CN107368554A - A kind of processing method, electronic lock and system for accessing data structured - Google Patents

A kind of processing method, electronic lock and system for accessing data structured Download PDF

Info

Publication number
CN107368554A
CN107368554A CN201710529680.XA CN201710529680A CN107368554A CN 107368554 A CN107368554 A CN 107368554A CN 201710529680 A CN201710529680 A CN 201710529680A CN 107368554 A CN107368554 A CN 107368554A
Authority
CN
China
Prior art keywords
electronic lock
user
data
module
access
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710529680.XA
Other languages
Chinese (zh)
Inventor
陈瑞波
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Post Technology Co Ltd
Original Assignee
Shenzhen Post Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Post Technology Co Ltd filed Critical Shenzhen Post Technology Co Ltd
Priority to CN201710529680.XA priority Critical patent/CN107368554A/en
Publication of CN107368554A publication Critical patent/CN107368554A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/25Integrating or interfacing systems involving database management systems
    • G06F16/258Data format conversion from or to a database
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys

Landscapes

  • Engineering & Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The embodiment of the present invention provides a kind of processing method, electronic lock and the system of the structuring for accessing data.The processing method of the structuring of data is accessed, including:User identifies table, and user stores the elements such as user's mark, incoming character string, access way;Obtain the instruction message of access request;According to the instruction message package string containing incoming character and access way, go the data for comparing user's mark table, if comparative result is consistent, receive access request, otherwise refuse.Present invention additionally comprises the design that electronic lock and system are realized according to this method.The present embodiment is identified by user, the data such as password, magnetic card number, fingerprint recognition number, client user number, recognition of face number, access way, time and access number are united, realize data structured, and then realize the unified access decision-making of electronic lock, and introduce client modules, server module systematically ensures Information Security and flexibility.

Description

A kind of processing method, electronic lock and system for accessing data structured
Technical field
The present invention relates to electronic lock field, more particularly to processing method, electronic lock and the system of access data structured.
Background technology
Improved constantly with the living standard of people, and electronic lock enters daily life on a large scale, for people no matter family Occupy life and intellectuality is provided.
In the prior art, electronic lock can be accessed by following several ways:
Input correct password;
Detect correct fingerprint;
Detect correct magnetic card;
Detect Subscriber Number corresponding to correct client;
Detect correct face.
But above-mentioned mechanism access way is different, it is also different to detect the data format of its carrying, is respective in prior art For political affairs, each processing.For example input password removes inquiry electronic lock when be " 123456 " this six characters with this six characters The password that cipher table preserves, electronic lock allows this cryptographic consumer to access if comparative result is consistent, otherwise refuses.Again for example, Magnetic card transmitting antenna using the magnetic card that number is " ABCD0123 " close to electronic lock, electronic lock detect that number is The magnetic card access request of " ABCD0123 ", and the magnetic card number preserved with this number inquiry electronic lock magnetic card instrument, if compared As a result consistent then electronic lock allows this card user to access, and otherwise refuses.
It is obvious that these above-mentioned data are fragmentations, and it is isolated, not by structuring.
The content of the invention
In consideration of it, the embodiment of the present invention provides a kind of processing method, electronic lock and system for accessing data structured.
The processing method of data structured is accessed, including:
User identifies table, for storing the elements such as user's mark, incoming character string, access way;
Obtain the instruction message of access request;
According to the instruction message package string containing incoming character and access way, the data for comparing user's mark table are gone, if compared As a result it is consistent, then receive access request, otherwise refuse.
Electronic lock, including:
Data module, for storing unique user mark table data;
Acquisition module, message is indicated for obtaining pending access request;
Processing module, for the incoming character string and access way contained according to instruction message package, remove the number for comparing user's mark table According to, if comparative result is consistent, receive access request and allow this user access electronic lock, otherwise refuse.
System, including:
Server module, for storing all user's mark table data;
Client modules, for storing user's mark table data of correlation;
Data module, for storing unique user mark table data;
Receiving module, for receiving the user's mark table data sended over from server module or client modules, and It is stored in data module;
Acquisition module, message is indicated for obtaining pending access request;
Processing module, for the incoming character string and access way contained according to instruction message package, go the user for comparing data module Table data are identified, if comparative result is consistent, receives access request and allows this user to access electronic lock, otherwise refuse.
The present embodiment is identified by user, password, magnetic card number, fingerprint recognition number, client user number, recognition of face Number, access way, time and the access data such as number unite, realize data structured, and then realize that electronic lock is unified Decision-making is accessed, effectively lifts Function Extension and the flexible function application of electronic lock.
Brief description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing There is the required accompanying drawing used in technology description to be briefly described, it should be apparent that, drawings in the following description are only this Some embodiments of invention, for those of ordinary skill in the art, on the premise of not paying creative work, can be with Other accompanying drawings are obtained according to these accompanying drawings.
Fig. 1 is the basic flow chart that the present invention accesses the processing method of data structure and the embodiment of electronic lock.
Fig. 2 is the flow chart of embodiments of the invention one.
Fig. 3 is the flow chart of embodiments of the invention two.
Fig. 4 is the flow chart of embodiments of the invention three.
Fig. 5 is the flow chart of embodiments of the invention four.
Fig. 6 is the flow chart of embodiments of the invention five.
Fig. 7 is the flow chart of embodiments of the invention six.
Fig. 8 is the system-based flow chart of the present invention.
Fig. 9 is the flow chart of embodiments of the invention seven.
Figure 10 is the flow chart of embodiments of the invention eight.
Figure 11 is the flow chart of embodiments of the invention nine.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Site preparation describes, it is clear that described embodiment is only part of the embodiment of the present invention, rather than whole embodiments.It is based on Embodiment in the present invention, those of ordinary skill in the art are obtained every other under the premise of creative work is not made Embodiment, belong to the scope of protection of the invention.
Electronic lock is accessed by following several ways:
The password of input;
The fingerprint detected;
The magnetic card detected;
Detect Subscriber Number corresponding to client;
Detect face;
Detect visit module connection.
During above-mentioned several ways access, electronic lock acquisition module will get the instruction message of access request, the instruction Message package string containing incoming character and access way.When wherein being accessed for password, incoming character string is password, and access way is close Code access;When being accessed for fingerprint, incoming character string is fingerprint identifier, and access way is fingerprint access;Accessed for magnetic card When, incoming character string is magnetic card number, and access way is magnetic card access;When being accessed for client, incoming character string is user Number, access way are client accesses;When being accessed for face, incoming character string is recognition of face number, and access way is people Face accesses;During for visit module access, incoming character string is visit module I D, and access way is visit module access.
Therefore, in an electronic lock a small range, using incoming character string, access way as structural element, jointly and only One ground represents an access identity, and this access identity is identified small in electronic lock as structural element, user's mark using user In the range of be globally unique.So the user after structuring, which identifies table, includes three elements:
User identifies;
Incoming character string;
Access way.
Now the user of the data module of an electronic lock identifies the following example of table data(The list data example of the present invention In, access way 1,2,3,4,5 represents that password access, magnetic card access, client access, fingerprint access and face connect respectively Enter):
User identifies Incoming character string Access way
0001 123456 1
0002 ABCD0123 2
0003 13800138000 3
0004 1 4
0005 1 5
Further, when more than an electronic lock scope, user's mark table after structuring must increase an element and be used for The unique mark of electronic lock is represented, this element is referred to as device identification.So now global user's mark table includes four elements:
User identifies;
Device identification;
Incoming character string;
Access way.
Now the user more than the data module of an electronic lock identifies the following example of table data:
User identifies Device identification Incoming character string Access way
0001 ABCD 123456 1
0002 ABCD ABCD0123 2
0003 ABCD 13800138000 3
0004 ABCD 1 4
0005 ABCD 1 5
0006 ABCE 123456 1
0007 ABCE ABCD0123 2
0008 ABCE 13800138000 3
0009 ABCE 1 4
0010 ABCE 1 5
Further, we can include " device identification " element in " user's mark " element, citing, if " device identification " It is ABCD, then " user's mark " is ABCD0001, either 0001ABCD or 00ABCD001.Then " device identification " without with An independent element is present in the mark table of family.So now global user's mark table includes three elements:
User identifies;
Incoming character string;
Access way.
Now the user more than the data module of an electronic lock identifies the following example of table data:
User identifies Incoming character string Access way
ABCD0001 123456 1
ABCD0002 ABCD0123 2
ABCD0003 13800138000 3
ABCD0004 1 4
ABCD0005 1 5
ABCE0006 123456 1
ABCE0007 ABCD0123 2
ABCE0008 13800138000 3
ABCE0009 1 4
ABCE0010 1 5
Further, user, which identifies table, can also include turn-on time.Now the user after structuring, which identifies table, includes five elements:
User identifies;
Incoming character string;
Access way;
Initial time;
End time.
Now user identifies the following example of table data:
User identifies Incoming character string Access way Initial time End time
ABCD0001 123456 1 2017-07-01 10:00:00 2017-07-02 10:00:00
ABCD0002 ABCD0123 2 2017-07-01 10:00:00
ABCD0003 13800138000 3 2017-07-02 10:00:00
ABCD0004 1 4
ABCD0005 1 5
Initial time and end time, which are all set, in example represents effective within the time period, i.e., effectively allows to use in time period Family is identified as ABCD0001 user's access, or does not effectively allow user to be identified as ABCD0001 user in time period and connect Enter.For there was only initial time without the end time, represent that this initial time starts effectively.Do not have for there was only the end time There is initial time, represent effective at the very start, be only changed into invalid until the end time.All do not have for initial time and end time There is setting, indicate no period limitation.
Further, indicate that message can also include access number, represent the number of access.Now, the use after structuring Family mark table includes four elements:
User identifies;
Incoming character string;
Access way;
Access number.
Now user identifies the following example of table data:
User identifies Incoming character string Access way Access number
ABCD0001 123456 1 1
ABCD0002 ABCD0123 2 0
ABCD0003 13800138000 3 65534
ABCD0004 1 4 65534
ABCD0005 1 5 65534
It is that 1 expression user is identified as ABCD0001 user and only had access once that number is accessed in example.Number is accessed in example ABCD0002 user is identified as 0 expression user to be accessed.It is that 65534 expression users are identified as that number is accessed in example ABCD0003 user does not become limitation access number.
Such as figure -1, when getting the instruction message of access request, instruction message package data containing access are extracted, then Compared with the data of user's mark table corresponding element, if comparative result is consistent, receives access request, otherwise refuse.
Technical solution of the present invention is described in detail using several specific embodiments below.
Embodiment one:
User inputs Subscriber Number and logs in client, and is successfully connected electronic lock, and client sends access request to electronic lock.Electricity Son lock acquisition module detects the instruction message of access request, and the instruction message package contains Subscriber Number and client access side Formula, such as figure -2.Electronic lock processing module is gone according to the instruction message package number containing client user, client access way Compare the Subscriber Number and client access way of user's mark table of data module storage.If in the use of data module storage A record is found in the mark table of family, the comparison of its Subscriber Number and client access way is consistent, and electronic lock allows this User accesses, and otherwise refuses.
Embodiment two:
User inputs password and sends access request to electronic lock.Electronic lock acquisition module detects that the instruction of access request disappears Breath, the instruction message package contain password string and password access way, such as figure -3.Electronic lock processing module is according to the instruction Message package contains password string and password access way, go to compare user's mark table of data module storage password string and Password access way.If find a record, its password string and password in user's mark table of data module storage The comparison of access way is consistent, and electronic lock allows this user to access, and otherwise refuses.
Embodiment three:
User sends access request using magnetic card to electronic lock.Electronic lock acquisition module detects the instruction message of access request, The instruction message package number containing magnetic card and magnetic card access way, such as figure -4.Electronic lock processing module is according to the instruction message Comprising magnetic card number and magnetic card access way, magnetic card number and the magnetic card access for comparing user's mark table of data module storage are gone Mode.If finding a record in user's mark table of data module storage, its magnetic card number and magnetic card access way It is consistent to compare, and electronic lock allows this user to access, and otherwise refuses.
Example IV:
User sends access request using fingerprint to electronic lock.Electronic lock acquisition module detects the instruction message of access request, The instruction message package is containing fingerprint recognition number and fingerprint recognition access way, such as figure -5.Electronic lock processing module is according to the finger Show message package containing fingerprint recognition number and fingerprint recognition access way, the fingerprint for going to compare user's mark table of data module storage is known Alias and fingerprint recognition access way.If finding a record in user's mark table of data module storage, its fingerprint is known The comparison of alias and fingerprint recognition access way is consistent, and electronic lock allows this user to access, and otherwise refuses.
Embodiment five:
User sends access request using face to electronic lock.Electronic lock acquisition module detects the instruction message of access request, The instruction message package is containing recognition of face number and recognition of face access way, such as figure -6.Electronic lock processing module is according to the finger Show message package containing recognition of face number and recognition of face access way, the face for going to compare user's mark table of data module storage is known Alias and recognition of face access way.If finding a record in user's mark table of data module storage, its face is known The comparison of alias and recognition of face access way is consistent, and electronic lock allows this user to access, and otherwise refuses.
Embodiment six:
User sends access request using visit module to electronic lock, and visit module can integrate one or more kinds of bluetooth moulds Block, Wi-Fi module, HomeKit modules, NFC module, NB-IoT modules, such as entity of communication network communication module, mobile phone.Electricity Son lock acquisition module detects the instruction message of access request, instruction message package module I D containing visit and visit module access Mode, such as figure -7.Electronic lock processing module is gone according to instruction message package module I D containing visit and visit module access way Compare the visit module I D and visit module access way of user's mark table of data module storage.If stored in data module User's mark table in find a record, its visit module I D and visit module access way comparison be consistent, electronics Lock allows this user to access, and otherwise refuses.
In above-mentioned all embodiments, if user's mark table corresponding record has turn-on time element, processing module, which obtains, to be worked as Preceding turn-on time and compared with the turn-on time of user's mark table, allow user to access if meeting to require, otherwise refuse Absolutely.If user, which identifies table corresponding record, access number element, processing module judges access number, if meeting to require Allow user to access, otherwise refuse.
User's mark table in above-described embodiment only stores the single data for belonging to the electronic lock, such as figure -8, this data Do not exchange, be only stored in the data module of electronic lock with outside.The data sheet one is present, and its advantage is simple and processing It is convenient, but inferior position is both dangerous or dumb, in order to which user identifies security and the flexibility of table data, present aspect is also Including the system for ensureing user's mark table Information Security and flexibility.
Embodiment seven:
System includes client modules, receiving module and data module.Such as figure -9, the related user's mark of client modules storage Table data, after client modules are successfully connected electronic lock, client modules send in user's mark table of its storage and correspond to institute The partial data of electronic lock is stated to electronic lock receiving module.Electronic lock receiving module is the user's mark table data storage received In electronic lock data module.
Embodiment eight:
System includes server module, receiving module and data module.Such as figure -10, the global user's mark of server module storage Know table data, after server module is successfully connected electronic lock, server module sends in user's mark table of its storage and corresponded to The partial data of the electronic lock is to electronic lock receiving module.Electronic lock receiving module deposits the user's mark table data received Storage is in electronic lock data module.
Embodiment nine:
System includes server module, client modules, receiving module and data module.As figure -11, server module storage are complete The user of office identifies table data.After client modules are successfully connected server module, server module extracts this Subscriber Number pair The user's mark table data answered, and it is sent to the client modules.The client modules are the user's mark table received Data storage is in client modules.After the client modules are successfully connected electronic lock, client modules send its storage User identifies table data to electronic lock receiving module, and the receiving module is the user's mark table data Cun Chudao electronics received Lock data module.User logs in client modules with Subscriber Number, and Subscriber Number is identified with access with electronic lock device and closed System, as Subscriber Number 13801234567 can access electronic lock ABCD, ABCE and ABCC, another aspect electronic lock can allow Multiple access, as Subscriber Number 13800000001,13800000002 and 13800000003 can access electronic lock ABCD.Then if Subscriber Number 13801234567 is logged in after client is successfully connected server module, server module will extract User's mark table Data Concurrent gives the client modules corresponding to electronic lock ABCD, ABCE and ABCC.If Subscriber Number After 13800000001 login clients are successfully connected server module, server module will be extracted corresponding to electronic lock ABCD and used Family mark table Data Concurrent gives the client modules.
The foregoing is only a specific embodiment of the invention, but protection scope of the present invention is not limited thereto, any Those familiar with the art the invention discloses technical scope in, change or replacement can be readily occurred in, should all be contained Cover within protection scope of the present invention.Therefore, protection scope of the present invention should be based on the protection scope of the described claims.

Claims (9)

  1. A kind of 1. processing method for the structuring for accessing data, it is characterised in that including:
    Electronic lock user identifies table, for storing user's mark, incoming character string, three elements of access way;
    The electronic lock obtains the instruction message of access request;
    The incoming character string and access way that the electronic lock contains according to the instruction message package, the electronic lock user mark Know the data of table, if comparative result is consistent, receives access request, otherwise refuse.
  2. 2. the processing method of the structuring of access data according to claim 1, it is characterised in that described user's mark Table also includes initial time and end time, the incoming character string and access side that the electronic lock contains according to the instruction message package Formula, and the time is currently accessed, the data of user's mark table of electronic lock described in comparison are gone, if comparative result is consistent, are received Access request, otherwise refuse.
  3. 3. the processing method of the structuring of access data according to claim 1, it is characterised in that described user's mark The incoming character string and access way that table also contains comprising access number, the electronic lock according to the instruction message package, go to compare The electronic lock user identifies the data of table, if comparative result is consistent and number is effective, receives access request, otherwise refuses Absolutely.
  4. 4. the processing method of the structuring of the access data according to claims 1 to 3 any claim, its feature exist In described user identifies the device identification that table also includes the electronic lock, and the electronic lock contains according to the instruction message package Incoming character string and access way, and the device identification of the electronic lock, remove user's mark table of electronic lock described in comparison Data, if comparative result is consistent, receives access request, otherwise refuse.
  5. 5. a kind of electronic lock, it is characterised in that the electronic lock includes:
    Data module, for storing user's mark table data of the electronic lock;
    Acquisition module, message is indicated for obtaining pending access request;
    Processing module, for according to the data that contain of instruction message package, going the data of user's mark table of data module described in comparison, If comparative result is consistent, receives access request and allow this user to access electronic lock, otherwise refuse.
  6. 6. a kind of system, it is characterised in that the system includes:
    Electronic lock acquisition module, message is indicated for obtaining pending access request;
    Electronic lock receiving module, for receiving user's mark table data;
    Electronic lock data module, for storing user's mark table data of the electronic lock;
    The electronic lock receiving module is the user's mark table data storage received in data module;
    The data that the processing module of the electronic lock contains according to instruction message package, remove user's mark table of data module described in comparison Data, if comparative result is consistent, receive access request and allow this user access electronic lock, otherwise refuse.
  7. 7. system according to claim 6, it is characterised in that the system also includes:
    Server module, for storing user's mark table data of the overall situation;
    After the server module is successfully connected electronic lock, the server module sends right in user's mark table that it is stored The partial data of the electronic lock is answered to electronic lock receiving module;
    The electronic lock receiving module is the user's mark table data storage received in data module;
    The data that the processing module of the electronic lock contains according to instruction message package, remove user's mark table of data module described in comparison Data, if comparative result is consistent, receive access request and allow this user access electronic lock, otherwise refuse.
  8. 8. system according to claim 6, it is characterised in that the system also includes:
    Client modules, for storing user's mark table data of correlation;
    After the client modules are successfully connected electronic lock, the client modules send right in user's mark table that it is stored The partial data of the electronic lock is answered to electronic lock receiving module;
    The electronic lock receiving module is the user's mark table data storage received in data module;
    The data that the processing module of the electronic lock contains according to instruction message package, remove user's mark table of data module described in comparison Data, if comparative result is consistent, receive access request and allow this user access electronic lock, otherwise refuse.
  9. 9. system according to claim 6, it is characterised in that the system also includes:
    Server module, for storing user's mark table data of the overall situation;
    Client modules, client is logged in for user, and store user's mark table data of the electronic lock of the user-association;
    After the client modules are successfully connected server module, the server module sends all of the user-association The user of electronic lock identifies table data and stores the data to the client modules, the client modules;
    After the client modules are successfully connected electronic lock, the client modules send and are stored in the client and belong to The user of the electronic lock identifies table data to the electronic lock receiving module;
    The electronic lock receiving module is the user's mark table data storage received in data module;
    The data that the processing module of the electronic lock contains according to instruction message package, remove user's mark table of data module described in comparison Data, if comparative result is consistent, receive access request and allow this user access electronic lock, otherwise refuse.
CN201710529680.XA 2017-07-02 2017-07-02 A kind of processing method, electronic lock and system for accessing data structured Pending CN107368554A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710529680.XA CN107368554A (en) 2017-07-02 2017-07-02 A kind of processing method, electronic lock and system for accessing data structured

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710529680.XA CN107368554A (en) 2017-07-02 2017-07-02 A kind of processing method, electronic lock and system for accessing data structured

Publications (1)

Publication Number Publication Date
CN107368554A true CN107368554A (en) 2017-11-21

Family

ID=60305266

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710529680.XA Pending CN107368554A (en) 2017-07-02 2017-07-02 A kind of processing method, electronic lock and system for accessing data structured

Country Status (1)

Country Link
CN (1) CN107368554A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109741496A (en) * 2018-12-27 2019-05-10 四川金网通电子科技有限公司 A kind of method that blue-tooth intelligence lock start-up picture batch is write

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101719238A (en) * 2009-11-30 2010-06-02 中国建设银行股份有限公司 Method and system for managing, authenticating and authorizing unified identities
KR20120006805A (en) * 2010-07-13 2012-01-19 (주)링크일렉트로닉스 Electronic locks for enhanced security to the haidian
CN103236094A (en) * 2013-03-29 2013-08-07 东莞宇龙通信科技有限公司 Door control system and method of unlocking door control equipment by mobile terminal
CN103971435A (en) * 2014-05-22 2014-08-06 广东欧珀移动通信有限公司 Unlocking method, server, mobile terminal, electronic lock and unlocking system
CN105991776A (en) * 2016-06-29 2016-10-05 北京三快在线科技有限公司 Method, device and system for cipher lock control
CN206071287U (en) * 2016-10-10 2017-04-05 越甲科技(北京)有限公司 A kind of electronic lock for intelligent case and bag, intelligent case and bag and electronic lock system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101719238A (en) * 2009-11-30 2010-06-02 中国建设银行股份有限公司 Method and system for managing, authenticating and authorizing unified identities
KR20120006805A (en) * 2010-07-13 2012-01-19 (주)링크일렉트로닉스 Electronic locks for enhanced security to the haidian
CN103236094A (en) * 2013-03-29 2013-08-07 东莞宇龙通信科技有限公司 Door control system and method of unlocking door control equipment by mobile terminal
CN103971435A (en) * 2014-05-22 2014-08-06 广东欧珀移动通信有限公司 Unlocking method, server, mobile terminal, electronic lock and unlocking system
CN105991776A (en) * 2016-06-29 2016-10-05 北京三快在线科技有限公司 Method, device and system for cipher lock control
CN206071287U (en) * 2016-10-10 2017-04-05 越甲科技(北京)有限公司 A kind of electronic lock for intelligent case and bag, intelligent case and bag and electronic lock system

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109741496A (en) * 2018-12-27 2019-05-10 四川金网通电子科技有限公司 A kind of method that blue-tooth intelligence lock start-up picture batch is write
CN109741496B (en) * 2018-12-27 2021-05-18 四川金网通电子科技有限公司 Method for compiling startup pictures of Bluetooth intelligent lock in batch

Similar Documents

Publication Publication Date Title
CN103971435B (en) Method for unlocking, server, mobile terminal, electronic lock and unlocking system
CN102523213B (en) Server and terminal authenticating method and server and terminal
CN103561086B (en) Method, terminal device and the Cloud Server of calendar prompting information is presented
CN102576404A (en) Method and apparatus for determining social networking relationships
CN102184391A (en) Distributed type face recognition method and system as well as face recognition terminal
US20080129457A1 (en) Identification Method and System and Device Suitable for Said Method and System
CN106484737A (en) A kind of network social intercourse method and network social intercourse device
CN103312519B (en) A kind of dynamic password device and method of work thereof
CN1456998A (en) Intelligent card replacing method and system
CN104951680A (en) Biological characteristic information processing method, storage method and device
CN101645138B (en) Radio frequency identification (RFID) privacy authenticating method
EP1487228A3 (en) Authentication of several wireless communication devices using a single SIM (Subscriber Identity Module) card
CN101753682A (en) Right management method for user identification card and terminal unit
CN110297923A (en) Information processing method, device, electronic equipment and computer readable storage medium
CN104166917B (en) The Notification Method and system of NFC transaction events
CN103414732B (en) Application integration device and application integration processing method
Chen et al. RFID technologies for internet of things
CN107196971A (en) Information processing method, device, electronic equipment and server
RU2011128731A (en) DEVICE FOR IDENTIFICATION AND ACCESS MANAGEMENT
Jisha et al. Rfid based security platform for internet of things in health care environment
CN113037820B (en) Thing networking device communication module
CN107368554A (en) A kind of processing method, electronic lock and system for accessing data structured
CN106649829A (en) Method and device for processing business based on palmprint data
CN101048997A (en) Method for registering a mobile communication terminal in a local area network
CN106407470A (en) Fingerprint sharing method, terminal and server

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20171121