CN106780895A - Method for unlocking coded lock, locking method, coded lock, systems approach and system - Google Patents

Method for unlocking coded lock, locking method, coded lock, systems approach and system Download PDF

Info

Publication number
CN106780895A
CN106780895A CN201611204553.4A CN201611204553A CN106780895A CN 106780895 A CN106780895 A CN 106780895A CN 201611204553 A CN201611204553 A CN 201611204553A CN 106780895 A CN106780895 A CN 106780895A
Authority
CN
China
Prior art keywords
password
coded lock
list
disposal
user input
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201611204553.4A
Other languages
Chinese (zh)
Inventor
余仁植
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201611204553.4A priority Critical patent/CN106780895A/en
Publication of CN106780895A publication Critical patent/CN106780895A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00658Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by passive electrical keys
    • G07C9/00674Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by passive electrical keys with switch-buttons
    • G07C9/0069Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by passive electrical keys with switch-buttons actuated in a predetermined sequence
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00817Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Processing Of Solid Wastes (AREA)
  • Lock And Its Accessories (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The method for unlocking coded lock based on disposal password, locking method, coded lock, systems approach and system are the embodiment of the invention provides, method for unlocking is:Disposal password list is store on coded lock, the list includes multiple disposal passwords;Then the password of user input is obtained;Whether effectively disposal password list according to storage judges the password of user input, effectively then by unlocking coded lock, and the password of user input just now is turned into invalid, prevents from reusing, and embodies disposable feature.The system set up based on above-mentioned method for unlocking does not require that coded lock networking is online, it is not necessary to back-end server real-time control coded lock;Meanwhile, password is disposable feature, it is ensured that safety.Therefore, it is simple with system deployment using embodiment of the present invention technical scheme, low cost, the advantages of safe and reliable.

Description

Method for unlocking coded lock, locking method, coded lock, systems approach and system
Technical field
The invention belongs to coded lock field, and in particular to method for unlocking coded lock, locking method, coded lock manufacture, system Method and system.
Background technology
Electronic password lock is that one kind controls circuit or chip operation by Password Input, so that control machinery switch Closure, completes unlocking, the electronic product of task of locking.Coded lock is now, socially with to obtain a kind of very universal lock, to answer extensively For various fields, the fields such as door lock, safety cabinet, self-service safe deposit box, vehicle are particularly applied to, coded lock need not be carried appoints What thing, it is convenient to unlock, and ease of use and Fingerprint Lock quite, surpass the lock swiped the card, but stability outclass Fingerprint Lock again. But either the problem for existing is password, and fixation is difficult modification, or heavy dependence network.First say existing based on internet Coding lock system, is typically made up of coded lock, gateway and password generation backstage.User when coded lock to be opened, it is necessary to Password request first is sent to password generation backstage, password generates backstage and sent to user's end according to password request one password of generation Hold and sent to coded lock password by gateway.Coded lock configures coded lock according to the password for obtaining, and user is by being connect The password of receipts opens coded lock.When logical between the communication link and gateway between coded lock and gateway and password generation backstage When letter link breaks down, password generation backstage will be unable to the unlocking cipher that password request is generated sent according to user terminal Send to coded lock, and then can cause the user cannot to open coded lock according to the unlocking cipher that is received.Besides it is independent of network Coded lock, be all that password is fixed, all people are that with a same password unlocking, there is password leakage and cause uneasiness Full situation;Even if password can be changed, but very cumbersome.Therefore how to allow coded lock to be independent of networking, be not intended to again with admittedly Determining password unlocking will seem extremely important.As can be seen here, Current Password is latched in management system complexity, high cost, stability Poor, inadequate security problems.
The content of the invention
The embodiment of the present invention provides method for unlocking coded lock, locking method, coded lock, system side based on disposal password Method and system, are used to solve the problems, such as solve to be proposed in above-mentioned background technology.
To achieve the above object, the present invention provides following technical scheme.
1. a kind of method for unlocking coded lock, step is as follows:
Disposal password list is store on A, coded lock, the disposal password list includes multiple disposal passwords;
B, the coded lock obtain the password of user input;
C, the coded lock judge whether the password of user input just now is effective according to the disposal password list of storage, if effectively Below step is then performed respectively;
D, the unlocking coded lock;
E, the coded lock make the password of user input just now as invalid in the disposal password list of storage.
Preferably, after the step E, also step F:The coded lock is suitable in the disposal password list All passwords of the tagmeme before the password of user input just now all turn into invalid.
Preferably, the step B obtains the password of user input, specific method be it is following in one or more combination:
By key-press input;
It is input into by touch-screen;
Obtained by language identification;
Obtained by bluetooth connection;
By near-field communication(Near Field Communication,NFC)Obtain;
By radio frequency identification(Radio Frequency Identification,RFID)Obtain;
Obtained by swepting slip shape code;
Obtained by sweeping Quick Response Code.
2. a kind of coded lock, including:Disposal password management module, input module, locking and unlocking module, wherein:
Disposal password management module, for storing disposal password list, judging whether a password effectively and in judgement is tied Fruit notifies the locking and unlocking module to perform unlocking operation, a valid password is turned into invalid when being effective;
Input module, the password for obtaining user input;
Locking and unlocking module, locks or unlocking operation accordingly for being performed by instruction.
Preferably, the input module includes button, touch-screen, speech recognition element, bluetooth element, near-field communication (Near Field Communication,NFC)Element, radio frequency identification(Radio Frequency Identification, RFID)One or more in reader, bar code recognition element, Quick Response Code recognition component, for obtaining the close of user input Code.
3. a kind of method of coding lock system, step is as follows:
A, coded lock store disposal password list, and background service management system stores the list of disposal password backstage, two List code data in initial preservation is consistent;
B, the background service management system find first in the list of the disposal password backstage and do not send close in order Code is sent to user and is designated as having sent;
C, the coded lock get the password of user input, and user input just now is judged further according to the disposal password list Password whether effectively, if effectively if unlock and in the disposal password list by the password of user input just now turn into nothing Effect.
Preferably, after the step C, also step D:The coded lock is suitable in the disposal password list All passwords of the tagmeme before the password of user input just now all turn into invalid.
4. a kind of coding lock system, including coded lock, background service management system, user terminal, wherein:
Coded lock includes disposal password management module, input module, locking and unlocking module;The disposal password manages mould Block, for storing disposal password list, judging whether disposal password effectively and when judged result is for effective notifies described Locking and unlocking module performs unlocking operation, a valid password is turned into invalid;The input module, for obtaining user input Password;The locking and unlocking module, locks or unlocking operation accordingly for being performed by instruction;The quantity of the coded lock is One or more, if then each coded lock has its unique mark to multiple;
Background service management system, including disposal password background module, the disposal password background module are used to store one Secondary property password backstage list, is additionally operable to find first in the list of the disposal password backstage in order according to user's request Password is not sent to be sent to user and mark the password to have sent;
User terminal, for disposal password to be sent into user.
5. a kind of coded lock locking method, step is as follows:
Disposal password list is store on A, coded lock, the disposal password list includes multiple disposal passwords;
B, the coded lock obtain the password of user input;
C, the coded lock judge whether the password of user input just now is effective according to the disposal password list of storage, if effectively Below step is then performed respectively;
D, the coded lock are locked;
E, the coded lock make the password of user input just now as invalid in the disposal password list of storage.
Preferably, after the step E, also step F:The coded lock is suitable in the disposal password list All passwords of the tagmeme before the password of user input just now all turn into invalid.
Compared with prior art, the beneficial effects of the invention are as follows:The present invention does not require that coded lock networking is online, it is not necessary to after End server real-time control coded lock;Meanwhile, password is disposable feature, it is ensured that safety.Therefore, implemented using the present invention Example technical scheme, low cost, safe and reliable the advantages of simple with system deployment.
Brief description of the drawings
Technical scheme in order to illustrate more clearly the embodiments of the present invention, below will be to that will use needed for embodiment description Accompanying drawing be briefly described.It should be evident that drawings in the following description are some embodiments of the present invention, it is only used for showing Go out the purpose of preferred embodiment, and be not considered as limitation of the present invention.In the accompanying drawings:
Fig. 1 is the schematic flow sheet of the method for unlocking coded lock of the embodiment of the present invention one;
Fig. 2 is the composition schematic diagram of the coded lock of the embodiment of the present invention two;
Fig. 3 is the schematic flow sheet of the coding lock system method of the embodiment of the present invention three;
Fig. 4 is the composition schematic diagram of the coding lock system of the embodiment of the present invention four;
Fig. 5 is the schematic flow sheet of the coded lock locking method of the embodiment of the present invention five.
Specific embodiment
To make the purpose, technical scheme and advantage of the embodiment of the present invention clearer, below in conjunction with the embodiment of the present invention In accompanying drawing, the technical scheme in the embodiment of the present invention is clearly and completely described, it is clear that described embodiment is A part of embodiment of the present invention, rather than whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art The every other embodiment obtained under the premise of creative work is not made, belongs to the scope of protection of the invention.
1. embodiment one.
As shown in figure 1, providing a kind of method for unlocking coded lock in the embodiment of the present invention, comprise the following steps.
Step S100:Disposal password list is store on coded lock, the list includes multiple disposal passwords.
Specifically, need to store disposal password list on coded lock, the list includes multiple disposal passwords, it is desirable to Each password is unique in the list where it.It has been greatly reduced in view of current storage cost, the list is included The quantity of disposal password can be very big, can be with enough a very long time.
Step S110:The coded lock obtains the password of user input.
Specifically, input module is installed on coded lock to obtain the password of user input.
Preferably, Password Input is provided during unlocking coded lock Password Input and finishes option, when coded lock detects use When family selection Password Input finishes option, that is, confirm that the password of user input terminates.
Preferably, the length of unlocking coded lock password is predetermined fixed value, when coded lock detects the password of user input When number of characters reaches preset value fixation, that is, confirm that the password of user input terminates.
Preferably, the step obtains the password of user input, specific method be it is following in one or more combination:
By key-press input;
It is input into by touch-screen;
Obtained by language identification;
Obtained by bluetooth connection;
By near-field communication(Near Field Communication, NFC)Obtain;
By radio frequency identification(Radio Frequency Identification,RFID)Obtain;
Obtained by swepting slip shape code;
Obtained by sweeping Quick Response Code.
Step S130:The coded lock judges whether the password of user input is effective according to the disposal password list of storage.
Specifically, the disposal password list according to storage judges whether the password of user input is effective, if password is effective Following steps S140 and step S150 is then performed respectively.Preferably, if judged result to perform step S170 and step if invalid S180.Here judge that password effectively refers to:The password is appeared in the disposal password list of storage, and its corresponding state Mark is shown as effective.Here judge that password useless refers to:The password is not in the disposal password list of storage, or depositing In the disposal password list of storage but its corresponding Status Flag is shown as invalid.
Step S140:The unlocking coded lock.
Step S150:The coded lock makes the password of user input just now as nothing in the disposal password list of storage Effect, prevents from reusing, and embodies disposable feature.
Specifically, making the password of user input just now turns into invalid, prevents from reusing, and embodies disposable feature. One effective password is turned into invalid, specific method is:Each password has corresponding shape in disposal password list Whether effectively state mark be used for recording, and initial value all be effective, as long as its mark is changed to invalid, then next judgement is just nothing Effect.Alternatively, directly the password is deleted from disposal password list, it is also possible to which an effective password is turned into invalid.
Step S160:The coded lock is the password that user input just now is sequentially located in the disposal password list All passwords before all turn into invalid.
Preferably, make user input just now password turn into it is invalid while, also in the disposal password list All passwords that order is located at before the password of user input just now all turn into invalid.This step purpose:Will come order Just now all passwords before the password of user input, even if not being transfused to also, also all can more ensure close as invalid The safe handling of code lock.
Step S170:The coded lock prompt cipher is invalid.
Specifically, if finding password useless, the coded lock prompt cipher mistake and counting user in step S130 It is input into the number of times of code error.
Step S180:When the number of times that malfunctions reaches predetermined threshold value, the coded lock temporary close password input function.
Specifically, when the number of times of statistics reaches predetermined threshold value, the coded lock is by temporary close password input function For a period of time, and shut-in time length can be elongated with the increased frequency of the code error for being counted.
2. embodiment two.
Based on above-mentioned technical proposal, as shown in Fig. 2 the embodiment of the present invention also provides a kind of coded lock, the coded lock 200 Including disposal password management module 210, input module 220, locking and unlocking module 230, wherein:
Disposal password management module 210, for storing disposal password list, judging whether disposal password is effective and sentencing Disconnected result notifies locking and unlocking module 230 to perform unlocking operation, a valid password is turned into invalid when being effective;
Input module 220, the password for obtaining user input;
Locking and unlocking module 230, locks or unlocking operation accordingly for being performed by instruction.
Specifically, disposal password management module 210 is configured as:Disposal password list is store, the list is included Multiple disposal passwords, it is desirable to which each password is unique in the list where it, it is contemplated that current storage cost is big Width reduction, the quantity of disposal password can be very big, can be with enough a very long time.Meanwhile, the module is additionally configured to:Energy Judge whether disposal password effectively and when judged result is for effective notifies that locking and unlocking module 230 performs unlocking operation.This In judge password effectively refer to:The password is appeared in the disposal password list of storage, and its corresponding Status Flag is aobvious It is shown as effective.Here judge that password useless refers to:The password not storage disposal password list on, or storage one In secondary property cipher list but its corresponding Status Flag is shown as invalid.Specifically, an effective password is turned into invalid, Specific method is:Whether effectively, initially each password has corresponding Status Flag for recording in disposal password list Value all be effective, if its mark is changed to it is invalid, then it is next to judge just as invalid.Alternatively, directly by the password from once Property cipher list on delete, it is also possible to by an effective password as invalid.
Preferably, the coded lock also includes:One or more in display module 240, locating module 250, wherein:
Display module 240, for display information and user mutual;
Locating module 250, the geographical location information for obtaining this coded lock.
Preferably, the input module includes button, touch-screen, speech recognition element, bluetooth element, near-field communication (Near Field Communication,NFC)Element, radio frequency identification(Radio Frequency Identification, RFID)One or more in reader, bar code recognition element, Quick Response Code recognition component, for obtaining the close of user input Code.
The method for unlocking of the coded lock 200 of the present embodiment is:Disposal password management module 210 is previously stored once Property cipher list;The password of user input is obtained by input module 220, the then disposal password list according to storage judges The password of user input whether effectively, if password effectively if notify that locking and unlocking module 230 is unlocked, and will user input just now Password turn into it is invalid, prevent from reusing, embody disposable feature.Preferably, make the password of user input just now into For it is invalid while, it is also all close before the password of user input just now being sequentially located in the disposal password list Code all turns into invalid.If judging the password of user input for invalid, the coded lock prompt cipher mistake, and mistake of statistics Number of times.If the errors number of statistics reaches predetermined threshold value, the coded lock by temporary close password input function for a period of time, And shut-in time length can be elongated with the increased frequency of the code error for being counted.
3. embodiment three.
Based on above-mentioned technical proposal, as shown in figure 3, the embodiment of the present invention also provides a kind of coding lock system method, including Following step.
Step S300:Coded lock stores disposal password list, and background service management system stores disposal password Backstage list, two lists code data in initial preservation is consistent.
Specifically, for each coded lock, two places preserve its unlocking cipher, we claim in coded lock List is disposal password list, and the list in background service management system is the list of disposal password backstage, this two list In initial preservation, code data is consistent, and the password quantity that each list is included all is multiple, row of each password where it It is unique in table.Have whether each password has sent mark in the list of disposal password backstage, initial value is all not send; Have in disposal password list each password whether effective marker, initial value is all effective.It is big in view of current storage cost Width reduction, password quantity can be very big, can be with enough a very long time.If the quantity of coded lock is for multiple in system, Then background service management system will also store the unique mark and its with the list of disposal password backstage one by one of each coded lock Corresponding relation, so that its disposal password backstage list can be found according to the unique mark of a coded lock.At the beginning of specific data Beginning method, Ke Yishi:Background service management system produces a collection of disposal password, then by its data copy to coded lock; Can also be that a collection of disposal password is produced by coded lock, then by its data copy to background service management system;May be used also To be, a collection of disposal password is produced by specific purpose tool, then by its data copy to coded lock and background service management system. Data copy process is to be directly connected to coded lock and background service management system, it is also possible to by intermediary, in this Between medium can be laptop computer, mobile stored password lock, mobile intelligent terminal or specific purpose tool etc., by data copy mistake Go.
This step is performed once when initializing first time, if then background service management system hair after some time Now the password major part in the disposal password backstage list is all used up, and is just necessary to perform this step again.
Step S320:User terminal completes User logs in.
Preferably, user terminal judges that the account of user input, judgement complete User logs in after passing through.For some feelings Condition, such as:Step S330 is directly entered, as long as on-line payment system completes reimbursement of expense, unlocking cipher can be just directly transmitted, this User logs in can not be needed if sample.
Step S330:On-line payment system completes reimbursement of expense on demand.
Preferably, if desired user pays expense, then complete reimbursement of expense by on-line payment system.For certain situation, Such as towards specific user situations such as freely using system, it may not be necessary to user charges.
Step S350:The background service management system finds first in the list of the disposal password backstage in order The individual password that do not send is sent to user and is designated as having sent.
Specifically, whether each password has corresponding Status Flag for record in the list of disposal password backstage Send, initial value all not send, after a password is sent, its mark is changed to send, then would not again take this next time Password is to user.According to user's request, the background service management system is in order in disposal password backstage list On find first and do not send password, user is sent to by user terminal;Afterwards, to identify this close for the background service management system Code is to have sent.If if there are multiple coded locks in system, coded lock unique mark is included in the user request information, use In finding the list of corresponding disposal password backstage according to unique mark.
Note, only refer to background service management system by the change in its disposal password backstage list, and password here The disposal password list locked is unrelated, and the latter refers to step S360.
Step S360:The coded lock gets the password of user input, judges further according to the disposal password list Just now whether effectively the password of user input, unlock and will user input just now in the disposal password list if effectively Password turn into it is invalid.
Specifically, the coded lock gets the password of user input, judges firm further according to the disposal password list Whether effectively the password of ability user input, unlock and in the disposal password list by user input just now if effectively Password turns into invalid, prevents from reusing, and embodies disposable feature.Here judge that password effectively refers to:The password occurs In the disposal password list of storage, and its corresponding Status Flag is shown as effective.Here judge that password useless refers to: The password not storage disposal password list on, or storage disposal password list on but its corresponding state mark Will is shown as invalid.One effective password is turned into invalid, specific method is:Each password in disposal password list Have corresponding Status Flag for record whether effectively, initial value is all effective, as long as its flag bit is changed to it is invalid, then under It is secondary to judge just as invalid.Alternatively, directly the password is deleted from disposal password list, it is also possible to effective close by one Code turns into invalid.
Step S370:The coded lock is the password that user input just now is sequentially located in the disposal password list All passwords before all turn into invalid.
Preferably, while the coded lock makes the password of user input just now turn into invalid, also described disposable The all passwords before the password of user input just now are sequentially located in cipher list all turns into invalid.This step purpose:Sequentially The all passwords before the password of user input just now are come, even if not being transfused to also, it is invalid also all to turn into, and more protects Demonstrate,prove the safe handling of coded lock.
4. example IV.
Based on above-mentioned technical proposal, as shown in figure 4, the embodiment of the present invention also provides a kind of coding lock system, including the above The coded lock 200, background service management system 400, user terminal 450, wherein:
The coded lock 200 includes disposal password management module 210, input module 220, locking and unlocking module 230;Described one Secondary property Password Management module 210, for storing disposal password list, judging disposal password whether effectively and in judged result For it is effective when notify locking and unlocking module 230 to perform unlocking operation, a valid password turned into invalid;The input module 220, the password for obtaining user input;The locking and unlocking module 230, locks or unlocks accordingly for being performed by instruction Operation;The quantity of coded lock 200 is one or more, if then every coded lock has coded lock unique mark 290 to multiple;
Background service management system 400, including disposal password background module 410, disposal password background module 410 are used to deposit Storage disposal password backstage list also, first found out from disposal password list in order according to user's request do not send close Code is to user and identifies the password after transmission to have sent;
User terminal 450, for disposal password to be sent into user.
Preferably, the background service management system 400 also includes:User's background module 420 and/or on-line payment system 430;Wherein, user's background module 420 is used to manage user;On-line payment system 430 is used to provide payment approach on demand.
The flow of the coding lock system of the present embodiment is:Specifically, for each coded lock, there are two places Its unlocking cipher is preserved, our lists in coded lock are called disposal password list, in background service management system List is the list of disposal password backstage, and this two list code data in initial preservation is consistent, the password that each list is included Quantity is all multiple, and each password is unique in the list where it.It has been greatly reduced in view of current storage cost, Password quantity can be very big, can be with enough a very long time.If the quantity of coded lock is for multiple in system, backstage clothes Business management system will also store the unique mark and its one-to-one relationship with the list of disposal password backstage of each coded lock, So that its disposal password backstage list can be found according to the unique mark of a coded lock.Specific data initialization method, Can be:Disposal password background module 410 produces a collection of disposal password, then by its data copy to disposal password pipe Reason module 210;Can also, by disposal password management module 210, produce a collection of disposal password, then copy its data In shellfish to disposal password background module 410;It is also possible that producing a collection of disposal password by specific purpose tool, then counted According to being copied to disposal password management module 210, and disposal password background module 410.Data copy process is by coded lock 200 and background service management system 400 be directly connected to, it is also possible to by intermediary, the intermediary can be portable Computer, mobile stored password lock, mobile intelligent terminal or specific purpose tool etc., data copy is gone over.Initialization step only has Find that the most of password in the disposal password backstage list is all used up in disposal password background module 410, just having must To perform again.Preferably, user's background module 420 completes User logs in, on-line payment system 430 and completes reimbursement of expense payment; Then, according to user's request, disposal password background module 410 finds in the list of the disposal password backstage in order One does not send password, and user is sent to by user terminal 450, and the password is identified in the list of the disposal password backstage To have sent.If if having multiple coded locks in system, coded lock unique mark 490 is included in the user request information, For finding the list of corresponding disposal password backstage according to unique mark.Coded lock 200 gets use by input module 220 The password of family input, judges whether the password of user input just now is effective further according to the disposal password list, if effectively Notify locking and unlocking module 230 to unlock and the password of user input just now is turned into invalid in the disposal password list; If judged result is invalid, the coded lock prompt cipher mistake, and mistake of statistics number of times.If the errors number of statistics reaches To predetermined threshold value, by temporary close password input function for a period of time, and shut-in time length can be with for the coded lock The increased frequency of the code error for being counted and it is elongated.Preferably, coded lock 200 makes the password of user input just now turn into invalid While, also all passwords being sequentially located in the disposal password list before the password of user input just now all into For invalid.Here judge that password effectively refers to:The password is appeared in the disposal password list of storage, and its corresponding shape State mark is shown as effective.Here judge that password useless refers to:The password not storage disposal password list on, Huo Zhe In the disposal password list of storage but its corresponding Status Flag is shown as invalid.One effective password is turned into nothing Imitate, specific method is:Whether effectively, just each password has corresponding Status Flag for recording in disposal password list Initial value is all effective, as long as its flag bit is changed to invalid, is then judged just as invalid next time.Alternatively, directly by the password from Deleted in disposal password list, it is also possible to which an effective password is turned into invalid.
Explanation is needed exist for, during actual deployment, background service management system 400 can only not necessarily be deployed in one On platform physical server, dispose for the convenience of the user, use, background service management system 400 can be to be integrated into user terminal 450 In one intelligent movable equipment, such as on mobile phone.
5. embodiment five.
As shown in figure 5, providing a kind of coded lock locking method in the embodiment of the present invention, comprise the following steps.
Step S500:Disposal password list is store on coded lock, the list includes multiple disposal passwords.
Specifically, need to store disposal password list on coded lock, the list includes multiple disposal passwords, it is desirable to Each password is unique in the list where it.It has been greatly reduced in view of current storage cost, the list is included The quantity of disposal password can be very big, can be with enough a very long time.
Step S510:The coded lock obtains the password of user input.
Preferably, the step obtains the password of user input, specific method be it is following in one or more combination:
By key-press input;
It is input into by touch-screen;
Obtained by language identification;
Obtained by bluetooth connection;
By near-field communication(Near Field Communication, NFC)Obtain;
By radio frequency identification(Radio Frequency Identification,RFID)Obtain;
Obtained by swepting slip shape code;
Obtained by sweeping Quick Response Code.
Step S530:The coded lock judges whether the password of user input is effective.
Specifically, the disposal password list according to storage judges whether the password of user input is effective, if password is effective Following steps S540 and step S550 is then performed respectively.Preferably, if judged result to perform step S570 and step if invalid S580.Here judge that password effectively refers to:The password is appeared in the disposal password list of storage, and its corresponding state Mark is shown as effective.Here judge that password useless refers to:The password is not in the disposal password list of storage, or depositing In the disposal password list of storage but its corresponding Status Flag is shown as invalid.
Step S540:The coded lock is locked.
Step S550:The coded lock makes the password of user input just now as nothing in the disposal password list of storage Effect, prevents from reusing, and embodies disposable feature.
Specifically, making the password of user input just now turns into invalid, prevents from reusing, and embodies disposable feature. One effective password is turned into invalid, specific method is:Each password has corresponding shape in disposal password list Whether effectively state mark be used for recording, and initial value all be effective, as long as its mark is changed to invalid, then next judgement is just nothing Effect.Alternatively, directly the password is deleted from disposal password list, it is also possible to which an effective password is turned into invalid.
Step S560:The coded lock is the password that user input just now is sequentially located in the disposal password list All passwords before all turn into invalid.
Preferably, make user input just now password turn into it is invalid while, also in the disposal password list All passwords that order is located at before the password of user input just now all turn into invalid.This step purpose:Will come order Just now all passwords before the password of user input, even if not being transfused to also, also all can more ensure close as invalid The safe handling of code lock.
Step S570:The coded lock prompt cipher is invalid.
Specifically, if finding password useless, the coded lock prompt cipher mistake, and counting user in step S530 It is input into the number of times of code error.
Step S580:When the number of times that malfunctions reaches predetermined threshold value, the coded lock temporary close password input function.
Specifically, when the number of times of statistics reaches predetermined threshold value, the coded lock is by temporary close password input function For a period of time, and shut-in time length can be elongated with the increased frequency of the code error for being counted.
Finally it should be noted that:Above example is only used to illustrate the technical scheme of the embodiment of the present invention, rather than it is limited System;Although being described in detail to the embodiment of the present invention with reference to the foregoing embodiments, one of ordinary skill in the art should Understand:It can still modify to the technical scheme described in foregoing embodiments, or to which part technical characteristic Carry out equivalent;And these modifications or replacement, the essence of appropriate technical solution is departed from each reality of the embodiment of the present invention Apply the spirit and scope of a technical scheme.

Claims (10)

1. a kind of method for unlocking coded lock, it is characterised in that step is as follows:
Disposal password list is store on A, coded lock, the disposal password list includes multiple disposal passwords;
B, the coded lock obtain the password of user input;
C, the coded lock judge whether the password of user input just now is effective according to the disposal password list of storage, if effectively Below step is then performed respectively;
D, the unlocking coded lock;
E, the coded lock make the password of user input just now as invalid in the disposal password list of storage.
2. method according to claim 1, it is characterised in that after the step E, also step F:The coded lock The all passwords being sequentially located in the disposal password list before the password of user input just now are all turned into invalid.
3. the method according to any one of claim 1 or 2, it is characterised in that the step B obtains the close of user input Code, specific method be it is following in one or more combination:
By key-press input;
It is input into by touch-screen;
Obtained by language identification;
Obtained by bluetooth connection;
By near-field communication(Near Field Communication,NFC)Obtain;
By radio frequency identification(Radio Frequency Identification,RFID)Obtain;
Obtained by swepting slip shape code;
Obtained by sweeping Quick Response Code.
4. a kind of coded lock, it is characterised in that including:Disposal password management module, input module, locking and unlocking module, its In:
Disposal password management module, for storing disposal password list, judging whether a password effectively and in judgement is tied Fruit notifies the locking and unlocking module to perform unlocking operation, a valid password is turned into invalid when being effective;
Input module, the password for obtaining user input;
Locking and unlocking module, locks or unlocking operation accordingly for being performed by instruction.
5. coded lock according to claim 4, it is characterised in that the input module includes that button, touch-screen, voice are known Other element, bluetooth element, near-field communication(Near Field Communication,NFC)Element, radio frequency identification(Radio Frequency Identification,RFID)One in reader, bar code recognition element, Quick Response Code recognition component or Multiple, the password for obtaining user input.
6. a kind of method of coding lock system, it is characterised in that step is as follows:
A, coded lock store disposal password list, and background service management system stores the list of disposal password backstage, two List code data in initial preservation is consistent;
B, the background service management system find first in the list of the disposal password backstage and do not send close in order Code is sent to user and is designated as having sent;
C, the coded lock get the password of user input, and user input just now is judged further according to the disposal password list Password whether effectively, if effectively if unlock and in the disposal password list by the password of user input just now turn into nothing Effect.
7. method according to claim 6, it is characterised in that after the step C, also step D:The coded lock The all passwords being sequentially located in the disposal password list before the password of user input just now are all turned into invalid.
8. a kind of coding lock system, it is characterised in that including coded lock, background service management system, user terminal, wherein:
Coded lock includes disposal password management module, input module, locking and unlocking module;The disposal password manages mould Block, for storing disposal password list, judging whether disposal password effectively and when judged result is for effective notifies described Locking and unlocking module performs unlocking operation, a valid password is turned into invalid;The input module, for obtaining user input Password;The locking and unlocking module, locks or unlocking operation accordingly for being performed by instruction;The quantity of the coded lock is One or more, if then each coded lock has its unique mark to multiple;
Background service management system, including disposal password background module, the disposal password background module are used to store one Secondary property password backstage list, is additionally operable to find first in the list of the disposal password backstage in order according to user's request Password is not sent to be sent to user and mark the password to have sent;
User terminal, for disposal password to be sent into user.
9. a kind of coded lock locking method, it is characterised in that step is as follows:
Disposal password list is store on A, coded lock, the disposal password list includes multiple disposal passwords;
B, the coded lock obtain the password of user input;
C, the coded lock judge whether the password of user input just now is effective according to the disposal password list of storage, if effectively Below step is then performed respectively;
D, the coded lock are locked;
E, the coded lock make the password of user input just now as invalid in the disposal password list of storage.
10. method according to claim 1, it is characterised in that after the step E, also step F:The password All passwords that lock handle is sequentially located at before the password of user input just now in the disposal password list all turn into invalid.
CN201611204553.4A 2016-12-23 2016-12-23 Method for unlocking coded lock, locking method, coded lock, systems approach and system Pending CN106780895A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611204553.4A CN106780895A (en) 2016-12-23 2016-12-23 Method for unlocking coded lock, locking method, coded lock, systems approach and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611204553.4A CN106780895A (en) 2016-12-23 2016-12-23 Method for unlocking coded lock, locking method, coded lock, systems approach and system

Publications (1)

Publication Number Publication Date
CN106780895A true CN106780895A (en) 2017-05-31

Family

ID=58897743

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611204553.4A Pending CN106780895A (en) 2016-12-23 2016-12-23 Method for unlocking coded lock, locking method, coded lock, systems approach and system

Country Status (1)

Country Link
CN (1) CN106780895A (en)

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107492169A (en) * 2017-07-27 2017-12-19 中兴通讯股份有限公司 Trigger the method, apparatus and system of smart lock work
CN107564141A (en) * 2017-08-01 2018-01-09 努比亚技术有限公司 A kind of ultrasonic wave method for unlocking, first terminal and second terminal
CN107590885A (en) * 2017-09-04 2018-01-16 深圳市谷咔互联科技有限公司 A kind of shared bicycle electronic lock unlocking method and system
CN107730676A (en) * 2017-09-29 2018-02-23 东峡大通(北京)管理咨询有限公司 Unlocking method, device and the storage medium of the vehicles
CN108449177A (en) * 2018-03-16 2018-08-24 东莞盛世科技电子实业有限公司 The use control method and system of temporary password
CN109978529A (en) * 2017-12-27 2019-07-05 青岛胶南海尔洗衣机有限公司 Offline electronic payment method
CN110300180A (en) * 2019-07-03 2019-10-01 北京享易天下科技有限公司 A kind of service system and method for servicing of shared device
CN110379051A (en) * 2019-07-02 2019-10-25 Oppo广东移动通信有限公司 Unlocking method, device, terminal and storage medium
CN110930551A (en) * 2019-11-27 2020-03-27 惠州拓邦电气技术有限公司 Unlocking method and device, password authorization method and device, and door lock system
CN111199596A (en) * 2018-10-31 2020-05-26 云丁网络技术(北京)有限公司 Intelligent door lock control method, device and system
CN111325916A (en) * 2020-02-20 2020-06-23 深圳市萝趣电子商务有限公司 Password unlocking system
CN111667611A (en) * 2020-05-08 2020-09-15 掌门物联科技(杭州)股份有限公司 Intelligent frequency hopping anti-interference door lock control system and control method thereof
CN112381976A (en) * 2020-11-17 2021-02-19 宁波久婵物联科技有限公司 One-time password verification method for electronic lock
CN113688380A (en) * 2021-10-26 2021-11-23 苏州浪潮智能科技有限公司 Password protection method, device and medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101194800A (en) * 2006-12-07 2008-06-11 陈科 Shopping box
CN101315708A (en) * 2007-05-31 2008-12-03 北京银融科技有限责任公司 Off-site controlled magnetic card cipher lock and control method thereof
CN102467774A (en) * 2010-11-17 2012-05-23 戴胜祝 Cryptosystem with anti-recording function
US20140255036A1 (en) * 2013-03-06 2014-09-11 Qualcomm Incorporated Methods and apparatus for using visible light communications for controlling access to an area
CN104464025A (en) * 2014-05-19 2015-03-25 贵州詹阳动力重工有限公司 Remote monitoring method and device for rented vehicles
CN106530470A (en) * 2016-12-14 2017-03-22 余仁植 Vehicle unlocking method, lock unlocking device, vehicle and vehicle system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101194800A (en) * 2006-12-07 2008-06-11 陈科 Shopping box
CN101315708A (en) * 2007-05-31 2008-12-03 北京银融科技有限责任公司 Off-site controlled magnetic card cipher lock and control method thereof
CN102467774A (en) * 2010-11-17 2012-05-23 戴胜祝 Cryptosystem with anti-recording function
US20140255036A1 (en) * 2013-03-06 2014-09-11 Qualcomm Incorporated Methods and apparatus for using visible light communications for controlling access to an area
CN104464025A (en) * 2014-05-19 2015-03-25 贵州詹阳动力重工有限公司 Remote monitoring method and device for rented vehicles
CN106530470A (en) * 2016-12-14 2017-03-22 余仁植 Vehicle unlocking method, lock unlocking device, vehicle and vehicle system

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107492169A (en) * 2017-07-27 2017-12-19 中兴通讯股份有限公司 Trigger the method, apparatus and system of smart lock work
CN107564141A (en) * 2017-08-01 2018-01-09 努比亚技术有限公司 A kind of ultrasonic wave method for unlocking, first terminal and second terminal
CN107590885A (en) * 2017-09-04 2018-01-16 深圳市谷咔互联科技有限公司 A kind of shared bicycle electronic lock unlocking method and system
CN107730676A (en) * 2017-09-29 2018-02-23 东峡大通(北京)管理咨询有限公司 Unlocking method, device and the storage medium of the vehicles
CN109978529A (en) * 2017-12-27 2019-07-05 青岛胶南海尔洗衣机有限公司 Offline electronic payment method
CN109978529B (en) * 2017-12-27 2024-01-23 海尔衣联生态科技(上海)有限公司 Offline payment method
CN108449177A (en) * 2018-03-16 2018-08-24 东莞盛世科技电子实业有限公司 The use control method and system of temporary password
US11657128B2 (en) 2018-03-16 2023-05-23 Smart Electronic Industrial (Dong Guan) Co., Ltd. Temporary password usage control method and system
CN111199596A (en) * 2018-10-31 2020-05-26 云丁网络技术(北京)有限公司 Intelligent door lock control method, device and system
CN110379051B (en) * 2019-07-02 2022-05-10 Oppo广东移动通信有限公司 Unlocking method, device, terminal and storage medium
CN110379051A (en) * 2019-07-02 2019-10-25 Oppo广东移动通信有限公司 Unlocking method, device, terminal and storage medium
CN110300180A (en) * 2019-07-03 2019-10-01 北京享易天下科技有限公司 A kind of service system and method for servicing of shared device
CN110930551A (en) * 2019-11-27 2020-03-27 惠州拓邦电气技术有限公司 Unlocking method and device, password authorization method and device, and door lock system
CN111325916A (en) * 2020-02-20 2020-06-23 深圳市萝趣电子商务有限公司 Password unlocking system
CN111667611A (en) * 2020-05-08 2020-09-15 掌门物联科技(杭州)股份有限公司 Intelligent frequency hopping anti-interference door lock control system and control method thereof
CN112381976A (en) * 2020-11-17 2021-02-19 宁波久婵物联科技有限公司 One-time password verification method for electronic lock
CN113688380A (en) * 2021-10-26 2021-11-23 苏州浪潮智能科技有限公司 Password protection method, device and medium

Similar Documents

Publication Publication Date Title
CN106780895A (en) Method for unlocking coded lock, locking method, coded lock, systems approach and system
CN105678872B (en) A kind of access control system and its authorization method and access control terminal equipment
US9818244B2 (en) Method and system for permitting remote check-in and coordinating access control
CN105321240B (en) The control method and device and Intelligent door control system of intelligent door lock
CN105827576B (en) Method for unlocking and system based on dynamic puzzle-lock
CA2593897C (en) Method, system and apparatus for accessing a resource based on data supplied by a local user
CN109272606A (en) A kind of smart lock monitoring equipment, method and storage medium based on block chain
CN108091011A (en) Method and system of the verification technique to equipment progress permission control is unified by the testimony of a witness
CN106097519B (en) A kind of control device of electronic lock, electronic lock, control method and its application
CN106530470A (en) Vehicle unlocking method, lock unlocking device, vehicle and vehicle system
CN109448175A (en) The control method and fingerprint lock administration system of Fingerprint Lock
CN105447927B (en) Control method, access controller and the access control system that gate inhibition's electric lock is opened
CN106846580A (en) Intelligent unlocking method and system
CN106960492B (en) System and method for electronic control unlocking
CN107633573A (en) The method for unlocking and intelligent door lock of a kind of intelligent door lock
CN101298817B (en) Lock body control device and method thereof
CN109215204A (en) A kind of intelligent door lock security system based on ether mill
CN101638017A (en) Novel confidential folder
CN108173931A (en) A kind of implementation method of mobile fingerprint remote control intelligent household lock
CN206193989U (en) Lock and vehicle
CN101765821B (en) Fingerprint reader resetting system and method
CN106384411A (en) Wireless lock system and unlocking method
CN207123882U (en) A kind of antitheft cloud service door-locking system of multiple intelligent
CN106778135A (en) A kind of image processing equipment unlocking method, image processing equipment and system
CN107403088A (en) The method and device of a kind of password identification

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20170531

WD01 Invention patent application deemed withdrawn after publication