CN106780895A - Method for unlocking coded lock, locking method, coded lock, systems approach and system - Google Patents
Method for unlocking coded lock, locking method, coded lock, systems approach and system Download PDFInfo
- Publication number
- CN106780895A CN106780895A CN201611204553.4A CN201611204553A CN106780895A CN 106780895 A CN106780895 A CN 106780895A CN 201611204553 A CN201611204553 A CN 201611204553A CN 106780895 A CN106780895 A CN 106780895A
- Authority
- CN
- China
- Prior art keywords
- password
- coded lock
- list
- disposal
- user input
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00658—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by passive electrical keys
- G07C9/00674—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by passive electrical keys with switch-buttons
- G07C9/0069—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by passive electrical keys with switch-buttons actuated in a predetermined sequence
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00817—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Processing Of Solid Wastes (AREA)
- Lock And Its Accessories (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The method for unlocking coded lock based on disposal password, locking method, coded lock, systems approach and system are the embodiment of the invention provides, method for unlocking is:Disposal password list is store on coded lock, the list includes multiple disposal passwords;Then the password of user input is obtained;Whether effectively disposal password list according to storage judges the password of user input, effectively then by unlocking coded lock, and the password of user input just now is turned into invalid, prevents from reusing, and embodies disposable feature.The system set up based on above-mentioned method for unlocking does not require that coded lock networking is online, it is not necessary to back-end server real-time control coded lock;Meanwhile, password is disposable feature, it is ensured that safety.Therefore, it is simple with system deployment using embodiment of the present invention technical scheme, low cost, the advantages of safe and reliable.
Description
Technical field
The invention belongs to coded lock field, and in particular to method for unlocking coded lock, locking method, coded lock manufacture, system
Method and system.
Background technology
Electronic password lock is that one kind controls circuit or chip operation by Password Input, so that control machinery switch
Closure, completes unlocking, the electronic product of task of locking.Coded lock is now, socially with to obtain a kind of very universal lock, to answer extensively
For various fields, the fields such as door lock, safety cabinet, self-service safe deposit box, vehicle are particularly applied to, coded lock need not be carried appoints
What thing, it is convenient to unlock, and ease of use and Fingerprint Lock quite, surpass the lock swiped the card, but stability outclass Fingerprint Lock again.
But either the problem for existing is password, and fixation is difficult modification, or heavy dependence network.First say existing based on internet
Coding lock system, is typically made up of coded lock, gateway and password generation backstage.User when coded lock to be opened, it is necessary to
Password request first is sent to password generation backstage, password generates backstage and sent to user's end according to password request one password of generation
Hold and sent to coded lock password by gateway.Coded lock configures coded lock according to the password for obtaining, and user is by being connect
The password of receipts opens coded lock.When logical between the communication link and gateway between coded lock and gateway and password generation backstage
When letter link breaks down, password generation backstage will be unable to the unlocking cipher that password request is generated sent according to user terminal
Send to coded lock, and then can cause the user cannot to open coded lock according to the unlocking cipher that is received.Besides it is independent of network
Coded lock, be all that password is fixed, all people are that with a same password unlocking, there is password leakage and cause uneasiness
Full situation;Even if password can be changed, but very cumbersome.Therefore how to allow coded lock to be independent of networking, be not intended to again with admittedly
Determining password unlocking will seem extremely important.As can be seen here, Current Password is latched in management system complexity, high cost, stability
Poor, inadequate security problems.
The content of the invention
The embodiment of the present invention provides method for unlocking coded lock, locking method, coded lock, system side based on disposal password
Method and system, are used to solve the problems, such as solve to be proposed in above-mentioned background technology.
To achieve the above object, the present invention provides following technical scheme.
1. a kind of method for unlocking coded lock, step is as follows:
Disposal password list is store on A, coded lock, the disposal password list includes multiple disposal passwords;
B, the coded lock obtain the password of user input;
C, the coded lock judge whether the password of user input just now is effective according to the disposal password list of storage, if effectively
Below step is then performed respectively;
D, the unlocking coded lock;
E, the coded lock make the password of user input just now as invalid in the disposal password list of storage.
Preferably, after the step E, also step F:The coded lock is suitable in the disposal password list
All passwords of the tagmeme before the password of user input just now all turn into invalid.
Preferably, the step B obtains the password of user input, specific method be it is following in one or more combination:
By key-press input;
It is input into by touch-screen;
Obtained by language identification;
Obtained by bluetooth connection;
By near-field communication(Near Field Communication,NFC)Obtain;
By radio frequency identification(Radio Frequency Identification,RFID)Obtain;
Obtained by swepting slip shape code;
Obtained by sweeping Quick Response Code.
2. a kind of coded lock, including:Disposal password management module, input module, locking and unlocking module, wherein:
Disposal password management module, for storing disposal password list, judging whether a password effectively and in judgement is tied
Fruit notifies the locking and unlocking module to perform unlocking operation, a valid password is turned into invalid when being effective;
Input module, the password for obtaining user input;
Locking and unlocking module, locks or unlocking operation accordingly for being performed by instruction.
Preferably, the input module includes button, touch-screen, speech recognition element, bluetooth element, near-field communication
(Near Field Communication,NFC)Element, radio frequency identification(Radio Frequency Identification,
RFID)One or more in reader, bar code recognition element, Quick Response Code recognition component, for obtaining the close of user input
Code.
3. a kind of method of coding lock system, step is as follows:
A, coded lock store disposal password list, and background service management system stores the list of disposal password backstage, two
List code data in initial preservation is consistent;
B, the background service management system find first in the list of the disposal password backstage and do not send close in order
Code is sent to user and is designated as having sent;
C, the coded lock get the password of user input, and user input just now is judged further according to the disposal password list
Password whether effectively, if effectively if unlock and in the disposal password list by the password of user input just now turn into nothing
Effect.
Preferably, after the step C, also step D:The coded lock is suitable in the disposal password list
All passwords of the tagmeme before the password of user input just now all turn into invalid.
4. a kind of coding lock system, including coded lock, background service management system, user terminal, wherein:
Coded lock includes disposal password management module, input module, locking and unlocking module;The disposal password manages mould
Block, for storing disposal password list, judging whether disposal password effectively and when judged result is for effective notifies described
Locking and unlocking module performs unlocking operation, a valid password is turned into invalid;The input module, for obtaining user input
Password;The locking and unlocking module, locks or unlocking operation accordingly for being performed by instruction;The quantity of the coded lock is
One or more, if then each coded lock has its unique mark to multiple;
Background service management system, including disposal password background module, the disposal password background module are used to store one
Secondary property password backstage list, is additionally operable to find first in the list of the disposal password backstage in order according to user's request
Password is not sent to be sent to user and mark the password to have sent;
User terminal, for disposal password to be sent into user.
5. a kind of coded lock locking method, step is as follows:
Disposal password list is store on A, coded lock, the disposal password list includes multiple disposal passwords;
B, the coded lock obtain the password of user input;
C, the coded lock judge whether the password of user input just now is effective according to the disposal password list of storage, if effectively
Below step is then performed respectively;
D, the coded lock are locked;
E, the coded lock make the password of user input just now as invalid in the disposal password list of storage.
Preferably, after the step E, also step F:The coded lock is suitable in the disposal password list
All passwords of the tagmeme before the password of user input just now all turn into invalid.
Compared with prior art, the beneficial effects of the invention are as follows:The present invention does not require that coded lock networking is online, it is not necessary to after
End server real-time control coded lock;Meanwhile, password is disposable feature, it is ensured that safety.Therefore, implemented using the present invention
Example technical scheme, low cost, safe and reliable the advantages of simple with system deployment.
Brief description of the drawings
Technical scheme in order to illustrate more clearly the embodiments of the present invention, below will be to that will use needed for embodiment description
Accompanying drawing be briefly described.It should be evident that drawings in the following description are some embodiments of the present invention, it is only used for showing
Go out the purpose of preferred embodiment, and be not considered as limitation of the present invention.In the accompanying drawings:
Fig. 1 is the schematic flow sheet of the method for unlocking coded lock of the embodiment of the present invention one;
Fig. 2 is the composition schematic diagram of the coded lock of the embodiment of the present invention two;
Fig. 3 is the schematic flow sheet of the coding lock system method of the embodiment of the present invention three;
Fig. 4 is the composition schematic diagram of the coding lock system of the embodiment of the present invention four;
Fig. 5 is the schematic flow sheet of the coded lock locking method of the embodiment of the present invention five.
Specific embodiment
To make the purpose, technical scheme and advantage of the embodiment of the present invention clearer, below in conjunction with the embodiment of the present invention
In accompanying drawing, the technical scheme in the embodiment of the present invention is clearly and completely described, it is clear that described embodiment is
A part of embodiment of the present invention, rather than whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art
The every other embodiment obtained under the premise of creative work is not made, belongs to the scope of protection of the invention.
1. embodiment one.
As shown in figure 1, providing a kind of method for unlocking coded lock in the embodiment of the present invention, comprise the following steps.
Step S100:Disposal password list is store on coded lock, the list includes multiple disposal passwords.
Specifically, need to store disposal password list on coded lock, the list includes multiple disposal passwords, it is desirable to
Each password is unique in the list where it.It has been greatly reduced in view of current storage cost, the list is included
The quantity of disposal password can be very big, can be with enough a very long time.
Step S110:The coded lock obtains the password of user input.
Specifically, input module is installed on coded lock to obtain the password of user input.
Preferably, Password Input is provided during unlocking coded lock Password Input and finishes option, when coded lock detects use
When family selection Password Input finishes option, that is, confirm that the password of user input terminates.
Preferably, the length of unlocking coded lock password is predetermined fixed value, when coded lock detects the password of user input
When number of characters reaches preset value fixation, that is, confirm that the password of user input terminates.
Preferably, the step obtains the password of user input, specific method be it is following in one or more combination:
By key-press input;
It is input into by touch-screen;
Obtained by language identification;
Obtained by bluetooth connection;
By near-field communication(Near Field Communication, NFC)Obtain;
By radio frequency identification(Radio Frequency Identification,RFID)Obtain;
Obtained by swepting slip shape code;
Obtained by sweeping Quick Response Code.
Step S130:The coded lock judges whether the password of user input is effective according to the disposal password list of storage.
Specifically, the disposal password list according to storage judges whether the password of user input is effective, if password is effective
Following steps S140 and step S150 is then performed respectively.Preferably, if judged result to perform step S170 and step if invalid
S180.Here judge that password effectively refers to:The password is appeared in the disposal password list of storage, and its corresponding state
Mark is shown as effective.Here judge that password useless refers to:The password is not in the disposal password list of storage, or depositing
In the disposal password list of storage but its corresponding Status Flag is shown as invalid.
Step S140:The unlocking coded lock.
Step S150:The coded lock makes the password of user input just now as nothing in the disposal password list of storage
Effect, prevents from reusing, and embodies disposable feature.
Specifically, making the password of user input just now turns into invalid, prevents from reusing, and embodies disposable feature.
One effective password is turned into invalid, specific method is:Each password has corresponding shape in disposal password list
Whether effectively state mark be used for recording, and initial value all be effective, as long as its mark is changed to invalid, then next judgement is just nothing
Effect.Alternatively, directly the password is deleted from disposal password list, it is also possible to which an effective password is turned into invalid.
Step S160:The coded lock is the password that user input just now is sequentially located in the disposal password list
All passwords before all turn into invalid.
Preferably, make user input just now password turn into it is invalid while, also in the disposal password list
All passwords that order is located at before the password of user input just now all turn into invalid.This step purpose:Will come order
Just now all passwords before the password of user input, even if not being transfused to also, also all can more ensure close as invalid
The safe handling of code lock.
Step S170:The coded lock prompt cipher is invalid.
Specifically, if finding password useless, the coded lock prompt cipher mistake and counting user in step S130
It is input into the number of times of code error.
Step S180:When the number of times that malfunctions reaches predetermined threshold value, the coded lock temporary close password input function.
Specifically, when the number of times of statistics reaches predetermined threshold value, the coded lock is by temporary close password input function
For a period of time, and shut-in time length can be elongated with the increased frequency of the code error for being counted.
2. embodiment two.
Based on above-mentioned technical proposal, as shown in Fig. 2 the embodiment of the present invention also provides a kind of coded lock, the coded lock 200
Including disposal password management module 210, input module 220, locking and unlocking module 230, wherein:
Disposal password management module 210, for storing disposal password list, judging whether disposal password is effective and sentencing
Disconnected result notifies locking and unlocking module 230 to perform unlocking operation, a valid password is turned into invalid when being effective;
Input module 220, the password for obtaining user input;
Locking and unlocking module 230, locks or unlocking operation accordingly for being performed by instruction.
Specifically, disposal password management module 210 is configured as:Disposal password list is store, the list is included
Multiple disposal passwords, it is desirable to which each password is unique in the list where it, it is contemplated that current storage cost is big
Width reduction, the quantity of disposal password can be very big, can be with enough a very long time.Meanwhile, the module is additionally configured to:Energy
Judge whether disposal password effectively and when judged result is for effective notifies that locking and unlocking module 230 performs unlocking operation.This
In judge password effectively refer to:The password is appeared in the disposal password list of storage, and its corresponding Status Flag is aobvious
It is shown as effective.Here judge that password useless refers to:The password not storage disposal password list on, or storage one
In secondary property cipher list but its corresponding Status Flag is shown as invalid.Specifically, an effective password is turned into invalid,
Specific method is:Whether effectively, initially each password has corresponding Status Flag for recording in disposal password list
Value all be effective, if its mark is changed to it is invalid, then it is next to judge just as invalid.Alternatively, directly by the password from once
Property cipher list on delete, it is also possible to by an effective password as invalid.
Preferably, the coded lock also includes:One or more in display module 240, locating module 250, wherein:
Display module 240, for display information and user mutual;
Locating module 250, the geographical location information for obtaining this coded lock.
Preferably, the input module includes button, touch-screen, speech recognition element, bluetooth element, near-field communication
(Near Field Communication,NFC)Element, radio frequency identification(Radio Frequency Identification,
RFID)One or more in reader, bar code recognition element, Quick Response Code recognition component, for obtaining the close of user input
Code.
The method for unlocking of the coded lock 200 of the present embodiment is:Disposal password management module 210 is previously stored once
Property cipher list;The password of user input is obtained by input module 220, the then disposal password list according to storage judges
The password of user input whether effectively, if password effectively if notify that locking and unlocking module 230 is unlocked, and will user input just now
Password turn into it is invalid, prevent from reusing, embody disposable feature.Preferably, make the password of user input just now into
For it is invalid while, it is also all close before the password of user input just now being sequentially located in the disposal password list
Code all turns into invalid.If judging the password of user input for invalid, the coded lock prompt cipher mistake, and mistake of statistics
Number of times.If the errors number of statistics reaches predetermined threshold value, the coded lock by temporary close password input function for a period of time,
And shut-in time length can be elongated with the increased frequency of the code error for being counted.
3. embodiment three.
Based on above-mentioned technical proposal, as shown in figure 3, the embodiment of the present invention also provides a kind of coding lock system method, including
Following step.
Step S300:Coded lock stores disposal password list, and background service management system stores disposal password
Backstage list, two lists code data in initial preservation is consistent.
Specifically, for each coded lock, two places preserve its unlocking cipher, we claim in coded lock
List is disposal password list, and the list in background service management system is the list of disposal password backstage, this two list
In initial preservation, code data is consistent, and the password quantity that each list is included all is multiple, row of each password where it
It is unique in table.Have whether each password has sent mark in the list of disposal password backstage, initial value is all not send;
Have in disposal password list each password whether effective marker, initial value is all effective.It is big in view of current storage cost
Width reduction, password quantity can be very big, can be with enough a very long time.If the quantity of coded lock is for multiple in system,
Then background service management system will also store the unique mark and its with the list of disposal password backstage one by one of each coded lock
Corresponding relation, so that its disposal password backstage list can be found according to the unique mark of a coded lock.At the beginning of specific data
Beginning method, Ke Yishi:Background service management system produces a collection of disposal password, then by its data copy to coded lock;
Can also be that a collection of disposal password is produced by coded lock, then by its data copy to background service management system;May be used also
To be, a collection of disposal password is produced by specific purpose tool, then by its data copy to coded lock and background service management system.
Data copy process is to be directly connected to coded lock and background service management system, it is also possible to by intermediary, in this
Between medium can be laptop computer, mobile stored password lock, mobile intelligent terminal or specific purpose tool etc., by data copy mistake
Go.
This step is performed once when initializing first time, if then background service management system hair after some time
Now the password major part in the disposal password backstage list is all used up, and is just necessary to perform this step again.
Step S320:User terminal completes User logs in.
Preferably, user terminal judges that the account of user input, judgement complete User logs in after passing through.For some feelings
Condition, such as:Step S330 is directly entered, as long as on-line payment system completes reimbursement of expense, unlocking cipher can be just directly transmitted, this
User logs in can not be needed if sample.
Step S330:On-line payment system completes reimbursement of expense on demand.
Preferably, if desired user pays expense, then complete reimbursement of expense by on-line payment system.For certain situation,
Such as towards specific user situations such as freely using system, it may not be necessary to user charges.
Step S350:The background service management system finds first in the list of the disposal password backstage in order
The individual password that do not send is sent to user and is designated as having sent.
Specifically, whether each password has corresponding Status Flag for record in the list of disposal password backstage
Send, initial value all not send, after a password is sent, its mark is changed to send, then would not again take this next time
Password is to user.According to user's request, the background service management system is in order in disposal password backstage list
On find first and do not send password, user is sent to by user terminal;Afterwards, to identify this close for the background service management system
Code is to have sent.If if there are multiple coded locks in system, coded lock unique mark is included in the user request information, use
In finding the list of corresponding disposal password backstage according to unique mark.
Note, only refer to background service management system by the change in its disposal password backstage list, and password here
The disposal password list locked is unrelated, and the latter refers to step S360.
Step S360:The coded lock gets the password of user input, judges further according to the disposal password list
Just now whether effectively the password of user input, unlock and will user input just now in the disposal password list if effectively
Password turn into it is invalid.
Specifically, the coded lock gets the password of user input, judges firm further according to the disposal password list
Whether effectively the password of ability user input, unlock and in the disposal password list by user input just now if effectively
Password turns into invalid, prevents from reusing, and embodies disposable feature.Here judge that password effectively refers to:The password occurs
In the disposal password list of storage, and its corresponding Status Flag is shown as effective.Here judge that password useless refers to:
The password not storage disposal password list on, or storage disposal password list on but its corresponding state mark
Will is shown as invalid.One effective password is turned into invalid, specific method is:Each password in disposal password list
Have corresponding Status Flag for record whether effectively, initial value is all effective, as long as its flag bit is changed to it is invalid, then under
It is secondary to judge just as invalid.Alternatively, directly the password is deleted from disposal password list, it is also possible to effective close by one
Code turns into invalid.
Step S370:The coded lock is the password that user input just now is sequentially located in the disposal password list
All passwords before all turn into invalid.
Preferably, while the coded lock makes the password of user input just now turn into invalid, also described disposable
The all passwords before the password of user input just now are sequentially located in cipher list all turns into invalid.This step purpose:Sequentially
The all passwords before the password of user input just now are come, even if not being transfused to also, it is invalid also all to turn into, and more protects
Demonstrate,prove the safe handling of coded lock.
4. example IV.
Based on above-mentioned technical proposal, as shown in figure 4, the embodiment of the present invention also provides a kind of coding lock system, including the above
The coded lock 200, background service management system 400, user terminal 450, wherein:
The coded lock 200 includes disposal password management module 210, input module 220, locking and unlocking module 230;Described one
Secondary property Password Management module 210, for storing disposal password list, judging disposal password whether effectively and in judged result
For it is effective when notify locking and unlocking module 230 to perform unlocking operation, a valid password turned into invalid;The input module
220, the password for obtaining user input;The locking and unlocking module 230, locks or unlocks accordingly for being performed by instruction
Operation;The quantity of coded lock 200 is one or more, if then every coded lock has coded lock unique mark 290 to multiple;
Background service management system 400, including disposal password background module 410, disposal password background module 410 are used to deposit
Storage disposal password backstage list also, first found out from disposal password list in order according to user's request do not send close
Code is to user and identifies the password after transmission to have sent;
User terminal 450, for disposal password to be sent into user.
Preferably, the background service management system 400 also includes:User's background module 420 and/or on-line payment system
430;Wherein, user's background module 420 is used to manage user;On-line payment system 430 is used to provide payment approach on demand.
The flow of the coding lock system of the present embodiment is:Specifically, for each coded lock, there are two places
Its unlocking cipher is preserved, our lists in coded lock are called disposal password list, in background service management system
List is the list of disposal password backstage, and this two list code data in initial preservation is consistent, the password that each list is included
Quantity is all multiple, and each password is unique in the list where it.It has been greatly reduced in view of current storage cost,
Password quantity can be very big, can be with enough a very long time.If the quantity of coded lock is for multiple in system, backstage clothes
Business management system will also store the unique mark and its one-to-one relationship with the list of disposal password backstage of each coded lock,
So that its disposal password backstage list can be found according to the unique mark of a coded lock.Specific data initialization method,
Can be:Disposal password background module 410 produces a collection of disposal password, then by its data copy to disposal password pipe
Reason module 210;Can also, by disposal password management module 210, produce a collection of disposal password, then copy its data
In shellfish to disposal password background module 410;It is also possible that producing a collection of disposal password by specific purpose tool, then counted
According to being copied to disposal password management module 210, and disposal password background module 410.Data copy process is by coded lock
200 and background service management system 400 be directly connected to, it is also possible to by intermediary, the intermediary can be portable
Computer, mobile stored password lock, mobile intelligent terminal or specific purpose tool etc., data copy is gone over.Initialization step only has
Find that the most of password in the disposal password backstage list is all used up in disposal password background module 410, just having must
To perform again.Preferably, user's background module 420 completes User logs in, on-line payment system 430 and completes reimbursement of expense payment;
Then, according to user's request, disposal password background module 410 finds in the list of the disposal password backstage in order
One does not send password, and user is sent to by user terminal 450, and the password is identified in the list of the disposal password backstage
To have sent.If if having multiple coded locks in system, coded lock unique mark 490 is included in the user request information,
For finding the list of corresponding disposal password backstage according to unique mark.Coded lock 200 gets use by input module 220
The password of family input, judges whether the password of user input just now is effective further according to the disposal password list, if effectively
Notify locking and unlocking module 230 to unlock and the password of user input just now is turned into invalid in the disposal password list;
If judged result is invalid, the coded lock prompt cipher mistake, and mistake of statistics number of times.If the errors number of statistics reaches
To predetermined threshold value, by temporary close password input function for a period of time, and shut-in time length can be with for the coded lock
The increased frequency of the code error for being counted and it is elongated.Preferably, coded lock 200 makes the password of user input just now turn into invalid
While, also all passwords being sequentially located in the disposal password list before the password of user input just now all into
For invalid.Here judge that password effectively refers to:The password is appeared in the disposal password list of storage, and its corresponding shape
State mark is shown as effective.Here judge that password useless refers to:The password not storage disposal password list on, Huo Zhe
In the disposal password list of storage but its corresponding Status Flag is shown as invalid.One effective password is turned into nothing
Imitate, specific method is:Whether effectively, just each password has corresponding Status Flag for recording in disposal password list
Initial value is all effective, as long as its flag bit is changed to invalid, is then judged just as invalid next time.Alternatively, directly by the password from
Deleted in disposal password list, it is also possible to which an effective password is turned into invalid.
Explanation is needed exist for, during actual deployment, background service management system 400 can only not necessarily be deployed in one
On platform physical server, dispose for the convenience of the user, use, background service management system 400 can be to be integrated into user terminal 450
In one intelligent movable equipment, such as on mobile phone.
5. embodiment five.
As shown in figure 5, providing a kind of coded lock locking method in the embodiment of the present invention, comprise the following steps.
Step S500:Disposal password list is store on coded lock, the list includes multiple disposal passwords.
Specifically, need to store disposal password list on coded lock, the list includes multiple disposal passwords, it is desirable to
Each password is unique in the list where it.It has been greatly reduced in view of current storage cost, the list is included
The quantity of disposal password can be very big, can be with enough a very long time.
Step S510:The coded lock obtains the password of user input.
Preferably, the step obtains the password of user input, specific method be it is following in one or more combination:
By key-press input;
It is input into by touch-screen;
Obtained by language identification;
Obtained by bluetooth connection;
By near-field communication(Near Field Communication, NFC)Obtain;
By radio frequency identification(Radio Frequency Identification,RFID)Obtain;
Obtained by swepting slip shape code;
Obtained by sweeping Quick Response Code.
Step S530:The coded lock judges whether the password of user input is effective.
Specifically, the disposal password list according to storage judges whether the password of user input is effective, if password is effective
Following steps S540 and step S550 is then performed respectively.Preferably, if judged result to perform step S570 and step if invalid
S580.Here judge that password effectively refers to:The password is appeared in the disposal password list of storage, and its corresponding state
Mark is shown as effective.Here judge that password useless refers to:The password is not in the disposal password list of storage, or depositing
In the disposal password list of storage but its corresponding Status Flag is shown as invalid.
Step S540:The coded lock is locked.
Step S550:The coded lock makes the password of user input just now as nothing in the disposal password list of storage
Effect, prevents from reusing, and embodies disposable feature.
Specifically, making the password of user input just now turns into invalid, prevents from reusing, and embodies disposable feature.
One effective password is turned into invalid, specific method is:Each password has corresponding shape in disposal password list
Whether effectively state mark be used for recording, and initial value all be effective, as long as its mark is changed to invalid, then next judgement is just nothing
Effect.Alternatively, directly the password is deleted from disposal password list, it is also possible to which an effective password is turned into invalid.
Step S560:The coded lock is the password that user input just now is sequentially located in the disposal password list
All passwords before all turn into invalid.
Preferably, make user input just now password turn into it is invalid while, also in the disposal password list
All passwords that order is located at before the password of user input just now all turn into invalid.This step purpose:Will come order
Just now all passwords before the password of user input, even if not being transfused to also, also all can more ensure close as invalid
The safe handling of code lock.
Step S570:The coded lock prompt cipher is invalid.
Specifically, if finding password useless, the coded lock prompt cipher mistake, and counting user in step S530
It is input into the number of times of code error.
Step S580:When the number of times that malfunctions reaches predetermined threshold value, the coded lock temporary close password input function.
Specifically, when the number of times of statistics reaches predetermined threshold value, the coded lock is by temporary close password input function
For a period of time, and shut-in time length can be elongated with the increased frequency of the code error for being counted.
Finally it should be noted that:Above example is only used to illustrate the technical scheme of the embodiment of the present invention, rather than it is limited
System;Although being described in detail to the embodiment of the present invention with reference to the foregoing embodiments, one of ordinary skill in the art should
Understand:It can still modify to the technical scheme described in foregoing embodiments, or to which part technical characteristic
Carry out equivalent;And these modifications or replacement, the essence of appropriate technical solution is departed from each reality of the embodiment of the present invention
Apply the spirit and scope of a technical scheme.
Claims (10)
1. a kind of method for unlocking coded lock, it is characterised in that step is as follows:
Disposal password list is store on A, coded lock, the disposal password list includes multiple disposal passwords;
B, the coded lock obtain the password of user input;
C, the coded lock judge whether the password of user input just now is effective according to the disposal password list of storage, if effectively
Below step is then performed respectively;
D, the unlocking coded lock;
E, the coded lock make the password of user input just now as invalid in the disposal password list of storage.
2. method according to claim 1, it is characterised in that after the step E, also step F:The coded lock
The all passwords being sequentially located in the disposal password list before the password of user input just now are all turned into invalid.
3. the method according to any one of claim 1 or 2, it is characterised in that the step B obtains the close of user input
Code, specific method be it is following in one or more combination:
By key-press input;
It is input into by touch-screen;
Obtained by language identification;
Obtained by bluetooth connection;
By near-field communication(Near Field Communication,NFC)Obtain;
By radio frequency identification(Radio Frequency Identification,RFID)Obtain;
Obtained by swepting slip shape code;
Obtained by sweeping Quick Response Code.
4. a kind of coded lock, it is characterised in that including:Disposal password management module, input module, locking and unlocking module, its
In:
Disposal password management module, for storing disposal password list, judging whether a password effectively and in judgement is tied
Fruit notifies the locking and unlocking module to perform unlocking operation, a valid password is turned into invalid when being effective;
Input module, the password for obtaining user input;
Locking and unlocking module, locks or unlocking operation accordingly for being performed by instruction.
5. coded lock according to claim 4, it is characterised in that the input module includes that button, touch-screen, voice are known
Other element, bluetooth element, near-field communication(Near Field Communication,NFC)Element, radio frequency identification(Radio
Frequency Identification,RFID)One in reader, bar code recognition element, Quick Response Code recognition component or
Multiple, the password for obtaining user input.
6. a kind of method of coding lock system, it is characterised in that step is as follows:
A, coded lock store disposal password list, and background service management system stores the list of disposal password backstage, two
List code data in initial preservation is consistent;
B, the background service management system find first in the list of the disposal password backstage and do not send close in order
Code is sent to user and is designated as having sent;
C, the coded lock get the password of user input, and user input just now is judged further according to the disposal password list
Password whether effectively, if effectively if unlock and in the disposal password list by the password of user input just now turn into nothing
Effect.
7. method according to claim 6, it is characterised in that after the step C, also step D:The coded lock
The all passwords being sequentially located in the disposal password list before the password of user input just now are all turned into invalid.
8. a kind of coding lock system, it is characterised in that including coded lock, background service management system, user terminal, wherein:
Coded lock includes disposal password management module, input module, locking and unlocking module;The disposal password manages mould
Block, for storing disposal password list, judging whether disposal password effectively and when judged result is for effective notifies described
Locking and unlocking module performs unlocking operation, a valid password is turned into invalid;The input module, for obtaining user input
Password;The locking and unlocking module, locks or unlocking operation accordingly for being performed by instruction;The quantity of the coded lock is
One or more, if then each coded lock has its unique mark to multiple;
Background service management system, including disposal password background module, the disposal password background module are used to store one
Secondary property password backstage list, is additionally operable to find first in the list of the disposal password backstage in order according to user's request
Password is not sent to be sent to user and mark the password to have sent;
User terminal, for disposal password to be sent into user.
9. a kind of coded lock locking method, it is characterised in that step is as follows:
Disposal password list is store on A, coded lock, the disposal password list includes multiple disposal passwords;
B, the coded lock obtain the password of user input;
C, the coded lock judge whether the password of user input just now is effective according to the disposal password list of storage, if effectively
Below step is then performed respectively;
D, the coded lock are locked;
E, the coded lock make the password of user input just now as invalid in the disposal password list of storage.
10. method according to claim 1, it is characterised in that after the step E, also step F:The password
All passwords that lock handle is sequentially located at before the password of user input just now in the disposal password list all turn into invalid.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611204553.4A CN106780895A (en) | 2016-12-23 | 2016-12-23 | Method for unlocking coded lock, locking method, coded lock, systems approach and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611204553.4A CN106780895A (en) | 2016-12-23 | 2016-12-23 | Method for unlocking coded lock, locking method, coded lock, systems approach and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106780895A true CN106780895A (en) | 2017-05-31 |
Family
ID=58897743
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201611204553.4A Pending CN106780895A (en) | 2016-12-23 | 2016-12-23 | Method for unlocking coded lock, locking method, coded lock, systems approach and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106780895A (en) |
Cited By (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107492169A (en) * | 2017-07-27 | 2017-12-19 | 中兴通讯股份有限公司 | Trigger the method, apparatus and system of smart lock work |
CN107564141A (en) * | 2017-08-01 | 2018-01-09 | 努比亚技术有限公司 | A kind of ultrasonic wave method for unlocking, first terminal and second terminal |
CN107590885A (en) * | 2017-09-04 | 2018-01-16 | 深圳市谷咔互联科技有限公司 | A kind of shared bicycle electronic lock unlocking method and system |
CN107730676A (en) * | 2017-09-29 | 2018-02-23 | 东峡大通(北京)管理咨询有限公司 | Unlocking method, device and the storage medium of the vehicles |
CN108449177A (en) * | 2018-03-16 | 2018-08-24 | 东莞盛世科技电子实业有限公司 | The use control method and system of temporary password |
CN109978529A (en) * | 2017-12-27 | 2019-07-05 | 青岛胶南海尔洗衣机有限公司 | Offline electronic payment method |
CN110300180A (en) * | 2019-07-03 | 2019-10-01 | 北京享易天下科技有限公司 | A kind of service system and method for servicing of shared device |
CN110379051A (en) * | 2019-07-02 | 2019-10-25 | Oppo广东移动通信有限公司 | Unlocking method, device, terminal and storage medium |
CN110930551A (en) * | 2019-11-27 | 2020-03-27 | 惠州拓邦电气技术有限公司 | Unlocking method and device, password authorization method and device, and door lock system |
CN111199596A (en) * | 2018-10-31 | 2020-05-26 | 云丁网络技术(北京)有限公司 | Intelligent door lock control method, device and system |
CN111325916A (en) * | 2020-02-20 | 2020-06-23 | 深圳市萝趣电子商务有限公司 | Password unlocking system |
CN111667611A (en) * | 2020-05-08 | 2020-09-15 | 掌门物联科技(杭州)股份有限公司 | Intelligent frequency hopping anti-interference door lock control system and control method thereof |
CN112381976A (en) * | 2020-11-17 | 2021-02-19 | 宁波久婵物联科技有限公司 | One-time password verification method for electronic lock |
CN113688380A (en) * | 2021-10-26 | 2021-11-23 | 苏州浪潮智能科技有限公司 | Password protection method, device and medium |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101194800A (en) * | 2006-12-07 | 2008-06-11 | 陈科 | Shopping box |
CN101315708A (en) * | 2007-05-31 | 2008-12-03 | 北京银融科技有限责任公司 | Off-site controlled magnetic card cipher lock and control method thereof |
CN102467774A (en) * | 2010-11-17 | 2012-05-23 | 戴胜祝 | Cryptosystem with anti-recording function |
US20140255036A1 (en) * | 2013-03-06 | 2014-09-11 | Qualcomm Incorporated | Methods and apparatus for using visible light communications for controlling access to an area |
CN104464025A (en) * | 2014-05-19 | 2015-03-25 | 贵州詹阳动力重工有限公司 | Remote monitoring method and device for rented vehicles |
CN106530470A (en) * | 2016-12-14 | 2017-03-22 | 余仁植 | Vehicle unlocking method, lock unlocking device, vehicle and vehicle system |
-
2016
- 2016-12-23 CN CN201611204553.4A patent/CN106780895A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101194800A (en) * | 2006-12-07 | 2008-06-11 | 陈科 | Shopping box |
CN101315708A (en) * | 2007-05-31 | 2008-12-03 | 北京银融科技有限责任公司 | Off-site controlled magnetic card cipher lock and control method thereof |
CN102467774A (en) * | 2010-11-17 | 2012-05-23 | 戴胜祝 | Cryptosystem with anti-recording function |
US20140255036A1 (en) * | 2013-03-06 | 2014-09-11 | Qualcomm Incorporated | Methods and apparatus for using visible light communications for controlling access to an area |
CN104464025A (en) * | 2014-05-19 | 2015-03-25 | 贵州詹阳动力重工有限公司 | Remote monitoring method and device for rented vehicles |
CN106530470A (en) * | 2016-12-14 | 2017-03-22 | 余仁植 | Vehicle unlocking method, lock unlocking device, vehicle and vehicle system |
Cited By (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107492169A (en) * | 2017-07-27 | 2017-12-19 | 中兴通讯股份有限公司 | Trigger the method, apparatus and system of smart lock work |
CN107564141A (en) * | 2017-08-01 | 2018-01-09 | 努比亚技术有限公司 | A kind of ultrasonic wave method for unlocking, first terminal and second terminal |
CN107590885A (en) * | 2017-09-04 | 2018-01-16 | 深圳市谷咔互联科技有限公司 | A kind of shared bicycle electronic lock unlocking method and system |
CN107730676A (en) * | 2017-09-29 | 2018-02-23 | 东峡大通(北京)管理咨询有限公司 | Unlocking method, device and the storage medium of the vehicles |
CN109978529A (en) * | 2017-12-27 | 2019-07-05 | 青岛胶南海尔洗衣机有限公司 | Offline electronic payment method |
CN109978529B (en) * | 2017-12-27 | 2024-01-23 | 海尔衣联生态科技(上海)有限公司 | Offline payment method |
CN108449177A (en) * | 2018-03-16 | 2018-08-24 | 东莞盛世科技电子实业有限公司 | The use control method and system of temporary password |
US11657128B2 (en) | 2018-03-16 | 2023-05-23 | Smart Electronic Industrial (Dong Guan) Co., Ltd. | Temporary password usage control method and system |
CN111199596A (en) * | 2018-10-31 | 2020-05-26 | 云丁网络技术(北京)有限公司 | Intelligent door lock control method, device and system |
CN110379051B (en) * | 2019-07-02 | 2022-05-10 | Oppo广东移动通信有限公司 | Unlocking method, device, terminal and storage medium |
CN110379051A (en) * | 2019-07-02 | 2019-10-25 | Oppo广东移动通信有限公司 | Unlocking method, device, terminal and storage medium |
CN110300180A (en) * | 2019-07-03 | 2019-10-01 | 北京享易天下科技有限公司 | A kind of service system and method for servicing of shared device |
CN110930551A (en) * | 2019-11-27 | 2020-03-27 | 惠州拓邦电气技术有限公司 | Unlocking method and device, password authorization method and device, and door lock system |
CN111325916A (en) * | 2020-02-20 | 2020-06-23 | 深圳市萝趣电子商务有限公司 | Password unlocking system |
CN111667611A (en) * | 2020-05-08 | 2020-09-15 | 掌门物联科技(杭州)股份有限公司 | Intelligent frequency hopping anti-interference door lock control system and control method thereof |
CN112381976A (en) * | 2020-11-17 | 2021-02-19 | 宁波久婵物联科技有限公司 | One-time password verification method for electronic lock |
CN113688380A (en) * | 2021-10-26 | 2021-11-23 | 苏州浪潮智能科技有限公司 | Password protection method, device and medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106780895A (en) | Method for unlocking coded lock, locking method, coded lock, systems approach and system | |
CN105678872B (en) | A kind of access control system and its authorization method and access control terminal equipment | |
US9818244B2 (en) | Method and system for permitting remote check-in and coordinating access control | |
CN105321240B (en) | The control method and device and Intelligent door control system of intelligent door lock | |
CN105827576B (en) | Method for unlocking and system based on dynamic puzzle-lock | |
CA2593897C (en) | Method, system and apparatus for accessing a resource based on data supplied by a local user | |
CN109272606A (en) | A kind of smart lock monitoring equipment, method and storage medium based on block chain | |
CN108091011A (en) | Method and system of the verification technique to equipment progress permission control is unified by the testimony of a witness | |
CN106097519B (en) | A kind of control device of electronic lock, electronic lock, control method and its application | |
CN106530470A (en) | Vehicle unlocking method, lock unlocking device, vehicle and vehicle system | |
CN109448175A (en) | The control method and fingerprint lock administration system of Fingerprint Lock | |
CN105447927B (en) | Control method, access controller and the access control system that gate inhibition's electric lock is opened | |
CN106846580A (en) | Intelligent unlocking method and system | |
CN106960492B (en) | System and method for electronic control unlocking | |
CN107633573A (en) | The method for unlocking and intelligent door lock of a kind of intelligent door lock | |
CN101298817B (en) | Lock body control device and method thereof | |
CN109215204A (en) | A kind of intelligent door lock security system based on ether mill | |
CN101638017A (en) | Novel confidential folder | |
CN108173931A (en) | A kind of implementation method of mobile fingerprint remote control intelligent household lock | |
CN206193989U (en) | Lock and vehicle | |
CN101765821B (en) | Fingerprint reader resetting system and method | |
CN106384411A (en) | Wireless lock system and unlocking method | |
CN207123882U (en) | A kind of antitheft cloud service door-locking system of multiple intelligent | |
CN106778135A (en) | A kind of image processing equipment unlocking method, image processing equipment and system | |
CN107403088A (en) | The method and device of a kind of password identification |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20170531 |
|
WD01 | Invention patent application deemed withdrawn after publication |