CN106296894B - A kind of method and terminal controlling intelligent door lock - Google Patents
A kind of method and terminal controlling intelligent door lock Download PDFInfo
- Publication number
- CN106296894B CN106296894B CN201610605249.4A CN201610605249A CN106296894B CN 106296894 B CN106296894 B CN 106296894B CN 201610605249 A CN201610605249 A CN 201610605249A CN 106296894 B CN106296894 B CN 106296894B
- Authority
- CN
- China
- Prior art keywords
- terminal
- holder
- door lock
- information
- intelligent door
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/22—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/22—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
- G07C9/25—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition
- G07C9/257—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition electronically
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Human Computer Interaction (AREA)
- Lock And Its Accessories (AREA)
Abstract
The embodiment of the invention discloses a kind of methods and terminal for controlling intelligent door lock, comprising: first terminal receives the unlatching request for the intelligent door lock that second terminal is sent, described to open the information that request includes the second terminal holder;The first terminal verifies the information of the second terminal holder;When the authentication succeeds, the first terminal determines security access levels according to the information of the second terminal holder;The first terminal obtains enabling code key corresponding with the security access levels;The first terminal sends the enabling code key to the second terminal.It is hereby understood that enabling to user remotely to control whether visitor can open intelligent door lock, to promote user experience by implementing technical solution provided by the invention.
Description
Technical field
The present invention relates to Smart Home technical fields, and in particular to a kind of method and mobile terminal for controlling intelligent door lock.
Background technique
Common, substantially every household all can install door lock for the house of oneself.When resident is outgoing or goes home, just need
It is unlocked with key.When there is friends and family to visit, if there is no one at home and the friends and family is also without key
If, can not just it enter.
From the above it can be seen that existing door lock can only be controlled according to key, when user is far from the door lock, just it is unable to control
The door lock opens or closes, to bring inconvenience to users.
Summary of the invention
The embodiment of the invention provides a kind of methods and terminal for controlling intelligent door lock, enable to user remotely to control and come
Whether visit person can open intelligent door lock, to promote user experience.
First aspect present invention discloses a kind of method for controlling intelligent door lock, comprising:
First terminal receives the unlatching request for the intelligent door lock that second terminal is sent, and the unlatching request includes described second
The information of holder terminal;
The first terminal verifies the information of the second terminal holder;
When the authentication succeeds, the first terminal determines secure access grade according to the information of the second terminal holder
Not;
The first terminal obtains enabling code key corresponding with the security access levels;
The first terminal sends the enabling code key to the second terminal.
In conjunction with first aspect present invention, in a first possible implementation of the first aspect of the invention, the acquisition
Enabling code key corresponding with the security access levels includes:
The first terminal sends the security access levels and the second terminal holder to the intelligent door lock
Information, so that the intelligent door lock is according to the security access levels and the generation of the information of the second terminal holder
Enabling code key;
The first terminal receives the enabling code key that the intelligent door lock is sent.
In conjunction with the first possible implementation of first aspect present invention, second in first aspect present invention may
Implementation in, the first terminal determines that security access levels include: according to the information of the second terminal holder
The first terminal from the information of the second terminal holder according to obtaining the second terminal holder's
Identity;
The first terminal is according to the identity ergodic data library of the second terminal holder with determination described second
The access times of holder terminal;
The first terminal determines the security access levels according to the access times of the second terminal holder.
In conjunction with second of possible implementation of first aspect present invention, the third in first aspect present invention may
Implementation in, the method also includes:
The first terminal obtains the second terminal current location from the information of the second terminal holder, described
The image and current time of second terminal current holder;
The first terminal is according to the identity of the second terminal holder, by the second terminal current location,
The image and current time of the second terminal current holder is updated to the database.
In conjunction with the third possible implementation of first aspect present invention to first aspect present invention, in the present invention first
In 4th kind of possible implementation of aspect, the method also includes:
The first terminal updates the number that the second terminal holder accesses the intelligent door lock;
Judge whether updated access times are greater than preset times;
When updated access times are greater than preset times, the secure access grade of the second terminal holder is promoted
Not.
Second aspect of the present invention discloses a kind of terminal, and the terminal includes:
Receiving unit, the unlatching request of the intelligent door lock for receiving second terminal transmission, the unlatching request includes institute
State the information of second terminal holder;
Authentication unit is verified for the information to the second terminal holder;
Determination unit, for when the authentication succeeds, determining secure access grade according to the information of the second terminal holder
Not;
Acquiring unit obtains enabling code key corresponding with the security access levels for the first terminal;
Transmission unit, for sending the enabling code key to the second terminal.
In conjunction with second aspect of the present invention, in the first feasible embodiment of second aspect of the present invention, the acquisition
Unit includes transmission sub-unit and receiving subelement;
The transmission sub-unit, for being held to the intelligent door lock transmission security access levels and the second terminal
The information for the person of having, so that the intelligent door lock is raw according to the security access levels and the information of the second terminal holder
At the enabling code key;
The receiving subelement, the enabling code key sent for receiving the intelligent door lock.
In conjunction with the first feasible embodiment of two aspect of the present invention, second in second aspect of the present invention is feasible
In embodiment, the determination unit includes obtaining subelement and determining subelement;
The acquisition subelement obtains the second terminal from the information of the second terminal holder for basis and holds
The identity for the person of having;
The determining subelement, for the identity ergodic data library according to the second terminal holder to determine
State the access times of second terminal holder;It is also used to determine the safety according to the access times of the second terminal holder
Access level.
In conjunction with second of feasible embodiment of second aspect of the present invention, the third in second aspect of the present invention is feasible
Embodiment in, the terminal further includes the first updating unit:
The acquiring unit, for obtaining the second terminal present bit from the information of the second terminal holder
It sets, the image and current time of the second terminal current holder;
First updating unit, for the identity according to the second terminal holder, by the second terminal
Current location, the image and current time of the second terminal current holder are updated to the database.
In conjunction with the third feasible embodiment of second aspect of the present invention to second aspect of the present invention, in the present invention second
In 4th kind of feasible embodiment of aspect, the terminal further includes the second updating unit, judging unit and lift unit:
Second updating unit accesses the number of the intelligent door lock for updating the second terminal holder;
The judging unit, for judging whether updated access times are greater than preset times;
The lift unit, for promoting the second terminal and holding when updated access times are greater than preset times
The security access levels for the person of having.
As can be seen that first terminal receives opening for the intelligent door lock that second terminal is sent in the scheme of the embodiment of the present invention
Request is opened, it is described to open the information that request includes the second terminal holder;The first terminal holds the second terminal
The information for the person of having is verified;When the authentication succeeds, the first terminal is determined according to the information of the second terminal holder
Security access levels;The first terminal obtains enabling code key corresponding with the security access levels;The first terminal to
The second terminal sends the enabling code key.It is hereby understood that enabling to use by implementing technical solution provided by the invention
Family remotely controls whether visitor can open intelligent door lock, to promote user experience.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below
There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this
Some embodiments of invention for those of ordinary skill in the art without creative efforts, can be with
It obtains other drawings based on these drawings.
Fig. 1 is a kind of flow diagram of method for controlling intelligent door lock disclosed by the embodiments of the present invention;
Fig. 2 is the flow diagram of the method for another control intelligent door lock disclosed by the embodiments of the present invention;
Fig. 3 is a kind of unit composition block diagram of mobile terminal disclosed by the embodiments of the present invention;
Fig. 4 is a kind of structural schematic diagram of mobile terminal disclosed by the embodiments of the present invention;
Fig. 5 is the structural schematic diagram of another mobile terminal disclosed by the embodiments of the present invention;
Fig. 6 is a kind of structural schematic diagram of mobile phone disclosed by the embodiments of the present invention.
Specific embodiment
In order to enable those skilled in the art to better understand the solution of the present invention, below in conjunction in the embodiment of the present invention
Attached drawing, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described embodiment is only
A part of the embodiment of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art
Every other embodiment obtained without creative efforts, shall fall within the protection scope of the present invention.
Description and claims of this specification and term " first " in above-mentioned attached drawing, " second " etc. are for distinguishing
Different objects, are not use to describe a particular order.In addition, term " includes " and " having " and their any deformations, it is intended that
It is to cover and non-exclusive includes.Such as the process, method, system, product or equipment for containing a series of steps or units do not have
It is defined in listed step or unit, but optionally further comprising the step of not listing or unit, or optionally also wrap
Include other step or units intrinsic for these process, methods, product or equipment.
Referenced herein " embodiment " is it is meant that a particular feature, structure, or characteristic described can wrap in conjunction with the embodiments
Containing at least one embodiment of the present invention.Each position in the description occur the phrase might not each mean it is identical
Embodiment, nor the independent or alternative embodiment with other embodiments mutual exclusion.Those skilled in the art explicitly and
Implicitly understand, embodiment described herein can be combined with other embodiments.
A kind of method for controlling intelligent door lock is disclosed in one embodiment of the invention, comprising: first terminal receives
The unlatching request for the intelligent door lock that second terminal is sent, it is described to open the information that request includes the second terminal holder;Institute
First terminal is stated to verify the information of the second terminal holder;When the authentication succeeds, the first terminal is according to institute
The information for stating second terminal holder determines security access levels;The first terminal obtains corresponding with the security access levels
Enabling code key;The first terminal sends the enabling code key to the second terminal.
Referring to Fig. 1, Fig. 1 is a kind of method for controlling intelligent door lock provided by one embodiment of the present invention.Wherein, as schemed
Shown in 1, a kind of method for control intelligent door lock that one embodiment of the present of invention provides includes the following contents:
S101, first terminal receive the unlatching request for the intelligent door lock that second terminal is sent.
Wherein, the first terminal, second terminal can be smart phone, tablet computer, intelligent wearable equipment, calculating
The electronic equipments such as machine.
Wherein it is possible to understand, the first terminal can pass through mobile network, wifi, bluetooth, Z-WAVE channel radio
The modes such as letter receive the unlatching request of the intelligent door lock of second terminal transmission.
Wherein, described to open the information that request includes the second terminal holder.
Wherein, the information of the second terminal holder can be pre-stored in second terminal, or second
What terminal obtained at that time.
Wherein, the information of the second terminal holder can be held for name, the second terminal of second terminal holder
Head portrait, identity information of second terminal holder of person etc..
S102, the first terminal verify the information of the second terminal holder.
Wherein it is possible to understand, the first terminal carries out verifying specific packet to the second terminal holder information
It includes: according to the identity ergodic data library of the second terminal holder;Determine whether second terminal holder has visiting note
Record;When the second terminal visitor has visiting record, the second terminal holder information of visiting situation and acquisition is fed back to
First terminal;When the visiting record of the second terminal visitor, the second terminal holder information that will acquire feeds back to the
One terminal, prompts whether first terminal needs second terminal to provide other information.
Wherein, optionally, the first terminal verifies the information of the second terminal holder, further includes: institute
Video intercommunication request can be sent to second terminal by stating first terminal, and the second terminal can pass through after receiving video intercommunication request
Terminal carries out video intercommunication.
Wherein, optionally, the first terminal verifies the information of the second terminal holder, further includes: institute
The request verified again can be issued to second terminal by stating first terminal, wherein the request verified again includes first whole
Other verification informations that end holder requires second terminal to provide.
Wherein, other described verification informations may include: that the ID card information of second terminal holder, second terminal are held
The relation information etc. of person and first terminal holder.
Optionally, the implementation method of above-mentioned steps S102 can specifically include:
Obtain the mark of second terminal and the first head image information of second terminal holder, the mark according to the second terminal
Know the second head image information obtained with mark binding, the first head image information is compared with the second head image information, it is such as consistent,
Then determination is proved to be successful, inconsistent, then is verified unsuccessful.
In order to avoid the increase of calculation amount, the first head image information and second can be determined by way of simply comparing
Whether picture information is consistent, for example, extracting the distance between two eye center points in the first head image information L1, obtains first
As nose midpoint in information, the angle α between nose midpoint and two eye center points is calculated, is extracted in the second head image information
The distance between two eye center points L2 obtains nose midpoint in the second head image information, calculates nose midpoint and two eyes
Angle β between central point is determined unanimously, is proved to be successful such as L1=L2 and α=β.This principle be based on it is same no matter its body
How weight changes, the folder from the point of view of the data counted according to us, between the distance between two and nose midpoint and two midpoints
Angle is all constant, so can realize quick comparison by this.
S103, when the authentication succeeds, the first terminal determine that safety is visited according to the information of the second terminal holder
Ask rank.
Wherein it is possible to understand, the first terminal determines that safety is visited according to the information of the second terminal holder
Ask that rank includes: the first terminal according to obtaining the second terminal holder from the information of the second terminal holder
Identity;The first terminal is according to the identity ergodic data library of the second terminal holder with determination described
The access times of two holder terminals;The first terminal determines the peace according to the access times of the second terminal holder
Full access level.
Wherein, optionally, the first terminal can be by preset algorithm come according to the visit of the second terminal holder
Ask that number determines the security access levels.
For example, whether the first terminal can be more than a certain by the access times of second terminal in preset time
Threshold value prompts the user whether to improve second terminal if the access times of second terminal are more than preset threshold in preset time
Security access levels, when user improves the security access levels of second terminal, then first terminal is prompted the user whether to second eventually
End security access levels duration is configured.If the access times of second terminal are no more than preset threshold in preset time, obtain
The relation information in second terminal holder information with first terminal holder is taken, when second terminal holder holds with first terminal
The relationship for the person of having is relatives' relationship and has the record being proved to be successful, then prompts the user whether the safety for improving second terminal holder
Access level.
Wherein, the preset time can be one day, one week, two weeks, one month or other unit time.
Wherein it is possible to understand, the preset time can may be described first whole for terminal default storage
Hold holder's setting.
Wherein, the preset threshold can be 5 times, 10 times, 15 times or other numbers.
Wherein it is possible to understand, the preset threshold can be terminal default storage, or described first eventually
Hold holder's setting.
S104, the first terminal obtain enabling code key corresponding with the security access levels.
Wherein it is possible to understand, described to obtain corresponding with security access levels enabling code key include: described the
One terminal sends the information of the security access levels and the second terminal holder to the intelligent door lock, so that described
Intelligent door lock generates the enabling code key according to the security access levels and the information of the second terminal holder, and described the
One terminal receives the enabling code key that the intelligent door lock is sent.
S105, the first terminal send the enabling code key to the second terminal.
Wherein it is possible to understand, the other enabling code key of minimum security level is only capable of using primary.
Wherein it is possible to understand, the enabling code key of the highest level can have first terminal holder to be set using
Number.
Wherein, after the first terminal sends the enabling code key to the second terminal, the method also includes: institute
It states first terminal and updates the number that the second terminal holder accesses the intelligent door lock;Judging updated access times is
It is no to be greater than preset times;When updated access times are greater than preset times, the access of the second terminal holder is promoted
Rank.
Wherein, optionally, the method also includes: the first terminal is obtained from the information of the second terminal holder
Take the second terminal current location, the image and current time of the second terminal current holder;The first terminal
According to the identity of the second terminal holder, by the second terminal current location, the second terminal is currently held
The image and current time of person is updated to the database.
As can be seen that first terminal receives the unlatching request for the intelligent door lock that second terminal is sent in the embodiment of the present invention,
It is described to open the information that request includes the second terminal holder;Letter of the first terminal to the second terminal holder
Breath is verified;When the authentication succeeds, the first terminal is determined according to the information of the second terminal holder and is had secure access to
Rank;The first terminal obtains enabling code key corresponding with the security access levels;The first terminal is to described second
Terminal sends the enabling code key.It is hereby understood that enabling to user remotely to control by implementing technical solution provided by the invention
Whether visitor processed can open intelligent door lock, to promote user experience.
Referring to Fig. 2, Fig. 2 be another embodiment of the present invention provides a kind of control intelligent door lock method process
Schematic diagram.Wherein, as shown in Fig. 2, another embodiment of the present invention provides the method for control intelligent door lock a kind of can wrap
Include the following contents:
S201, first terminal receive the unlatching request for the intelligent door lock that second terminal is sent.
Wherein, the first terminal, second terminal can be smart phone, tablet computer, intelligent wearable equipment, calculating
The electronic equipments such as machine.
Wherein it is possible to understand, the first terminal can pass through mobile network, wifi, bluetooth, Z-WAVE channel radio
The modes such as letter receive the unlatching request of the intelligent door lock of second terminal transmission.
Wherein, described to open the information that request includes the second terminal holder.
Wherein, the information of the second terminal holder can be pre-stored in second terminal, or second
What terminal obtained at that time.
Wherein, the information of the second terminal holder can be held for name, the second terminal of second terminal holder
Head portrait, identity information of second terminal holder of person etc..
S202, the first terminal verify the information of the second terminal holder.
Wherein it is possible to understand, the first terminal carries out verifying specific packet to the second terminal holder information
It includes: according to the identity ergodic data library of the second terminal holder;Determine whether second terminal holder has visiting note
Record;When the second terminal visitor has visiting record, the second terminal holder information of visiting situation and acquisition is fed back to
First terminal;When the visiting record of the second terminal visitor, the second terminal holder information that will acquire feeds back to the
One terminal, prompts whether first terminal needs second terminal to provide other information.
Wherein, optionally, the first terminal verifies the information of the second terminal holder, further includes: institute
Video intercommunication request can be sent to second terminal by stating first terminal, and the second terminal can pass through after receiving video intercommunication request
Terminal carries out video intercommunication.
Wherein, optionally, the first terminal verifies the information of the second terminal holder, further includes: institute
The request verified again can be issued to second terminal by stating first terminal, wherein the request verified again includes first whole
Other verification informations that end holder requires second terminal to provide.
Wherein, other described verification informations may include: that the ID card information of second terminal holder, second terminal are held
The relation information etc. of person and first terminal holder.
S203, when the authentication succeeds, the first terminal determine that safety is visited according to the information of the second terminal holder
Ask rank.
Wherein it is possible to understand, the first terminal determines that safety is visited according to the information of the second terminal holder
Ask that rank includes: the first terminal according to obtaining the second terminal holder from the information of the second terminal holder
Identity;The first terminal is according to the identity ergodic data library of the second terminal holder with determination described
The access times of two holder terminals;The first terminal determines the peace according to the access times of the second terminal holder
Full access level.
Wherein, optionally, the first terminal can be by preset algorithm come according to the visit of the second terminal holder
Ask that number determines the security access levels.
For example, whether the first terminal can be more than a certain by the access times of second terminal in preset time
Threshold value prompts the user whether to improve second terminal if the access times of second terminal are more than preset threshold in preset time
Security access levels, when user improves the security access levels of second terminal, then first terminal is prompted the user whether to second eventually
End security access levels duration is configured.If the access times of second terminal are no more than preset threshold in preset time, obtain
The relation information in second terminal holder information with first terminal holder is taken, when second terminal holder holds with first terminal
The relationship for the person of having is relatives' relationship and has the record being proved to be successful, then prompts the user whether the safety for improving second terminal holder
Access level.
Wherein, the preset time can be one day, one week, two weeks, one month or other unit time.
Wherein it is possible to understand, the preset time can may be described first whole for terminal default storage
Hold holder's setting.
Wherein, the preset threshold can be 5 times, 10 times, 15 times or other numbers.
Wherein it is possible to understand, the preset threshold can be terminal default storage, or described first eventually
Hold holder's setting.
S204, the first terminal obtain enabling code key corresponding with the security access levels.
Wherein it is possible to understand, described to obtain corresponding with security access levels enabling code key include: described the
One terminal sends the information of the security access levels and the second terminal holder to the intelligent door lock, so that described
Intelligent door lock generates the enabling code key according to the security access levels and the information of the second terminal holder, and described the
One terminal receives the enabling code key that the intelligent door lock is sent.
S205, the first terminal send the enabling code key to the second terminal.
Wherein it is possible to understand, the other enabling code key of minimum security level is only capable of using primary.
Wherein it is possible to understand, the enabling code key of the highest level can have first terminal holder to be set using
Number.
S206, the first terminal obtain the second terminal present bit from the information of the second terminal holder
It sets, the image and current time of the second terminal current holder.
S207, the first terminal are current by the second terminal according to the identity of the second terminal holder
Position, the image and current time of the second terminal current holder are updated to the database.
S208, the first terminal update the number that the second terminal holder accesses the intelligent door lock.
S209, judges whether updated access times are greater than preset times.
S210, when updated access times are greater than preset times, the safety for promoting the second terminal holder is visited
Ask rank.
It is opened as can be seen that expanding the first terminal in the scheme of the embodiment of the present invention to described in second terminal transmission
The step of updating visitor's database in first terminal after door code key and updating visitor's security access levels.It is hereby understood that
By implementation technical solution provided by the invention, user is enabled to remotely to control whether visitor can open intelligent door lock,
To promote user experience.
Referring to Fig. 3, Fig. 3 is a kind of structural schematic diagram for terminal that one embodiment of the present of invention provides.Wherein, as schemed
Shown in 3, one embodiment of the present of invention provide a kind of terminal 300, wherein the terminal can be smart phone, tablet computer,
The electronic equipments such as intelligent wearable equipment, computer.The terminal 300 includes receiving unit 301, authentication unit 302, determination unit
303, acquiring unit 304, transmission unit 305.
Receiving unit 301, the unlatching request of the intelligent door lock for receiving second terminal transmission, the unlatching request include
The information of the second terminal holder.
Authentication unit 302 is verified for the information to the second terminal holder.
Determination unit 303, for when the authentication succeeds, being determined and being had secure access to according to the information of the second terminal holder
Rank.
Wherein, the determination unit 303 includes obtaining subelement 3031 and determining subelement 3032.
The acquisition subelement 3031, for whole according to obtaining described second from the information of the second terminal holder
Hold the identity of holder.
The determining subelement 3032, for the identity ergodic data library according to the second terminal holder with true
The access times of the fixed second terminal holder;It is also used to according to the determination of the access times of the second terminal holder
Security access levels.
Acquiring unit 304 obtains enabling code key corresponding with the security access levels for the first terminal.
Wherein, the acquiring unit 304 further includes transmission sub-unit 3041 and receiving subelement 3042.
Wherein, the transmission sub-unit 3041, for sending the security access levels and described to the intelligent door lock
The information of second terminal holder, so that the intelligent door lock is held according to the security access levels and the second terminal
The information of person generates the enabling code key.
The receiving subelement 3042, the enabling code key sent for receiving the intelligent door lock.
Transmission unit 305, for sending the enabling code key to the second terminal.
Wherein, receiving unit 301, authentication unit 302, determination unit 303, acquiring unit 304, transmission unit 305 can be with
For executing method described in step S101 to S105 in embodiment 1, specifically describes detailed in Example 1 and the method is retouched
It states, details are not described herein.
Referring to Fig. 4, Fig. 4 is a kind of structural schematic diagram for terminal that one embodiment of the present of invention provides.Wherein, as schemed
Shown in 4, a kind of terminal 400 of one embodiment of the present of invention offer, wherein the terminal 400 can be smart phone, plate electricity
The installation such as brain, intelligent wearable equipment, computer is there are many application program and with the electronic equipment of touching display screen.The terminal
400 include receiving unit 401, authentication unit 402, determination unit 403, acquiring unit 404, the update list of transmission unit 405, first
First 406, second updating unit 407, judging unit 408 and lift unit 409.
Receiving unit 401, the unlatching request of the intelligent door lock for receiving second terminal transmission, the unlatching request include
The information of the second terminal holder.
Authentication unit 402 is verified for the information to the second terminal holder.
Determination unit 403, for when the authentication succeeds, being determined and being had secure access to according to the information of the second terminal holder
Rank.
Acquiring unit 404 obtains enabling code key corresponding with the security access levels for the first terminal.
Transmission unit 405, for sending the enabling code key to the second terminal.
Wherein, the acquiring unit 404 is also used to obtain described second from the information of the second terminal holder eventually
Hold current location, the image and current time of the second terminal current holder;
First updating unit 406 works as the second terminal for the identity according to the second terminal holder
Front position, the image and current time of the second terminal current holder are updated to the database.
Second updating unit 407 accesses the number of the intelligent door lock for updating the second terminal holder.
The judging unit 408, for judging whether updated access times are greater than preset times.
The lift unit 409, for promoting the second terminal when updated access times are greater than preset times
The security access levels of holder.
Wherein, receiving unit 401, authentication unit 402, determination unit 403, acquiring unit 404, transmission unit 405, first
Updating unit 406, the second updating unit 407, judging unit 408 and lift unit 409 can be used for executing to be walked in embodiment 2
Method described in rapid S201 to S209 specifically describes description of the detailed in Example 1 to the method, and details are not described herein.
Referring to Fig. 5, in another embodiment of the present invention, providing a kind of terminal.The terminal 500 includes
CPU501, memory 502, bus 503, the equal hardware of display screen 504.Wherein, which can be smart phone, plate electricity
The equipment such as brain, intelligent wearable device.
Wherein, CPU501 executes the program being stored in advance in memory 502, which specifically includes:
First terminal receives the unlatching request for the intelligent door lock that second terminal is sent, and the unlatching request includes described second
The information of holder terminal;
The first terminal verifies the information of the second terminal holder;
When the authentication succeeds, the first terminal determines secure access grade according to the information of the second terminal holder
Not;
The first terminal obtains enabling code key corresponding with the security access levels;
The first terminal sends the enabling code key to the second terminal.
Optionally, acquisition enabling code key corresponding with the security access levels includes:
The first terminal sends the security access levels and the second terminal holder to the intelligent door lock
Information, so that the intelligent door lock is according to the security access levels and the generation of the information of the second terminal holder
Enabling code key;
The first terminal receives the enabling code key that the intelligent door lock is sent.
Optionally, the first terminal determines that security access levels include: according to the information of the second terminal holder
The first terminal from the information of the second terminal holder according to obtaining the second terminal holder's
Identity;
The first terminal is according to the identity ergodic data library of the second terminal holder with determination described second
The access times of holder terminal;
The first terminal determines the security access levels according to the access times of the second terminal holder.
Optionally, the implementation procedure further include:
The first terminal obtains the second terminal current location from the information of the second terminal holder, described
The image and current time of second terminal current holder;
The first terminal is according to the identity of the second terminal holder, by the second terminal current location,
The image and current time of the second terminal current holder is updated to the database.
Optionally, the implementation procedure further include:
The first terminal updates the number that the second terminal holder accesses the intelligent door lock;
Judge whether updated access times are greater than preset times;
When updated access times are greater than preset times, the secure access grade of the second terminal holder is promoted
Not.
Referring to Fig. 6, Fig. 6 is the frame of the part-structure for the relevant mobile phone of terminal that one embodiment of the present of invention provides
Figure.With reference to Fig. 6, mobile phone includes: radio frequency (Radio Frequency, RF) circuit 610, memory 620, input unit 630, shows
Show unit 640, sensor 650, voicefrequency circuit 660, Wireless Fidelity (Wireless Fidelity, WiFi) module 670, processing
The components such as device 680 and power supply 690.It will be understood by those skilled in the art that handset structure shown in Fig. 6 is not constituted pair
The restriction of mobile phone may include perhaps combining certain components or different component cloth than illustrating more or fewer components
It sets.
It is specifically introduced below with reference to each component parts of the Fig. 6 to mobile phone:
RF circuit 610 can be used for sending and receiving for information.In general, RF circuit 610 includes but is not limited to antenna, at least one
A amplifier, transceiver, coupler, low-noise amplifier (Low Noise Amplifier, LNA), duplexer etc..In addition,
RF circuit 610 can also be communicated with network and other equipment by wireless communication.Any communication can be used in above-mentioned wireless communication
Standard or agreement, including but not limited to global system for mobile communications (Global System of Mobile
Communication, GSM), general packet radio service (General Packet Radio Service, GPRS), code it is point more
Location (Code Division Multiple Access, CDMA), wideband code division multiple access (Wideband Code Division
Multiple Access, WCDMA), long term evolution (Long Term Evolution, LTE), Email, short message service
(Short Messaging Service, SMS) etc..
Memory 620 can be used for storing software program and module, and processor 680 is stored in memory 620 by operation
Software program and module, thereby executing the various function application and data processing of mobile phone.Memory 620 can mainly include
Storing program area and storage data area, wherein storing program area can application journey needed for storage program area, at least one function
Sequence (for example determine security access levels, determination enabling code key corresponding with the security access levels, obtain visitor's information function
Energy is equal) etc.;Storage data area can store according to mobile phone use created data (such as visitor's information data, safety it is secret
Key information etc.) etc..In addition, memory 620 may include high-speed random access memory, it can also include non-volatile memories
Device, for example, at least a disk memory, flush memory device or other volatile solid-state parts.
Input unit 630 can be used for receiving the number or character information of input, and generate with the user setting of mobile phone with
And the related key signals input of function control.Specifically, input unit 630 may include that fingerprint mould group 631 and other inputs are set
Standby 632.Fingerprint mould group 631 can acquire the finger print data of user on it.Optionally, fingerprint mould group 631 may include that optical profile type refers to
Line module, capacitance type fingerprint module and RF type fingerprint module.By taking fingerprint mould group 631 is capacitance type fingerprint mould group as an example, tool
Body includes induction electrode (n1 abnormal induction electrode and n2 normal induction electrode) and the signal that connect with the induction electrode
Processing circuit (such as amplifying circuit, noise suppression circuit, analog-to-digital conversion circuit, etc.).In addition to fingerprint mould group 631, input unit
630 can also include other input equipments 632.Specifically, other input equipments 632 can include but is not limited to physical keyboard,
One of function key (such as volume control button, switch key etc.), trace ball, mouse, operating stick etc. are a variety of.
Display unit 640 can be used for showing information input by user or be supplied to user information and mobile phone it is various
Menu.Display unit 640 may include display screen 641, optionally, can use liquid crystal display (Liquid Crystal
Display, LCD), the forms such as Organic Light Emitting Diode (Organic Light-Emitting Diode, OLED) it is aobvious to configure
Display screen 641.Although fingerprint mould group 631 and display screen 641 are to realize the defeated of mobile phone as two independent components in Fig. 6
Enter and input function, but in some embodiments it is possible to it is fingerprint mould group 631 and display screen 641 is integrated and realize mobile phone
Output and input function.
Mobile phone may also include at least one sensor 650, such as optical sensor, motion sensor and other sensors.
Specifically, optical sensor may include ambient light sensor and proximity sensor, wherein ambient light sensor can be according to ambient light
Light and shade adjust the brightness of display screen 641, proximity sensor can when mobile phone is moved in one's ear, close display screen 641 and/or
Backlight.As a kind of motion sensor, accelerometer sensor can detect all directions on (generally three axis) acceleration it is big
It is small, can detect that size and the direction of gravity when static, can be used to identify mobile phone posture application (such as horizontal/vertical screen switching, phase
Close game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, tap) etc.;It can also configure as mobile phone
The other sensors such as gyroscope, barometer, hygrometer, thermometer, infrared sensor, details are not described herein.
Voicefrequency circuit 660, loudspeaker 661, microphone 662 can provide the audio interface between user and mobile phone.Audio-frequency electric
Electric signal after the audio data received conversion can be transferred to loudspeaker 661, be converted to sound by loudspeaker 661 by road 660
Signal output;On the other hand, the voice signal of collection is converted to electric signal by microphone 662, is turned after being received by voicefrequency circuit 660
It is changed to audio data, then by after the processing of audio data output processor 680, such as another mobile phone is sent to through RF circuit 610,
Or audio data is exported to memory 620 to be further processed.
WiFi belongs to short range wireless transmission technology, and mobile phone can help user's transceiver electronics postal by WiFi module 670
Part, browsing webpage and access streaming video etc., it provides wireless broadband internet access for user.Although Fig. 6 is shown
WiFi module 670, but it is understood that, and it is not belonging to must be configured into for mobile phone, it can according to need do not changing completely
Become in the range of the essence of invention and omits.
Processor 680 is the control centre of mobile phone, using the various pieces of various interfaces and connection whole mobile phone, is led to
It crosses operation or executes the software program and/or module being stored in memory 620, and call and be stored in memory 620
Data execute the various functions and processing data of mobile phone, to carry out integral monitoring to mobile phone.Optionally, processor 680 can wrap
Include one or more processing units;Preferably, processor 680 can integrate application processor and modem processor, wherein answer
With the main processing operation system of processor, user interface and application program etc., modem processor mainly handles wireless communication.
It is understood that above-mentioned modem processor can not also be integrated into processor 680.
Mobile phone further includes the power supply 690 (such as battery) powered to all parts, it is preferred that power supply can pass through power supply pipe
Reason system and processor 680 are logically contiguous, to realize management charging, electric discharge and power managed by power-supply management system
Etc. functions.
Although being not shown, mobile phone can also be including camera, bluetooth module, Z-WAVE wireless communication module etc., herein not
It repeats again.
In earlier figures 1, embodiment shown in Fig. 2, each step method process can be realized based on the structure of the mobile phone.
In earlier figures 3, embodiment shown in Fig. 4, each unit function can be realized based on the structure of the mobile phone.
The embodiment of the present invention also provides a kind of computer storage medium, wherein the computer storage medium can be stored with journey
Sequence, the program include some or all of any solution lock control method recorded in above method embodiment step when executing
Suddenly.
It should be noted that for the various method embodiments described above, for simple description, therefore, it is stated as a series of
Combination of actions, but those skilled in the art should understand that, the present invention is not limited by the sequence of acts described because
According to the present invention, some steps may be performed in other sequences or simultaneously.Secondly, those skilled in the art should also know
It knows, the embodiments described in the specification are all preferred embodiments, and related actions and modules is not necessarily of the invention
It is necessary.
In the above-described embodiments, it all emphasizes particularly on different fields to the description of each embodiment, there is no the portion being described in detail in some embodiment
Point, reference can be made to the related descriptions of other embodiments.
In several embodiments provided herein, it should be understood that disclosed device, it can be by another way
It realizes.For example, the apparatus embodiments described above are merely exemplary, such as the division of the unit, it is only a kind of
Logical function partition, there may be another division manner in actual implementation, such as multiple units or components can combine or can
To be integrated into another system, or some features can be ignored or not executed.Another point, shown or discussed is mutual
Coupling, direct-coupling or communication connection can be through some interfaces, the indirect coupling or communication connection of device or unit,
It can be electrical or other forms.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit
The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple
In network unit.It can select some or all of unit therein according to the actual needs to realize the mesh of this embodiment scheme
's.
It, can also be in addition, the functional units in various embodiments of the present invention may be integrated into one processing unit
It is that each unit physically exists alone, can also be integrated in one unit with two or more units.Above-mentioned integrated list
Member both can take the form of hardware realization, can also realize in the form of software functional units.
If the integrated unit is realized in the form of SFU software functional unit and sells or use as independent product
When, it can store in a computer-readable access to memory.Based on this understanding, technical solution of the present invention substantially or
Person says that all or part of the part that contributes to existing technology or the technical solution can body in the form of software products
Reveal and, which is stored in a memory, including some instructions are used so that a computer equipment
(can be personal computer, server or network equipment etc.) executes all or part of each embodiment the method for the present invention
Step.And memory above-mentioned includes: USB flash disk, read-only memory (ROM, Read-Only Memory), random access memory
The various media that can store program code such as (RAM, Random Access Memory), mobile hard disk, magnetic or disk.
Those of ordinary skill in the art will appreciate that all or part of the steps in the various methods of above-described embodiment is can
It is completed with instructing relevant hardware by program, which can store in a computer-readable memory, memory
May include: flash disk, read-only memory (English: Read-Only Memory, referred to as: ROM), random access device (English:
Random Access Memory, referred to as: RAM), disk or CD etc..
The embodiment of the present invention has been described in detail above, specific case used herein to the principle of the present invention and
Embodiment is expounded, and the above description of the embodiment is only used to help understand the method for the present invention and its core ideas;
At the same time, for those skilled in the art can in specific embodiments and applications according to the thought of the present invention
There is change place, in conclusion the contents of this specification are not to be construed as limiting the invention.
Claims (8)
1. a kind of method for controlling intelligent door lock characterized by comprising
First terminal receives the unlatching request for the intelligent door lock that second terminal is sent, and the unlatching request includes the second terminal
The information of holder;
The first terminal verifies the information of the second terminal holder;
When the authentication succeeds, the first terminal determines security access levels according to the information of the second terminal holder;Its
In, the first terminal determines the secure access grade according to the access times of the second terminal holder by preset algorithm
Not;
The first terminal receives the enabling code key corresponding with the security access levels that the intelligent door lock is sent;Wherein,
The first terminal sends the information of the security access levels and the second terminal holder to the intelligent door lock, so that
It obtains the intelligent door lock and generates the enabling code key according to the security access levels and the information of the second terminal holder;
The enabling code key of minimum safe access level is only capable of using primary, and the enabling code key of highest security access levels can be by first terminal
Holder is set using number;
The first terminal sends the enabling code key to the second terminal.
2. the method according to claim 1, wherein the first terminal is according to the second terminal holder's
Information determines that security access levels include:
The first terminal is according to the identity for obtaining the second terminal holder from the information of the second terminal holder
Mark;
The first terminal is according to the identity ergodic data library of the second terminal holder with the determination second terminal
The access times of holder;
The first terminal determines the security access levels according to the access times of the second terminal holder.
3. according to the method described in claim 2, it is characterized in that, the method also includes:
The first terminal obtains the second terminal current location from the information of the second terminal holder, and described second
The image and current time of terminal current holder;
The first terminal is described by the second terminal current location according to the identity of the second terminal holder
The image and current time of second terminal current holder is updated to the database.
4. method according to claim 1 to 3, which is characterized in that the first terminal is whole to described second
After end sends the enabling code key, the method also includes:
The first terminal updates the number that the second terminal holder accesses the intelligent door lock;
Judge whether updated access times are greater than preset times;
When updated access times are greater than preset times, the security access levels of the second terminal holder are promoted.
5. it is a kind of control intelligent door lock terminal, which is characterized in that it is described control intelligent door lock terminal include:
Receiving unit, the unlatching request of the intelligent door lock for receiving second terminal transmission, unlatchings request include described the
The information of two holder terminals;
Authentication unit is verified for the information to the second terminal holder;
Determination unit, for when the authentication succeeds, determining security access levels according to the information of the second terminal holder;Its
In, the determination unit determines the secure access grade according to the access times of the second terminal holder by preset algorithm
Not;
Acquiring unit, including transmission sub-unit and receiving subelement;The transmission sub-unit, for being sent to the intelligent door lock
The information of the security access levels and the second terminal holder, so that the intelligent door lock is according to the secure access
Rank and the information of the second terminal holder generate enabling code key;The receiving subelement is for receiving the intelligent door lock
The enabling code key corresponding with the security access levels sent;Wherein, the enabling code key of minimum safe access level is only capable of making
With primary, the enabling code key of highest security access levels can be set using time by the holder terminal of the control intelligent door lock
Number;
Transmission unit, for sending the enabling code key to the second terminal.
6. the terminal of control intelligent door lock according to claim 5, which is characterized in that the determination unit includes obtaining son
Unit and determining subelement;
The acquisition subelement obtains the second terminal holder for basis from the information of the second terminal holder
Identity;
The determining subelement, for the identity ergodic data library according to the second terminal holder with determination described
The access times of two holder terminals;It is also used to determine the secure access according to the access times of the second terminal holder
Rank.
7. the terminal of control intelligent door lock according to claim 6, which is characterized in that the terminal of the control intelligent door lock
Further include the first updating unit:
The acquiring unit, for obtaining the second terminal current location, institute from the information of the second terminal holder
State the image and current time of second terminal current holder;
First updating unit, it is for the identity according to the second terminal holder, the second terminal is current
Position, the image and current time of the second terminal current holder are updated to the database.
8. controlling the terminal of intelligent door lock according to claim 5-7 any one, which is characterized in that the control intelligence
The terminal of energy door lock further includes the second updating unit, judging unit and lift unit:
Second updating unit accesses the number of the intelligent door lock for updating the second terminal holder;
The judging unit, for judging whether updated access times are greater than preset times;
The lift unit, for promoting the second terminal holder when updated access times are greater than preset times
Security access levels.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610605249.4A CN106296894B (en) | 2016-07-28 | 2016-07-28 | A kind of method and terminal controlling intelligent door lock |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610605249.4A CN106296894B (en) | 2016-07-28 | 2016-07-28 | A kind of method and terminal controlling intelligent door lock |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106296894A CN106296894A (en) | 2017-01-04 |
CN106296894B true CN106296894B (en) | 2019-09-06 |
Family
ID=57662494
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610605249.4A Active CN106296894B (en) | 2016-07-28 | 2016-07-28 | A kind of method and terminal controlling intelligent door lock |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106296894B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112184960B (en) * | 2020-09-28 | 2022-08-02 | 杭州安恒信息技术股份有限公司 | Intelligent lock control method and device, intelligent lock system and storage medium |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR100663090B1 (en) * | 2005-11-24 | 2007-01-02 | 주식회사 에스원 | Door control system and door control method thereof |
CN104157045A (en) * | 2014-07-07 | 2014-11-19 | 广东建邦计算机软件有限公司 | Entrance guard control method and system |
CN104504789A (en) * | 2014-12-05 | 2015-04-08 | 深圳天珑无线科技有限公司 | Access control management method and access control management device |
CN105608765A (en) * | 2015-09-30 | 2016-05-25 | 宇龙计算机通信科技(深圳)有限公司 | Access authorization control method and device |
-
2016
- 2016-07-28 CN CN201610605249.4A patent/CN106296894B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR100663090B1 (en) * | 2005-11-24 | 2007-01-02 | 주식회사 에스원 | Door control system and door control method thereof |
CN104157045A (en) * | 2014-07-07 | 2014-11-19 | 广东建邦计算机软件有限公司 | Entrance guard control method and system |
CN104504789A (en) * | 2014-12-05 | 2015-04-08 | 深圳天珑无线科技有限公司 | Access control management method and access control management device |
CN105608765A (en) * | 2015-09-30 | 2016-05-25 | 宇龙计算机通信科技(深圳)有限公司 | Access authorization control method and device |
Also Published As
Publication number | Publication date |
---|---|
CN106296894A (en) | 2017-01-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110336720B (en) | Equipment control method and equipment | |
CN106055957B (en) | A kind of method and terminal of unlocked by fingerprint | |
CN103632165B (en) | A kind of method of image procossing, device and terminal device | |
CN106778175B (en) | Interface locking method and device and terminal equipment | |
CN106293751A (en) | A kind of method showing information on the terminal device and terminal unit | |
CN106022071B (en) | A kind of method and terminal of unlocked by fingerprint | |
CN106055364A (en) | Application starting method and terminal equipment | |
CN108521494A (en) | Terminal control method and device, readable storage medium storing program for executing, terminal | |
CN107480489B (en) | unlocking control method and related product | |
CN108536783A (en) | Data processing method and device, terminal, computer readable storage medium | |
CN104901805B (en) | A kind of identification authentication methods, devices and systems | |
CN104767863A (en) | Terminal screen unlocking method and terminal | |
CN107437009A (en) | Authority control method and related product | |
CN107590375A (en) | Unlocking method and related product | |
CN106250025A (en) | The method of camera, device and mobile terminal is called under screen lock state | |
CN107767839A (en) | Brightness adjusting method and related product | |
CN105868598B (en) | A kind of method and terminal of unlocked by fingerprint | |
CN103338193B (en) | Method, system and device for initial media equipment | |
CN106303004A (en) | The way of recording, device and mobile terminal under screen lock state | |
CN106055954B (en) | A kind of unlocking method and terminal of terminal | |
CN106529256B (en) | A kind of terminal unlock method and mobile terminal | |
CN106203143A (en) | Method, device and the mobile terminal of a kind of application program locking | |
CN106296894B (en) | A kind of method and terminal controlling intelligent door lock | |
CN109189397A (en) | The method, apparatus of mobile terminal and intelligent display hiden application | |
CN108304123A (en) | Page display control method and related product |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |