CN106296894B - A kind of method and terminal controlling intelligent door lock - Google Patents

A kind of method and terminal controlling intelligent door lock Download PDF

Info

Publication number
CN106296894B
CN106296894B CN201610605249.4A CN201610605249A CN106296894B CN 106296894 B CN106296894 B CN 106296894B CN 201610605249 A CN201610605249 A CN 201610605249A CN 106296894 B CN106296894 B CN 106296894B
Authority
CN
China
Prior art keywords
terminal
holder
door lock
information
intelligent door
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610605249.4A
Other languages
Chinese (zh)
Other versions
CN106296894A (en
Inventor
马辉申
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SHENZHEN BOKE INTELLIGENT TECHNOLOGY Co Ltd
Original Assignee
SHENZHEN BOKE INTELLIGENT TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SHENZHEN BOKE INTELLIGENT TECHNOLOGY Co Ltd filed Critical SHENZHEN BOKE INTELLIGENT TECHNOLOGY Co Ltd
Priority to CN201610605249.4A priority Critical patent/CN106296894B/en
Publication of CN106296894A publication Critical patent/CN106296894A/en
Application granted granted Critical
Publication of CN106296894B publication Critical patent/CN106296894B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/22Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/22Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
    • G07C9/25Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition
    • G07C9/257Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder using biometric data, e.g. fingerprints, iris scans or voice recognition electronically

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The embodiment of the invention discloses a kind of methods and terminal for controlling intelligent door lock, comprising: first terminal receives the unlatching request for the intelligent door lock that second terminal is sent, described to open the information that request includes the second terminal holder;The first terminal verifies the information of the second terminal holder;When the authentication succeeds, the first terminal determines security access levels according to the information of the second terminal holder;The first terminal obtains enabling code key corresponding with the security access levels;The first terminal sends the enabling code key to the second terminal.It is hereby understood that enabling to user remotely to control whether visitor can open intelligent door lock, to promote user experience by implementing technical solution provided by the invention.

Description

A kind of method and terminal controlling intelligent door lock
Technical field
The present invention relates to Smart Home technical fields, and in particular to a kind of method and mobile terminal for controlling intelligent door lock.
Background technique
Common, substantially every household all can install door lock for the house of oneself.When resident is outgoing or goes home, just need It is unlocked with key.When there is friends and family to visit, if there is no one at home and the friends and family is also without key If, can not just it enter.
From the above it can be seen that existing door lock can only be controlled according to key, when user is far from the door lock, just it is unable to control The door lock opens or closes, to bring inconvenience to users.
Summary of the invention
The embodiment of the invention provides a kind of methods and terminal for controlling intelligent door lock, enable to user remotely to control and come Whether visit person can open intelligent door lock, to promote user experience.
First aspect present invention discloses a kind of method for controlling intelligent door lock, comprising:
First terminal receives the unlatching request for the intelligent door lock that second terminal is sent, and the unlatching request includes described second The information of holder terminal;
The first terminal verifies the information of the second terminal holder;
When the authentication succeeds, the first terminal determines secure access grade according to the information of the second terminal holder Not;
The first terminal obtains enabling code key corresponding with the security access levels;
The first terminal sends the enabling code key to the second terminal.
In conjunction with first aspect present invention, in a first possible implementation of the first aspect of the invention, the acquisition Enabling code key corresponding with the security access levels includes:
The first terminal sends the security access levels and the second terminal holder to the intelligent door lock Information, so that the intelligent door lock is according to the security access levels and the generation of the information of the second terminal holder Enabling code key;
The first terminal receives the enabling code key that the intelligent door lock is sent.
In conjunction with the first possible implementation of first aspect present invention, second in first aspect present invention may Implementation in, the first terminal determines that security access levels include: according to the information of the second terminal holder
The first terminal from the information of the second terminal holder according to obtaining the second terminal holder's Identity;
The first terminal is according to the identity ergodic data library of the second terminal holder with determination described second The access times of holder terminal;
The first terminal determines the security access levels according to the access times of the second terminal holder.
In conjunction with second of possible implementation of first aspect present invention, the third in first aspect present invention may Implementation in, the method also includes:
The first terminal obtains the second terminal current location from the information of the second terminal holder, described The image and current time of second terminal current holder;
The first terminal is according to the identity of the second terminal holder, by the second terminal current location, The image and current time of the second terminal current holder is updated to the database.
In conjunction with the third possible implementation of first aspect present invention to first aspect present invention, in the present invention first In 4th kind of possible implementation of aspect, the method also includes:
The first terminal updates the number that the second terminal holder accesses the intelligent door lock;
Judge whether updated access times are greater than preset times;
When updated access times are greater than preset times, the secure access grade of the second terminal holder is promoted Not.
Second aspect of the present invention discloses a kind of terminal, and the terminal includes:
Receiving unit, the unlatching request of the intelligent door lock for receiving second terminal transmission, the unlatching request includes institute State the information of second terminal holder;
Authentication unit is verified for the information to the second terminal holder;
Determination unit, for when the authentication succeeds, determining secure access grade according to the information of the second terminal holder Not;
Acquiring unit obtains enabling code key corresponding with the security access levels for the first terminal;
Transmission unit, for sending the enabling code key to the second terminal.
In conjunction with second aspect of the present invention, in the first feasible embodiment of second aspect of the present invention, the acquisition Unit includes transmission sub-unit and receiving subelement;
The transmission sub-unit, for being held to the intelligent door lock transmission security access levels and the second terminal The information for the person of having, so that the intelligent door lock is raw according to the security access levels and the information of the second terminal holder At the enabling code key;
The receiving subelement, the enabling code key sent for receiving the intelligent door lock.
In conjunction with the first feasible embodiment of two aspect of the present invention, second in second aspect of the present invention is feasible In embodiment, the determination unit includes obtaining subelement and determining subelement;
The acquisition subelement obtains the second terminal from the information of the second terminal holder for basis and holds The identity for the person of having;
The determining subelement, for the identity ergodic data library according to the second terminal holder to determine State the access times of second terminal holder;It is also used to determine the safety according to the access times of the second terminal holder Access level.
In conjunction with second of feasible embodiment of second aspect of the present invention, the third in second aspect of the present invention is feasible Embodiment in, the terminal further includes the first updating unit:
The acquiring unit, for obtaining the second terminal present bit from the information of the second terminal holder It sets, the image and current time of the second terminal current holder;
First updating unit, for the identity according to the second terminal holder, by the second terminal Current location, the image and current time of the second terminal current holder are updated to the database.
In conjunction with the third feasible embodiment of second aspect of the present invention to second aspect of the present invention, in the present invention second In 4th kind of feasible embodiment of aspect, the terminal further includes the second updating unit, judging unit and lift unit:
Second updating unit accesses the number of the intelligent door lock for updating the second terminal holder;
The judging unit, for judging whether updated access times are greater than preset times;
The lift unit, for promoting the second terminal and holding when updated access times are greater than preset times The security access levels for the person of having.
As can be seen that first terminal receives opening for the intelligent door lock that second terminal is sent in the scheme of the embodiment of the present invention Request is opened, it is described to open the information that request includes the second terminal holder;The first terminal holds the second terminal The information for the person of having is verified;When the authentication succeeds, the first terminal is determined according to the information of the second terminal holder Security access levels;The first terminal obtains enabling code key corresponding with the security access levels;The first terminal to The second terminal sends the enabling code key.It is hereby understood that enabling to use by implementing technical solution provided by the invention Family remotely controls whether visitor can open intelligent door lock, to promote user experience.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this Some embodiments of invention for those of ordinary skill in the art without creative efforts, can be with It obtains other drawings based on these drawings.
Fig. 1 is a kind of flow diagram of method for controlling intelligent door lock disclosed by the embodiments of the present invention;
Fig. 2 is the flow diagram of the method for another control intelligent door lock disclosed by the embodiments of the present invention;
Fig. 3 is a kind of unit composition block diagram of mobile terminal disclosed by the embodiments of the present invention;
Fig. 4 is a kind of structural schematic diagram of mobile terminal disclosed by the embodiments of the present invention;
Fig. 5 is the structural schematic diagram of another mobile terminal disclosed by the embodiments of the present invention;
Fig. 6 is a kind of structural schematic diagram of mobile phone disclosed by the embodiments of the present invention.
Specific embodiment
In order to enable those skilled in the art to better understand the solution of the present invention, below in conjunction in the embodiment of the present invention Attached drawing, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described embodiment is only A part of the embodiment of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art Every other embodiment obtained without creative efforts, shall fall within the protection scope of the present invention.
Description and claims of this specification and term " first " in above-mentioned attached drawing, " second " etc. are for distinguishing Different objects, are not use to describe a particular order.In addition, term " includes " and " having " and their any deformations, it is intended that It is to cover and non-exclusive includes.Such as the process, method, system, product or equipment for containing a series of steps or units do not have It is defined in listed step or unit, but optionally further comprising the step of not listing or unit, or optionally also wrap Include other step or units intrinsic for these process, methods, product or equipment.
Referenced herein " embodiment " is it is meant that a particular feature, structure, or characteristic described can wrap in conjunction with the embodiments Containing at least one embodiment of the present invention.Each position in the description occur the phrase might not each mean it is identical Embodiment, nor the independent or alternative embodiment with other embodiments mutual exclusion.Those skilled in the art explicitly and Implicitly understand, embodiment described herein can be combined with other embodiments.
A kind of method for controlling intelligent door lock is disclosed in one embodiment of the invention, comprising: first terminal receives The unlatching request for the intelligent door lock that second terminal is sent, it is described to open the information that request includes the second terminal holder;Institute First terminal is stated to verify the information of the second terminal holder;When the authentication succeeds, the first terminal is according to institute The information for stating second terminal holder determines security access levels;The first terminal obtains corresponding with the security access levels Enabling code key;The first terminal sends the enabling code key to the second terminal.
Referring to Fig. 1, Fig. 1 is a kind of method for controlling intelligent door lock provided by one embodiment of the present invention.Wherein, as schemed Shown in 1, a kind of method for control intelligent door lock that one embodiment of the present of invention provides includes the following contents:
S101, first terminal receive the unlatching request for the intelligent door lock that second terminal is sent.
Wherein, the first terminal, second terminal can be smart phone, tablet computer, intelligent wearable equipment, calculating The electronic equipments such as machine.
Wherein it is possible to understand, the first terminal can pass through mobile network, wifi, bluetooth, Z-WAVE channel radio The modes such as letter receive the unlatching request of the intelligent door lock of second terminal transmission.
Wherein, described to open the information that request includes the second terminal holder.
Wherein, the information of the second terminal holder can be pre-stored in second terminal, or second What terminal obtained at that time.
Wherein, the information of the second terminal holder can be held for name, the second terminal of second terminal holder Head portrait, identity information of second terminal holder of person etc..
S102, the first terminal verify the information of the second terminal holder.
Wherein it is possible to understand, the first terminal carries out verifying specific packet to the second terminal holder information It includes: according to the identity ergodic data library of the second terminal holder;Determine whether second terminal holder has visiting note Record;When the second terminal visitor has visiting record, the second terminal holder information of visiting situation and acquisition is fed back to First terminal;When the visiting record of the second terminal visitor, the second terminal holder information that will acquire feeds back to the One terminal, prompts whether first terminal needs second terminal to provide other information.
Wherein, optionally, the first terminal verifies the information of the second terminal holder, further includes: institute Video intercommunication request can be sent to second terminal by stating first terminal, and the second terminal can pass through after receiving video intercommunication request Terminal carries out video intercommunication.
Wherein, optionally, the first terminal verifies the information of the second terminal holder, further includes: institute The request verified again can be issued to second terminal by stating first terminal, wherein the request verified again includes first whole Other verification informations that end holder requires second terminal to provide.
Wherein, other described verification informations may include: that the ID card information of second terminal holder, second terminal are held The relation information etc. of person and first terminal holder.
Optionally, the implementation method of above-mentioned steps S102 can specifically include:
Obtain the mark of second terminal and the first head image information of second terminal holder, the mark according to the second terminal Know the second head image information obtained with mark binding, the first head image information is compared with the second head image information, it is such as consistent, Then determination is proved to be successful, inconsistent, then is verified unsuccessful.
In order to avoid the increase of calculation amount, the first head image information and second can be determined by way of simply comparing Whether picture information is consistent, for example, extracting the distance between two eye center points in the first head image information L1, obtains first As nose midpoint in information, the angle α between nose midpoint and two eye center points is calculated, is extracted in the second head image information The distance between two eye center points L2 obtains nose midpoint in the second head image information, calculates nose midpoint and two eyes Angle β between central point is determined unanimously, is proved to be successful such as L1=L2 and α=β.This principle be based on it is same no matter its body How weight changes, the folder from the point of view of the data counted according to us, between the distance between two and nose midpoint and two midpoints Angle is all constant, so can realize quick comparison by this.
S103, when the authentication succeeds, the first terminal determine that safety is visited according to the information of the second terminal holder Ask rank.
Wherein it is possible to understand, the first terminal determines that safety is visited according to the information of the second terminal holder Ask that rank includes: the first terminal according to obtaining the second terminal holder from the information of the second terminal holder Identity;The first terminal is according to the identity ergodic data library of the second terminal holder with determination described The access times of two holder terminals;The first terminal determines the peace according to the access times of the second terminal holder Full access level.
Wherein, optionally, the first terminal can be by preset algorithm come according to the visit of the second terminal holder Ask that number determines the security access levels.
For example, whether the first terminal can be more than a certain by the access times of second terminal in preset time Threshold value prompts the user whether to improve second terminal if the access times of second terminal are more than preset threshold in preset time Security access levels, when user improves the security access levels of second terminal, then first terminal is prompted the user whether to second eventually End security access levels duration is configured.If the access times of second terminal are no more than preset threshold in preset time, obtain The relation information in second terminal holder information with first terminal holder is taken, when second terminal holder holds with first terminal The relationship for the person of having is relatives' relationship and has the record being proved to be successful, then prompts the user whether the safety for improving second terminal holder Access level.
Wherein, the preset time can be one day, one week, two weeks, one month or other unit time.
Wherein it is possible to understand, the preset time can may be described first whole for terminal default storage Hold holder's setting.
Wherein, the preset threshold can be 5 times, 10 times, 15 times or other numbers.
Wherein it is possible to understand, the preset threshold can be terminal default storage, or described first eventually Hold holder's setting.
S104, the first terminal obtain enabling code key corresponding with the security access levels.
Wherein it is possible to understand, described to obtain corresponding with security access levels enabling code key include: described the One terminal sends the information of the security access levels and the second terminal holder to the intelligent door lock, so that described Intelligent door lock generates the enabling code key according to the security access levels and the information of the second terminal holder, and described the One terminal receives the enabling code key that the intelligent door lock is sent.
S105, the first terminal send the enabling code key to the second terminal.
Wherein it is possible to understand, the other enabling code key of minimum security level is only capable of using primary.
Wherein it is possible to understand, the enabling code key of the highest level can have first terminal holder to be set using Number.
Wherein, after the first terminal sends the enabling code key to the second terminal, the method also includes: institute It states first terminal and updates the number that the second terminal holder accesses the intelligent door lock;Judging updated access times is It is no to be greater than preset times;When updated access times are greater than preset times, the access of the second terminal holder is promoted Rank.
Wherein, optionally, the method also includes: the first terminal is obtained from the information of the second terminal holder Take the second terminal current location, the image and current time of the second terminal current holder;The first terminal According to the identity of the second terminal holder, by the second terminal current location, the second terminal is currently held The image and current time of person is updated to the database.
As can be seen that first terminal receives the unlatching request for the intelligent door lock that second terminal is sent in the embodiment of the present invention, It is described to open the information that request includes the second terminal holder;Letter of the first terminal to the second terminal holder Breath is verified;When the authentication succeeds, the first terminal is determined according to the information of the second terminal holder and is had secure access to Rank;The first terminal obtains enabling code key corresponding with the security access levels;The first terminal is to described second Terminal sends the enabling code key.It is hereby understood that enabling to user remotely to control by implementing technical solution provided by the invention Whether visitor processed can open intelligent door lock, to promote user experience.
Referring to Fig. 2, Fig. 2 be another embodiment of the present invention provides a kind of control intelligent door lock method process Schematic diagram.Wherein, as shown in Fig. 2, another embodiment of the present invention provides the method for control intelligent door lock a kind of can wrap Include the following contents:
S201, first terminal receive the unlatching request for the intelligent door lock that second terminal is sent.
Wherein, the first terminal, second terminal can be smart phone, tablet computer, intelligent wearable equipment, calculating The electronic equipments such as machine.
Wherein it is possible to understand, the first terminal can pass through mobile network, wifi, bluetooth, Z-WAVE channel radio The modes such as letter receive the unlatching request of the intelligent door lock of second terminal transmission.
Wherein, described to open the information that request includes the second terminal holder.
Wherein, the information of the second terminal holder can be pre-stored in second terminal, or second What terminal obtained at that time.
Wherein, the information of the second terminal holder can be held for name, the second terminal of second terminal holder Head portrait, identity information of second terminal holder of person etc..
S202, the first terminal verify the information of the second terminal holder.
Wherein it is possible to understand, the first terminal carries out verifying specific packet to the second terminal holder information It includes: according to the identity ergodic data library of the second terminal holder;Determine whether second terminal holder has visiting note Record;When the second terminal visitor has visiting record, the second terminal holder information of visiting situation and acquisition is fed back to First terminal;When the visiting record of the second terminal visitor, the second terminal holder information that will acquire feeds back to the One terminal, prompts whether first terminal needs second terminal to provide other information.
Wherein, optionally, the first terminal verifies the information of the second terminal holder, further includes: institute Video intercommunication request can be sent to second terminal by stating first terminal, and the second terminal can pass through after receiving video intercommunication request Terminal carries out video intercommunication.
Wherein, optionally, the first terminal verifies the information of the second terminal holder, further includes: institute The request verified again can be issued to second terminal by stating first terminal, wherein the request verified again includes first whole Other verification informations that end holder requires second terminal to provide.
Wherein, other described verification informations may include: that the ID card information of second terminal holder, second terminal are held The relation information etc. of person and first terminal holder.
S203, when the authentication succeeds, the first terminal determine that safety is visited according to the information of the second terminal holder Ask rank.
Wherein it is possible to understand, the first terminal determines that safety is visited according to the information of the second terminal holder Ask that rank includes: the first terminal according to obtaining the second terminal holder from the information of the second terminal holder Identity;The first terminal is according to the identity ergodic data library of the second terminal holder with determination described The access times of two holder terminals;The first terminal determines the peace according to the access times of the second terminal holder Full access level.
Wherein, optionally, the first terminal can be by preset algorithm come according to the visit of the second terminal holder Ask that number determines the security access levels.
For example, whether the first terminal can be more than a certain by the access times of second terminal in preset time Threshold value prompts the user whether to improve second terminal if the access times of second terminal are more than preset threshold in preset time Security access levels, when user improves the security access levels of second terminal, then first terminal is prompted the user whether to second eventually End security access levels duration is configured.If the access times of second terminal are no more than preset threshold in preset time, obtain The relation information in second terminal holder information with first terminal holder is taken, when second terminal holder holds with first terminal The relationship for the person of having is relatives' relationship and has the record being proved to be successful, then prompts the user whether the safety for improving second terminal holder Access level.
Wherein, the preset time can be one day, one week, two weeks, one month or other unit time.
Wherein it is possible to understand, the preset time can may be described first whole for terminal default storage Hold holder's setting.
Wherein, the preset threshold can be 5 times, 10 times, 15 times or other numbers.
Wherein it is possible to understand, the preset threshold can be terminal default storage, or described first eventually Hold holder's setting.
S204, the first terminal obtain enabling code key corresponding with the security access levels.
Wherein it is possible to understand, described to obtain corresponding with security access levels enabling code key include: described the One terminal sends the information of the security access levels and the second terminal holder to the intelligent door lock, so that described Intelligent door lock generates the enabling code key according to the security access levels and the information of the second terminal holder, and described the One terminal receives the enabling code key that the intelligent door lock is sent.
S205, the first terminal send the enabling code key to the second terminal.
Wherein it is possible to understand, the other enabling code key of minimum security level is only capable of using primary.
Wherein it is possible to understand, the enabling code key of the highest level can have first terminal holder to be set using Number.
S206, the first terminal obtain the second terminal present bit from the information of the second terminal holder It sets, the image and current time of the second terminal current holder.
S207, the first terminal are current by the second terminal according to the identity of the second terminal holder Position, the image and current time of the second terminal current holder are updated to the database.
S208, the first terminal update the number that the second terminal holder accesses the intelligent door lock.
S209, judges whether updated access times are greater than preset times.
S210, when updated access times are greater than preset times, the safety for promoting the second terminal holder is visited Ask rank.
It is opened as can be seen that expanding the first terminal in the scheme of the embodiment of the present invention to described in second terminal transmission The step of updating visitor's database in first terminal after door code key and updating visitor's security access levels.It is hereby understood that By implementation technical solution provided by the invention, user is enabled to remotely to control whether visitor can open intelligent door lock, To promote user experience.
Referring to Fig. 3, Fig. 3 is a kind of structural schematic diagram for terminal that one embodiment of the present of invention provides.Wherein, as schemed Shown in 3, one embodiment of the present of invention provide a kind of terminal 300, wherein the terminal can be smart phone, tablet computer, The electronic equipments such as intelligent wearable equipment, computer.The terminal 300 includes receiving unit 301, authentication unit 302, determination unit 303, acquiring unit 304, transmission unit 305.
Receiving unit 301, the unlatching request of the intelligent door lock for receiving second terminal transmission, the unlatching request include The information of the second terminal holder.
Authentication unit 302 is verified for the information to the second terminal holder.
Determination unit 303, for when the authentication succeeds, being determined and being had secure access to according to the information of the second terminal holder Rank.
Wherein, the determination unit 303 includes obtaining subelement 3031 and determining subelement 3032.
The acquisition subelement 3031, for whole according to obtaining described second from the information of the second terminal holder Hold the identity of holder.
The determining subelement 3032, for the identity ergodic data library according to the second terminal holder with true The access times of the fixed second terminal holder;It is also used to according to the determination of the access times of the second terminal holder Security access levels.
Acquiring unit 304 obtains enabling code key corresponding with the security access levels for the first terminal.
Wherein, the acquiring unit 304 further includes transmission sub-unit 3041 and receiving subelement 3042.
Wherein, the transmission sub-unit 3041, for sending the security access levels and described to the intelligent door lock The information of second terminal holder, so that the intelligent door lock is held according to the security access levels and the second terminal The information of person generates the enabling code key.
The receiving subelement 3042, the enabling code key sent for receiving the intelligent door lock.
Transmission unit 305, for sending the enabling code key to the second terminal.
Wherein, receiving unit 301, authentication unit 302, determination unit 303, acquiring unit 304, transmission unit 305 can be with For executing method described in step S101 to S105 in embodiment 1, specifically describes detailed in Example 1 and the method is retouched It states, details are not described herein.
Referring to Fig. 4, Fig. 4 is a kind of structural schematic diagram for terminal that one embodiment of the present of invention provides.Wherein, as schemed Shown in 4, a kind of terminal 400 of one embodiment of the present of invention offer, wherein the terminal 400 can be smart phone, plate electricity The installation such as brain, intelligent wearable equipment, computer is there are many application program and with the electronic equipment of touching display screen.The terminal 400 include receiving unit 401, authentication unit 402, determination unit 403, acquiring unit 404, the update list of transmission unit 405, first First 406, second updating unit 407, judging unit 408 and lift unit 409.
Receiving unit 401, the unlatching request of the intelligent door lock for receiving second terminal transmission, the unlatching request include The information of the second terminal holder.
Authentication unit 402 is verified for the information to the second terminal holder.
Determination unit 403, for when the authentication succeeds, being determined and being had secure access to according to the information of the second terminal holder Rank.
Acquiring unit 404 obtains enabling code key corresponding with the security access levels for the first terminal.
Transmission unit 405, for sending the enabling code key to the second terminal.
Wherein, the acquiring unit 404 is also used to obtain described second from the information of the second terminal holder eventually Hold current location, the image and current time of the second terminal current holder;
First updating unit 406 works as the second terminal for the identity according to the second terminal holder Front position, the image and current time of the second terminal current holder are updated to the database.
Second updating unit 407 accesses the number of the intelligent door lock for updating the second terminal holder.
The judging unit 408, for judging whether updated access times are greater than preset times.
The lift unit 409, for promoting the second terminal when updated access times are greater than preset times The security access levels of holder.
Wherein, receiving unit 401, authentication unit 402, determination unit 403, acquiring unit 404, transmission unit 405, first Updating unit 406, the second updating unit 407, judging unit 408 and lift unit 409 can be used for executing to be walked in embodiment 2 Method described in rapid S201 to S209 specifically describes description of the detailed in Example 1 to the method, and details are not described herein.
Referring to Fig. 5, in another embodiment of the present invention, providing a kind of terminal.The terminal 500 includes CPU501, memory 502, bus 503, the equal hardware of display screen 504.Wherein, which can be smart phone, plate electricity The equipment such as brain, intelligent wearable device.
Wherein, CPU501 executes the program being stored in advance in memory 502, which specifically includes:
First terminal receives the unlatching request for the intelligent door lock that second terminal is sent, and the unlatching request includes described second The information of holder terminal;
The first terminal verifies the information of the second terminal holder;
When the authentication succeeds, the first terminal determines secure access grade according to the information of the second terminal holder Not;
The first terminal obtains enabling code key corresponding with the security access levels;
The first terminal sends the enabling code key to the second terminal.
Optionally, acquisition enabling code key corresponding with the security access levels includes:
The first terminal sends the security access levels and the second terminal holder to the intelligent door lock Information, so that the intelligent door lock is according to the security access levels and the generation of the information of the second terminal holder Enabling code key;
The first terminal receives the enabling code key that the intelligent door lock is sent.
Optionally, the first terminal determines that security access levels include: according to the information of the second terminal holder
The first terminal from the information of the second terminal holder according to obtaining the second terminal holder's Identity;
The first terminal is according to the identity ergodic data library of the second terminal holder with determination described second The access times of holder terminal;
The first terminal determines the security access levels according to the access times of the second terminal holder.
Optionally, the implementation procedure further include:
The first terminal obtains the second terminal current location from the information of the second terminal holder, described The image and current time of second terminal current holder;
The first terminal is according to the identity of the second terminal holder, by the second terminal current location, The image and current time of the second terminal current holder is updated to the database.
Optionally, the implementation procedure further include:
The first terminal updates the number that the second terminal holder accesses the intelligent door lock;
Judge whether updated access times are greater than preset times;
When updated access times are greater than preset times, the secure access grade of the second terminal holder is promoted Not.
Referring to Fig. 6, Fig. 6 is the frame of the part-structure for the relevant mobile phone of terminal that one embodiment of the present of invention provides Figure.With reference to Fig. 6, mobile phone includes: radio frequency (Radio Frequency, RF) circuit 610, memory 620, input unit 630, shows Show unit 640, sensor 650, voicefrequency circuit 660, Wireless Fidelity (Wireless Fidelity, WiFi) module 670, processing The components such as device 680 and power supply 690.It will be understood by those skilled in the art that handset structure shown in Fig. 6 is not constituted pair The restriction of mobile phone may include perhaps combining certain components or different component cloth than illustrating more or fewer components It sets.
It is specifically introduced below with reference to each component parts of the Fig. 6 to mobile phone:
RF circuit 610 can be used for sending and receiving for information.In general, RF circuit 610 includes but is not limited to antenna, at least one A amplifier, transceiver, coupler, low-noise amplifier (Low Noise Amplifier, LNA), duplexer etc..In addition, RF circuit 610 can also be communicated with network and other equipment by wireless communication.Any communication can be used in above-mentioned wireless communication Standard or agreement, including but not limited to global system for mobile communications (Global System of Mobile Communication, GSM), general packet radio service (General Packet Radio Service, GPRS), code it is point more Location (Code Division Multiple Access, CDMA), wideband code division multiple access (Wideband Code Division Multiple Access, WCDMA), long term evolution (Long Term Evolution, LTE), Email, short message service (Short Messaging Service, SMS) etc..
Memory 620 can be used for storing software program and module, and processor 680 is stored in memory 620 by operation Software program and module, thereby executing the various function application and data processing of mobile phone.Memory 620 can mainly include Storing program area and storage data area, wherein storing program area can application journey needed for storage program area, at least one function Sequence (for example determine security access levels, determination enabling code key corresponding with the security access levels, obtain visitor's information function Energy is equal) etc.;Storage data area can store according to mobile phone use created data (such as visitor's information data, safety it is secret Key information etc.) etc..In addition, memory 620 may include high-speed random access memory, it can also include non-volatile memories Device, for example, at least a disk memory, flush memory device or other volatile solid-state parts.
Input unit 630 can be used for receiving the number or character information of input, and generate with the user setting of mobile phone with And the related key signals input of function control.Specifically, input unit 630 may include that fingerprint mould group 631 and other inputs are set Standby 632.Fingerprint mould group 631 can acquire the finger print data of user on it.Optionally, fingerprint mould group 631 may include that optical profile type refers to Line module, capacitance type fingerprint module and RF type fingerprint module.By taking fingerprint mould group 631 is capacitance type fingerprint mould group as an example, tool Body includes induction electrode (n1 abnormal induction electrode and n2 normal induction electrode) and the signal that connect with the induction electrode Processing circuit (such as amplifying circuit, noise suppression circuit, analog-to-digital conversion circuit, etc.).In addition to fingerprint mould group 631, input unit 630 can also include other input equipments 632.Specifically, other input equipments 632 can include but is not limited to physical keyboard, One of function key (such as volume control button, switch key etc.), trace ball, mouse, operating stick etc. are a variety of.
Display unit 640 can be used for showing information input by user or be supplied to user information and mobile phone it is various Menu.Display unit 640 may include display screen 641, optionally, can use liquid crystal display (Liquid Crystal Display, LCD), the forms such as Organic Light Emitting Diode (Organic Light-Emitting Diode, OLED) it is aobvious to configure Display screen 641.Although fingerprint mould group 631 and display screen 641 are to realize the defeated of mobile phone as two independent components in Fig. 6 Enter and input function, but in some embodiments it is possible to it is fingerprint mould group 631 and display screen 641 is integrated and realize mobile phone Output and input function.
Mobile phone may also include at least one sensor 650, such as optical sensor, motion sensor and other sensors. Specifically, optical sensor may include ambient light sensor and proximity sensor, wherein ambient light sensor can be according to ambient light Light and shade adjust the brightness of display screen 641, proximity sensor can when mobile phone is moved in one's ear, close display screen 641 and/or Backlight.As a kind of motion sensor, accelerometer sensor can detect all directions on (generally three axis) acceleration it is big It is small, can detect that size and the direction of gravity when static, can be used to identify mobile phone posture application (such as horizontal/vertical screen switching, phase Close game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, tap) etc.;It can also configure as mobile phone The other sensors such as gyroscope, barometer, hygrometer, thermometer, infrared sensor, details are not described herein.
Voicefrequency circuit 660, loudspeaker 661, microphone 662 can provide the audio interface between user and mobile phone.Audio-frequency electric Electric signal after the audio data received conversion can be transferred to loudspeaker 661, be converted to sound by loudspeaker 661 by road 660 Signal output;On the other hand, the voice signal of collection is converted to electric signal by microphone 662, is turned after being received by voicefrequency circuit 660 It is changed to audio data, then by after the processing of audio data output processor 680, such as another mobile phone is sent to through RF circuit 610, Or audio data is exported to memory 620 to be further processed.
WiFi belongs to short range wireless transmission technology, and mobile phone can help user's transceiver electronics postal by WiFi module 670 Part, browsing webpage and access streaming video etc., it provides wireless broadband internet access for user.Although Fig. 6 is shown WiFi module 670, but it is understood that, and it is not belonging to must be configured into for mobile phone, it can according to need do not changing completely Become in the range of the essence of invention and omits.
Processor 680 is the control centre of mobile phone, using the various pieces of various interfaces and connection whole mobile phone, is led to It crosses operation or executes the software program and/or module being stored in memory 620, and call and be stored in memory 620 Data execute the various functions and processing data of mobile phone, to carry out integral monitoring to mobile phone.Optionally, processor 680 can wrap Include one or more processing units;Preferably, processor 680 can integrate application processor and modem processor, wherein answer With the main processing operation system of processor, user interface and application program etc., modem processor mainly handles wireless communication. It is understood that above-mentioned modem processor can not also be integrated into processor 680.
Mobile phone further includes the power supply 690 (such as battery) powered to all parts, it is preferred that power supply can pass through power supply pipe Reason system and processor 680 are logically contiguous, to realize management charging, electric discharge and power managed by power-supply management system Etc. functions.
Although being not shown, mobile phone can also be including camera, bluetooth module, Z-WAVE wireless communication module etc., herein not It repeats again.
In earlier figures 1, embodiment shown in Fig. 2, each step method process can be realized based on the structure of the mobile phone.
In earlier figures 3, embodiment shown in Fig. 4, each unit function can be realized based on the structure of the mobile phone.
The embodiment of the present invention also provides a kind of computer storage medium, wherein the computer storage medium can be stored with journey Sequence, the program include some or all of any solution lock control method recorded in above method embodiment step when executing Suddenly.
It should be noted that for the various method embodiments described above, for simple description, therefore, it is stated as a series of Combination of actions, but those skilled in the art should understand that, the present invention is not limited by the sequence of acts described because According to the present invention, some steps may be performed in other sequences or simultaneously.Secondly, those skilled in the art should also know It knows, the embodiments described in the specification are all preferred embodiments, and related actions and modules is not necessarily of the invention It is necessary.
In the above-described embodiments, it all emphasizes particularly on different fields to the description of each embodiment, there is no the portion being described in detail in some embodiment Point, reference can be made to the related descriptions of other embodiments.
In several embodiments provided herein, it should be understood that disclosed device, it can be by another way It realizes.For example, the apparatus embodiments described above are merely exemplary, such as the division of the unit, it is only a kind of Logical function partition, there may be another division manner in actual implementation, such as multiple units or components can combine or can To be integrated into another system, or some features can be ignored or not executed.Another point, shown or discussed is mutual Coupling, direct-coupling or communication connection can be through some interfaces, the indirect coupling or communication connection of device or unit, It can be electrical or other forms.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple In network unit.It can select some or all of unit therein according to the actual needs to realize the mesh of this embodiment scheme 's.
It, can also be in addition, the functional units in various embodiments of the present invention may be integrated into one processing unit It is that each unit physically exists alone, can also be integrated in one unit with two or more units.Above-mentioned integrated list Member both can take the form of hardware realization, can also realize in the form of software functional units.
If the integrated unit is realized in the form of SFU software functional unit and sells or use as independent product When, it can store in a computer-readable access to memory.Based on this understanding, technical solution of the present invention substantially or Person says that all or part of the part that contributes to existing technology or the technical solution can body in the form of software products Reveal and, which is stored in a memory, including some instructions are used so that a computer equipment (can be personal computer, server or network equipment etc.) executes all or part of each embodiment the method for the present invention Step.And memory above-mentioned includes: USB flash disk, read-only memory (ROM, Read-Only Memory), random access memory The various media that can store program code such as (RAM, Random Access Memory), mobile hard disk, magnetic or disk.
Those of ordinary skill in the art will appreciate that all or part of the steps in the various methods of above-described embodiment is can It is completed with instructing relevant hardware by program, which can store in a computer-readable memory, memory May include: flash disk, read-only memory (English: Read-Only Memory, referred to as: ROM), random access device (English: Random Access Memory, referred to as: RAM), disk or CD etc..
The embodiment of the present invention has been described in detail above, specific case used herein to the principle of the present invention and Embodiment is expounded, and the above description of the embodiment is only used to help understand the method for the present invention and its core ideas; At the same time, for those skilled in the art can in specific embodiments and applications according to the thought of the present invention There is change place, in conclusion the contents of this specification are not to be construed as limiting the invention.

Claims (8)

1. a kind of method for controlling intelligent door lock characterized by comprising
First terminal receives the unlatching request for the intelligent door lock that second terminal is sent, and the unlatching request includes the second terminal The information of holder;
The first terminal verifies the information of the second terminal holder;
When the authentication succeeds, the first terminal determines security access levels according to the information of the second terminal holder;Its In, the first terminal determines the secure access grade according to the access times of the second terminal holder by preset algorithm Not;
The first terminal receives the enabling code key corresponding with the security access levels that the intelligent door lock is sent;Wherein, The first terminal sends the information of the security access levels and the second terminal holder to the intelligent door lock, so that It obtains the intelligent door lock and generates the enabling code key according to the security access levels and the information of the second terminal holder; The enabling code key of minimum safe access level is only capable of using primary, and the enabling code key of highest security access levels can be by first terminal Holder is set using number;
The first terminal sends the enabling code key to the second terminal.
2. the method according to claim 1, wherein the first terminal is according to the second terminal holder's Information determines that security access levels include:
The first terminal is according to the identity for obtaining the second terminal holder from the information of the second terminal holder Mark;
The first terminal is according to the identity ergodic data library of the second terminal holder with the determination second terminal The access times of holder;
The first terminal determines the security access levels according to the access times of the second terminal holder.
3. according to the method described in claim 2, it is characterized in that, the method also includes:
The first terminal obtains the second terminal current location from the information of the second terminal holder, and described second The image and current time of terminal current holder;
The first terminal is described by the second terminal current location according to the identity of the second terminal holder The image and current time of second terminal current holder is updated to the database.
4. method according to claim 1 to 3, which is characterized in that the first terminal is whole to described second After end sends the enabling code key, the method also includes:
The first terminal updates the number that the second terminal holder accesses the intelligent door lock;
Judge whether updated access times are greater than preset times;
When updated access times are greater than preset times, the security access levels of the second terminal holder are promoted.
5. it is a kind of control intelligent door lock terminal, which is characterized in that it is described control intelligent door lock terminal include:
Receiving unit, the unlatching request of the intelligent door lock for receiving second terminal transmission, unlatchings request include described the The information of two holder terminals;
Authentication unit is verified for the information to the second terminal holder;
Determination unit, for when the authentication succeeds, determining security access levels according to the information of the second terminal holder;Its In, the determination unit determines the secure access grade according to the access times of the second terminal holder by preset algorithm Not;
Acquiring unit, including transmission sub-unit and receiving subelement;The transmission sub-unit, for being sent to the intelligent door lock The information of the security access levels and the second terminal holder, so that the intelligent door lock is according to the secure access Rank and the information of the second terminal holder generate enabling code key;The receiving subelement is for receiving the intelligent door lock The enabling code key corresponding with the security access levels sent;Wherein, the enabling code key of minimum safe access level is only capable of making With primary, the enabling code key of highest security access levels can be set using time by the holder terminal of the control intelligent door lock Number;
Transmission unit, for sending the enabling code key to the second terminal.
6. the terminal of control intelligent door lock according to claim 5, which is characterized in that the determination unit includes obtaining son Unit and determining subelement;
The acquisition subelement obtains the second terminal holder for basis from the information of the second terminal holder Identity;
The determining subelement, for the identity ergodic data library according to the second terminal holder with determination described The access times of two holder terminals;It is also used to determine the secure access according to the access times of the second terminal holder Rank.
7. the terminal of control intelligent door lock according to claim 6, which is characterized in that the terminal of the control intelligent door lock Further include the first updating unit:
The acquiring unit, for obtaining the second terminal current location, institute from the information of the second terminal holder State the image and current time of second terminal current holder;
First updating unit, it is for the identity according to the second terminal holder, the second terminal is current Position, the image and current time of the second terminal current holder are updated to the database.
8. controlling the terminal of intelligent door lock according to claim 5-7 any one, which is characterized in that the control intelligence The terminal of energy door lock further includes the second updating unit, judging unit and lift unit:
Second updating unit accesses the number of the intelligent door lock for updating the second terminal holder;
The judging unit, for judging whether updated access times are greater than preset times;
The lift unit, for promoting the second terminal holder when updated access times are greater than preset times Security access levels.
CN201610605249.4A 2016-07-28 2016-07-28 A kind of method and terminal controlling intelligent door lock Active CN106296894B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610605249.4A CN106296894B (en) 2016-07-28 2016-07-28 A kind of method and terminal controlling intelligent door lock

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610605249.4A CN106296894B (en) 2016-07-28 2016-07-28 A kind of method and terminal controlling intelligent door lock

Publications (2)

Publication Number Publication Date
CN106296894A CN106296894A (en) 2017-01-04
CN106296894B true CN106296894B (en) 2019-09-06

Family

ID=57662494

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610605249.4A Active CN106296894B (en) 2016-07-28 2016-07-28 A kind of method and terminal controlling intelligent door lock

Country Status (1)

Country Link
CN (1) CN106296894B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112184960B (en) * 2020-09-28 2022-08-02 杭州安恒信息技术股份有限公司 Intelligent lock control method and device, intelligent lock system and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100663090B1 (en) * 2005-11-24 2007-01-02 주식회사 에스원 Door control system and door control method thereof
CN104157045A (en) * 2014-07-07 2014-11-19 广东建邦计算机软件有限公司 Entrance guard control method and system
CN104504789A (en) * 2014-12-05 2015-04-08 深圳天珑无线科技有限公司 Access control management method and access control management device
CN105608765A (en) * 2015-09-30 2016-05-25 宇龙计算机通信科技(深圳)有限公司 Access authorization control method and device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100663090B1 (en) * 2005-11-24 2007-01-02 주식회사 에스원 Door control system and door control method thereof
CN104157045A (en) * 2014-07-07 2014-11-19 广东建邦计算机软件有限公司 Entrance guard control method and system
CN104504789A (en) * 2014-12-05 2015-04-08 深圳天珑无线科技有限公司 Access control management method and access control management device
CN105608765A (en) * 2015-09-30 2016-05-25 宇龙计算机通信科技(深圳)有限公司 Access authorization control method and device

Also Published As

Publication number Publication date
CN106296894A (en) 2017-01-04

Similar Documents

Publication Publication Date Title
CN110336720B (en) Equipment control method and equipment
CN106055957B (en) A kind of method and terminal of unlocked by fingerprint
CN103632165B (en) A kind of method of image procossing, device and terminal device
CN106778175B (en) Interface locking method and device and terminal equipment
CN106293751A (en) A kind of method showing information on the terminal device and terminal unit
CN106022071B (en) A kind of method and terminal of unlocked by fingerprint
CN106055364A (en) Application starting method and terminal equipment
CN108521494A (en) Terminal control method and device, readable storage medium storing program for executing, terminal
CN107480489B (en) unlocking control method and related product
CN108536783A (en) Data processing method and device, terminal, computer readable storage medium
CN104901805B (en) A kind of identification authentication methods, devices and systems
CN104767863A (en) Terminal screen unlocking method and terminal
CN107437009A (en) Authority control method and related product
CN107590375A (en) Unlocking method and related product
CN106250025A (en) The method of camera, device and mobile terminal is called under screen lock state
CN107767839A (en) Brightness adjusting method and related product
CN105868598B (en) A kind of method and terminal of unlocked by fingerprint
CN103338193B (en) Method, system and device for initial media equipment
CN106303004A (en) The way of recording, device and mobile terminal under screen lock state
CN106055954B (en) A kind of unlocking method and terminal of terminal
CN106529256B (en) A kind of terminal unlock method and mobile terminal
CN106203143A (en) Method, device and the mobile terminal of a kind of application program locking
CN106296894B (en) A kind of method and terminal controlling intelligent door lock
CN109189397A (en) The method, apparatus of mobile terminal and intelligent display hiden application
CN108304123A (en) Page display control method and related product

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant