CN107368554A - A kind of processing method, electronic lock and system for accessing data structured - Google Patents
A kind of processing method, electronic lock and system for accessing data structured Download PDFInfo
- Publication number
- CN107368554A CN107368554A CN201710529680.XA CN201710529680A CN107368554A CN 107368554 A CN107368554 A CN 107368554A CN 201710529680 A CN201710529680 A CN 201710529680A CN 107368554 A CN107368554 A CN 107368554A
- Authority
- CN
- China
- Prior art keywords
- electronic lock
- user
- data
- module
- access
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/25—Integrating or interfacing systems involving database management systems
- G06F16/258—Data format conversion from or to a database
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
Landscapes
- Engineering & Computer Science (AREA)
- Databases & Information Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Data Mining & Analysis (AREA)
- General Engineering & Computer Science (AREA)
- Storage Device Security (AREA)
Abstract
The embodiment of the present invention provides a kind of processing method, electronic lock and the system of the structuring for accessing data.The processing method of the structuring of data is accessed, including:User identifies table, and user stores the elements such as user's mark, incoming character string, access way;Obtain the instruction message of access request;According to the instruction message package string containing incoming character and access way, go the data for comparing user's mark table, if comparative result is consistent, receive access request, otherwise refuse.Present invention additionally comprises the design that electronic lock and system are realized according to this method.The present embodiment is identified by user, the data such as password, magnetic card number, fingerprint recognition number, client user number, recognition of face number, access way, time and access number are united, realize data structured, and then realize the unified access decision-making of electronic lock, and introduce client modules, server module systematically ensures Information Security and flexibility.
Description
Technical field
The present invention relates to electronic lock field, more particularly to processing method, electronic lock and the system of access data structured.
Background technology
Improved constantly with the living standard of people, and electronic lock enters daily life on a large scale, for people no matter family
Occupy life and intellectuality is provided.
In the prior art, electronic lock can be accessed by following several ways:
Input correct password;
Detect correct fingerprint;
Detect correct magnetic card;
Detect Subscriber Number corresponding to correct client;
Detect correct face.
But above-mentioned mechanism access way is different, it is also different to detect the data format of its carrying, is respective in prior art
For political affairs, each processing.For example input password removes inquiry electronic lock when be " 123456 " this six characters with this six characters
The password that cipher table preserves, electronic lock allows this cryptographic consumer to access if comparative result is consistent, otherwise refuses.Again for example,
Magnetic card transmitting antenna using the magnetic card that number is " ABCD0123 " close to electronic lock, electronic lock detect that number is
The magnetic card access request of " ABCD0123 ", and the magnetic card number preserved with this number inquiry electronic lock magnetic card instrument, if compared
As a result consistent then electronic lock allows this card user to access, and otherwise refuses.
It is obvious that these above-mentioned data are fragmentations, and it is isolated, not by structuring.
The content of the invention
In consideration of it, the embodiment of the present invention provides a kind of processing method, electronic lock and system for accessing data structured.
The processing method of data structured is accessed, including:
User identifies table, for storing the elements such as user's mark, incoming character string, access way;
Obtain the instruction message of access request;
According to the instruction message package string containing incoming character and access way, the data for comparing user's mark table are gone, if compared
As a result it is consistent, then receive access request, otherwise refuse.
Electronic lock, including:
Data module, for storing unique user mark table data;
Acquisition module, message is indicated for obtaining pending access request;
Processing module, for the incoming character string and access way contained according to instruction message package, remove the number for comparing user's mark table
According to, if comparative result is consistent, receive access request and allow this user access electronic lock, otherwise refuse.
System, including:
Server module, for storing all user's mark table data;
Client modules, for storing user's mark table data of correlation;
Data module, for storing unique user mark table data;
Receiving module, for receiving the user's mark table data sended over from server module or client modules, and
It is stored in data module;
Acquisition module, message is indicated for obtaining pending access request;
Processing module, for the incoming character string and access way contained according to instruction message package, go the user for comparing data module
Table data are identified, if comparative result is consistent, receives access request and allows this user to access electronic lock, otherwise refuse.
The present embodiment is identified by user, password, magnetic card number, fingerprint recognition number, client user number, recognition of face
Number, access way, time and the access data such as number unite, realize data structured, and then realize that electronic lock is unified
Decision-making is accessed, effectively lifts Function Extension and the flexible function application of electronic lock.
Brief description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing
There is the required accompanying drawing used in technology description to be briefly described, it should be apparent that, drawings in the following description are only this
Some embodiments of invention, for those of ordinary skill in the art, on the premise of not paying creative work, can be with
Other accompanying drawings are obtained according to these accompanying drawings.
Fig. 1 is the basic flow chart that the present invention accesses the processing method of data structure and the embodiment of electronic lock.
Fig. 2 is the flow chart of embodiments of the invention one.
Fig. 3 is the flow chart of embodiments of the invention two.
Fig. 4 is the flow chart of embodiments of the invention three.
Fig. 5 is the flow chart of embodiments of the invention four.
Fig. 6 is the flow chart of embodiments of the invention five.
Fig. 7 is the flow chart of embodiments of the invention six.
Fig. 8 is the system-based flow chart of the present invention.
Fig. 9 is the flow chart of embodiments of the invention seven.
Figure 10 is the flow chart of embodiments of the invention eight.
Figure 11 is the flow chart of embodiments of the invention nine.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete
Site preparation describes, it is clear that described embodiment is only part of the embodiment of the present invention, rather than whole embodiments.It is based on
Embodiment in the present invention, those of ordinary skill in the art are obtained every other under the premise of creative work is not made
Embodiment, belong to the scope of protection of the invention.
Electronic lock is accessed by following several ways:
The password of input;
The fingerprint detected;
The magnetic card detected;
Detect Subscriber Number corresponding to client;
Detect face;
Detect visit module connection.
During above-mentioned several ways access, electronic lock acquisition module will get the instruction message of access request, the instruction
Message package string containing incoming character and access way.When wherein being accessed for password, incoming character string is password, and access way is close
Code access;When being accessed for fingerprint, incoming character string is fingerprint identifier, and access way is fingerprint access;Accessed for magnetic card
When, incoming character string is magnetic card number, and access way is magnetic card access;When being accessed for client, incoming character string is user
Number, access way are client accesses;When being accessed for face, incoming character string is recognition of face number, and access way is people
Face accesses;During for visit module access, incoming character string is visit module I D, and access way is visit module access.
Therefore, in an electronic lock a small range, using incoming character string, access way as structural element, jointly and only
One ground represents an access identity, and this access identity is identified small in electronic lock as structural element, user's mark using user
In the range of be globally unique.So the user after structuring, which identifies table, includes three elements:
User identifies;
Incoming character string;
Access way.
Now the user of the data module of an electronic lock identifies the following example of table data(The list data example of the present invention
In, access way 1,2,3,4,5 represents that password access, magnetic card access, client access, fingerprint access and face connect respectively
Enter):
User identifies | Incoming character string | Access way |
0001 | 123456 | 1 |
0002 | ABCD0123 | 2 |
0003 | 13800138000 | 3 |
0004 | 1 | 4 |
0005 | 1 | 5 |
Further, when more than an electronic lock scope, user's mark table after structuring must increase an element and be used for
The unique mark of electronic lock is represented, this element is referred to as device identification.So now global user's mark table includes four elements:
User identifies;
Device identification;
Incoming character string;
Access way.
Now the user more than the data module of an electronic lock identifies the following example of table data:
User identifies | Device identification | Incoming character string | Access way |
0001 | ABCD | 123456 | 1 |
0002 | ABCD | ABCD0123 | 2 |
0003 | ABCD | 13800138000 | 3 |
0004 | ABCD | 1 | 4 |
0005 | ABCD | 1 | 5 |
0006 | ABCE | 123456 | 1 |
0007 | ABCE | ABCD0123 | 2 |
0008 | ABCE | 13800138000 | 3 |
0009 | ABCE | 1 | 4 |
0010 | ABCE | 1 | 5 |
Further, we can include " device identification " element in " user's mark " element, citing, if " device identification "
It is ABCD, then " user's mark " is ABCD0001, either 0001ABCD or 00ABCD001.Then " device identification " without with
An independent element is present in the mark table of family.So now global user's mark table includes three elements:
User identifies;
Incoming character string;
Access way.
Now the user more than the data module of an electronic lock identifies the following example of table data:
User identifies | Incoming character string | Access way |
ABCD0001 | 123456 | 1 |
ABCD0002 | ABCD0123 | 2 |
ABCD0003 | 13800138000 | 3 |
ABCD0004 | 1 | 4 |
ABCD0005 | 1 | 5 |
ABCE0006 | 123456 | 1 |
ABCE0007 | ABCD0123 | 2 |
ABCE0008 | 13800138000 | 3 |
ABCE0009 | 1 | 4 |
ABCE0010 | 1 | 5 |
Further, user, which identifies table, can also include turn-on time.Now the user after structuring, which identifies table, includes five elements:
User identifies;
Incoming character string;
Access way;
Initial time;
End time.
Now user identifies the following example of table data:
User identifies | Incoming character string | Access way | Initial time | End time |
ABCD0001 | 123456 | 1 | 2017-07-01 10:00:00 | 2017-07-02 10:00:00 |
ABCD0002 | ABCD0123 | 2 | 2017-07-01 10:00:00 | |
ABCD0003 | 13800138000 | 3 | 2017-07-02 10:00:00 | |
ABCD0004 | 1 | 4 | ||
ABCD0005 | 1 | 5 |
Initial time and end time, which are all set, in example represents effective within the time period, i.e., effectively allows to use in time period
Family is identified as ABCD0001 user's access, or does not effectively allow user to be identified as ABCD0001 user in time period and connect
Enter.For there was only initial time without the end time, represent that this initial time starts effectively.Do not have for there was only the end time
There is initial time, represent effective at the very start, be only changed into invalid until the end time.All do not have for initial time and end time
There is setting, indicate no period limitation.
Further, indicate that message can also include access number, represent the number of access.Now, the use after structuring
Family mark table includes four elements:
User identifies;
Incoming character string;
Access way;
Access number.
Now user identifies the following example of table data:
User identifies | Incoming character string | Access way | Access number |
ABCD0001 | 123456 | 1 | 1 |
ABCD0002 | ABCD0123 | 2 | 0 |
ABCD0003 | 13800138000 | 3 | 65534 |
ABCD0004 | 1 | 4 | 65534 |
ABCD0005 | 1 | 5 | 65534 |
It is that 1 expression user is identified as ABCD0001 user and only had access once that number is accessed in example.Number is accessed in example
ABCD0002 user is identified as 0 expression user to be accessed.It is that 65534 expression users are identified as that number is accessed in example
ABCD0003 user does not become limitation access number.
Such as figure -1, when getting the instruction message of access request, instruction message package data containing access are extracted, then
Compared with the data of user's mark table corresponding element, if comparative result is consistent, receives access request, otherwise refuse.
Technical solution of the present invention is described in detail using several specific embodiments below.
Embodiment one:
User inputs Subscriber Number and logs in client, and is successfully connected electronic lock, and client sends access request to electronic lock.Electricity
Son lock acquisition module detects the instruction message of access request, and the instruction message package contains Subscriber Number and client access side
Formula, such as figure -2.Electronic lock processing module is gone according to the instruction message package number containing client user, client access way
Compare the Subscriber Number and client access way of user's mark table of data module storage.If in the use of data module storage
A record is found in the mark table of family, the comparison of its Subscriber Number and client access way is consistent, and electronic lock allows this
User accesses, and otherwise refuses.
Embodiment two:
User inputs password and sends access request to electronic lock.Electronic lock acquisition module detects that the instruction of access request disappears
Breath, the instruction message package contain password string and password access way, such as figure -3.Electronic lock processing module is according to the instruction
Message package contains password string and password access way, go to compare user's mark table of data module storage password string and
Password access way.If find a record, its password string and password in user's mark table of data module storage
The comparison of access way is consistent, and electronic lock allows this user to access, and otherwise refuses.
Embodiment three:
User sends access request using magnetic card to electronic lock.Electronic lock acquisition module detects the instruction message of access request,
The instruction message package number containing magnetic card and magnetic card access way, such as figure -4.Electronic lock processing module is according to the instruction message
Comprising magnetic card number and magnetic card access way, magnetic card number and the magnetic card access for comparing user's mark table of data module storage are gone
Mode.If finding a record in user's mark table of data module storage, its magnetic card number and magnetic card access way
It is consistent to compare, and electronic lock allows this user to access, and otherwise refuses.
Example IV:
User sends access request using fingerprint to electronic lock.Electronic lock acquisition module detects the instruction message of access request,
The instruction message package is containing fingerprint recognition number and fingerprint recognition access way, such as figure -5.Electronic lock processing module is according to the finger
Show message package containing fingerprint recognition number and fingerprint recognition access way, the fingerprint for going to compare user's mark table of data module storage is known
Alias and fingerprint recognition access way.If finding a record in user's mark table of data module storage, its fingerprint is known
The comparison of alias and fingerprint recognition access way is consistent, and electronic lock allows this user to access, and otherwise refuses.
Embodiment five:
User sends access request using face to electronic lock.Electronic lock acquisition module detects the instruction message of access request,
The instruction message package is containing recognition of face number and recognition of face access way, such as figure -6.Electronic lock processing module is according to the finger
Show message package containing recognition of face number and recognition of face access way, the face for going to compare user's mark table of data module storage is known
Alias and recognition of face access way.If finding a record in user's mark table of data module storage, its face is known
The comparison of alias and recognition of face access way is consistent, and electronic lock allows this user to access, and otherwise refuses.
Embodiment six:
User sends access request using visit module to electronic lock, and visit module can integrate one or more kinds of bluetooth moulds
Block, Wi-Fi module, HomeKit modules, NFC module, NB-IoT modules, such as entity of communication network communication module, mobile phone.Electricity
Son lock acquisition module detects the instruction message of access request, instruction message package module I D containing visit and visit module access
Mode, such as figure -7.Electronic lock processing module is gone according to instruction message package module I D containing visit and visit module access way
Compare the visit module I D and visit module access way of user's mark table of data module storage.If stored in data module
User's mark table in find a record, its visit module I D and visit module access way comparison be consistent, electronics
Lock allows this user to access, and otherwise refuses.
In above-mentioned all embodiments, if user's mark table corresponding record has turn-on time element, processing module, which obtains, to be worked as
Preceding turn-on time and compared with the turn-on time of user's mark table, allow user to access if meeting to require, otherwise refuse
Absolutely.If user, which identifies table corresponding record, access number element, processing module judges access number, if meeting to require
Allow user to access, otherwise refuse.
User's mark table in above-described embodiment only stores the single data for belonging to the electronic lock, such as figure -8, this data
Do not exchange, be only stored in the data module of electronic lock with outside.The data sheet one is present, and its advantage is simple and processing
It is convenient, but inferior position is both dangerous or dumb, in order to which user identifies security and the flexibility of table data, present aspect is also
Including the system for ensureing user's mark table Information Security and flexibility.
Embodiment seven:
System includes client modules, receiving module and data module.Such as figure -9, the related user's mark of client modules storage
Table data, after client modules are successfully connected electronic lock, client modules send in user's mark table of its storage and correspond to institute
The partial data of electronic lock is stated to electronic lock receiving module.Electronic lock receiving module is the user's mark table data storage received
In electronic lock data module.
Embodiment eight:
System includes server module, receiving module and data module.Such as figure -10, the global user's mark of server module storage
Know table data, after server module is successfully connected electronic lock, server module sends in user's mark table of its storage and corresponded to
The partial data of the electronic lock is to electronic lock receiving module.Electronic lock receiving module deposits the user's mark table data received
Storage is in electronic lock data module.
Embodiment nine:
System includes server module, client modules, receiving module and data module.As figure -11, server module storage are complete
The user of office identifies table data.After client modules are successfully connected server module, server module extracts this Subscriber Number pair
The user's mark table data answered, and it is sent to the client modules.The client modules are the user's mark table received
Data storage is in client modules.After the client modules are successfully connected electronic lock, client modules send its storage
User identifies table data to electronic lock receiving module, and the receiving module is the user's mark table data Cun Chudao electronics received
Lock data module.User logs in client modules with Subscriber Number, and Subscriber Number is identified with access with electronic lock device and closed
System, as Subscriber Number 13801234567 can access electronic lock ABCD, ABCE and ABCC, another aspect electronic lock can allow
Multiple access, as Subscriber Number 13800000001,13800000002 and 13800000003 can access electronic lock
ABCD.Then if Subscriber Number 13801234567 is logged in after client is successfully connected server module, server module will extract
User's mark table Data Concurrent gives the client modules corresponding to electronic lock ABCD, ABCE and ABCC.If Subscriber Number
After 13800000001 login clients are successfully connected server module, server module will be extracted corresponding to electronic lock ABCD and used
Family mark table Data Concurrent gives the client modules.
The foregoing is only a specific embodiment of the invention, but protection scope of the present invention is not limited thereto, any
Those familiar with the art the invention discloses technical scope in, change or replacement can be readily occurred in, should all be contained
Cover within protection scope of the present invention.Therefore, protection scope of the present invention should be based on the protection scope of the described claims.
Claims (9)
- A kind of 1. processing method for the structuring for accessing data, it is characterised in that including:Electronic lock user identifies table, for storing user's mark, incoming character string, three elements of access way;The electronic lock obtains the instruction message of access request;The incoming character string and access way that the electronic lock contains according to the instruction message package, the electronic lock user mark Know the data of table, if comparative result is consistent, receives access request, otherwise refuse.
- 2. the processing method of the structuring of access data according to claim 1, it is characterised in that described user's mark Table also includes initial time and end time, the incoming character string and access side that the electronic lock contains according to the instruction message package Formula, and the time is currently accessed, the data of user's mark table of electronic lock described in comparison are gone, if comparative result is consistent, are received Access request, otherwise refuse.
- 3. the processing method of the structuring of access data according to claim 1, it is characterised in that described user's mark The incoming character string and access way that table also contains comprising access number, the electronic lock according to the instruction message package, go to compare The electronic lock user identifies the data of table, if comparative result is consistent and number is effective, receives access request, otherwise refuses Absolutely.
- 4. the processing method of the structuring of the access data according to claims 1 to 3 any claim, its feature exist In described user identifies the device identification that table also includes the electronic lock, and the electronic lock contains according to the instruction message package Incoming character string and access way, and the device identification of the electronic lock, remove user's mark table of electronic lock described in comparison Data, if comparative result is consistent, receives access request, otherwise refuse.
- 5. a kind of electronic lock, it is characterised in that the electronic lock includes:Data module, for storing user's mark table data of the electronic lock;Acquisition module, message is indicated for obtaining pending access request;Processing module, for according to the data that contain of instruction message package, going the data of user's mark table of data module described in comparison, If comparative result is consistent, receives access request and allow this user to access electronic lock, otherwise refuse.
- 6. a kind of system, it is characterised in that the system includes:Electronic lock acquisition module, message is indicated for obtaining pending access request;Electronic lock receiving module, for receiving user's mark table data;Electronic lock data module, for storing user's mark table data of the electronic lock;The electronic lock receiving module is the user's mark table data storage received in data module;The data that the processing module of the electronic lock contains according to instruction message package, remove user's mark table of data module described in comparison Data, if comparative result is consistent, receive access request and allow this user access electronic lock, otherwise refuse.
- 7. system according to claim 6, it is characterised in that the system also includes:Server module, for storing user's mark table data of the overall situation;After the server module is successfully connected electronic lock, the server module sends right in user's mark table that it is stored The partial data of the electronic lock is answered to electronic lock receiving module;The electronic lock receiving module is the user's mark table data storage received in data module;The data that the processing module of the electronic lock contains according to instruction message package, remove user's mark table of data module described in comparison Data, if comparative result is consistent, receive access request and allow this user access electronic lock, otherwise refuse.
- 8. system according to claim 6, it is characterised in that the system also includes:Client modules, for storing user's mark table data of correlation;After the client modules are successfully connected electronic lock, the client modules send right in user's mark table that it is stored The partial data of the electronic lock is answered to electronic lock receiving module;The electronic lock receiving module is the user's mark table data storage received in data module;The data that the processing module of the electronic lock contains according to instruction message package, remove user's mark table of data module described in comparison Data, if comparative result is consistent, receive access request and allow this user access electronic lock, otherwise refuse.
- 9. system according to claim 6, it is characterised in that the system also includes:Server module, for storing user's mark table data of the overall situation;Client modules, client is logged in for user, and store user's mark table data of the electronic lock of the user-association;After the client modules are successfully connected server module, the server module sends all of the user-association The user of electronic lock identifies table data and stores the data to the client modules, the client modules;After the client modules are successfully connected electronic lock, the client modules send and are stored in the client and belong to The user of the electronic lock identifies table data to the electronic lock receiving module;The electronic lock receiving module is the user's mark table data storage received in data module;The data that the processing module of the electronic lock contains according to instruction message package, remove user's mark table of data module described in comparison Data, if comparative result is consistent, receive access request and allow this user access electronic lock, otherwise refuse.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710529680.XA CN107368554A (en) | 2017-07-02 | 2017-07-02 | A kind of processing method, electronic lock and system for accessing data structured |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710529680.XA CN107368554A (en) | 2017-07-02 | 2017-07-02 | A kind of processing method, electronic lock and system for accessing data structured |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107368554A true CN107368554A (en) | 2017-11-21 |
Family
ID=60305266
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710529680.XA Pending CN107368554A (en) | 2017-07-02 | 2017-07-02 | A kind of processing method, electronic lock and system for accessing data structured |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107368554A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109741496A (en) * | 2018-12-27 | 2019-05-10 | 四川金网通电子科技有限公司 | A kind of method that blue-tooth intelligence lock start-up picture batch is write |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101719238A (en) * | 2009-11-30 | 2010-06-02 | 中国建设银行股份有限公司 | Method and system for managing, authenticating and authorizing unified identities |
KR20120006805A (en) * | 2010-07-13 | 2012-01-19 | (주)링크일렉트로닉스 | Electronic locks for enhanced security to the haidian |
CN103236094A (en) * | 2013-03-29 | 2013-08-07 | 东莞宇龙通信科技有限公司 | Door control system and method of unlocking door control equipment by mobile terminal |
CN103971435A (en) * | 2014-05-22 | 2014-08-06 | 广东欧珀移动通信有限公司 | Unlocking method, server, mobile terminal, electronic lock and unlocking system |
CN105991776A (en) * | 2016-06-29 | 2016-10-05 | 北京三快在线科技有限公司 | Method, device and system for cipher lock control |
CN206071287U (en) * | 2016-10-10 | 2017-04-05 | 越甲科技(北京)有限公司 | A kind of electronic lock for intelligent case and bag, intelligent case and bag and electronic lock system |
-
2017
- 2017-07-02 CN CN201710529680.XA patent/CN107368554A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101719238A (en) * | 2009-11-30 | 2010-06-02 | 中国建设银行股份有限公司 | Method and system for managing, authenticating and authorizing unified identities |
KR20120006805A (en) * | 2010-07-13 | 2012-01-19 | (주)링크일렉트로닉스 | Electronic locks for enhanced security to the haidian |
CN103236094A (en) * | 2013-03-29 | 2013-08-07 | 东莞宇龙通信科技有限公司 | Door control system and method of unlocking door control equipment by mobile terminal |
CN103971435A (en) * | 2014-05-22 | 2014-08-06 | 广东欧珀移动通信有限公司 | Unlocking method, server, mobile terminal, electronic lock and unlocking system |
CN105991776A (en) * | 2016-06-29 | 2016-10-05 | 北京三快在线科技有限公司 | Method, device and system for cipher lock control |
CN206071287U (en) * | 2016-10-10 | 2017-04-05 | 越甲科技(北京)有限公司 | A kind of electronic lock for intelligent case and bag, intelligent case and bag and electronic lock system |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109741496A (en) * | 2018-12-27 | 2019-05-10 | 四川金网通电子科技有限公司 | A kind of method that blue-tooth intelligence lock start-up picture batch is write |
CN109741496B (en) * | 2018-12-27 | 2021-05-18 | 四川金网通电子科技有限公司 | Method for compiling startup pictures of Bluetooth intelligent lock in batch |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103971435B (en) | Method for unlocking, server, mobile terminal, electronic lock and unlocking system | |
CN102523213B (en) | Server and terminal authenticating method and server and terminal | |
CN103561086B (en) | Method, terminal device and the Cloud Server of calendar prompting information is presented | |
CN102576404A (en) | Method and apparatus for determining social networking relationships | |
CN102184391A (en) | Distributed type face recognition method and system as well as face recognition terminal | |
US20080129457A1 (en) | Identification Method and System and Device Suitable for Said Method and System | |
CN106484737A (en) | A kind of network social intercourse method and network social intercourse device | |
CN103312519B (en) | A kind of dynamic password device and method of work thereof | |
CN1456998A (en) | Intelligent card replacing method and system | |
CN104951680A (en) | Biological characteristic information processing method, storage method and device | |
CN101645138B (en) | Radio frequency identification (RFID) privacy authenticating method | |
EP1487228A3 (en) | Authentication of several wireless communication devices using a single SIM (Subscriber Identity Module) card | |
CN101753682A (en) | Right management method for user identification card and terminal unit | |
CN110297923A (en) | Information processing method, device, electronic equipment and computer readable storage medium | |
CN104166917B (en) | The Notification Method and system of NFC transaction events | |
CN103414732B (en) | Application integration device and application integration processing method | |
Chen et al. | RFID technologies for internet of things | |
CN107196971A (en) | Information processing method, device, electronic equipment and server | |
RU2011128731A (en) | DEVICE FOR IDENTIFICATION AND ACCESS MANAGEMENT | |
Jisha et al. | Rfid based security platform for internet of things in health care environment | |
CN113037820B (en) | Thing networking device communication module | |
CN107368554A (en) | A kind of processing method, electronic lock and system for accessing data structured | |
CN106649829A (en) | Method and device for processing business based on palmprint data | |
CN101048997A (en) | Method for registering a mobile communication terminal in a local area network | |
CN106407470A (en) | Fingerprint sharing method, terminal and server |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20171121 |