CN105991776A - Method, device and system for cipher lock control - Google Patents

Method, device and system for cipher lock control Download PDF

Info

Publication number
CN105991776A
CN105991776A CN201610500751.9A CN201610500751A CN105991776A CN 105991776 A CN105991776 A CN 105991776A CN 201610500751 A CN201610500751 A CN 201610500751A CN 105991776 A CN105991776 A CN 105991776A
Authority
CN
China
Prior art keywords
unlocking cipher
coded lock
unlocking
cipher
password
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610500751.9A
Other languages
Chinese (zh)
Other versions
CN105991776B (en
Inventor
陈丹
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Sankuai Online Technology Co Ltd
Original Assignee
Beijing Sankuai Online Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Sankuai Online Technology Co Ltd filed Critical Beijing Sankuai Online Technology Co Ltd
Priority to CN201610500751.9A priority Critical patent/CN105991776B/en
Publication of CN105991776A publication Critical patent/CN105991776A/en
Application granted granted Critical
Publication of CN105991776B publication Critical patent/CN105991776B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The invention discloses a method, a device and a system for cipher lock control, which belong to the field of cipher lock control. The cipher lock control method comprises steps: a cipher request sent by a user terminal is acquired and an unlocking cipher is acquired according to the cipher request, wherein the unlocking cipher is one selected from multiple pre-generated unlocking ciphers sent to the cipher lock and stored by the cipher lock, and the cipher lock is bound with the user terminal; and the acquired unlocking cipher is sent to the user terminal. Thus, the phenomenon that in the case of cipher lock and server communication abnormalities, the user can not unlock the cipher lock through an unlocking cipher inputting mode can be effectively avoided.

Description

A kind of coded lock control method, device and system
Technical field
The invention belongs to control field, be specifically related to a kind of coded lock control method, device and system.
Background technology
The existing coding lock system based on internet, after typically being generated by coded lock, gateway and password Platform forms.User is when coded lock to be opened, and needing first to generate backstage transmission password to password please Asking, password generates backstage and sends to user terminal according to password request one password of generation and pass through net Close and send password to coded lock.Coded lock is according to the password configuration coded lock obtaining, and user passes through institute Coded lock opened by the password receiving.
The coded lock being arranged on door typically uses battery to power, and therefore, is limited to the battery of coded lock Electricity, coded lock needs to generate backstage by gateway and password and realizes communication connection, and non-immediate and close Code generates backstage and realizes communication connection.
Communication link between coded lock and gateway and gateway and password generate the communication between backstage When link breaks down, password generates backstage and will be unable to be given birth to according to the password request of user terminal transmission The unlocking cipher becoming sends to coded lock, and then can cause the user cannot be according to the unlocking cipher being received Open the door corresponding to coded lock.
Content of the invention
It is an object of the invention to provide a kind of auth method and system, to improve above-mentioned problem.
First aspect, embodiments provides a kind of coded lock control method, comprising: obtain and use The password request that family terminal sends, obtains a unlocking cipher, described unlocking according to described password request Password is previously generating and being sent in multiple unlocking ciphers that coded lock is stored by described coded lock Individual, described coded lock is bound with described user terminal phase;Acquired unlocking cipher is sent extremely described User terminal.
Second aspect, the embodiment of the present invention additionally provides another kind of coded lock control method, comprising: obtain Take the verification password of family input;Verification password and the multiple unlocking ciphers being stored when user's input In at least one unlocking cipher coupling when, send open command to corresponding electric lockset, wherein, The multiple unlocking ciphers being stored are the unlocking cipher being generated by server.
The third aspect, the embodiment of the present invention additionally provides a kind of coded lock control system, including server, Coded lock and gateway.Described server is used for generating multiple unlocking cipher, it is thus achieved that user terminal sends Password request, obtains a unlocking cipher according to described password request, sends out acquired unlocking cipher Deliver to user terminal.Described gateway is used for obtaining the plurality of unlocking cipher in described server, and Send acquired the plurality of unlocking cipher to described coded lock.Described coded lock is for being connect The plurality of unlocking cipher storage received, receives the verification password of user's input, when the school of user's input When at least one unlocking cipher mates in the multiple unlocking ciphers tested password and stored, send unlatching and refer to Order is to corresponding electric lockset.
Fourth aspect, the embodiment of the present invention additionally provides a kind of coded lock control device, comprising: password Setup unit and transmitting element.Password setting unit is used for obtaining the password request that user terminal sends, Obtaining a unlocking cipher according to described password request, described unlocking cipher is for prestoring and being sent to One of multiple unlocking ciphers that coded lock is stored by described coded lock.Transmitting element is for being obtained The unlocking cipher taking sends to described user terminal.
5th aspect, the embodiment of the present invention additionally provides a kind of coded lock control device, comprising: verification Password acquiring unit and authentication unit.Verification password acquiring unit is close for the verification obtaining user's input Code.Authentication unit for when in verification password and multiple unlocking ciphers of being stored of user's input at least During one unlocking cipher coupling, open corresponding door, wherein, multiple unlocking ciphers of being stored For the unlocking cipher being generated by server.
In the embodiment of the present invention, at coded lock initial phase, generate multiple unlocking at server in advance Password, and sent the multiple unlocking cipher being generated to coded lock, password by gateway by server Multiple unlocking cipher storage that lock will be received.Thus, multiple unlocking ciphers that server will be generated Corresponding with coded lock, and the password that coded lock is stored also is stored in server.
Server, after receiving the password request that user terminal sends, finds according to the ID of user terminal The coded lock of the ID binding with user terminal, finds this coded lock institute right further according to bound coded lock The multiple unlocking ciphers answered, according to default unlocking cipher search rule many corresponding to this coded lock Individual unlocking cipher obtains a unlocking cipher, sends acquired unlocking cipher to user terminal.
User can obtain unlocking cipher by user terminal, inputs password, work as input at coded lock Password and coded lock in storage multiple unlocking ciphers at least one when mating, open coded lock Corresponding electric lockset.Unlocking cipher compared with coded lock of the prior art, acquired in user Store in coded lock when coded lock is initialized, and without unlocking cipher being sent out at server While delivering to user terminal send unlocking cipher to coded lock, so that user terminal and coded lock Password is consistent.Therefore, even if the communication link between coded lock and server breaks down and cannot be just Normal open is believed, nor affecting on server is that user terminal assigns lock cipher and user is beaten by unlocking cipher Open coded lock.When effectively prevent coded lock and server communication abnormality, user cannot be opened by input The mode of lock cipher opens coded lock.
Brief description
In order to be illustrated more clearly that the embodiment of the present invention or technical scheme of the prior art, below by right In embodiment, the accompanying drawing of required use is briefly described, it should be apparent that, below describe in attached Figure is only some embodiments of the present invention, for those of ordinary skill in the art, is not paying On the premise of creative work, other accompanying drawing can also be obtained according to these accompanying drawings.By accompanying drawing institute Showing, the above and other purpose of the present invention, feature and advantage will become apparent from.Phase in whole accompanying drawings With the reference identical part of instruction.Deliberately do not draw accompanying drawing by actual size equal proportion scaling, Focus on illustrating the purport of the present invention.
The mutual schematic diagram of a kind of coded lock control system that Fig. 1 provides for one embodiment of the invention;
The mutual schematic diagram of a kind of coded lock control system that Fig. 2 provides for another embodiment of the present invention;
The structured flowchart of the coded lock that Fig. 3 provides for one embodiment of the invention;
The method flow diagram of a kind of coded lock control method that Fig. 4 provides for one embodiment of the invention;
The method flow diagram of a kind of coded lock control method that Fig. 5 provides for another embodiment of the present invention;
In a kind of coded lock control method that Fig. 6 provides for another embodiment of the present invention, coded lock initializes Method flow diagram;
The method flow diagram of a kind of coded lock control method that Fig. 7 provides for another embodiment of the present invention;
The renewal side of the unlocking cipher of a kind of coded lock control method that Fig. 8 provides for the embodiment of the present invention The method flow diagram of method;
Disabling of the unlocking cipher of a kind of coded lock control method that Fig. 9 provides for the embodiment of the present invention The method flow diagram of journey;
The method flow diagram of a kind of coded lock control method that Figure 10 provides for another embodiment of the present invention;
The structured flowchart of a kind of coded lock control device that Figure 11 provides for one embodiment of the invention;
A kind of coded lock control apparatus structure block diagram that Figure 12 provides for another embodiment of the present invention;
A kind of coded lock control apparatus structure block diagram that Figure 13 provides for another embodiment of the present invention;
A kind of coded lock control apparatus structure block diagram that Figure 14 provides for another embodiment of the present invention.
Detailed description of the invention
Below in conjunction with accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out Clearly and completely describe, it is clear that described embodiment is only a part of embodiment of the present invention, Rather than whole embodiments.The generally group of the embodiment of the present invention described and illustrated in accompanying drawing herein Part can be arranged with various different configurations and design.Therefore, below to the basis providing in the accompanying drawings The detailed description of inventive embodiment is not intended to limit the scope of claimed invention, but only Only represent the selected embodiment of the present invention.Based on embodiments of the invention, those skilled in the art are not having There is the every other embodiment being obtained on the premise of making creative work, broadly fall into present invention protection Scope.
It should also be noted that similar label and letter represent similar terms, therefore, one in following accompanying drawing A certain Xiang Yi the accompanying drawing of denier is defined, does not then need to carry out it further in accompanying drawing subsequently Definition and explanation.Meanwhile, in describing the invention, term " first ", " second " etc. are only used Describe in distinguishing, and it is not intended that indicate or hint relative importance.
Refer to Fig. 1, show a kind of coded lock control system 100.Coded lock control system 100 is wrapped Include coded lock the 110th, gateway the 120th, server 130 and user terminal 140.Coded lock 110 and gateway 120 couplings, gateway 120 and server 130 couple.Leading between coded lock 110 and gateway 120 When letter link is normal, coded lock 110 and gateway 120 can carry out data interaction, in like manner, work as gateway When communication link between 120 and server 130 is normal, gateway 120 can be carried out with server 130 Data interaction.
Coded lock 110 can drive the executing agency opening and closing for controlling door to perform corresponding Action, to control the opening and closing of corresponding door.As a kind of embodiment, coded lock 110 Including controller, memory and electric lockset, memory is used for storing the unlocking cipher that server sends, Controller sends open command for the matching result of the password according to input and its unlocking cipher storing To electric lockset.Electric lockset is for opening according to open command.Coded lock 110 can include defeated Entering button, this load button inputs unlocking cipher for user.
Gateway 120 for being used for realizing communication Protocol Conversion before coded lock 110 and server 130 so that The computer equipment of coded lock 110 and server 130 network interconnection or system.As a kind of embodiment party Formula, coded lock 110 uses battery to power, and therefore, is limited to the electricity of battery, and coded lock 110 needs To be communicated with server 130 by gateway 120.It should be noted that each password shown in Fig. 1 The corresponding gateway 120 of lock 110, certainly, in application scenes, for example close together multiple close Code lock 110 can share a gateway 120.Gateway 120 connects different passwords by different ports Lock 110.
Server 130 can be the webserver or database server, is used for generating unlocking cipher simultaneously Unlocking cipher is sent to coded lock 110 by gateway 120.Preferably, it is equipped with in server 130 Password Management backstage, this Password Management backstage is for generating unlocking cipher and asking according to the password being received Ask transmission unlocking cipher to user.As a kind of embodiment, server 130 generated each open Lock cipher is all to there being the information such as use state, mark and the term of validity, and server 130 is by unlocking cipher And the unlocking cipher corresponding use state of lock, mark is corresponding with the term of validity is stored in a tables of data. In addition, server 130 is responsible for the password configuration of multiple coded lock, therefore, also set in this tables of data There is coded lock label.Wherein, coded lock label can be the device id of coded lock 110, certainly also may be used To be the room number corresponding to coded lock 110.
As a kind of embodiment, this tables of data can be as shown in table 1:
Table 1
By " the coded lock label A " of table 1 it can be seen that multiple unlocking ciphers in table 1 are corresponding is Coded lock is numbered the coded lock of A.The coded lock 110 that server 130 is managed can have multiple, Coded lock corresponding to coded lock label B and coded lock label C as shown in Figure 1, server 130 All set up a tables of data for each coded lock 110.All can use the form shown in table 1, just Modify for the unlocking cipher of coded lock 110 and the management operation such as lookup in server 130.
Wherein, in table 1, the different state of the different numeric representation unlocking ciphers of state, example are used As use state 0 represents that unlocking cipher " does not uses ", and use state 1 represents that unlocking cipher " uses In ", use state 2 represents that unlocking cipher " uses ".Wherein, unlocking cipher " using " is Refer to that this unlocking cipher has been used and user has abandoned using or have passed through validity period Limit, and in view of the security of password, the unlocking cipher using state to be " using " should be by more Change, and should not come into operation again.
In table 1, being designated position in tables of data for the unlocking cipher, for example, mark can be each Physical address in the memory space at tables of data place for the unlocking cipher or the finger of sensing storage address Pin.Identified by arranging, it is simple to the unlocking cipher in tables of data is made a look up and changes by server, The unlocking cipher being stored in also allowing for server update coded lock.Due in the embodiment of the present invention, pin To same coded lock label, in needing to keep server, stored multiple unlocking cipher and password as far as possible The unlocking cipher being stored in Suo is consistent, therefore, when updating in server or change unlock code, The unlocking cipher storing in needing corresponding Modify password lock.Server comprises to be changed by sending one The modification instruction of the corresponding mark of unlocking cipher to coded lock, coded lock is after receiving this modification instruction Corresponding for the mark being received unlocking cipher is sent out by the instruction instructing according to this modification according to server The unlocking cipher sending is modified.
In addition, in table 1, the term of validity is that unlocking cipher can be used in opening the door corresponding to coded lock Time limit.When arranging new unlocking cipher for the first time, the term of validity of unlocking cipher is used as default. Wherein, default value can be a timing node or time numerical value.Such as 12 days, the date of start of calculation was for just The time point of secondary generation unlocking cipher.It should be noted that generating unlocking cipher for the first time can be system The unlocking cipher generating for the first time during initialization, it is also possible to be that old unlocking cipher is updated to new opening Lock cipher.In addition, " T1 " in table 1 represents the term of validity of the unlocking cipher manually arranging.Manually The start time of the term of validity arranging can be dual lock password when the term of validity is manually set when segmentum intercalaris Point, the end time of the term of validity manually arranging can set according to actually used demand.
User terminal 140 is used for sending password request to server, and wherein, password request includes using The identity information of family terminal and coded lock label.Wherein, the identity information of user terminal and coded lock mark Number binding mutually, the identity information of user terminal can be the MAC Address of user terminal or user passes through The login account being used during the application program login service device installed on user terminal.Real as one Executing mode, the identity information of user terminal is login account.Application program is installed on the subscriber terminal, This application program is logged in by this application program as the interaction platform of user terminal and server, user Server, send password request to server and from server obtain unlocking cipher.
Refer to Fig. 2, a kind of coded lock control system 100 providing for the embodiment of the present invention.With Fig. 1 Except for the difference that, the coded lock control system shown in Fig. 2 is applied to be provided with the locker of coded lock.This When, corresponding coded lock 110 can drive and perform for the executing agency that switch board door opens and closes Corresponding action, to control the opening and closing of corresponding cabinet door.In embodiment shown in Fig. 2, Coded lock label is the cabinet door number of locker, such as G1, G2 and the G3 etc. in Fig. 2.Need explanation , coded lock 110 may be mounted at the parts such as door, cabinet door, chamber door or drawer.Wherein, electricity Sub-lockset seals device as the parts such as door, cabinet door, chamber door or drawer.In the embodiment of the present invention, The application scenarios of coded lock 110 is defined as door or cabinet door so that coded lock control method, device to be described And the detailed description of the invention of system, and not the application scenarios of coded lock is limited.
As it is shown on figure 3, be the structured flowchart of coded lock 110.Coded lock 110 includes: lock pin control Device processed 111st, memory the 112nd, storage control the 113rd, processor the 114th, Peripheral Interface is the 115th, defeated Enter output unit 116 and display unit 117.
Coded lock control device the 111st, memory the 112nd, storage control the 113rd, processor is the 114th, outer If interface the 115th, input-output unit 116 and each element of display unit 117 are direct or indirect each other Ground is electrically connected with, to realize the transmission of data or mutual.For example, these elements can pass through each other One or more communication bus or holding wire realize being electrically connected with.Described coded lock control device 111 wraps Include at least one to be stored in described memory with the form of software or firmware (firmware) or solid Change the software function in the operating system (operating system, OS) of described coded lock 110 Module.Described processor 114 is for performing the executable module of storage in memory, for example described close The code software function module that includes of lock control device 111 or computer program.
Wherein, memory 112 may be, but not limited to, random access memory (Random Access Memory, RAM), read-only storage (Read Only Memory, ROM), Programmable read only memory (Programmable Read-Only Memory, PROM), erasable Read memory (Erasable Programmable Read-Only Memory, EPROM), electrically erasable Except read-only storage (Electric Erasable Programmable Read-Only Memory, EEPROM) etc..Wherein, memory 112 is used for storing program, and described processor 114 is receiving After performing instruction, performing described program, what aforementioned embodiment of the present invention any embodiment disclosed flows through journey The method performed by server 130 of definition can apply in processor 114, or by processor 114 realize.It in addition, memory 113 is as the storage medium of coded lock, is used for storing server and sends Unlocking cipher and the data such as the corresponding mark of unlocking cipher, the term of validity and use state.
Processor 114 is probably a kind of IC chip, has the disposal ability of signal.Above-mentioned Processor can be general processor, including central processing unit (Central Processing Unit, Be called for short CPU), network processing unit (Network Processor, be called for short NP) etc.;Can also is that numeral Signal processor (DSP), special IC (ASIC), ready-made programmable gate array (FPGA) or its His PLD, discrete gate or transistor logic, discrete hardware components.Can be real Disclosed each method now or in the execution embodiment of the present invention, step and logic diagram.General procedure The processor etc. that device can be microprocessor or this processor also can be any routine.
Various input/output devices are coupled to processor 114 and memory by described Peripheral Interface 115 112.In certain embodiments, Peripheral Interface, processor 114 and storage control 113 can be One single chip realizes.In some other example, they can be realized by independent chip respectively.
Input unit 116 realizes the mutual of user and coded lock 110 for being supplied to user input data. Described input-output unit 116 may be, but not limited to, keyboard etc..
Display 117 provides an interactive interface (such as user behaviour between coded lock 110 and user Make interface) or be used for showing view data to user's reference.In the present embodiment, described display unit 117 can be liquid crystal display.
It should be noted that when the virtual key that input unit 116 is display on display 117, Input unit 116 and display 117 are integrated into touch control display.Then in this touch control display, aobvious Show that device 117 can be for supporting capacitance type touch control screen or the resistance type touch control screen etc. of single-point and multi-point touch operation. Support that single-point and multi-point touch operation refer to that touch control display can sense on this touch control display one The touch control operation that individual or multiple positions produce simultaneously, and the touch control operation that this is sensed transfer to process Device calculates and processes.
Fig. 4 shows a kind of coded lock control method that the embodiment of the present invention provides, and the method is applied to Said system and device.Coded lock control method at least includes: step S301 and step S302.Below The step being comprised by the method to the present embodiment for the executive agent with server 130 is described in detail.
Step S301, it is thus achieved that the password request that user terminal sends, obtains one according to described password request Individual unlocking cipher, described unlocking cipher generates and sends to coded lock by described coded lock for prestoring One of multiple unlocking ciphers of storage, described coded lock is bound with described user terminal phase.
The multiple unlocking ciphers being stored in coded lock 110 be coded lock 110 when initializing, by taking Business device 130 generates and sends to coded lock 110 storage.It is to say, in step S301 Before, coded lock 110 needs first to initialize.By the initialization of coded lock 110, server 130 To be given birth in the case of server the 130th, the communication link between gateway 120 and coded lock 110 is normal The multiple unlocking cipher becoming sends to coded lock 110, so that multiple unlockings that coded lock 110 will be received Password stores.Thus, multiple unlocking cipher that coded lock 110 is stored is stored with server 130 Multiple unlocking ciphers consistent.After coded lock 110 successful initialization, coded lock 110 just can Input password as user to be used to open the control device of door.Namely coded lock 110 is becoming Before work(initializes, user cannot subscribe the room corresponding to coded lock 110, and server 130 is not yet Response user is for the password request of this coded lock 110.
Coded lock 110 and user terminal 140 are corresponding, and this corresponding relation can user eventually Generate, by user terminal 140 by predetermined room during the end 140 reservation corresponding room of this coded lock Coded lock label send to server 130, by server 130 by user terminal with by user terminal institute The phase-locked binding of password in predetermined room.Also can be user when sending password request, server 130 According to password request, coded lock 110 is bound with user terminal 140.Wherein, user terminal 140 institute The password request sending can be the request of the acquisition password that user sends when reservation, it is also possible to It is when the formality that user moves in reservation has been handled complete, the acquisition sending to server 130 The request of password.
For example, the password request sending at user terminal 140 includes coded lock label and user terminal Identity information.Wherein, coded lock label can represent the room label representated by coded lock 110, The identity information of user terminal 140 can be user account information, it is also possible to be user terminal 140 MAC Address or SIM number.Wherein, the label in room can be the number in room or room institute is right The geographical position answered.Server 130 is after receiving password request, by the data to password request Resolve and obtain the identity information including coded lock label in password request and user terminal, by close The identity information binding of code lock label and user terminal.I.e. can be by the identity letter of table 1 and user terminal Breath correspondence.When user terminal 140 needs to change corresponding coded lock, after including replacing The replacement request of coded lock label is sent to server 130, so that server 130 is by the body of user terminal Part corresponding coded lock of information is revised as the coded lock label after changing.
Again for example, user terminal 140 is when server 130 logs in or registers, and server 130 can Obtain the identity information of user terminal.When user terminal 140 is reserved a room, user terminal 140 will The room label subscribed sends to server 130.Be stored with on server 130 multiple coded lock label And with the room label corresponding to this coded lock label.Obtain user terminal institute at server 130 pre- During the room label booked, obtain and this room label corresponding coded lock label according to this room label, Coded lock is bound with user terminal.
Server 130, after receiving password request, is obtained by the parsing of the data to password request Including the identity information of coded lock label in password request and user terminal.According to coded lock label Find corresponding multiple unlocking ciphers under this coded lock label, opened by the plurality of further according to preset rules Lock cipher obtains a unlocking cipher.Wherein, preset rules can be that one unlocking of random acquisition is close Code, it is also possible to obtain unlocking cipher according to certain strategy, will be described in detail in follow-up embodiment.
Step S302: send acquired unlocking cipher to described user terminal.
Server 130 obtains coded lock mark according to the binding relationship of coded lock 110 and user terminal 140 The identity information of the user terminal corresponding to number, sends acquired unlocking cipher to user terminal User terminal 140 corresponding to identity information.
User obtains unlocking cipher by user terminal 140, according to the unlocking cipher being obtained at password Lock input validation password at 110, the verification password that user is inputted by coded lock 110 and storage in it Multiple unlocking ciphers match, if the verification password of user's input and its interior multiple unlocking ciphers storing In at least one is consistent, then coded lock 110 controls its corresponding door and opens.
As a kind of embodiment, it is as follows that coded lock 110 controls the mode that its corresponding door opens:
The controller of coded lock 110 sends open command to the electric lockset of coded lock 110, with control Electric lockset is opened, thus opens door.Specifically, electric lockset includes drive mechanism and execution Mechanism, wherein, drive mechanism can be the device that motor etc. is capable of output mechanical energy, executing agency Set according to the lock core structure of electric lockset, for example, it may be pole, will by way of spacing Puzzle lock fastening.Open command can control the duty of the drive mechanism in electric lockset, for example, Rotating and reverse of motor, thus drive the movement of executing agency, and then control executing agency opens Coded lock.
Therefore, before coded lock 110 i.e. obtains password request when initialized, server is completed The storage of the multiple unlocking ciphers between 130 and coded lock 110 and setting.Obtain at server 130 During to the password request of user, server 130 is without depending on the unlocking to coded lock 110 for the network again Password is configured.Avoid after user sends password request, coded lock 110 and gateway 120 or Communication link between person's gateway 120 and server 130 is abnormal, causes server 130 to configure The unlocking cipher of coded lock, causes user cannot open coded lock by input unlocking cipher.
In order to keep coded lock 110 multiple unlocking cipher of being stored and server 130 when initializing The unlocking cipher strict conformance being stored, server 130 needs the feedback according to coded lock 110 to deposit Store up generated password.
As it is shown in figure 5, a kind of coded lock control method that the embodiment of the present invention provides, at least include: Step S401, step S402, step S403, step S404 and step S405.Below will be with service The step that device 130 is comprised by the method to the present embodiment for the executive agent describes in detail.
Step S401: generate multiple unlocking cipher.
The multiple mutual unduplicated unlocking cipher of server 130 stochastic generation, each unlocking cipher is all right Answer a mark, use state and the term of validity, for example, use the form in table 1.
Step S402: send the plurality of unlocking cipher to described coded lock, so that described coded lock The multiple unlocking cipher storage that will be received.
In the case of server 130 and coded lock 110 communication link are normal, server 130 will be many Individual unlocking cipher sends to coded lock 110.The multiple unlocking ciphers being received are stored in by coded lock 110 In the memory of coded lock 110.
Step S403: obtain and obtain the life after the received unlocking cipher of successfully storage of described coded lock The plurality of unlocking cipher is stored by the first instruction becoming.
Coded lock 110, when memory space inadequate or internal hardware fault, can cause unlocking cipher Storage failure or loss of data, if now server 130 is by close for the multiple unlockings corresponding to coded lock Code storage, may result in server 130 unlocking cipher being stored and opening that coded lock 110 is stored Lock cipher is inconsistent.
Therefore, coded lock 110 is after obtaining unlocking cipher and successfully storing, and feedback the first instruction is extremely Server 130.Wherein, the first instruction is for representing coded lock 110 successfully by acquired unlocking Password stores.Specifically, coded lock 110 generates first after obtaining unlocking cipher and successfully storing Instruction, and the first instruction is sent to gateway, gateway sends the first instruction to server.Server 130 after receiving the first instruction, by multiple unlocking ciphers that are that generated and that be sent to coded lock 110 Storage, it is preferable that with the form storage of the tables of data shown in table 1.Specifically, server by more New unlocking cipher storage it can be understood as server update after unlocking cipher replace renewal before Unlocking cipher simultaneously stores, and now, in server, multiple unlocking ciphers corresponding with this coded lock just become Unlocking cipher after renewal.Do not store if server only updates unlocking cipher, then can be understood as clothes Business device have updated unlocking cipher, but the unlocking cipher after not updating is stored in the memory of server In (for example, hard disk), the unlocking cipher before i.e. not updating covers;It is also understood that will more Unlocking cipher after Xin is revised as the unlocking cipher before updating and stores.
First instruction can be an operational order for making server perform corresponding actions, it is also possible to It is the description information of multiple unlocking ciphers that coded lock 110 is stored, for example, multiple unlocking ciphers Metadata.If first instruction include that this describes information, server 130 obtain described first instruction after, Resolve the described first instruction and obtain the description information of multiple unlocking ciphers that coded lock 110 successfully stores. According to described description information, server 130 can interpolate that whether described coded lock 110 is given birth to server That become and send to multiple unlocking ciphers of coded lock and all successfully store, when server 130 judges password Locking when successfully storing the plurality of unlocking cipher, the plurality of unlocking cipher is also stored by server 130.
Preferably, the multiple unlocking ciphers for the ease of server 130, coded lock 110 being stored Management, multiple unlocking ciphers that coded lock 110 is stored also can use the form of table 1, and service The unlocking cipher of device 130 drawback lock password interior storage with the corresponding relation of mark and the term of validity and coded lock Identical with the corresponding relation of mark and the term of validity.
Step S404: obtain the password request that user terminal sends, obtains one according to described password request Individual unlocking cipher, described unlocking cipher generates and sends to coded lock by described coded lock for prestoring One of multiple unlocking ciphers of storage, described coded lock is bound with described user terminal phase.
Step S405: send acquired unlocking cipher to described user terminal.
The implementation process of above-mentioned steps S404 and S405 is referred to corresponding step S301 of Fig. 4 and step Rapid S302, does not repeats them here.
Above-mentioned steps S401, step S402 and step S403 are that coded lock initializes, real as one Executing mode, coded lock initializes and can use in the method flow of the coded lock control method shown in Fig. 6 Step S502 to S506.
As shown in Figure 6, coded lock control method at least includes: step S501 is to step S508.
Step S501: generate multiple unlocking cipher.
The detailed description of the invention of step S501 is referred to corresponding step S401 of Fig. 5.
Step S502: server sends the plurality of unlocking cipher to described gateway.
Server, after execution of step S501, sends the multiple unlocking cipher being generated to gateway 120。
Step S503: whether gateway is properly received the plurality of unlocking cipher?
Gateway 120 can feed back the when being successfully received multiple unlocking cipher that server 130 sends Two instructions are to described server 130.Wherein, the second instruction represents that gateway 120 has been successfully received service Multiple unlocking ciphers that device 130 sends.
If gateway 120 is properly received the plurality of unlocking cipher, then step S504.If gateway 120 It is not successfully received the plurality of unlocking cipher, then step S502.Gateway 120 is not properly received The plurality of unlocking cipher is probably due to the connection fault of gateway 120 and server 130, it is also possible to Data transmission procedure has the problem such as active or gateway hardware fault.At this point it is possible to attempt returning step Rapid S502, server 130 reattempts transmission once multiple unlocking ciphers to gateway 120.If repeatedly Sending, gateway 120 does not all return the second instruction to server 130, i.e. gateway 120 is all not successfully received Multiple unlocking ciphers that server 130 sends, then initialize unsuccessfully, after pending fault is got rid of, again holds Row step S502.
Step S504: gateway sends the plurality of unlocking cipher to coded lock.
If gateway 120 is properly received the plurality of unlocking cipher, then multiple unlocking ciphers are sent extremely close Code lock 110.
As a kind of embodiment, multiple unlocking ciphers are sent out by server 130 by the form of packet Give gateway 120, then gateway 120 is transmitted to coded lock 110.Wherein, packet includes source address With destination address, multiple unlocking cipher and the corresponding term of validity of each unlocking cipher and mark etc..Its In, source address is the mailing address of server 130, for example, can be IP address, and destination address is close The mailing address of code lock 110.Source address according to included by packet for the gateway 120 and destination address, Lead to the port of coded lock 110 in finding gateway 120, send multiple unlocking ciphers to coded lock 110.
Step S505: whether coded lock successfully stores the plurality of unlocking cipher?
Coded lock 110 is successfully storing multiple unlocking ciphers that server 130 is sent by gateway 120 When, feedback the first instruction is to described server 130.Specifically, coded lock 110 can will received Multiple unlocking ciphers send the first instruction extremely when being successfully stored in the corresponding memory of coded lock 110 Server 130.Certainly, in order to keep the data of transmission between coded lock 110 and server 130 Integrality, coded lock 110 also can be to institute after receiving multiple unlocking ciphers that gateway 120 sends The integrality of the multiple unlocking ciphers receiving is verified.As a kind of embodiment, coded lock 110 And can verify that coded lock 110 is received by the data check of communication protocol between server 130 The integrality of data.For example, the corresponding data of multiple unlocking ciphers that server 130 sends include one Individual check bit, this check bit generates according to the standard of communication protocol according to multiple unlocking ciphers.Password Lock 110 receive server 130 send multiple unlocking ciphers after, according to received data with And calculate a check value according to the standard meter of the communication protocol arranged with server 130, if being counted The check value calculated is consistent with the check value of the data that server 130 sends, then show that coded lock 110 is complete Have received multiple unlocking ciphers that server 130 sends wholely.
If coded lock 110 successfully stores the plurality of unlocking cipher, then step S505.If password Lock the 110 the plurality of unlocking ciphers of unsuccessful storage, then step S501.Server 130 is tasted again Examination sends once multiple unlocking ciphers to coded lock 110.
Step S506: coded lock sends first and instructs to server, so that the multiple unlocking of server storage Password.
Server 130 receives what coded lock 110 sent after successfully storing the plurality of unlocking cipher First instruction, the multiple unlocking cipher storage that will be generated, thus, initialization terminates.Pass through password The initialization of lock 110, the multiple unlocking cipher making coded lock 110 be stored is deposited with server 130 Multiple unlocking ciphers of storage.Further, it is possible to before server 130 receives the password request of user, Complete to initialize so that the configuration of the unlocking cipher of coded lock 110 be independent of its with server 130 it Between communication conditions.
Step S507: obtain the password request that user terminal sends, obtains one according to described password request Individual unlocking cipher, described unlocking cipher generates and sends to coded lock by described coded lock for prestoring One of multiple unlocking ciphers of storage, described coded lock is bound with described user terminal phase.
Step S508: send acquired unlocking cipher to described user terminal.
The detailed description of the invention of step S507 and step 508 is referred to step S404 of previous embodiment And S405, do not repeat them here.
For reasonable distribution unlocking cipher, the embodiment of the present invention is reasonable according to the use state of unlocking cipher Assign lock cipher for user terminal, as it is shown in fig. 7, a kind of coded lock that the embodiment of the present invention provides Control method, comprising: step 601 is to step S610.
Step S601: obtain the password request that user terminal sends.
Step S601 and the password request obtaining user terminal transmission in step S301 in Fig. 4 Step is consistent, does not repeats them here.
Step S602: whether there is the unlocking cipher of the first state in server?
Wherein, the first state is the use state of unlocking cipher, " making in the corresponding table 1 of the first state By state 0 ", represent that this unlocking cipher is also not used by.There is opening of the first state in server 130 The corresponding multiple unlockings of coded lock 110 in lock cipher refers to server 130 and bound in user terminal In password, at least the use state of a unlocking cipher is the first state, i.e. in server 130 Multiple unlocking ciphers corresponding to coded lock 110 there is untapped unlocking cipher.
If there is the unlocking cipher of the first state, then step S603 in server 130.If service There is not the unlocking cipher of the first state, then step S604 in device 130.
Step S603: server obtains the unlocking cipher of first state.
Server 130 obtains from the unlocking cipher of multiple first states finding step S602 at random Take the unlocking cipher of first state, by the use state of the unlocking cipher of the first acquired state It is revised as the second state.Wherein, this unlocking cipher of the second state representation is in " in use ", its implication Consistent with " using state 1 " in table 1.Only find in step S602 it should be noted that work as The unlocking cipher of one the first state, then, in step S603, server 130 directly obtains in step The unlocking cipher of the first state finding in S602.
The password request that user terminal sends includes that user moves in the time range in this room, for example, move in Time is 12:00 on June 8,12:00 to 2016 year on the 6th June in 2016.Server 130 exists When obtaining the unlocking cipher of the first state, can be according to password request having acquired unlocking cipher The effect phase is set to Preset Time.Wherein, Preset Time refers to move in the time according to user or is server Move in the time for what user specified and time of generating.For example, server 130 is by acquired first The term of validity of the unlocking cipher of state is set to 12:00 on June 8th, 2016.
It should be noted that the unlocking cipher when coded lock initializes or in coded lock 110 is updated When, the term of validity of the unlocking cipher in coded lock 110 is default value.If server 130 is by institute The unlocking cipher of the first state obtaining sends after user terminal 140, server 130 and password Lock 110 is unanimously in communication abnormality state, server 130 cannot update in coded lock with send extremely The term of validity of the unlocking cipher corresponding to the unlocking cipher of user terminal, then user institute in coded lock 110 The term of validity of the unlocking cipher using is still default value.If the time of default value is more than Preset Time, Can cause user after checking out, and the unlocking cipher that user is used is not disabled it by server 130 Before, user still can open door with unlocking cipher.
In order to avoid the generation of above-mentioned condition, server 130 can be updated in coded lock 110 with The operation of the term of validity of the corresponding unlocking cipher of unlocking cipher that user is used is placed in server 130 In background thread, and the communications status of moment monitoring server 130 and coded lock.Once server 130 When connection with coded lock is normal, server 130 performs to update being made with user in coded lock 110 The operation of the term of validity of the corresponding unlocking cipher of unlocking cipher, by coded lock 110 and user The term of validity of the corresponding unlocking cipher of unlocking cipher being used is revised as Preset Time.
Step S604: whether coded lock is normal with the communication of server?
Inside ICP/IP protocol, if coded lock 110 and the side's normal shutdown in server 130 When, the opposing party can receive and connect the notice disconnecting.If coded lock 110 and in server 130 When side is due to non-graceful disconnections such as the system failure or power supply are unplugged, can lead between server 130 Whether normal cross the communication between heartbeat mechanism detection server 130 and coded lock 110.Certainly, take Whether business device 130 also can feed back by transmission detection data to coded lock 110 according to coded lock 110 It is properly received the instruction of detection data to judge that whether coded lock is normal with the communication of server 130.Its In, communication is just referring to carry out data interaction between coded lock 110 and server 130.
If coded lock 110 is improper with the communication of server 130, then step S605.If password Lock 110 is normal with the communication of server 130, then step S606.
Step S605: server obtains the unlocking cipher of a third state.
Wherein, the third state represents that this unlocking cipher is in the state of " using ", and in table 1 " use state 2 " consistent.The unlocking cipher of the third state should be worked as and updated and abandoned by server 130 Use, but owing to there is not unlocking cipher and the server 130 of unused state in server 130 Communication with coded lock is off, and server 130 both cannot be close in the multiple unlockings being stored The unlocking cipher of a verification password that can open door as user is obtained in code, also cannot be at clothes Generate new unlocking cipher in business device 130 and coded lock simultaneously and come into operation, therefore, server 130 The unlocking cipher that one term of validity of acquisition is not exceeded the time limit in the unlocking cipher of the third state is opened as user The unlocking cipher that door is used, and by the use status maintenance of the unlocking cipher of the acquired third state Change the second state into.Wherein, the term of validity does not exceeds the time limit the term of validity referring to unlocking cipher more than current time. For example, the term of validity is 11:30 on June 9th, 2016, and current time is on June 6th, 2016 11:00, then the term of validity is more than current time, represents that the term of validity is not exceeded the time limit.
Step S606: the unlocking cipher of the server update third state, and the unlocking cipher that will be updated Send to coded lock.
If the communication between server 130 and coded lock 110 is normal, namely server 130 with Can be with interaction data between coded lock 110, then server 130 can update coded lock 110 and service The unlocking cipher being updated is thrown by the unlocking cipher having used in device 130 as new unlocking cipher Enter to use.
Server 130 obtains the unlocking cipher of the third state, updates the unlocking cipher of this third state, And be the first state by the use status modifier of the unlocking cipher of renewal, the term of validity uses as default. As a example by table 1, before renewal, use state is that the unlocking cipher of the third state is respectively 122345 Hes 123455, corresponding mark is respectively 5 and 6.After renewal, unlocking cipher corresponding to 5 for the mark Being 123345, using state to be " 0 ", unlocking cipher corresponding to 6 for the mark is 123446, uses shape State is " 0 ".
Server 130 will update after unlocking cipher and its corresponding mark and the term of validity send to close Code lock 110, the data i.e. being sent may is that the mark 5-unlocking cipher 123345-term of validity: gives tacit consent to Value;The mark 6-unlocking cipher 123446-term of validity: default value.
Step S607: whether coded lock successfully stores updated unlocking cipher?
After unlocking cipher after receiving the renewal that server 130 sends for the coded lock 110, according to being connect The unlocking cipher received updates opening of described coded lock 110 storage with the corresponding relation of mark and the term of validity Lock cipher and the term of validity.
For example, coded lock 110 is according to the mark 5 of the unlocking cipher being received, and finds stored multiple Unlocking cipher is designated the unlocking cipher of 5, the unlocking cipher being designated 5 being stored is revised as 123345, the term of validity of the unlocking cipher being designated 5 is revised as default value;It is designated 6 by stored Unlocking cipher be revised as 123446, the term of validity of the unlocking cipher being designated 6 is revised as default value.
First can be fed back after coded lock 110 is successfully by the unlocking cipher storage after received renewal Instruction is to described server 130, with step S609.If coded lock 110 cannot successfully will be connect The unlocking cipher storage received, then step S608.Specifically, server 130 can set one Presetting the detection time, wherein, this default detection time can be an empirical value, according to specifically used Environment and set.Server 130 detected whether to be properly received coded lock 110 within the default detection time The first instruction being sent by gateway 120, if being properly received the first instruction within the default detection time, Then represent that coded lock 110 successfully stores the unlocking cipher after updating.If not becoming within the default detection time Work(receives the first instruction, then it represents that the unlocking cipher after coded lock 110 unsuccessful storage renewal.
Step S608: whether reach maximum attempts?
When at the complete unlocking cipher of server update and sending the unlocking cipher being updated to coded lock, note Unlocking cipher after record will update sends to the number of times of described coded lock, and for example, server 130 sets One maximum attempts, sets a variable in server 130, the initial value of variable is 0, service Device 130 sends the unlocking cipher after updating every time and adds 1 to coded lock 110, the value of this variable.
If the unlocking cipher storage that coded lock 110 cannot successfully will be received, then server 130 can be many Secondary trial sends the unlocking cipher after updating to coded lock 110.When the value of variable is attempted secondary not less than maximum During number, return step S606, then in step S607.
When the value of variable exceedes maximum attempts, server is by the unlocking cipher being updated and renewal After unlocking cipher corresponding use state and the term of validity be revised as update before unlocking cipher, use State and the term of validity, and step S605.I.e. between this server 130 and coded lock 110 The renewal failure of unlocking cipher, server 130 step S605, choose opening of a third state Lock cipher, to user terminal, opens the unlocking cipher of door as user.
For example, before updating, mark 5 corresponding unlocking ciphers, use state and the term of validity are: mark 5- The unlocking cipher 123345-term of validity: t1-uses state: 2, when step S606, becomes: The mark 5-unlocking cipher 123344-term of validity: t2-uses state: 0.Server detects coded lock When successfully storing updated unlocking cipher, the unlocking cipher that server will be updated stores.Now, Multiple unlocking ciphers corresponding with coded lock is designated the unlocking cipher of 5 and corresponding in server The term of validity and use state become: the mark 5-unlocking cipher 123344-term of validity: t2-uses state: 0。
When coded lock is after reaching maximum trial storage number of times, still unsuccessful storage is many after updating Individual unlocking cipher, then the unlocking cipher storage that server will not be updated.Now, server is updated Unlocking cipher and corresponding use state and the term of validity etc. be revised as update before unlocking cipher and Corresponding use state and the term of validity, will be designated 5 unlocking cipher and the corresponding term of validity and The renewal that use state is done is abandoned, and is designated unlocking cipher and the corresponding term of validity and the use of 5 State remain as renewal before the mark 5-unlocking cipher 123345-term of validity: t1-uses state: 2.
Step S609: the unlocking cipher after server storage renewal.
Coded lock 110 is when the updated unlocking cipher of successfully storage, and feedback the first instruction is to described clothes Business device 130, the unlocking cipher after server 130 will update stores.By step S606, step S607, Step S608 and step S609, have again the unlocking cipher that can use in server 130.Therefore, Step S603 after execution of step S609.
When execution of step S603, the unlocking cipher of the first state acquired in server 130 can Opening the password of coded lock 110 as user, then step S610.
Step S610: send acquired unlocking cipher to described user terminal.
It should be noted that in step S610, acquired unlocking cipher can be in step S603 The unlocking cipher of the first state, it is also possible to be the unlocking cipher of the third state in step S605.
Step S610 is identical with abovementioned steps S302, does not repeats them here.
In addition, in order to avoid user is after employing unlocking cipher, and will be used in server 130 The use status indication of unlocking cipher be the third state, the state i.e. having used, and cause server Not having new unlocking cipher in 130 for being next time user terminal distribution, the embodiment of the present invention also includes out Lock cipher update method.As shown in Figure 8, the update method of unlocking cipher includes: step S701 is to step Rapid S705.
Step S701: when the communication of server and coded lock is normal, whether server exists the 3rd shape The unlocking cipher of state?
Server 130 needs at server 130 and password with the renewal of the unlocking cipher of coded lock 110 The communication of lock 110 is carried out when normal, and the renewal of unlocking cipher can be according to set by server 130 Update cycle performs.For example, the update cycle that server 130 sets is to update once or one in one week Within individual month, update once, naturally it is also possible to be the unlocking judging the first stored state at server 130 When password quantity is too low, step S701.Wherein, quantity is too low refers to that the unlocking of the first state is close The quantity of code is less than preset value, and described preset value is an empirical value, according to actually used scene Set.
It should be noted that preferably, the unlocking cipher that server 130 is updated is for the 3rd shape The unlocking cipher of state, and the unlocking cipher of the second state and the first state is without updating, and so can keep away Exempt from the unlocking cipher that user is currently in use to be updated and coded lock 110 cannot be opened, and update and do not use Unlocking cipher and the wasting of resources that causes.
If there is the unlocking cipher of the third state, then step S702 in server 130.Server 130 If there is not the unlocking cipher of the third state, then it represents that do not exist in server 130 and need update to open Lock cipher, then terminate this and update.
Step S702: the unlocking cipher of the server update third state, and the unlocking cipher that will be updated Send to coded lock.
Step S703: whether coded lock successfully stores updated unlocking cipher?
If coded lock 110 successfully stores updated unlocking cipher, then step S705.If password Lock the unlocking cipher that 110 unsuccessful storages are updated, then step S704.
Step S704: whether reach maximum attempts?
If the number of times that the updated unlocking cipher of storage attempted by coded lock 110 is not up to maximum attempts, Then step S702.If the number of times that the updated unlocking cipher of storage attempted by coded lock 110 reaches Big number of attempt, then terminate this and update.
Step S705: server 130 stores the unlocking cipher after updating.
The step that above-mentioned steps S702, the embodiment of S703, S704 and S705 are referred in Fig. 7 Rapid S606, step S607, step S608 and step S609, do not repeat them here.However it is necessary that Bright, in step S704, if the number of times of the updated unlocking cipher of storage attempted by coded lock 110 Reach maximum attempts, represent that coded lock 110 cannot store the unlocking that server 130 updated close Code, then terminate this and update, and the new unlocking cipher that server 130 is generated can be deleted, will The new unlocking cipher being buffered in storage discharges.
In order to ensure user after checking out, will not being used by other people of the unlocking cipher that used Or user's unlocking cipher used before still can using after checking out opens door, the present invention Embodiment provides the de-activation procedure of unlocking cipher, as it is shown in figure 9, this de-activation procedure includes: step S801 is to step S808.
Step S801: obtain coded lock password and disable instruction.
Coded lock 110 password disable instruction for server 130 acquired in for execution by user terminal For opening the enabled instruction of the unlocking cipher disabling operation of door, its producing method can include following Several embodiments:
The first, server 130, when sending unlocking cipher to user terminal, starts to user institute The monitoring of the term of validity of the unlocking cipher using, exceeding after the term of validity reaches or in the term of validity makes When using the time limit, generate coded lock 110 password and disable instruction.Wherein, useful life refers to allow user It is continuing with unlocking cipher in certain time after the term of validity is exceeded the time limit.
The second, it is thus achieved that described coded lock 110 password that user terminal sends disables instruction.User exists When checking out, send password by user terminal and disable instruction to server 130.
The third, user is after check-out has been handled on foreground, and the administrative staff in room are by server 130 The status modifier in interior room is for checking out, and server 130 is in the corresponding room of coded lock 110 label Turntable generate password when being changed to the state checked out and disable instruction.
It should be noted that it is close for bound in user terminal that coded lock 110 password disables instruction Code lock 110, i.e. server 130 only by the coded lock 110 bound in user terminal with user terminal institute The unlocking cipher that the unlocking cipher of acquisition is corresponding disables.
Step S802: whether server exists the unlocking cipher of the second state?
The unlocking that whether there is the second state in multiple unlocking ciphers that server 130 lookup is stored is close Code, if existing, step S803.If there is not the unlocking cipher of the second state in server 130, Then in representation theory, all unlocking ciphers in server 130 are all not used by, then terminate this and stop With operation.
Step S803: the unlocking cipher of the second state is updated to the third state by server.
The use state of unlocking cipher during server 130 will use changes to use.
Step S804: whether server is normal with the communication of coded lock?
If server 130 is normal with the communication of coded lock 110, then step S805.If server 130 with the communication abnormality of coded lock 110, then terminate this and disable.
Step S805: the unlocking cipher of the server update third state, and the unlocking cipher that will be updated Send to coded lock.
Step S806: whether coded lock successfully stores updated unlocking cipher?
If coded lock 110 successfully stores updated unlocking cipher, then step S808.If password Lock the unlocking cipher that 110 unsuccessful storages are updated, then step S807.
Step S807: whether reach maximum attempts?
If the number of times that the updated unlocking cipher of storage attempted by coded lock 110 is not up to maximum attempts, Then step S805.If the number of times that the updated unlocking cipher of storage attempted by coded lock 110 reaches Big number of attempt, then terminate this disabling operation.
Step S808: the unlocking cipher after server storage renewal.
Step S804, S805, S806, S807 and S808 are referred to previous embodiment, at this not Repeat again.
It should be noted that the de-activation procedure of described unlocking cipher can not step S803, accordingly Step S805 then become: server 130 updates the unlocking cipher of the second state, and will be updated Unlocking cipher sends to coded lock 110.Concrete, can after the unlocking cipher of second state of acquisition, And in the case of server 130 is normal with the communication of coded lock 110, directly update the second state Unlocking cipher, and the use state by the unlocking cipher of the second state is updated to the first state, then will more Unlocking cipher after Xin sends to coded lock 110, and step S806, S807 and S808.And scheme The unlocking cipher that user is used can not only be disabled by the method flow corresponding to 9, and can be by close Code lock 110 updates with the unlocking cipher having used in server 130, it is simple to next time uses.
By the embodiment corresponding to Fig. 7 it is known that no matter use which kind of mode to be that user terminal is sent out Send a unlocking cipher to open the password of door as user, be required for the unlocking cipher that sent Status modifier is used to be the second state.Therefore, can will be taken by the de-activation procedure of described unlocking cipher The unlocking cipher of the second state in business device 130 updates, and synchronously renewing cipher lock 110 is interior and service The corresponding unlocking cipher of label of the unlocking cipher of second state being updated of device 130 updates.And use Unlocking cipher acquired in the terminal of family is old password, in coded lock 110 cannot successful match, because of This, the unlocking cipher that user is used is deactivated and cannot open coded lock 110.
Refer to Figure 10, embodiments provide a kind of coded lock control method, this coded lock 110 The execution process with coded lock 110 as executive agent for the control method.Described coded lock 110 control method Including:
Step S901: obtain the verification password of user's input.
Step S902: when in the verification password that user inputs and the multiple unlocking ciphers being stored at least one During individual unlocking cipher coupling, send the extremely corresponding electric lockset of open command, wherein, stored Multiple unlocking ciphers are the unlocking cipher being generated by server being received.
In addition, when in the verification password that user inputs and the multiple unlocking ciphers being stored, at least one is opened During lock cipher coupling, send the process of the extremely corresponding electric lockset of open command, concrete, permissible Including:
The verification password match obtaining with described user input is searched in the multiple unlocking ciphers being stored Unlocking cipher;When being searched, the corresponding term of validity of unlocking cipher obtaining is described with acquisition verifies password Time when meeting preset relation, send open command to corresponding electric lockset.
The specific implementation process of above-mentioned steps S901 and S902 refers to the enforcement of preceding method and system Example, does not repeats them here.
Refer to Figure 11, a kind of coded lock control device 111 that the embodiment of the present invention provides, run on Server 130, comprising: password setting unit 210 and transmitting element 220.
Password setting unit 210 is for obtaining the password request that user terminal sends, according to described password One unlocking cipher of acquisition request, described unlocking cipher is for prestoring and being sent to coded lock by described One of multiple unlocking ciphers of coded lock storage.
Transmitting element 220 is for sending acquired unlocking cipher to described user terminal.
Those skilled in the art is it can be understood that arrive, for convenience and simplicity of description, above-mentioned The specific works process of the system, device and the unit that describe, is referred in preceding method embodiment Corresponding process, does not repeats them here.
Refer to Figure 12, a kind of coded lock control device 111 that the embodiment of the present invention provides, run on Server 130, comprising: password dispensing unit the 310th, password setting unit the 320th, transmitting element 330 With disable password unit the 340th, updating block 350 and time setting unit 360.
Password dispensing unit 310 includes generating subelement and the 3101st, sends subelement 3102 and storage singly Unit 3103.
Generate subelement 3101 to be used for generating the plurality of unlocking cipher.Send subelement 3102 to be used for Send the plurality of unlocking cipher to described coded lock, so that described coded lock is multiple by received Unlocking cipher stores.Storing sub-units 3103 is for obtaining what described coded lock was received in successfully storage The plurality of unlocking cipher is stored by the first instruction generating after unlocking cipher.
Password setting unit 320 is for obtaining the password request that user terminal sends, according to described password One unlocking cipher of acquisition request, described unlocking cipher is for previously generating and being sent to coded lock by described One of multiple unlocking ciphers of coded lock storage, described coded lock is bound with described user terminal phase.
Specifically, password setting unit 320 includes that password request obtains subelement 3201 and password is searched Subelement 3202.
Password request obtains subelement 3201 for obtaining the password request that user terminal sends.Password is looked into Look for subelement 3202 for obtaining a unlocking cipher according to described password request.
Wherein, password searches subelement 3202 specifically for when at least including in the plurality of unlocking cipher When one use state is the unlocking cipher of the first state, according to described password request obtains one Use state is the unlocking cipher of the first state, by the unlocking that acquired use state is the first state The use status modifier of password is the second state.
Password is searched subelement 3202 and is additionally operable to and when there is not use state in the plurality of unlocking cipher is , there is the unlocking cipher that use state is the third state in the unlocking cipher of the first state, and server with One the use state of acquisition in communication connection and multiple unlocking cipher that do not sets up between described coded lock is The unlocking cipher that the third state and the term of validity are not exceeded the time limit, by acquired use state be the third state and The use status modifier of the unlocking cipher that the term of validity is not exceeded the time limit is the second state.
When password lookup subelement 3202 is additionally operable between described coded lock set up communication connection, more New all use states are the unlocking cipher of the third state, by the use of the unlocking cipher after all renewal Status modifier is the first state;By the unlocking cipher after all renewal and the corresponding mark of this unlocking cipher Know and send to described coded lock, so that right according to the unlocking cipher being received and mark of described coded lock The unlocking cipher updating the storage of described coded lock should be related to;Obtain a use according to described password request State is the unlocking cipher of the first state.
Transmitting element 330 is for sending acquired unlocking cipher to described user terminal.
Disable password unit 340 to obtain coded lock password and disable instruction;It is second by all use states The use status modifier of the unlocking cipher of state is the third state;Updating all use states is the 3rd shape The unlocking cipher of state;By the mark corresponding to the unlocking cipher of the third state being updated and this unlocking cipher Know and send to described coded lock, so that described coded lock is according to the corresponding unlocking cipher of the mark being received Update the unlocking cipher of described coded lock storage.
Specifically, disable password unit 340 to send to described user terminal for being more than at current time The unlocking cipher corresponding term of validity when, generate described coded lock password and disable instruction, or, it is thus achieved that The described coded lock password that user terminal sends disables instruction.
Updating block 350 is used for updating the unlocking cipher that all use states are the third state and this is opened Lock cipher corresponding use state and the term of validity, wherein, update this unlocking cipher corresponding use state For being the first state by the use status modifier of this unlocking cipher, update this unlocking cipher corresponding effectively Phase is for being set as default value by the term of validity of this unlocking cipher;By all update after unlocking cipher and The corresponding mark of this unlocking cipher and the term of validity send to described coded lock so that described coded lock according to The mark being received updates the unlocking of described coded lock storage with the corresponding relation of unlocking cipher and the term of validity Password and the term of validity.
Time setting unit 360 is for corresponding with described password request opening according to described password request The term of validity of lock cipher is set as Preset Time and sends to described coded lock, so that described coded lock will In the multiple unlocking ciphers being stored, the term of validity of corresponding unlocking cipher is repaiied with the unlocking cipher being received Change Preset Time into.
Those skilled in the art is it can be understood that arrive, for convenience and simplicity of description, above-mentioned The specific works process of the system, device and the unit that describe, is referred in preceding method embodiment Corresponding process, does not repeats them here.
Refer to Figure 13, a kind of coded lock control device 111 that the embodiment of the present invention provides, run on Coded lock 110, comprising: verification password acquiring unit 410 and authentication unit 420.
Verification password acquiring unit 410 is for obtaining the verification password of user's input.Authentication unit 420 For at least one unlocking cipher in the verification password inputting as user and the multiple unlocking ciphers being stored During coupling, sending the extremely corresponding electric lockset of open command, wherein, the multiple unlockings being stored are close Code is the unlocking cipher being generated by server.
Those skilled in the art is it can be understood that arrive, for convenience and simplicity of description, above-mentioned The specific works process of the system, device and the unit that describe, is referred in preceding method embodiment Corresponding process, does not repeats them here.
Refer to Figure 14, a kind of coded lock control device 111 that the embodiment of the present invention provides, run on Coded lock 110, comprising: unlocking cipher acquiring unit the 510th, verify password acquiring unit 520 and checking Unit 530.
Wherein, unlocking cipher acquiring unit 510 for obtain that described server sends by described service Multiple unlocking ciphers that device generates;Feedback first after multiple unlocking ciphers that successfully storage is received Instruction is to described gateway, so that described gateway sends described first instruction to described server.
Verification password acquiring unit 520 is for obtaining the verification password of user's input.
Authentication unit 530 is for when in user's verification password inputting and the multiple unlocking ciphers being stored During at least one unlocking cipher coupling, send the extremely corresponding electric lockset of open command, wherein, institute Multiple unlocking ciphers of storage are the unlocking cipher being generated by server.
Wherein, authentication unit 530 includes coupling subelement 5301 and performs subelement 5302.
Coupling subelement 5301 obtains and described user for searching in the multiple unlocking ciphers being stored The unlocking cipher of the verification password match of input.
Perform subelement 5302 for when the corresponding term of validity of unlocking cipher being searched acquisition and acquisition institute State the time of verification password when meeting preset relation, send open command to corresponding electric lockset.
Those skilled in the art is it can be understood that arrive, for convenience and simplicity of description, above-mentioned The specific works process of the system, device and the unit that describe, is referred in preceding method embodiment Corresponding process, does not repeats them here.
In several embodiments provided herein, it should be understood that disclosed apparatus and method, Also can realize by another way.Device embodiment described above is only schematically, For example, the flow chart in accompanying drawing and block diagram show the device of the multiple embodiments according to the present invention, side The architectural framework in the cards of method and computer program, function and operation.At this point, flow Each square frame in journey figure or block diagram can represent a part for a module, program segment or code, institute The part stating module, program segment or code comprises one or more logic function for realizing regulation Executable instruction.It should also be noted that at some as in the implementation replaced, square frame is marked The function of note also can occur to be different from the order being marked in accompanying drawing.For example, two continuous print sides Frame can essentially perform substantially in parallel, and they also can perform sometimes in the opposite order, and this depends on Depending on involved function.It is also noted that each square frame in block diagram and/or flow chart and The combination of the square frame in block diagram and/or flow chart, can use the function of execution regulation or the special of action Hardware based system realizes, or can realize with the combination of specialized hardware and computer instruction.
In addition, each functional module in each embodiment of the present invention can integrate formation one Independent part, it is also possible to be modules individualism, it is also possible to two or more module collection It is shaped as an independent part.
If described function realizes using the form of software function module and as independent production marketing or make Used time, can be stored in a computer read/write memory medium.Based on such understanding, this Part that prior art is contributed by bright technical scheme substantially in other words or this technical scheme Part can embody with the form of software product, and this computer software product is stored in a storage In medium, including some instructions are with so that a computer equipment (can be personal computer, take Business device, or the network equipment etc.) perform completely or partially walking of method described in each embodiment of the present invention Suddenly.And aforesaid storage medium includes: USB flash disk, portable hard drive, read-only storage (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), magnetic disc or CD Etc. the various media that can store program code.It should be noted that herein, the such as first He The relational terms of second or the like is used merely to an entity or operation and another entity or operation Make a distinction, and not necessarily require or imply there is any this reality between these entities or operation Relation or order.And, term " includes ", "comprising" or its any other variant are intended to Cover comprising of nonexcludability so that include the process of a series of key element, method, article or Equipment not only includes those key elements, but also includes other key elements being not expressly set out, or also Including the key element intrinsic for this process, method, article or equipment.There is no more restriction In the case of, the key element being limited by statement " including ... ", it is not excluded that including described key element Process, method, article or equipment there is also other identical element.
The foregoing is only the preferred embodiments of the present invention, be not limited to the present invention, for For those skilled in the art, the present invention can have various modifications and variations.All essences in the present invention Within god and principle, any modification, equivalent substitution and improvement etc. made, should be included in the present invention Protection domain within.It should also be noted that similar label represents similar with letter in following accompanying drawing , therefore, once a certain Xiang Yi accompanying drawing is defined, then it is right not need in accompanying drawing subsequently It defines further and explains.
The above, the only detailed description of the invention of the present invention, but protection scope of the present invention not office Being limited to this, any those familiar with the art, can in the technical scope that the invention discloses Readily occur in change or replace, all should cover within protection scope of the present invention.Therefore, the present invention Protection domain should described be as the criterion with scope of the claims.

Claims (23)

1. a coded lock control method, it is characterised in that include:
Obtain the password request that user terminal sends, obtain a unlocking cipher according to described password request, Described unlocking cipher be previously generate and be sent to coded lock by described coded lock store multiple unlocking close One of code, described coded lock is bound with described user terminal phase;
Send acquired unlocking cipher to described user terminal.
2. method according to claim 1, it is characterised in that described acquisition user terminal sends Password request before, also include:
Generate the plurality of unlocking cipher;
Send the plurality of unlocking cipher to described coded lock, so that described coded lock will be received Multiple unlocking ciphers store;
Obtain the first instruction that described coded lock generates after the received unlocking cipher of successfully storage, The plurality of unlocking cipher is stored.
3. method according to claim 2, it is characterised in that the plurality of unlocking cipher is sent out Deliver to the step of described coded lock, comprising:
Send the plurality of unlocking cipher to gateway, so that described gateway is the plurality of by received Unlocking cipher sends to described coded lock;
When not receiving the second finger that described gateway sends when being successfully received the plurality of unlocking cipher When making, again sending the plurality of unlocking cipher to gateway, sending out until being successfully received described gateway The second instruction sent.
4. method according to claim 1, it is characterised in that each described unlocking cipher is all right Should have use state, the step obtaining a unlocking cipher according to described password request includes:
When the unlocking cipher at least including in the plurality of unlocking cipher that a use state is the first state When, according to the unlocking cipher that described password request one described use state of acquisition is the first state, will Acquired use state be the use status modifier of the unlocking cipher of the first state be the second state.
5. method according to claim 4, it is characterised in that each described unlocking cipher is all right Should have the term of validity, the step obtaining a unlocking cipher according to described password request includes:
When the plurality of unlocking cipher does not exist the unlocking cipher that use state is the first state, exist Use state is not set up communication between the unlocking cipher of the third state, and server and described coded lock During connection, according to described password request one use state of acquisition be the third state and the term of validity is not exceeded the time limit Unlocking cipher, acquired use state is the third state and unlocking cipher that the term of validity is not exceeded the time limit Use status modifier be the second state.
6. method according to claim 5, it is characterised in that each described unlocking cipher is all right Answering a mark, the step obtaining a unlocking cipher according to described password request also includes:
When setting up communication connection between described coded lock, updating all use states is the third state Unlocking cipher, be the first state by the use status modifier of unlocking cipher after all renewal;
Send the unlocking cipher after all renewal and the corresponding mark of this unlocking cipher to described password Lock, so that described coded lock updates described close according to the unlocking cipher being received with the corresponding relation of mark Code latches the unlocking cipher of storage;
When receiving the first instruction, store the unlocking cipher after all renewal and this unlocking cipher pair The use state answered, wherein, described first instruction successfully stores updated unlocking by described coded lock The instruction generating during password;
According to the unlocking cipher that described password request one use state of acquisition is the first state.
7. method according to claim 6, it is characterised in that by all update after unlocking close Code and the corresponding mark of this unlocking cipher send after described coded lock, and described method also includes:
Record sends the number of times of the extremely described coded lock of the unlocking cipher after updating;
When not receiving the described first instruction within the default detection time, it is judged that whether current number of times is big In default value, if it is not, again send the extremely described coded lock of the unlocking cipher after updating, will work as previous Number adds one;If so, by corresponding to the unlocking cipher being updated and this unlocking cipher use status modifier For the unlocking cipher before renewal and use state, obtain one according to described password request and use state The unlocking cipher not exceeded the time limit for the third state and the term of validity, is the third state by acquired use state And the use status modifier of unlocking cipher that the term of validity is not exceeded the time limit is the second state.
8. method according to claim 1, it is characterised in that each described unlocking cipher is all right Should have mark, use state and the term of validity, described method also includes:
Update the unlocking cipher that all use states are the third state and the corresponding use of this unlocking cipher State and the term of validity, wherein, update this unlocking cipher corresponding use state for by this unlocking cipher Use status modifier to be the first state, update the corresponding term of validity of this unlocking cipher for by this unlocking cipher The term of validity be set as default value;
Unlocking cipher after all renewal and the corresponding mark of this unlocking cipher are sent extremely with the term of validity Described coded lock, so that right according to the mark being received and unlocking cipher and the term of validity of described coded lock Unlocking cipher and the term of validity updating the storage of described coded lock should be related to.
9. method according to claim 8, it is characterised in that by all update after unlocking close Code and the corresponding mark of this unlocking cipher and the term of validity send after described coded lock, described method Also include:
When receiving the first instruction, store the unlocking cipher after all renewal and this unlocking cipher pair The use state answered and the term of validity, wherein, described first instruction for described coded lock successfully store more The instruction generating during new unlocking cipher.
10. method according to claim 9, it is characterised in that by all update after unlocking close Code and the corresponding mark of this unlocking cipher and the term of validity send after described coded lock, described method Also include:
Record sends the number of times of the extremely described coded lock of the unlocking cipher after updating;
When not receiving the described first instruction within the default detection time, and current number of times is more than default During numerical value, again send the extremely described coded lock of the unlocking cipher after updating, and current number of times is added one.
11. methods according to claim 1, it is characterised in that each described unlocking cipher is all right Should there is the term of validity, after obtaining a unlocking cipher according to described password request, also include:
According to described password request, the term of validity of unlocking cipher corresponding with described password request is set as Preset Time simultaneously sends to described coded lock, so that multiple unlocking ciphers that described coded lock will be stored In the term of validity of corresponding unlocking cipher is revised as Preset Time with the unlocking cipher being received.
12. methods according to claim 1, it is characterised in that each described unlocking cipher is all right Should have mark and use state, described method also includes:
Obtain coded lock password and disable instruction;
Use status modifier by the unlocking cipher that all use states are the second state is the third state;
Update the unlocking cipher that all use states are the third state;
Send the mark corresponding to the unlocking cipher of the third state being updated and this unlocking cipher to institute State coded lock, so that described coded lock updates described close according to the corresponding unlocking cipher of the mark being received Code latches the unlocking cipher of storage.
13. methods according to claim 12, it is characterised in that each described unlocking cipher is equal Also to there being the term of validity, the step that described acquisition coded lock password disables instruction includes:
When current time is more than the corresponding term of validity of unlocking cipher of transmission to described user terminal, raw Described coded lock password is become to disable instruction;Or
The described coded lock password obtaining user terminal transmission disables instruction.
14. methods according to claim 12 or 13, it is characterised in that being updated Mark corresponding to the unlocking cipher of three condition and this unlocking cipher sends after described coded lock, institute Method of stating also includes:
When the first instruction receiving feedback when described coded lock successfully stores updated unlocking cipher When, store the unlocking cipher after all renewal and this unlocking cipher corresponding use state.
15. methods according to claim 12 or 13, it is characterised in that the 3rd being updated Mark corresponding to the unlocking cipher of state and this unlocking cipher sends after described coded lock, described Method also includes:
Unlocking cipher after record will update sends to the number of times of described coded lock;
Successfully store updated unlocking cipher when not receiving described coded lock within the default detection time When feedback the first instruction when, and current number of times whether more than default value when, again send after updating Unlocking cipher to described coded lock, and current number of times is added one.
16. 1 kinds of coded lock control methods, it is characterised in that include:
Obtain the verification password of user's input;
Verification password and at least one unlocking cipher in the multiple unlocking ciphers being stored when user's input During coupling, sending the extremely corresponding electric lockset of open command, wherein, the multiple unlockings being stored are close Code is the unlocking cipher being generated by server.
17. methods according to claim 16, it is characterised in that each described unlocking cipher is equal To there being the term of validity, when in the verification password that user inputs and the multiple unlocking ciphers being stored at least one During individual unlocking cipher coupling, the step opening corresponding electric lockset, comprising:
The verification password match obtaining with described user input is searched in the multiple unlocking ciphers being stored Unlocking cipher;
Full when the time being searched the corresponding term of validity of unlocking cipher obtaining verification described with acquisition password During foot preset relation, send open command to corresponding electric lockset.
18. methods according to claim 16, it is characterised in that described acquisition user input Verification password before, also include:
Obtain the multiple unlocking ciphers being generated by described server that gateway sends;
The first instruction extremely described gateway is sent after multiple unlocking ciphers that successfully storage is received, with Described gateway is made to send described first instruction to described server.
19. 1 kinds of coded lock control systems, it is characterised in that include server, coded lock and gateway;
Described server is used for generating multiple unlocking cipher, it is thus achieved that the password request that user terminal sends, Obtain a unlocking cipher according to described password request, acquired unlocking cipher is sent to user eventually End;
Described gateway is for obtaining the plurality of unlocking cipher in described server, and by acquired The plurality of unlocking cipher sends to described coded lock;
Described coded lock, for the plurality of unlocking cipher storage that will be received, receives user's input Verification password, when in the verification password that user inputs and the multiple unlocking ciphers being stored, at least one is opened During lock cipher coupling, send open command to corresponding electric lockset.
20. 1 kinds of coded lock control devices, it is characterised in that include:
Password setting unit, for obtaining the password request that user terminal sends, please according to described password Seeking one unlocking cipher of acquisition, described unlocking cipher is for prestoring and being sent to coded lock by described close Code latches one of multiple unlocking ciphers of storage;
Transmitting element, for sending acquired unlocking cipher to described user terminal.
21. 1 kinds of coded lock control devices, it is characterised in that include:
Verification password acquiring unit, for obtaining the verification password of user's input;
Authentication unit, for when in verification password and multiple unlocking ciphers of being stored of user's input extremely During few unlocking cipher coupling, opening corresponding door, wherein, the multiple unlockings being stored are close Code is the unlocking cipher being generated by server.
22. devices according to claim 21, it is characterised in that also include:
Unlocking cipher acquiring unit, multiple is opened by what described server generated for obtain that gateway sends Lock cipher;The first instruction extremely described gateway is sent after multiple unlocking ciphers that successfully storage is received, So that described gateway sends described first instruction to described server.
23. devices according to claim 21, it is characterised in that described authentication unit includes:
Coupling subelement, defeated with described user for searching acquisition in the multiple unlocking ciphers being stored The unlocking cipher of the verification password match entering;
Perform subelement, described with acquisition for working as the corresponding term of validity of unlocking cipher being searched acquisition When the time of verification password meets preset relation, send open command to corresponding electric lockset.
CN201610500751.9A 2016-06-29 2016-06-29 A kind of coded lock control method, apparatus and system Expired - Fee Related CN105991776B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610500751.9A CN105991776B (en) 2016-06-29 2016-06-29 A kind of coded lock control method, apparatus and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610500751.9A CN105991776B (en) 2016-06-29 2016-06-29 A kind of coded lock control method, apparatus and system

Publications (2)

Publication Number Publication Date
CN105991776A true CN105991776A (en) 2016-10-05
CN105991776B CN105991776B (en) 2019-08-20

Family

ID=57044283

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610500751.9A Expired - Fee Related CN105991776B (en) 2016-06-29 2016-06-29 A kind of coded lock control method, apparatus and system

Country Status (1)

Country Link
CN (1) CN105991776B (en)

Cited By (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106600792A (en) * 2016-12-28 2017-04-26 北京拜克洛克科技有限公司 Unlocking method, system and device of bicycle
CN106920302A (en) * 2017-01-16 2017-07-04 中国铁塔股份有限公司江西省分公司 Method for unlocking, master device for Internet of Things lock, from apparatus and system
CN106934901A (en) * 2017-04-14 2017-07-07 美的智慧家居科技有限公司 Smart lock method for unlocking and device
CN107146309A (en) * 2017-05-22 2017-09-08 广州海图克计算机技术有限公司 A kind of door lock cipher set-up method and door-locking system
CN107368554A (en) * 2017-07-02 2017-11-21 深圳市驿固科技有限公司 A kind of processing method, electronic lock and system for accessing data structured
CN107578503A (en) * 2017-08-24 2018-01-12 东峡大通(北京)管理咨询有限公司 Method for unlocking, unlocking terminal and the smart lock of shared vehicle
CN107590885A (en) * 2017-09-04 2018-01-16 深圳市谷咔互联科技有限公司 A kind of shared bicycle electronic lock unlocking method and system
CN107633580A (en) * 2017-09-14 2018-01-26 京东方科技集团股份有限公司 A kind of smart lock and its control method, intelligent coffer
CN107633588A (en) * 2017-10-24 2018-01-26 北京金储自动化技术有限公司 Control method, system, lockset, electronic equipment and readable storage medium storing program for executing
CN107730689A (en) * 2017-11-06 2018-02-23 广东安居宝数码科技股份有限公司 The door opening method and device of gate control system
CN108242109A (en) * 2016-12-23 2018-07-03 青岛海尔滚筒洗衣机有限公司 A kind of self-service clothes washing method, server and self-service clothes washing system
CN109118634A (en) * 2018-09-28 2019-01-01 伟创达电子科技(深圳)有限公司 A kind of two dimensional code unlocking access control system
CN109243015A (en) * 2018-08-22 2019-01-18 深圳威琳懋生物科技有限公司 intelligent entrance guard robot
CN109410406A (en) * 2018-11-14 2019-03-01 北京华大智宝电子系统有限公司 A kind of authorization method, device and system
CN109978530A (en) * 2017-12-27 2019-07-05 青岛胶南海尔洗衣机有限公司 Offline electronic payment method
CN110073420A (en) * 2016-11-28 2019-07-30 江苏宏宝工具有限公司 System and method for unlocking
CN110300180A (en) * 2019-07-03 2019-10-01 北京享易天下科技有限公司 A kind of service system and method for servicing of shared device
CN111379475A (en) * 2018-12-29 2020-07-07 云丁网络技术(北京)有限公司 Unlocking method of electronic lock, electronic lock and unlocking management equipment
CN112164159A (en) * 2020-09-27 2021-01-01 青岛海信智慧家居系统股份有限公司 Smart hotel-based remote card issuing method and device
CN112863013A (en) * 2021-01-04 2021-05-28 珠海格力电器股份有限公司 Unlocking method, device, equipment and medium
CN113228121A (en) * 2018-12-28 2021-08-06 浙江大华技术股份有限公司 System and method for controlling ingress and egress
CN113538964A (en) * 2021-09-17 2021-10-22 成都宜泊信息科技有限公司 Parking management method, parking management system, storage medium and electronic equipment

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2002117448A (en) * 2000-10-10 2002-04-19 Fuji Denki Reiki Co Ltd Door control system for automatic vending machine
CN202003425U (en) * 2011-03-31 2011-10-05 上海圣兆信息技术有限公司 Central management system for monitoring intelligent lock
CN105024803A (en) * 2014-04-28 2015-11-04 恩智浦有限公司 Behavioral fingerprint in a white-box implementation
CN105205898A (en) * 2015-10-22 2015-12-30 深圳优方网络技术有限公司 Electronic code permission management system for intelligent lock
CN105243752A (en) * 2015-09-11 2016-01-13 赛酷特(北京)信息技术有限公司 Intelligent locking system, and system and method for renting public bike based on same
CN105336022A (en) * 2014-08-13 2016-02-17 李凯 Novel cipher lock

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2002117448A (en) * 2000-10-10 2002-04-19 Fuji Denki Reiki Co Ltd Door control system for automatic vending machine
CN202003425U (en) * 2011-03-31 2011-10-05 上海圣兆信息技术有限公司 Central management system for monitoring intelligent lock
CN105024803A (en) * 2014-04-28 2015-11-04 恩智浦有限公司 Behavioral fingerprint in a white-box implementation
CN105336022A (en) * 2014-08-13 2016-02-17 李凯 Novel cipher lock
CN105243752A (en) * 2015-09-11 2016-01-13 赛酷特(北京)信息技术有限公司 Intelligent locking system, and system and method for renting public bike based on same
CN105205898A (en) * 2015-10-22 2015-12-30 深圳优方网络技术有限公司 Electronic code permission management system for intelligent lock

Cited By (29)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110073420A (en) * 2016-11-28 2019-07-30 江苏宏宝工具有限公司 System and method for unlocking
CN108242109A (en) * 2016-12-23 2018-07-03 青岛海尔滚筒洗衣机有限公司 A kind of self-service clothes washing method, server and self-service clothes washing system
CN106600792A (en) * 2016-12-28 2017-04-26 北京拜克洛克科技有限公司 Unlocking method, system and device of bicycle
CN106920302A (en) * 2017-01-16 2017-07-04 中国铁塔股份有限公司江西省分公司 Method for unlocking, master device for Internet of Things lock, from apparatus and system
CN106934901A (en) * 2017-04-14 2017-07-07 美的智慧家居科技有限公司 Smart lock method for unlocking and device
CN107146309A (en) * 2017-05-22 2017-09-08 广州海图克计算机技术有限公司 A kind of door lock cipher set-up method and door-locking system
CN107368554A (en) * 2017-07-02 2017-11-21 深圳市驿固科技有限公司 A kind of processing method, electronic lock and system for accessing data structured
CN107578503A (en) * 2017-08-24 2018-01-12 东峡大通(北京)管理咨询有限公司 Method for unlocking, unlocking terminal and the smart lock of shared vehicle
CN107590885A (en) * 2017-09-04 2018-01-16 深圳市谷咔互联科技有限公司 A kind of shared bicycle electronic lock unlocking method and system
US10403073B2 (en) 2017-09-14 2019-09-03 Boe Technology Group Co., Ltd. Intelligent lock, method for operating the same, and intelligent safe deposit box
CN107633580A (en) * 2017-09-14 2018-01-26 京东方科技集团股份有限公司 A kind of smart lock and its control method, intelligent coffer
CN107633588A (en) * 2017-10-24 2018-01-26 北京金储自动化技术有限公司 Control method, system, lockset, electronic equipment and readable storage medium storing program for executing
CN107730689A (en) * 2017-11-06 2018-02-23 广东安居宝数码科技股份有限公司 The door opening method and device of gate control system
CN107730689B (en) * 2017-11-06 2020-10-16 广东安居宝数码科技股份有限公司 Door opening method and device of access control system
CN109978530A (en) * 2017-12-27 2019-07-05 青岛胶南海尔洗衣机有限公司 Offline electronic payment method
CN109978530B (en) * 2017-12-27 2023-12-22 海尔衣联生态科技(上海)有限公司 Offline payment method
CN109243015A (en) * 2018-08-22 2019-01-18 深圳威琳懋生物科技有限公司 intelligent entrance guard robot
CN109118634A (en) * 2018-09-28 2019-01-01 伟创达电子科技(深圳)有限公司 A kind of two dimensional code unlocking access control system
CN109410406A (en) * 2018-11-14 2019-03-01 北京华大智宝电子系统有限公司 A kind of authorization method, device and system
CN109410406B (en) * 2018-11-14 2021-11-16 北京华大智宝电子系统有限公司 Authorization method, device and system
CN113228121A (en) * 2018-12-28 2021-08-06 浙江大华技术股份有限公司 System and method for controlling ingress and egress
US11600127B2 (en) 2018-12-28 2023-03-07 Zhejiang Dahua Technology Co., Ltd. Systems and methods for controlling access to an entrance
CN111379475A (en) * 2018-12-29 2020-07-07 云丁网络技术(北京)有限公司 Unlocking method of electronic lock, electronic lock and unlocking management equipment
CN110300180A (en) * 2019-07-03 2019-10-01 北京享易天下科技有限公司 A kind of service system and method for servicing of shared device
CN112164159B (en) * 2020-09-27 2022-07-08 青岛海信智慧生活科技股份有限公司 Smart hotel-based remote card issuing method and device
CN112164159A (en) * 2020-09-27 2021-01-01 青岛海信智慧家居系统股份有限公司 Smart hotel-based remote card issuing method and device
CN112863013A (en) * 2021-01-04 2021-05-28 珠海格力电器股份有限公司 Unlocking method, device, equipment and medium
CN113538964A (en) * 2021-09-17 2021-10-22 成都宜泊信息科技有限公司 Parking management method, parking management system, storage medium and electronic equipment
CN113538964B (en) * 2021-09-17 2021-12-14 成都宜泊信息科技有限公司 Parking management method, parking management system, storage medium and electronic equipment

Also Published As

Publication number Publication date
CN105991776B (en) 2019-08-20

Similar Documents

Publication Publication Date Title
CN105991776A (en) Method, device and system for cipher lock control
Shen et al. Privacy-preserving and lightweight key agreement protocol for V2G in the social Internet of Things
CN111209334B (en) Power terminal data security management method based on block chain
EP3111433B1 (en) Wireless sensor network
CN207409010U (en) The newer temporary password access control system of encryption parameter dynamic
CN107274532A (en) The temporary password gate control system that encryption parameter dynamically updates
CN104980322B (en) The method and device to link between network access equipment
CN101136746A (en) Identification method and system
KR102458922B1 (en) Device System performing group authentication and Operating Method thereof
CN110944301A (en) Intelligent cell equipment monitoring system based on block chain and key management method
CN103312525A (en) Mixed deployment system for business network and management network of server, server and switch
CN107196917A (en) A kind of service response method and its middleware
EP2272199B1 (en) Distributed data memory unit
CN111010381A (en) Cross-chain-based identity authentication method and system
CN104914806A (en) Connection of persons and things via mobile messaging privacy/security broker system
US11516071B2 (en) Method and system for root cause analysis across multiple network systems
US20210264051A1 (en) Blockchain system, blockchain management apparatus, network control apparatus, method and program
US9590998B2 (en) Network switch with hierarchical security
CN109981280A (en) A kind of electronic data evidence obtaining method and system
Liu et al. Secure and efficient smart healthcare system based on federated learning
CN110636482A (en) Switch maintenance method, device, switch, terminal and readable storage medium
Hashim et al. Performance Evaluation of Blockchain Consensus Algorithms for Electronic Health Record Sharing
CN108050653A (en) Precision air conditioner startup password collocation method, configuration system and precision air conditioner
DE102020128700A1 (en) System for authenticating a user at a charging device and reporting on the use of the same
CN105847239A (en) User authentication manner determining method and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20190820