Preset Time,
Can cause user after checking out, and the unlocking cipher that user is used is not disabled it by server 130
Before, user still can open door with unlocking cipher.
In order to avoid the generation of above-mentioned condition, server 130 can be updated in coded lock 110 with
The operation of the term of validity of the corresponding unlocking cipher of unlocking cipher that user is used is placed in server 130
In background thread, and the communications status of moment monitoring server 130 and coded lock.Once server 130
When connection with coded lock is normal, server 130 performs to update being made with user in coded lock 110
The operation of the term of validity of the corresponding unlocking cipher of unlocking cipher, by coded lock 110 and user
The term of validity of the corresponding unlocking cipher of unlocking cipher being used is revised as Preset Time.
Step S604: whether coded lock is normal with the communication of server?
Inside ICP/IP protocol, if coded lock 110 and the side's normal shutdown in server 130
When, the opposing party can receive and connect the notice disconnecting.If coded lock 110 and in server 130
When side is due to non-graceful disconnections such as the system failure or power supply are unplugged, can lead between server 130
Whether normal cross the communication between heartbeat mechanism detection server 130 and coded lock 110.Certainly, take
Whether business device 130 also can feed back by transmission detection data to coded lock 110 according to coded lock 110
It is properly received the instruction of detection data to judge that whether coded lock is normal with the communication of server 130.Its
In, communication is just referring to carry out data interaction between coded lock 110 and server 130.
If coded lock 110 is improper with the communication of server 130, then step S605.If password
Lock 110 is normal with the communication of server 130, then step S606.
Step S605: server obtains the unlocking cipher of a third state.
Wherein, the third state represents that this unlocking cipher is in the state of " using ", and in table 1
" use state 2 " consistent.The unlocking cipher of the third state should be worked as and updated and abandoned by server 130
Use, but owing to there is not unlocking cipher and the server 130 of unused state in server 130
Communication with coded lock is off, and server 130 both cannot be close in the multiple unlockings being stored
The unlocking cipher of a verification password that can open door as user is obtained in code, also cannot be at clothes
Generate new unlocking cipher in business device 130 and coded lock simultaneously and come into operation, therefore, server 130
The unlocking cipher that one term of validity of acquisition is not exceeded the time limit in the unlocking cipher of the third state is opened as user
The unlocking cipher that door is used, and by the use status maintenance of the unlocking cipher of the acquired third state
Change the second state into.Wherein, the term of validity does not exceeds the time limit the term of validity referring to unlocking cipher more than current time.
For example, the term of validity is 11:30 on June 9th, 2016, and current time is on June 6th, 2016
11:00, then the term of validity is more than current time, represents that the term of validity is not exceeded the time limit.
Step S606: the unlocking cipher of the server update third state, and the unlocking cipher that will be updated
Send to coded lock.
If the communication between server 130 and coded lock 110 is normal, namely server 130 with
Can be with interaction data between coded lock 110, then server 130 can update coded lock 110 and service
The unlocking cipher being updated is thrown by the unlocking cipher having used in device 130 as new unlocking cipher
Enter to use.
Server 130 obtains the unlocking cipher of the third state, updates the unlocking cipher of this third state,
And be the first state by the use status modifier of the unlocking cipher of renewal, the term of validity uses as default.
As a example by table 1, before renewal, use state is that the unlocking cipher of the third state is respectively 122345 Hes
123455, corresponding mark is respectively 5 and 6.After renewal, unlocking cipher corresponding to 5 for the mark
Being 123345, using state to be " 0 ", unlocking cipher corresponding to 6 for the mark is 123446, uses shape
State is " 0 ".
Server 130 will update after unlocking cipher and its corresponding mark and the term of validity send to close
Code lock 110, the data i.e. being sent may is that the mark 5-unlocking cipher 123345-term of validity: gives tacit consent to
Value;The mark 6-unlocking cipher 123446-term of validity: default value.
Step S607: whether coded lock successfully stores updated unlocking cipher?
After unlocking cipher after receiving the renewal that server 130 sends for the coded lock 110, according to being connect
The unlocking cipher received updates opening of described coded lock 110 storage with the corresponding relation of mark and the term of validity
Lock cipher and the term of validity.
For example, coded lock 110 is according to the mark 5 of the unlocking cipher being received, and finds stored multiple
Unlocking cipher is designated the unlocking cipher of 5, the unlocking cipher being designated 5 being stored is revised as
123345, the term of validity of the unlocking cipher being designated 5 is revised as default value;It is designated 6 by stored
Unlocking cipher be revised as 123446, the term of validity of the unlocking cipher being designated 6 is revised as default value.
First can be fed back after coded lock 110 is successfully by the unlocking cipher storage after received renewal
Instruction is to described server 130, with step S609.If coded lock 110 cannot successfully will be connect
The unlocking cipher storage received, then step S608.Specifically, server 130 can set one
Presetting the detection time, wherein, this default detection time can be an empirical value, according to specifically used
Environment and set.Server 130 detected whether to be properly received coded lock 110 within the default detection time
The first instruction being sent by gateway 120, if being properly received the first instruction within the default detection time,
Then represent that coded lock 110 successfully stores the unlocking cipher after updating.If not becoming within the default detection time
Work(receives the first instruction, then it represents that the unlocking cipher after coded lock 110 unsuccessful storage renewal.
Step S608: whether reach maximum attempts?
When at the complete unlocking cipher of server update and sending the unlocking cipher being updated to coded lock, note
Unlocking cipher after record will update sends to the number of times of described coded lock, and for example, server 130 sets
One maximum attempts, sets a variable in server 130, the initial value of variable is 0, service
Device 130 sends the unlocking cipher after updating every time and adds 1 to coded lock 110, the value of this variable.
If the unlocking cipher storage that coded lock 110 cannot successfully will be received, then server 130 can be many
Secondary trial sends the unlocking cipher after updating to coded lock 110.When the value of variable is attempted secondary not less than maximum
During number, return step S606, then in step S607.
When the value of variable exceedes maximum attempts, server is by the unlocking cipher being updated and renewal
After unlocking cipher corresponding use state and the term of validity be revised as update before unlocking cipher, use
State and the term of validity, and step S605.I.e. between this server 130 and coded lock 110
The renewal failure of unlocking cipher, server 130 step S605, choose opening of a third state
Lock cipher, to user terminal, opens the unlocking cipher of door as user.
For example, before updating, mark 5 corresponding unlocking ciphers, use state and the term of validity are: mark 5-
The unlocking cipher 123345-term of validity: t1-uses state: 2, when step S606, becomes:
The mark 5-unlocking cipher 123344-term of validity: t2-uses state: 0.Server detects coded lock
When successfully storing updated unlocking cipher, the unlocking cipher that server will be updated stores.Now,
Multiple unlocking ciphers corresponding with coded lock is designated the unlocking cipher of 5 and corresponding in server
The term of validity and use state become: the mark 5-unlocking cipher 123344-term of validity: t2-uses state:
0。
When coded lock is after reaching maximum trial storage number of times, still unsuccessful storage is many after updating
Individual unlocking cipher, then the unlocking cipher storage that server will not be updated.Now, server is updated
Unlocking cipher and corresponding use state and the term of validity etc. be revised as update before unlocking cipher and
Corresponding use state and the term of validity, will be designated 5 unlocking cipher and the corresponding term of validity and
The renewal that use state is done is abandoned, and is designated unlocking cipher and the corresponding term of validity and the use of 5
State remain as renewal before the mark 5-unlocking cipher 123345-term of validity: t1-uses state: 2.
Step S609: the unlocking cipher after server storage renewal.
Coded lock 110 is when the updated unlocking cipher of successfully storage, and feedback the first instruction is to described clothes
Business device 130, the unlocking cipher after server 130 will update stores.By step S606, step S607,
Step S608 and step S609, have again the unlocking cipher that can use in server 130.Therefore,
Step S603 after execution of step S609.
When execution of step S603, the unlocking cipher of the first state acquired in server 130 can
Opening the password of coded lock 110 as user, then step S610.
Step S610: send acquired unlocking cipher to described user terminal.
It should be noted that in step S610, acquired unlocking cipher can be in step S603
The unlocking cipher of the first state, it is also possible to be the unlocking cipher of the third state in step S605.
Step S610 is identical with abovementioned steps S302, does not repeats them here.
In addition, in order to avoid user is after employing unlocking cipher, and will be used in server 130
The use status indication of unlocking cipher be the third state, the state i.e. having used, and cause server
Not having new unlocking cipher in 130 for being next time user terminal distribution, the embodiment of the present invention also includes out
Lock cipher update method.As shown in Figure 8, the update method of unlocking cipher includes: step S701 is to step
Rapid S705.
Step S701: when the communication of server and coded lock is normal, whether server exists the 3rd shape
The unlocking cipher of state?
Server 130 needs at server 130 and password with the renewal of the unlocking cipher of coded lock 110
The communication of lock 110 is carried out when normal, and the renewal of unlocking cipher can be according to set by server 130
Update cycle performs.For example, the update cycle that server 130 sets is to update once or one in one week
Within individual month, update once, naturally it is also possible to be the unlocking judging the first stored state at server 130
When password quantity is too low, step S701.Wherein, quantity is too low refers to that the unlocking of the first state is close
The quantity of code is less than preset value, and described preset value is an empirical value, according to actually used scene
Set.
It should be noted that preferably, the unlocking cipher that server 130 is updated is for the 3rd shape
The unlocking cipher of state, and the unlocking cipher of the second state and the first state is without updating, and so can keep away
Exempt from the unlocking cipher that user is currently in use to be updated and coded lock 110 cannot be opened, and update and do not use
Unlocking cipher and the wasting of resources that causes.
If there is the unlocking cipher of the third state, then step S702 in server 130.Server 130
If there is not the unlocking cipher of the third state, then it represents that do not exist in server 130 and need update to open
Lock cipher, then terminate this and update.
Step S702: the unlocking cipher of the server update third state, and the unlocking cipher that will be updated
Send to coded lock.
Step S703: whether coded lock successfully stores updated unlocking cipher?
If coded lock 110 successfully stores updated unlocking cipher, then step S705.If password
Lock the unlocking cipher that 110 unsuccessful storages are updated, then step S704.
Step S704: whether reach maximum attempts?
If the number of times that the updated unlocking cipher of storage attempted by coded lock 110 is not up to maximum attempts,
Then step S702.If the number of times that the updated unlocking cipher of storage attempted by coded lock 110 reaches
Big number of attempt, then terminate this and update.
Step S705: server 130 stores the unlocking cipher after updating.
The step that above-mentioned steps S702, the embodiment of S703, S704 and S705 are referred in Fig. 7
Rapid S606, step S607, step S608 and step S609, do not repeat them here.However it is necessary that
Bright, in step S704, if the number of times of the updated unlocking cipher of storage attempted by coded lock 110
Reach maximum attempts, represent that coded lock 110 cannot store the unlocking that server 130 updated close
Code, then terminate this and update, and the new unlocking cipher that server 130 is generated can be deleted, will
The new unlocking cipher being buffered in storage discharges.
In order to ensure user after checking out, will not being used by other people of the unlocking cipher that used
Or user's unlocking cipher used before still can using after checking out opens door, the present invention
Embodiment provides the de-activation procedure of unlocking cipher, as it is shown in figure 9, this de-activation procedure includes: step
S801 is to step S808.
Step S801: obtain coded lock password and disable instruction.
Coded lock 110 password disable instruction for server 130 acquired in for execution by user terminal
For opening the enabled instruction of the unlocking cipher disabling operation of door, its producing method can include following
Several embodiments:
The first, server 130, when sending unlocking cipher to user terminal, starts to user institute
The monitoring of the term of validity of the unlocking cipher using, exceeding after the term of validity reaches or in the term of validity makes
When using the time limit, generate coded lock 110 password and disable instruction.Wherein, useful life refers to allow user
It is continuing with unlocking cipher in certain time after the term of validity is exceeded the time limit.
The second, it is thus achieved that described coded lock 110 password that user terminal sends disables instruction.User exists
When checking out, send password by user terminal and disable instruction to server 130.
The third, user is after check-out has been handled on foreground, and the administrative staff in room are by server 130
The status modifier in interior room is for checking out, and server 130 is in the corresponding room of coded lock 110 label
Turntable generate password when being changed to the state checked out and disable instruction.
It should be noted that it is close for bound in user terminal that coded lock 110 password disables instruction
Code lock 110, i.e. server 130 only by the coded lock 110 bound in user terminal with user terminal institute
The unlocking cipher that the unlocking cipher of acquisition is corresponding disables.
Step S802: whether server exists the unlocking cipher of the second state?
The unlocking that whether there is the second state in multiple unlocking ciphers that server 130 lookup is stored is close
Code, if existing, step S803.If there is not the unlocking cipher of the second state in server 130,
Then in representation theory, all unlocking ciphers in server 130 are all not used by, then terminate this and stop
With operation.
Step S803: the unlocking cipher of the second state is updated to the third state by server.
The use state of unlocking cipher during server 130 will use changes to use.
Step S804: whether server is normal with the communication of coded lock?
If server 130 is normal with the communication of coded lock 110, then step S805.If server
130 with the communication abnormality of coded lock 110, then terminate this and disable.
Step S805: the unlocking cipher of the server update third state, and the unlocking cipher that will be updated
Send to coded lock.
Step S806: whether coded lock successfully stores updated unlocking cipher?
If coded lock 110 successfully stores updated unlocking cipher, then step S808.If password
Lock the unlocking cipher that 110 unsuccessful storages are updated, then step S807.
Step S807: whether reach maximum attempts?
If the number of times that the updated unlocking cipher of storage attempted by coded lock 110 is not up to maximum attempts,
Then step S805.If the number of times that the updated unlocking cipher of storage attempted by coded lock 110 reaches
Big number of attempt, then terminate this disabling operation.
Step S808: the unlocking cipher after server storage renewal.
Step S804, S805, S806, S807 and S808 are referred to previous embodiment, at this not
Repeat again.
It should be noted that the de-activation procedure of described unlocking cipher can not step S803, accordingly
Step S805 then become: server 130 updates the unlocking cipher of the second state, and will be updated
Unlocking cipher sends to coded lock 110.Concrete, can after the unlocking cipher of second state of acquisition,
And in the case of server 130 is normal with the communication of coded lock 110, directly update the second state
Unlocking cipher, and the use state by the unlocking cipher of the second state is updated to the first state, then will more
Unlocking cipher after Xin sends to coded lock 110, and step S806, S807 and S808.And scheme
The unlocking cipher that user is used can not only be disabled by the method flow corresponding to 9, and can be by close
Code lock 110 updates with the unlocking cipher having used in server 130, it is simple to next time uses.
By the embodiment corresponding to Fig. 7 it is known that no matter use which kind of mode to be that user terminal is sent out
Send a unlocking cipher to open the password of door as user, be required for the unlocking cipher that sent
Status modifier is used to be the second state.Therefore, can will be taken by the de-activation procedure of described unlocking cipher
The unlocking cipher of the second state in business device 130 updates, and synchronously renewing cipher lock 110 is interior and service
The corresponding unlocking cipher of label of the unlocking cipher of second state being updated of device 130 updates.And use
Unlocking cipher acquired in the terminal of family is old password, in coded lock 110 cannot successful match, because of
This, the unlocking cipher that user is used is deactivated and cannot open coded lock 110.
Refer to Figure 10, embodiments provide a kind of coded lock control method, this coded lock 110
The execution process with coded lock 110 as executive agent for the control method.Described coded lock 110 control method
Including:
Step S901: obtain the verification password of user's input.
Step S902: when in the verification password that user inputs and the multiple unlocking ciphers being stored at least one
During individual unlocking cipher coupling, send the extremely corresponding electric lockset of open command, wherein, stored
Multiple unlocking ciphers are the unlocking cipher being generated by server being received.
In addition, when in the verification password that user inputs and the multiple unlocking ciphers being stored, at least one is opened
During lock cipher coupling, send the process of the extremely corresponding electric lockset of open command, concrete, permissible
Including:
The verification password match obtaining with described user input is searched in the multiple unlocking ciphers being stored
Unlocking cipher;When being searched, the corresponding term of validity of unlocking cipher obtaining is described with acquisition verifies password
Time when meeting preset relation, send open command to corresponding electric lockset.
The specific implementation process of above-mentioned steps S901 and S902 refers to the enforcement of preceding method and system
Example, does not repeats them here.
Refer to Figure 11, a kind of coded lock control device 111 that the embodiment of the present invention provides, run on
Server 130, comprising: password setting unit 210 and transmitting element 220.
Password setting unit 210 is for obtaining the password request that user terminal sends, according to described password
One unlocking cipher of acquisition request, described unlocking cipher is for prestoring and being sent to coded lock by described
One of multiple unlocking ciphers of coded lock storage.
Transmitting element 220 is for sending acquired unlocking cipher to described user terminal.
Those skilled in the art is it can be understood that arrive, for convenience and simplicity of description, above-mentioned
The specific works process of the system, device and the unit that describe, is referred in preceding method embodiment
Corresponding process, does not repeats them here.
Refer to Figure 12, a kind of coded lock control device 111 that the embodiment of the present invention provides, run on
Server 130, comprising: password dispensing unit the 310th, password setting unit the 320th, transmitting element 330
With disable password unit the 340th, updating block 350 and time setting unit 360.
Password dispensing unit 310 includes generating subelement and the 3101st, sends subelement 3102 and storage singly
Unit 3103.
Generate subelement 3101 to be used for generating the plurality of unlocking cipher.Send subelement 3102 to be used for
Send the plurality of unlocking cipher to described coded lock, so that described coded lock is multiple by received
Unlocking cipher stores.Storing sub-units 3103 is for obtaining what described coded lock was received in successfully storage
The plurality of unlocking cipher is stored by the first instruction generating after unlocking cipher.
Password setting unit 320 is for obtaining the password request that user terminal sends, according to described password
One unlocking cipher of acquisition request, described unlocking cipher is for previously generating and being sent to coded lock by described
One of multiple unlocking ciphers of coded lock storage, described coded lock is bound with described user terminal phase.
Specifically, password setting unit 320 includes that password request obtains subelement 3201 and password is searched
Subelement 3202.
Password request obtains subelement 3201 for obtaining the password request that user terminal sends.Password is looked into
Look for subelement 3202 for obtaining a unlocking cipher according to described password request.
Wherein, password searches subelement 3202 specifically for when at least including in the plurality of unlocking cipher
When one use state is the unlocking cipher of the first state, according to described password request obtains one
Use state is the unlocking cipher of the first state, by the unlocking that acquired use state is the first state
The use status modifier of password is the second state.
Password is searched subelement 3202 and is additionally operable to and when there is not use state in the plurality of unlocking cipher is
, there is the unlocking cipher that use state is the third state in the unlocking cipher of the first state, and server with
One the use state of acquisition in communication connection and multiple unlocking cipher that do not sets up between described coded lock is
The unlocking cipher that the third state and the term of validity are not exceeded the time limit, by acquired use state be the third state and
The use status modifier of the unlocking cipher that the term of validity is not exceeded the time limit is the second state.
When password lookup subelement 3202 is additionally operable between described coded lock set up communication connection, more
New all use states are the unlocking cipher of the third state, by the use of the unlocking cipher after all renewal
Status modifier is the first state;By the unlocking cipher after all renewal and the corresponding mark of this unlocking cipher
Know and send to described coded lock, so that right according to the unlocking cipher being received and mark of described coded lock
The unlocking cipher updating the storage of described coded lock should be related to;Obtain a use according to described password request
State is the unlocking cipher of the first state.
Transmitting element 330 is for sending acquired unlocking cipher to described user terminal.
Disable password unit 340 to obtain coded lock password and disable instruction;It is second by all use states
The use status modifier of the unlocking cipher of state is the third state;Updating all use states is the 3rd shape
The unlocking cipher of state;By the mark corresponding to the unlocking cipher of the third state being updated and this unlocking cipher
Know and send to described coded lock, so that described coded lock is according to the corresponding unlocking cipher of the mark being received
Update the unlocking cipher of described coded lock storage.
Specifically, disable password unit 340 to send to described user terminal for being more than at current time
The unlocking cipher corresponding term of validity when, generate described coded lock password and disable instruction, or, it is thus achieved that
The described coded lock password that user terminal sends disables instruction.
Updating block 350 is used for updating the unlocking cipher that all use states are the third state and this is opened
Lock cipher corresponding use state and the term of validity, wherein, update this unlocking cipher corresponding use state
For being the first state by the use status modifier of this unlocking cipher, update this unlocking cipher corresponding effectively
Phase is for being set as default value by the term of validity of this unlocking cipher;By all update after unlocking cipher and
The corresponding mark of this unlocking cipher and the term of validity send to described coded lock so that described coded lock according to
The mark being received updates the unlocking of described coded lock storage with the corresponding relation of unlocking cipher and the term of validity
Password and the term of validity.
Time setting unit 360 is for corresponding with described password request opening according to described password request
The term of validity of lock cipher is set as Preset Time and sends to described coded lock, so that described coded lock will
In the multiple unlocking ciphers being stored, the term of validity of corresponding unlocking cipher is repaiied with the unlocking cipher being received
Change Preset Time into.
Those skilled in the art is it can be understood that arrive, for convenience and simplicity of description, above-mentioned
The specific works process of the system, device and the unit that describe, is referred in preceding method embodiment
Corresponding process, does not repeats them here.
Refer to Figure 13, a kind of coded lock control device 111 that the embodiment of the present invention provides, run on
Coded lock 110, comprising: verification password acquiring unit 410 and authentication unit 420.
Verification password acquiring unit 410 is for obtaining the verification password of user's input.Authentication unit 420
For at least one unlocking cipher in the verification password inputting as user and the multiple unlocking ciphers being stored
During coupling, sending the extremely corresponding electric lockset of open command, wherein, the multiple unlockings being stored are close
Code is the unlocking cipher being generated by server.
Those skilled in the art is it can be understood that arrive, for convenience and simplicity of description, above-mentioned
The specific works process of the system, device and the unit that describe, is referred in preceding method embodiment
Corresponding process, does not repeats them here.
Refer to Figure 14, a kind of coded lock control device 111 that the embodiment of the present invention provides, run on
Coded lock 110, comprising: unlocking cipher acquiring unit the 510th, verify password acquiring unit 520 and checking
Unit 530.
Wherein, unlocking cipher acquiring unit 510 for obtain that described server sends by described service
Multiple unlocking ciphers that device generates;Feedback first after multiple unlocking ciphers that successfully storage is received
Instruction is to described gateway, so that described gateway sends described first instruction to described server.
Verification password acquiring unit 520 is for obtaining the verification password of user's input.
Authentication unit 530 is for when in user's verification password inputting and the multiple unlocking ciphers being stored
During at least one unlocking cipher coupling, send the extremely corresponding electric lockset of open command, wherein, institute
Multiple unlocking ciphers of storage are the unlocking cipher being generated by server.
Wherein, authentication unit 530 includes coupling subelement 5301 and performs subelement 5302.
Coupling subelement 5301 obtains and described user for searching in the multiple unlocking ciphers being stored
The unlocking cipher of the verification password match of input.
Perform subelement 5302 for when the corresponding term of validity of unlocking cipher being searched acquisition and acquisition institute
State the time of verification password when meeting preset relation, send open command to corresponding electric lockset.
Those skilled in the art is it can be understood that arrive, for convenience and simplicity of description, above-mentioned
The specific works process of the system, device and the unit that describe, is referred in preceding method embodiment
Corresponding process, does not repeats them here.
In several embodiments provided herein, it should be understood that disclosed apparatus and method,
Also can realize by another way.Device embodiment described above is only schematically,
For example, the flow chart in accompanying drawing and block diagram show the device of the multiple embodiments according to the present invention, side
The architectural framework in the cards of method and computer program, function and operation.At this point, flow
Each square frame in journey figure or block diagram can represent a part for a module, program segment or code, institute
The part stating module, program segment or code comprises one or more logic function for realizing regulation
Executable instruction.It should also be noted that at some as in the implementation replaced, square frame is marked
The function of note also can occur to be different from the order being marked in accompanying drawing.For example, two continuous print sides
Frame can essentially perform substantially in parallel, and they also can perform sometimes in the opposite order, and this depends on
Depending on involved function.It is also noted that each square frame in block diagram and/or flow chart and
The combination of the square frame in block diagram and/or flow chart, can use the function of execution regulation or the special of action
Hardware based system realizes, or can realize with the combination of specialized hardware and computer instruction.
In addition, each functional module in each embodiment of the present invention can integrate formation one
Independent part, it is also possible to be modules individualism, it is also possible to two or more module collection
It is shaped as an independent part.
If described function realizes using the form of software function module and as independent production marketing or make
Used time, can be stored in a computer read/write memory medium.Based on such understanding, this
Part that prior art is contributed by bright technical scheme substantially in other words or this technical scheme
Part can embody with the form of software product, and this computer software product is stored in a storage
In medium, including some instructions are with so that a computer equipment (can be personal computer, take
Business device, or the network equipment etc.) perform completely or partially walking of method described in each embodiment of the present invention
Suddenly.And aforesaid storage medium includes: USB flash disk, portable hard drive, read-only storage (ROM, Read-Only
Memory), random access memory (RAM, Random Access Memory), magnetic disc or CD
Etc. the various media that can store program code.It should be noted that herein, the such as first He
The relational terms of second or the like is used merely to an entity or operation and another entity or operation
Make a distinction, and not necessarily require or imply there is any this reality between these entities or operation
Relation or order.And, term " includes ", "comprising" or its any other variant are intended to
Cover comprising of nonexcludability so that include the process of a series of key element, method, article or
Equipment not only includes those key elements, but also includes other key elements being not expressly set out, or also
Including the key element intrinsic for this process, method, article or equipment.There is no more restriction
In the case of, the key element being limited by statement " including ... ", it is not excluded that including described key element
Process, method, article or equipment there is also other identical element.
The foregoing is only the preferred embodiments of the present invention, be not limited to the present invention, for
For those skilled in the art, the present invention can have various modifications and variations.All essences in the present invention
Within god and principle, any modification, equivalent substitution and improvement etc. made, should be included in the present invention
Protection domain within.It should also be noted that similar label represents similar with letter in following accompanying drawing
, therefore, once a certain Xiang Yi accompanying drawing is defined, then it is right not need in accompanying drawing subsequently
It defines further and explains.
The above, the only detailed description of the invention of the present invention, but protection scope of the present invention not office
Being limited to this, any those familiar with the art, can in the technical scope that the invention discloses
Readily occur in change or replace, all should cover within protection scope of the present invention.Therefore, the present invention
Protection domain should described be as the criterion with scope of the claims.
Claims (23)
1. a coded lock control method, it is characterised in that include:
Obtain the password request that user terminal sends, obtain a unlocking cipher according to described password request,
Described unlocking cipher be previously generate and be sent to coded lock by described coded lock store multiple unlocking close
One of code, described coded lock is bound with described user terminal phase;
Send acquired unlocking cipher to described user terminal.
2. method according to claim 1, it is characterised in that described acquisition user terminal sends
Password request before, also include:
Generate the plurality of unlocking cipher;
Send the plurality of unlocking cipher to described coded lock, so that described coded lock will be received
Multiple unlocking ciphers store;
Obtain the first instruction that described coded lock generates after the received unlocking cipher of successfully storage,
The plurality of unlocking cipher is stored.
3. method according to claim 2, it is characterised in that the plurality of unlocking cipher is sent out
Deliver to the step of described coded lock, comprising:
Send the plurality of unlocking cipher to gateway, so that described gateway is the plurality of by received
Unlocking cipher sends to described coded lock;
When not receiving the second finger that described gateway sends when being successfully received the plurality of unlocking cipher
When making, again sending the plurality of unlocking cipher to gateway, sending out until being successfully received described gateway
The second instruction sent.
4. method according to claim 1, it is characterised in that each described unlocking cipher is all right
Should have use state, the step obtaining a unlocking cipher according to described password request includes:
When the unlocking cipher at least including in the plurality of unlocking cipher that a use state is the first state
When, according to the unlocking cipher that described password request one described use state of acquisition is the first state, will
Acquired use state be the use status modifier of the unlocking cipher of the first state be the second state.
5. method according to claim 4, it is characterised in that each described unlocking cipher is all right
Should have the term of validity, the step obtaining a unlocking cipher according to described password request includes:
When the plurality of unlocking cipher does not exist the unlocking cipher that use state is the first state, exist
Use state is not set up communication between the unlocking cipher of the third state, and server and described coded lock
During connection, according to described password request one use state of acquisition be the third state and the term of validity is not exceeded the time limit
Unlocking cipher, acquired use state is the third state and unlocking cipher that the term of validity is not exceeded the time limit
Use status modifier be the second state.
6. method according to claim 5, it is characterised in that each described unlocking cipher is all right
Answering a mark, the step obtaining a unlocking cipher according to described password request also includes:
When setting up communication connection between described coded lock, updating all use states is the third state
Unlocking cipher, be the first state by the use status modifier of unlocking cipher after all renewal;
Send the unlocking cipher after all renewal and the corresponding mark of this unlocking cipher to described password
Lock, so that described coded lock updates described close according to the unlocking cipher being received with the corresponding relation of mark
Code latches the unlocking cipher of storage;
When receiving the first instruction, store the unlocking cipher after all renewal and this unlocking cipher pair
The use state answered, wherein, described first instruction successfully stores updated unlocking by described coded lock
The instruction generating during password;
According to the unlocking cipher that described password request one use state of acquisition is the first state.
7. method according to claim 6, it is characterised in that by all update after unlocking close
Code and the corresponding mark of this unlocking cipher send after described coded lock, and described method also includes:
Record sends the number of times of the extremely described coded lock of the unlocking cipher after updating;
When not receiving the described first instruction within the default detection time, it is judged that whether current number of times is big
In default value, if it is not, again send the extremely described coded lock of the unlocking cipher after updating, will work as previous
Number adds one;If so, by corresponding to the unlocking cipher being updated and this unlocking cipher use status modifier
For the unlocking cipher before renewal and use state, obtain one according to described password request and use state
The unlocking cipher not exceeded the time limit for the third state and the term of validity, is the third state by acquired use state
And the use status modifier of unlocking cipher that the term of validity is not exceeded the time limit is the second state.
8. method according to claim 1, it is characterised in that each described unlocking cipher is all right
Should have mark, use state and the term of validity, described method also includes:
Update the unlocking cipher that all use states are the third state and the corresponding use of this unlocking cipher
State and the term of validity, wherein, update this unlocking cipher corresponding use state for by this unlocking cipher
Use status modifier to be the first state, update the corresponding term of validity of this unlocking cipher for by this unlocking cipher
The term of validity be set as default value;
Unlocking cipher after all renewal and the corresponding mark of this unlocking cipher are sent extremely with the term of validity
Described coded lock, so that right according to the mark being received and unlocking cipher and the term of validity of described coded lock
Unlocking cipher and the term of validity updating the storage of described coded lock should be related to.
9. method according to claim 8, it is characterised in that by all update after unlocking close
Code and the corresponding mark of this unlocking cipher and the term of validity send after described coded lock, described method
Also include:
When receiving the first instruction, store the unlocking cipher after all renewal and this unlocking cipher pair
The use state answered and the term of validity, wherein, described first instruction for described coded lock successfully store more
The instruction generating during new unlocking cipher.
10. method according to claim 9, it is characterised in that by all update after unlocking close
Code and the corresponding mark of this unlocking cipher and the term of validity send after described coded lock, described method
Also include:
Record sends the number of times of the extremely described coded lock of the unlocking cipher after updating;
When not receiving the described first instruction within the default detection time, and current number of times is more than default
During numerical value, again send the extremely described coded lock of the unlocking cipher after updating, and current number of times is added one.
11. methods according to claim 1, it is characterised in that each described unlocking cipher is all right
Should there is the term of validity, after obtaining a unlocking cipher according to described password request, also include:
According to described password request, the term of validity of unlocking cipher corresponding with described password request is set as
Preset Time simultaneously sends to described coded lock, so that multiple unlocking ciphers that described coded lock will be stored
In the term of validity of corresponding unlocking cipher is revised as Preset Time with the unlocking cipher being received.
12. methods according to claim 1, it is characterised in that each described unlocking cipher is all right
Should have mark and use state, described method also includes:
Obtain coded lock password and disable instruction;
Use status modifier by the unlocking cipher that all use states are the second state is the third state;
Update the unlocking cipher that all use states are the third state;
Send the mark corresponding to the unlocking cipher of the third state being updated and this unlocking cipher to institute
State coded lock, so that described coded lock updates described close according to the corresponding unlocking cipher of the mark being received
Code latches the unlocking cipher of storage.
13. methods according to claim 12, it is characterised in that each described unlocking cipher is equal
Also to there being the term of validity, the step that described acquisition coded lock password disables instruction includes:
When current time is more than the corresponding term of validity of unlocking cipher of transmission to described user terminal, raw
Described coded lock password is become to disable instruction;Or
The described coded lock password obtaining user terminal transmission disables instruction.
14. methods according to claim 12 or 13, it is characterised in that being updated
Mark corresponding to the unlocking cipher of three condition and this unlocking cipher sends after described coded lock, institute
Method of stating also includes:
When the first instruction receiving feedback when described coded lock successfully stores updated unlocking cipher
When, store the unlocking cipher after all renewal and this unlocking cipher corresponding use state.
15. methods according to claim 12 or 13, it is characterised in that the 3rd being updated
Mark corresponding to the unlocking cipher of state and this unlocking cipher sends after described coded lock, described
Method also includes:
Unlocking cipher after record will update sends to the number of times of described coded lock;
Successfully store updated unlocking cipher when not receiving described coded lock within the default detection time
When feedback the first instruction when, and current number of times whether more than default value when, again send after updating
Unlocking cipher to described coded lock, and current number of times is added one.
16. 1 kinds of coded lock control methods, it is characterised in that include:
Obtain the verification password of user's input;
Verification password and at least one unlocking cipher in the multiple unlocking ciphers being stored when user's input
During coupling, sending the extremely corresponding electric lockset of open command, wherein, the multiple unlockings being stored are close
Code is the unlocking cipher being generated by server.
17. methods according to claim 16, it is characterised in that each described unlocking cipher is equal
To there being the term of validity, when in the verification password that user inputs and the multiple unlocking ciphers being stored at least one
During individual unlocking cipher coupling, the step opening corresponding electric lockset, comprising:
The verification password match obtaining with described user input is searched in the multiple unlocking ciphers being stored
Unlocking cipher;
Full when the time being searched the corresponding term of validity of unlocking cipher obtaining verification described with acquisition password
During foot preset relation, send open command to corresponding electric lockset.
18. methods according to claim 16, it is characterised in that described acquisition user input
Verification password before, also include:
Obtain the multiple unlocking ciphers being generated by described server that gateway sends;
The first instruction extremely described gateway is sent after multiple unlocking ciphers that successfully storage is received, with
Described gateway is made to send described first instruction to described server.
19. 1 kinds of coded lock control systems, it is characterised in that include server, coded lock and gateway;
Described server is used for generating multiple unlocking cipher, it is thus achieved that the password request that user terminal sends,
Obtain a unlocking cipher according to described password request, acquired unlocking cipher is sent to user eventually
End;
Described gateway is for obtaining the plurality of unlocking cipher in described server, and by acquired
The plurality of unlocking cipher sends to described coded lock;
Described coded lock, for the plurality of unlocking cipher storage that will be received, receives user's input
Verification password, when in the verification password that user inputs and the multiple unlocking ciphers being stored, at least one is opened
During lock cipher coupling, send open command to corresponding electric lockset.
20. 1 kinds of coded lock control devices, it is characterised in that include:
Password setting unit, for obtaining the password request that user terminal sends, please according to described password
Seeking one unlocking cipher of acquisition, described unlocking cipher is for prestoring and being sent to coded lock by described close
Code latches one of multiple unlocking ciphers of storage;
Transmitting element, for sending acquired unlocking cipher to described user terminal.
21. 1 kinds of coded lock control devices, it is characterised in that include:
Verification password acquiring unit, for obtaining the verification password of user's input;
Authentication unit, for when in verification password and multiple unlocking ciphers of being stored of user's input extremely
During few unlocking cipher coupling, opening corresponding door, wherein, the multiple unlockings being stored are close
Code is the unlocking cipher being generated by server.
22. devices according to claim 21, it is characterised in that also include:
Unlocking cipher acquiring unit, multiple is opened by what described server generated for obtain that gateway sends
Lock cipher;The first instruction extremely described gateway is sent after multiple unlocking ciphers that successfully storage is received,
So that described gateway sends described first instruction to described server.
23. devices according to claim 21, it is characterised in that described authentication unit includes:
Coupling subelement, defeated with described user for searching acquisition in the multiple unlocking ciphers being stored
The unlocking cipher of the verification password match entering;
Perform subelement, described with acquisition for working as the corresponding term of validity of unlocking cipher being searched acquisition
When the time of verification password meets preset relation, send open command to corresponding electric lockset.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610500751.9A CN105991776B (en) | 2016-06-29 | 2016-06-29 | A kind of coded lock control method, apparatus and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610500751.9A CN105991776B (en) | 2016-06-29 | 2016-06-29 | A kind of coded lock control method, apparatus and system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105991776A true CN105991776A (en) | 2016-10-05 |
CN105991776B CN105991776B (en) | 2019-08-20 |
Family
ID=57044283
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610500751.9A Expired - Fee Related CN105991776B (en) | 2016-06-29 | 2016-06-29 | A kind of coded lock control method, apparatus and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105991776B (en) |
Cited By (22)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106600792A (en) * | 2016-12-28 | 2017-04-26 | 北京拜克洛克科技有限公司 | Unlocking method, system and device of bicycle |
CN106920302A (en) * | 2017-01-16 | 2017-07-04 | 中国铁塔股份有限公司江西省分公司 | Method for unlocking, master device for Internet of Things lock, from apparatus and system |
CN106934901A (en) * | 2017-04-14 | 2017-07-07 | 美的智慧家居科技有限公司 | Smart lock method for unlocking and device |
CN107146309A (en) * | 2017-05-22 | 2017-09-08 | 广州海图克计算机技术有限公司 | A kind of door lock cipher set-up method and door-locking system |
CN107368554A (en) * | 2017-07-02 | 2017-11-21 | 深圳市驿固科技有限公司 | A kind of processing method, electronic lock and system for accessing data structured |
CN107578503A (en) * | 2017-08-24 | 2018-01-12 | 东峡大通(北京)管理咨询有限公司 | Method for unlocking, unlocking terminal and the smart lock of shared vehicle |
CN107590885A (en) * | 2017-09-04 | 2018-01-16 | 深圳市谷咔互联科技有限公司 | A kind of shared bicycle electronic lock unlocking method and system |
CN107633580A (en) * | 2017-09-14 | 2018-01-26 | 京东方科技集团股份有限公司 | A kind of smart lock and its control method, intelligent coffer |
CN107633588A (en) * | 2017-10-24 | 2018-01-26 | 北京金储自动化技术有限公司 | Control method, system, lockset, electronic equipment and readable storage medium storing program for executing |
CN107730689A (en) * | 2017-11-06 | 2018-02-23 | 广东安居宝数码科技股份有限公司 | The door opening method and device of gate control system |
CN108242109A (en) * | 2016-12-23 | 2018-07-03 | 青岛海尔滚筒洗衣机有限公司 | A kind of self-service clothes washing method, server and self-service clothes washing system |
CN109118634A (en) * | 2018-09-28 | 2019-01-01 | 伟创达电子科技(深圳)有限公司 | A kind of two dimensional code unlocking access control system |
CN109243015A (en) * | 2018-08-22 | 2019-01-18 | 深圳威琳懋生物科技有限公司 | intelligent entrance guard robot |
CN109410406A (en) * | 2018-11-14 | 2019-03-01 | 北京华大智宝电子系统有限公司 | A kind of authorization method, device and system |
CN109978530A (en) * | 2017-12-27 | 2019-07-05 | 青岛胶南海尔洗衣机有限公司 | Offline electronic payment method |
CN110073420A (en) * | 2016-11-28 | 2019-07-30 | 江苏宏宝工具有限公司 | System and method for unlocking |
CN110300180A (en) * | 2019-07-03 | 2019-10-01 | 北京享易天下科技有限公司 | A kind of service system and method for servicing of shared device |
CN111379475A (en) * | 2018-12-29 | 2020-07-07 | 云丁网络技术(北京)有限公司 | Unlocking method of electronic lock, electronic lock and unlocking management equipment |
CN112164159A (en) * | 2020-09-27 | 2021-01-01 | 青岛海信智慧家居系统股份有限公司 | Smart hotel-based remote card issuing method and device |
CN112863013A (en) * | 2021-01-04 | 2021-05-28 | 珠海格力电器股份有限公司 | Unlocking method, device, equipment and medium |
CN113228121A (en) * | 2018-12-28 | 2021-08-06 | 浙江大华技术股份有限公司 | System and method for controlling ingress and egress |
CN113538964A (en) * | 2021-09-17 | 2021-10-22 | 成都宜泊信息科技有限公司 | Parking management method, parking management system, storage medium and electronic equipment |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2002117448A (en) * | 2000-10-10 | 2002-04-19 | Fuji Denki Reiki Co Ltd | Door control system for automatic vending machine |
CN202003425U (en) * | 2011-03-31 | 2011-10-05 | 上海圣兆信息技术有限公司 | Central management system for monitoring intelligent lock |
CN105024803A (en) * | 2014-04-28 | 2015-11-04 | 恩智浦有限公司 | Behavioral fingerprint in a white-box implementation |
CN105205898A (en) * | 2015-10-22 | 2015-12-30 | 深圳优方网络技术有限公司 | Electronic code permission management system for intelligent lock |
CN105243752A (en) * | 2015-09-11 | 2016-01-13 | 赛酷特(北京)信息技术有限公司 | Intelligent locking system, and system and method for renting public bike based on same |
CN105336022A (en) * | 2014-08-13 | 2016-02-17 | 李凯 | Novel cipher lock |
-
2016
- 2016-06-29 CN CN201610500751.9A patent/CN105991776B/en not_active Expired - Fee Related
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2002117448A (en) * | 2000-10-10 | 2002-04-19 | Fuji Denki Reiki Co Ltd | Door control system for automatic vending machine |
CN202003425U (en) * | 2011-03-31 | 2011-10-05 | 上海圣兆信息技术有限公司 | Central management system for monitoring intelligent lock |
CN105024803A (en) * | 2014-04-28 | 2015-11-04 | 恩智浦有限公司 | Behavioral fingerprint in a white-box implementation |
CN105336022A (en) * | 2014-08-13 | 2016-02-17 | 李凯 | Novel cipher lock |
CN105243752A (en) * | 2015-09-11 | 2016-01-13 | 赛酷特(北京)信息技术有限公司 | Intelligent locking system, and system and method for renting public bike based on same |
CN105205898A (en) * | 2015-10-22 | 2015-12-30 | 深圳优方网络技术有限公司 | Electronic code permission management system for intelligent lock |
Cited By (29)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110073420A (en) * | 2016-11-28 | 2019-07-30 | 江苏宏宝工具有限公司 | System and method for unlocking |
CN108242109A (en) * | 2016-12-23 | 2018-07-03 | 青岛海尔滚筒洗衣机有限公司 | A kind of self-service clothes washing method, server and self-service clothes washing system |
CN106600792A (en) * | 2016-12-28 | 2017-04-26 | 北京拜克洛克科技有限公司 | Unlocking method, system and device of bicycle |
CN106920302A (en) * | 2017-01-16 | 2017-07-04 | 中国铁塔股份有限公司江西省分公司 | Method for unlocking, master device for Internet of Things lock, from apparatus and system |
CN106934901A (en) * | 2017-04-14 | 2017-07-07 | 美的智慧家居科技有限公司 | Smart lock method for unlocking and device |
CN107146309A (en) * | 2017-05-22 | 2017-09-08 | 广州海图克计算机技术有限公司 | A kind of door lock cipher set-up method and door-locking system |
CN107368554A (en) * | 2017-07-02 | 2017-11-21 | 深圳市驿固科技有限公司 | A kind of processing method, electronic lock and system for accessing data structured |
CN107578503A (en) * | 2017-08-24 | 2018-01-12 | 东峡大通(北京)管理咨询有限公司 | Method for unlocking, unlocking terminal and the smart lock of shared vehicle |
CN107590885A (en) * | 2017-09-04 | 2018-01-16 | 深圳市谷咔互联科技有限公司 | A kind of shared bicycle electronic lock unlocking method and system |
US10403073B2 (en) | 2017-09-14 | 2019-09-03 | Boe Technology Group Co., Ltd. | Intelligent lock, method for operating the same, and intelligent safe deposit box |
CN107633580A (en) * | 2017-09-14 | 2018-01-26 | 京东方科技集团股份有限公司 | A kind of smart lock and its control method, intelligent coffer |
CN107633588A (en) * | 2017-10-24 | 2018-01-26 | 北京金储自动化技术有限公司 | Control method, system, lockset, electronic equipment and readable storage medium storing program for executing |
CN107730689A (en) * | 2017-11-06 | 2018-02-23 | 广东安居宝数码科技股份有限公司 | The door opening method and device of gate control system |
CN107730689B (en) * | 2017-11-06 | 2020-10-16 | 广东安居宝数码科技股份有限公司 | Door opening method and device of access control system |
CN109978530A (en) * | 2017-12-27 | 2019-07-05 | 青岛胶南海尔洗衣机有限公司 | Offline electronic payment method |
CN109978530B (en) * | 2017-12-27 | 2023-12-22 | 海尔衣联生态科技(上海)有限公司 | Offline payment method |
CN109243015A (en) * | 2018-08-22 | 2019-01-18 | 深圳威琳懋生物科技有限公司 | intelligent entrance guard robot |
CN109118634A (en) * | 2018-09-28 | 2019-01-01 | 伟创达电子科技(深圳)有限公司 | A kind of two dimensional code unlocking access control system |
CN109410406A (en) * | 2018-11-14 | 2019-03-01 | 北京华大智宝电子系统有限公司 | A kind of authorization method, device and system |
CN109410406B (en) * | 2018-11-14 | 2021-11-16 | 北京华大智宝电子系统有限公司 | Authorization method, device and system |
CN113228121A (en) * | 2018-12-28 | 2021-08-06 | 浙江大华技术股份有限公司 | System and method for controlling ingress and egress |
US11600127B2 (en) | 2018-12-28 | 2023-03-07 | Zhejiang Dahua Technology Co., Ltd. | Systems and methods for controlling access to an entrance |
CN111379475A (en) * | 2018-12-29 | 2020-07-07 | 云丁网络技术(北京)有限公司 | Unlocking method of electronic lock, electronic lock and unlocking management equipment |
CN110300180A (en) * | 2019-07-03 | 2019-10-01 | 北京享易天下科技有限公司 | A kind of service system and method for servicing of shared device |
CN112164159B (en) * | 2020-09-27 | 2022-07-08 | 青岛海信智慧生活科技股份有限公司 | Smart hotel-based remote card issuing method and device |
CN112164159A (en) * | 2020-09-27 | 2021-01-01 | 青岛海信智慧家居系统股份有限公司 | Smart hotel-based remote card issuing method and device |
CN112863013A (en) * | 2021-01-04 | 2021-05-28 | 珠海格力电器股份有限公司 | Unlocking method, device, equipment and medium |
CN113538964A (en) * | 2021-09-17 | 2021-10-22 | 成都宜泊信息科技有限公司 | Parking management method, parking management system, storage medium and electronic equipment |
CN113538964B (en) * | 2021-09-17 | 2021-12-14 | 成都宜泊信息科技有限公司 | Parking management method, parking management system, storage medium and electronic equipment |
Also Published As
Publication number | Publication date |
---|---|
CN105991776B (en) | 2019-08-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105991776A (en) | Method, device and system for cipher lock control | |
Shen et al. | Privacy-preserving and lightweight key agreement protocol for V2G in the social Internet of Things | |
CN111209334B (en) | Power terminal data security management method based on block chain | |
EP3111433B1 (en) | Wireless sensor network | |
CN207409010U (en) | The newer temporary password access control system of encryption parameter dynamic | |
CN107274532A (en) | The temporary password gate control system that encryption parameter dynamically updates | |
CN104980322B (en) | The method and device to link between network access equipment | |
CN101136746A (en) | Identification method and system | |
KR102458922B1 (en) | Device System performing group authentication and Operating Method thereof | |
CN110944301A (en) | Intelligent cell equipment monitoring system based on block chain and key management method | |
CN103312525A (en) | Mixed deployment system for business network and management network of server, server and switch | |
CN107196917A (en) | A kind of service response method and its middleware | |
EP2272199B1 (en) | Distributed data memory unit | |
CN111010381A (en) | Cross-chain-based identity authentication method and system | |
CN104914806A (en) | Connection of persons and things via mobile messaging privacy/security broker system | |
US11516071B2 (en) | Method and system for root cause analysis across multiple network systems | |
US20210264051A1 (en) | Blockchain system, blockchain management apparatus, network control apparatus, method and program | |
US9590998B2 (en) | Network switch with hierarchical security | |
CN109981280A (en) | A kind of electronic data evidence obtaining method and system | |
Liu et al. | Secure and efficient smart healthcare system based on federated learning | |
CN110636482A (en) | Switch maintenance method, device, switch, terminal and readable storage medium | |
Hashim et al. | Performance Evaluation of Blockchain Consensus Algorithms for Electronic Health Record Sharing | |
CN108050653A (en) | Precision air conditioner startup password collocation method, configuration system and precision air conditioner | |
DE102020128700A1 (en) | System for authenticating a user at a charging device and reporting on the use of the same | |
CN105847239A (en) | User authentication manner determining method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20190820 |