The content of the invention
The embodiments of the invention provide a kind of unlocking method of smart lock, terminal, server and system for unlocking, at least to solve
The problem of smart lock production and high maintenance cost are certainly opened on intelligent terminal
One side according to embodiments of the present invention, there is provided a kind of unlocking method of smart lock, including:
Unlocking request is responded, ultrasonic signal is sent to terminal to be verified, is initiated with triggering terminal to be verified to service end
Verification request, wherein, carried in ultrasonic signal and need to be unlocked the first identification information of terminal, first is carried in verification request
Second identification information of identification information and terminal to be verified;The unlock instruction for coming from service end is received, wherein, unlock instruction is
Determine that terminal to be verified possesses according to the corresponding relation of the first identification information and the second identification information in service end and treat unblock eventually
Hold the authority being unlocked and issue;The smart lock in unblock terminal is treated using unlock instruction to be unlocked.
Alternatively, before ultrasonic signal is sent to terminal to be verified, in addition to:Read the first identification information;According to
First identification information is encrypted predetermined encryption algorithm, the first identification information after being encrypted;By after encryption
One identification information is converted into ultrasonic signal.
Alternatively, before ultrasonic signal is sent to terminal to be verified, in addition to:Prompt message is sent, wherein, prompt
Information is used to prompt the application program that terminal operating to be verified matches with ultrasonic signal, waits received ultrasonic signal.
Alternatively, smart lock is unlocked using unlock instruction including:The identification information carried in checking unlock instruction
With whether the first identification information consistent and checking issues from service end the first moment and the terminal unlock reception of unlock instruction
Whether the time interval between the second moment of unlock instruction is in preset time range;If identification information is unanimously and between the time
It is interposed between in preset time range, then smart lock is unlocked using unlock instruction.
Another aspect according to embodiments of the present invention, a kind of unlocking method of smart lock is additionally provided, including:
The ultrasonic signal for coming from terminal to be unlocked is received, wherein, carried in ultrasonic signal and need to be unlocked terminal
First identification information;The first identification information is parsed from ultrasonic signal;Verification request is initiated to service end, to trigger service
Hold to terminal to be unlocked and issue unlock instruction, wherein, the of the first identification information and terminal to be verified is carried in verification request
Two identification informations, unlock instruction are to treat school according to the determination of the corresponding relation of the first identification information and the second identification information in service end
Test terminal and possess and treat the authority that is unlocked of unblock terminal and issue.
Another aspect according to embodiments of the present invention, additionally provides a kind of unlocking method of smart lock, including:
The verification request for coming from terminal to be verified is received, wherein, carried in verification request and need to be unlocked the first of terminal
Second identification information of identification information and terminal to be verified, the first identification information are that terminal to be verified is sent from terminal to be unlocked
Parsing obtains in ultrasonic signal;Terminal to be verified is determined according to the corresponding relation of the first identification information and the second identification information
Possess treat unblock terminal be unlocked authority when, issue unlock instruction.
Another aspect according to embodiments of the present invention, additionally provides a kind of intelligent terminal, including:Processor and smart lock,
Wherein, processor is used to perform following process instruction:Unlocking request is responded, ultrasonic signal is sent to terminal to be verified, to touch
Send out terminal to be verified and initiate verification request to service end, wherein, carried in ultrasonic signal and need the unlocked terminal first mark
Information, the first identification information and the second identification information of terminal to be verified are carried in verification request;Reception comes from service end
Unlock instruction, wherein, unlock instruction is true according to the corresponding relation of the first identification information and the second identification information in service end
Fixed terminal to be verified, which possesses, to be treated the authority that unblock terminal is unlocked and issues;Treated using unlock instruction in unblock terminal
Smart lock is unlocked.
Another aspect according to embodiments of the present invention, additionally provides a kind of mobile terminal, including:Processor, wherein, processing
Device is used to perform following process instruction:The ultrasonic signal for coming from terminal to be unlocked is received, wherein, carried in ultrasonic signal
Need to be unlocked the first identification information of terminal;The first identification information is parsed from ultrasonic signal;Initiate to verify to service end
Request, issue unlock instruction to terminal unlock to trigger service end, wherein, verification request in carry the first identification information with
Second identification information of terminal to be verified, unlock instruction are according to the first identification information and pair of the second identification information in service end
It should be related to that determining that terminal to be verified possesses treats the authority that unblock terminal is unlocked and issue.
Another aspect according to embodiments of the present invention, additionally provides a kind of server, including:Processor, wherein, processor
For performing following process instruction:The verification request for coming from terminal to be verified is received, wherein, carried in verification request and need to be solved
Lock the first identification information of terminal and the second identification information of terminal to be verified, the first identification information is terminal to be verified from waiting to solve
Parsing obtains in the ultrasonic signal that lock terminal is sent;It is true according to the corresponding relation of the first identification information and the second identification information
Fixed terminal to be verified possesses when treating authority that unblock terminal is unlocked, issues unlock instruction.
Another aspect according to embodiments of the present invention, additionally provides a kind of system for unlocking, including:First terminal, second are eventually
End and server.
In embodiments of the present invention, using response unlocking request, send carrying to terminal to be verified and need to be unlocked terminal
The ultrasonic signal of first identification information, initiate to carry the first identification information and to treat school to trigger terminal to be verified to service end
The mode of the verification request of the second identification information of terminal is tested, is believed by service end according to the first identification information and the second mark
The corresponding relation of breath determine terminal to be verified possess treat unblock terminal be unlocked authority when, issue solution to terminal to be unlocked
Lock instruction, it is unlocked so that terminal to be unlocked treats the smart lock in unblock terminal using unlock instruction, using by waiting to unlock
Identification information of the ultrasonic signal that the sound transmitter being equipped with terminal is sent to terminal transmission to be verified terminal to be unlocked
Mode substitute using the Quick Response Code on mobile scanning terminal display screen to obtain the mode of the identification information of terminal to be unlocked,
So as to reduce production and maintenance cost technique effect that smart lock is opened on intelligent terminal, and then solve and opened on intelligent terminal
Open smart lock production and the high technical problem of maintenance cost.
Embodiment 1
According to a wherein embodiment of the invention, there is provided a kind of embodiment of the unlocking method of smart lock is, it is necessary to explanation
It is that can be performed the step of the flow of accompanying drawing illustrates in the computer system of such as one group computer executable instructions,
Also, although logical order is shown in flow charts, in some cases, can be with different from order execution herein
Shown or described step.
The embodiment of the method that the embodiment of the present application one is provided can be in mobile terminal, terminal or similar fortune
Calculate and performed in device.Fig. 1 shows a kind of hardware block diagram for being used to realize the terminal of the unlocking method of smart lock.Such as Fig. 1
Shown, terminal 10 can include one or more (use 102a, 102b ... ... in figure, 102n to show) processors 102 and (locate
Reason device 102 can include but is not limited to the processing unit of microprocessor (MCU) or PLD (FPGA) etc.), be used for
Memory 104, smart lock 106 and the transmitting device for communication function of data storage.Those of ordinary skill in the art can
To understand, the structure shown in Fig. 1 is only to illustrate, and it does not cause to limit to the structure of above-mentioned electronic installation.For example, terminal 10 is also
It may include more either less components than shown in Fig. 1 or there is the configuration different from shown in Fig. 1.
It is to be noted that said one or multiple processors 102 and/or other data processing circuits lead to herein
It can often be referred to as " data processing circuit ".The data processing circuit can be presented as software, hardware, firmware with all or part of
Or other any combination.In addition, data processing circuit can be single independent processing module, or all or part of it is attached to end
In any one in other elements in end 10.As involved in the embodiment of the present application, the data processing circuit conduct
A kind of processor controls (such as the selection for the variable resistor end path being connected with interface).
Memory 104 can be used for the software program and module of storage application software, such as the intelligence in the embodiment of the present invention
Programmed instruction/data storage device corresponding with the operations of the required execution of terminal to be unlocked, processing in the unlocking method of lock
Device 102 is stored in software program and module in memory 104 by operation, so as to perform various function application and data
Processing, that is, realize the unlocking method of above-mentioned smart lock.Memory 104 may include high speed random access memory, may also include non-volatile
Property memory, such as one or more magnetic storage device, flash memory or other non-volatile solid state memories.In some realities
In example, memory 104 can further comprise relative to the remotely located memory of processor 102, and these remote memories can be with
Pass through network connection to terminal 10.The example of above-mentioned network includes but is not limited to internet, intranet, local
Net, mobile radio communication and combinations thereof.
Transmitting device is used to data are received or sent via a network.Above-mentioned network instantiation may include to calculate
The wireless network that the communication providerses of machine terminal 10 provide.In an example, transmitting device includes a network adapter
(Network Interface Controller, referred to as NIC), its can be connected by base station with other network equipments so as to
Communicated with internet.In an example, transmitting device can be radio frequency (Radio Frequency, referred to as RF) mould
Block, it is used to wirelessly be communicated with internet.
Under above-mentioned running environment, this application provides the unlocking method of smart lock as shown in Figure 2.Fig. 2 is according to this
The flow chart of the unlocking method of a kind of smart lock of inventive embodiments, as shown in Fig. 2 the flow may comprise steps of:
Step S26, unlocking request is responded, ultrasonic signal is sent to terminal to be verified, to trigger terminal to be verified to clothes
Verification request is initiated at business end, wherein, carried in ultrasonic signal and need to be unlocked the first identification information of terminal, verified and taken in request
The second identification information with the first identification information and terminal to be verified;
Step S27, the unlock instruction for coming from service end is received, wherein, unlock instruction is according to the first mark in service end
Know information and the second identification information corresponding relation determine terminal to be verified possess treat the authority that unblock terminal is unlocked and
Issue;
Step S28, the smart lock in unblock terminal is treated using unlock instruction and is unlocked.
By above-mentioned steps, using response unlocking request, send carrying to terminal to be verified and need to be unlocked the first of terminal
The ultrasonic signal of identification information, initiate to carry the first identification information and end to be verified to trigger terminal to be verified to service end
The mode of the verification request of second identification information at end, by service end according to the first identification information and pair of the second identification information
It should be related to and determine that terminal to be verified possesses when treating authority that unblock terminal is unlocked, issue unblock to terminal to be unlocked and refer to
Order, it is unlocked so that terminal to be unlocked treats the smart lock in unblock terminal using unlock instruction, the present embodiment is utilized by treating
Mark of the ultrasonic signal that the supersonic generator being equipped with unblock terminal is sent to terminal transmission to be verified terminal to be unlocked
The mode for knowing information substitutes using the Quick Response Code on mobile scanning terminal display screen to obtain the identification information of terminal to be unlocked
Mode.Due to no longer needing to set display screen or fingerprint scanner in terminal to be unlocked, and it need to only increase loudspeaker etc.
Supersonic generator, in addition, the supersonic generator such as loudspeaker when breaking down for ease of maintenaince, and replacement cost also compared with
It is low, thus reduce and smart lock production and maintenance cost are opened on intelligent terminal;And then solve and opened on intelligent terminal
Smart lock produces and the high technical problem of maintenance cost.
Ultrasonic wave is the sound wave that frequency is higher than 20000 hertz, and its lower-frequency limit is close with human auditory's upper limit.Ultrasonic wave
With direction of propagation property is strong, energy is easy to concentrate, penetration capacity is strong, be easily obtained relatively concentrate acoustic energy, in water transmission distance
The characteristic such as remote.Ultrasonic wave can be propagated in various different mediums, and can propagate distance remote enough.Ultrasonic wave and sound bearing medium
Interaction it is moderate, be easy to carry about with one the information about sound bearing medium state.Because ultrasonic wave directive property is strong, energy expenditure is slow
And propagate in media as well distant, therefore, the identification information of terminal to be unlocked can be transmitted by ultrasonic signal, and
Without obtaining the identification information of terminal to be unlocked by scanning the modes such as screen Quick Response Code again, terminal to be verified thereby eliminating
Open the troublesome operation of camera and the Quick Response Code being aligned on the display screen of terminal to be unlocked.For a user, whole unblock
Process is simple and easy to do, and user, which only needs to start the preassembled supporting application program in terminal to be verified, can realize quick solution
Lock.In addition, the above method also avoid increases the hardware configurations such as display screen, fingerprint scanner in terminal to be unlocked.For life
For producing manufacturer and consumer, during the manufacture craft of terminal to be unlocked, it is only necessary to which installation cost is remote in terminal to be unlocked
Less than the supersonic generator of the hardware such as display screen, the production cost and later maintenance cost of terminal to be unlocked thus are reduced, its
Market price can also be significantly lower than the intelligent terminal of the hardware such as existing setting display screen, have wide market application foreground.
Different from the smart lock unlocking manner provided in the prior art, above-mentioned technical proposal is as waiting to solve where smart lock
Lock terminal (such as:Automatic vending machine) by active to terminal to be verified (such as:Smart mobile phone) send carrying need to be unlocked end
The ultrasonic signal of first identification information at end, and be not to be obtained from terminal to be verified by modes such as scannings to terminal to be unlocked
Take the identification information of the terminal to be unlocked.In addition, terminal to be verified is after ultrasonic signal is got, it is first from ultrasonic signal
Parse the first identification information, then again by by the first identification information with the second identification information of terminal to be verified according to the side of combination
Formula is carried in verification is asked simultaneously, so that service end carries out Authority Verification to terminal to be verified.Service end is receiving verification
, it is necessary to the first identification information and the second identification information be parsed from verification request, by the local database after request
Search whether corresponding relation between the first identification information and the second identification information be present, if there is the first identification information and the
Corresponding relation between two identification informations, then illustrate that the terminal to be verified possesses the authority for managing terminal to be unlocked, therefore, can be with
Unlock instruction is issued to terminal to be unlocked.
In addition, registration request is initiated to service end in advance by installing application program in terminal to be verified, wherein, the registration
The authentication information of terminal to be verified is carried in request, after succeeding in registration, server is to treat school according to authentication information
Terminal distribution administration authority is tested, and foundation is corresponding between the identification information and the identification information of terminal to be unlocked of terminal to be verified
Relation.
Alternatively, in step S26, before sending ultrasonic signal to terminal to be verified, step performed below can also be included
Suddenly:
Step S20, read the first identification information;
Step S21, the first identification information is encrypted according to predetermined encryption algorithm, the first mark after being encrypted
Know information;
Step S22, the first identification information after encryption is converted into ultrasonic signal.
Above-mentioned first identification information can include but is not limited to:Terminal to be unlocked (such as:Automatic vending machine) media connect
Enter control (MAC) address, Internet protocol (IP) address, product bar code.
Above-mentioned predetermined encryption mode can include but is not limited to one below:
Mode one, code table are replaced, and each character in the first identification information to be encrypted is replaced with into another character;
Mode two, shifting processing, the high position in the first identification information to be encrypted is swapped with low order character, it is overall
Move to left or move to right self-defined digit;
Mode three, radom insertion invalid data, the specified location insertion invalid number in the first identification information to be encrypted
According to, then be encrypted;
Mode four, block encryption algorithm, using fixed digit (such as:128) key believed first mark to be encrypted
Data clear text in breath is encrypted.
During being preferable to carry out, the identification information that unblock terminal can be preferentially treated from irreversible AES is entered
Row encryption, the time point for issuing unlock instruction to terminal unlock from starting the first identification information is encrypted service end tie
Beam, during the period, above-mentioned identification information are in irreversible encrypted state all the time, to prevent the identification information from being passed in network
It is cracked during defeated, and then is used for illegal purposes.
During being preferable to carry out, step S22, the first identification information after encryption is converted into ultrasonic signal to wrap
Include step performed below:
Step S221, the character included in encrypted result is obtained, wherein, the type of character includes at least one of:
Numeral, letter, spcial character;
Step S222,16 systems are carried out to the character included in encrypted result or 32 scale codings are handled, and obtain ultrasound
Ripple signal.
IP address is the binary number of one 32, is usually divided into 4 " 8 bits " (i.e. 4 bytes), IP
Address generally use " dotted decimal notation " is expressed as the form of (a.b.c.d), wherein, a, b, c, d are ten between 0~255
System integer.
MAC Address represented using hexadecimal number, totally six bytes (48), wherein, first three byte be by electrically with
The registration management mechanism of Electronic Engineering Association (IEEE) is responsible for giving the code of different manufacturers distribution (high-order 24), is also known as
" unique identifier in establishment ", rear three bytes (low level 24) are voluntarily assigned to the adaptor interface of production by each producer,
Referred to as extended identifier.
Product bar code be generally be made up of prefix part, manufacturer's code, commercial product code and check code one group Ah
Arabic numbers.
In ultrasonic wave cataloged procedure is carried out, it can be identified from the MAC Address after encryption, IP address, product bar code etc.
In information remove spcial character (such as:-、@、!), then, the identification information after encryption is carried out according to different coded systems
Coding, if for example, encoded using 16 scale coding modes to identification information, can be by the MAC Address after encryption, IP
The numeral included in address, product bar code is converted into 16 scale codings, and/or by the MAC Address after encryption, IP address, production
The letter included in product bar code is converted into the character of 2 16 systems.When needs transmit bigger data in ultrasonic signal
During amount, 16 scale coding modes can also be expanded to 32 scale coding modes, thus, it is possible to be carried more in ultrasonic signal
More data.
Alternatively, in step S26, before sending ultrasonic signal to terminal to be verified, step performed below can also be included
Suddenly:
Step S23, prompt message is sent, wherein, prompt message is used to prompt terminal operating and ultrasonic signal to be verified
The application program of matching, wait received ultrasonic signal.
Terminal to be unlocked can prompt terminal to be verified is close to wait to unlock before ultrasonic signal is sent by light flash
The loudspeaker of terminal prepares received ultrasonic signal, or, " ultrasound please be received close to loudspeaker by loudspeaker playing alert tones
Ripple signal!" prompt terminal to be verified to prepare received ultrasonic signal close to the loudspeaker of terminal to be unlocked.Thus, treat unblock eventually
The loudspeaker at end will be used as acoustic signal generator, and the microphone of terminal to be verified will be used as acoustic signals receiver, so as to real
The transmission of existing ultrasonic signal.Terminal to be verified is received by acoustic signals receiver comes from sound wave letter in terminal to be unlocked
After the ultrasonic signal of number generator, ultrasonic signal can be converted into data signal, and then obtain the mark of terminal to be unlocked
Know information, when the microphone of terminal to be verified is received wait the cue that the loudspeaker for unlocking terminal is sent, end to be verified
Hold the application program monitoring and get ultrasonic signal of the unlatching to install, wait received ultrasonic signal.
It should be noted that the application program supporting with terminal to be unlocked is pre-installed in terminal to be verified, the application
The function that program is realized can include:The ultrasonic signal for coming from terminal to be unlocked is monitored and obtains, by terminal to be unlocked
Identification information and terminal to be verified identification information using combination by the way of carry verification ask in, retransmit to service
End, in addition to the management of terminal that is managed itself of operation personnel and monitoring etc..
Alternatively, in step S26, before sending ultrasonic signal to terminal to be verified, step performed below can also be included
Suddenly:
Step S24, when working on power first, it is determined that terminal to be unlocked is in state to be initiated;
Step S25, initial unlock instruction is issued to smart lock, smart lock is unlocked, to complete initialization operation.
Disposing first when terminal is unlocked, terminal to be unlocked is in unpowered state, the intelligence of terminal built-in to be unlocked
Lock is in the lock state.If terminal to be unlocked did not carried out initialization registration in service end, then electric in terminal to be unlocked
Afterwards, terminal to be unlocked can first pass through network and obtain initial unlock instruction from service end, then again by terminal to be unlocked
Reason device issues unlock instruction to smart lock.Smart lock is unlocked after unlock instruction is received.
Alternatively, in step S28, smart lock, which is unlocked, using unlock instruction can include step performed below:
Step S281, verify in unlock instruction whether the identification information that carries and the first identification information consistent and verify from
Service end issues the time interval between the first moment of unlock instruction and the second moment of terminal to be unlocked reception unlock instruction
Whether in preset time range;
Step S282, if identification information is consistent and time interval is in preset time range, using unlock instruction pair
Smart lock is unlocked.
, it is necessary to judge following two simultaneously during smart lock of the terminal control to be unlocked built in it is unlocked
Part:
Whether the identification information and the first identification information carried in condition one, checking unlock instruction be consistent;
The first moment that condition two, checking issue unlock instruction from service end, (i.e. service end issued the time of unlock instruction
Point) between the second moment (terminal i.e. to be unlocked receives the time point of unlock instruction) of terminal to be unlocked reception unlock instruction
Whether time interval is in preset time range;
The identification information for only meeting to carry in unlock instruction simultaneously is consistent with the first identification information and time interval exists
In preset time range, terminal to be unlocked can just start unblock operation.In other words, if terminal to be unlocked finds that service end issues
Unlock instruction in the identification information that carries be not consistent with the identification information of itself, then illustrate that the unlock instruction is not intended to this
Smart lock in terminal to be unlocked is unlocked.Further, it is also possible to it is (i.e. default to configure the life span cycle for each unlock instruction
Time range), if terminal to be unlocked finds the time interval for the unlock instruction that service end issues not in preset time range,
Then illustrate that the life span cycle of the unlock instruction is over, the disabler of unlock instruction instruction unblock.Therefore, no matter
It is which kind of reason causes unlock instruction to fail to reach in preset time range, will all ignores the unlock instruction.
In another preferred embodiment, present invention also provides the unlocking method of smart lock as shown in Figure 3.The party
Method be applied to mobile terminal (such as:Smart mobile phone).Fig. 3 is the unlocking method of another smart lock according to embodiments of the present invention
Flow chart, as shown in figure 3, the flow may comprise steps of:
Step S32, the ultrasonic signal for coming from terminal to be unlocked is received, wherein, carried in ultrasonic signal and need to be solved
Lock the first identification information of terminal;
Step S34, the first identification information is parsed from ultrasonic signal;
Step S36, verification request is initiated to service end, unlock instruction is issued to terminal to be unlocked to trigger service end, its
In, the first identification information and the second identification information of terminal to be verified are carried in verification request, unlock instruction is in service end
According to the corresponding relation of the first identification information and the second identification information determine terminal to be verified possess treat unblock terminal solved
Lock authority and issue.
Alternatively, in step S36, after initiating verification request message to service end, step performed below can also be included:
Step S37, the notification message for coming from service end is received, wherein, notification message is used to notify terminal to be verified not
Possess and treat the authority that unblock terminal is unlocked.Terminal to be unlocked can be sent by loudspeaker carries the terminal to be unlocked
Identification information ultrasonic signal.Ultrasonic signal by microphone received ultrasonic signal and is converted into by terminal to be verified
Data signal, therefrom to parse the identification information of terminal to be unlocked, then again by the identification information of terminal to be unlocked with treating school
The identification information for testing terminal is sent to service end in the lump by way of combination.Service end is searched in locally stored database
Corresponding relation between no the first identification information that terminal to be unlocked be present and the second identification information of terminal to be verified, i.e. clothes
Business end needs to verify whether terminal to be verified possesses the administration authority for treating unblock terminal.If service end verification passes through, due to
Terminal to be unlocked possesses network communicating function in itself, and it no longer needs to forward the unlock instruction by terminal to be verified, but directly
Connect network interface and receive the unlock instruction from service end.Then, the processor in terminal to be unlocked can be by unlock instruction
The smart lock of terminal built-in to be unlocked is sent to, to open smart lock.However, if service end verification does not pass through, then it is assumed that
Terminal to be verified does not possess the administration authority for treating unblock terminal, and then terminal to be verified can not be possessed and treats solution by service end
The notification message for locking the administration authority of terminal is sent to terminal to be verified.
Alternatively, in step S32, before receiving the ultrasonic signal, step performed below can also be included:
Step S30, prompt message is received, wherein, the prompt message is used to prompt described in the terminal reception to be verified
Ultrasonic signal;
Step S31, the application program matched with the ultrasonic signal is run, waits the ultrasonic signal to be received.
Terminal to be unlocked can prompt terminal to be verified is close to wait to unlock before ultrasonic signal is sent by light flash
The loudspeaker of terminal prepares received ultrasonic signal, or, " ultrasound please be received close to loudspeaker by loudspeaker playing alert tones
Ripple signal!" prompt terminal to be verified to prepare received ultrasonic signal close to the loudspeaker of terminal to be unlocked.Thus, treat unblock eventually
The loudspeaker at end will be used as acoustic signal generator, and the microphone of terminal to be verified will be used as acoustic signals receiver, so as to real
The transmission of existing ultrasonic signal.Terminal to be verified is received by acoustic signals receiver comes from sound wave letter in terminal to be unlocked
After the ultrasonic signal of number generator, ultrasonic signal can be converted into data signal, and then obtain the mark of terminal to be unlocked
Know information, when the microphone of terminal to be verified is received wait the cue that the loudspeaker for unlocking terminal is sent, end to be verified
Hold the application program monitoring and get ultrasonic signal of the unlatching to install, wait received ultrasonic signal.
It should be noted that the application program supporting with terminal to be unlocked is pre-installed in terminal to be verified, the application
The function that program is realized can include:The ultrasonic signal for coming from terminal to be unlocked is monitored and obtains, by terminal to be unlocked
Identification information and terminal to be verified identification information using combination by the way of carry verification ask in, retransmit to service
End, in addition to the management of terminal that is managed itself of operation personnel and monitoring etc..
In another preferred embodiment, under above-mentioned running environment, present invention also provides intelligence as shown in Figure 4
The unlocking method of lock.This method is applied to service end.Fig. 4 is the unlocking method of another smart lock according to embodiments of the present invention
Flow chart, as shown in figure 4, the flow may comprise steps of:
Step S42, the verification request for coming from terminal to be verified is received, wherein, carried in verification request and need to be unlocked end
First identification information at end and the second identification information of terminal to be verified, the first identification information are terminals to be verified from treating unblock eventually
Hold and parse what is obtained in the ultrasonic signal sent;
Step S44, determine that terminal to be verified possesses pair according to the corresponding relation of the first identification information and the second identification information
When the authority that terminal is unlocked is unlocked, unlock instruction is issued.
Terminal to be unlocked sent by loudspeaker the identification information for carrying the terminal to be unlocked ultrasonic signal it
Afterwards, terminal to be verified can be converted into data signal by microphone received ultrasonic signal and by ultrasonic signal, and therefrom
The identification information of terminal to be unlocked is parsed, then again by the identification information of terminal to be unlocked and the identification information of terminal to be verified
Sent in the lump to service end using combination.
Service end after the first identification information and the second identification information of terminal to be verified for getting terminal to be unlocked,
The identification information in the presence of terminal to be unlocked and terminal to be verified can be further searched whether in locally stored database
Corresponding relation between identification information, i.e. service end needs to verify whether terminal to be verified possesses the management for treating unblock terminal
Authority.If service end verification passes through, because terminal to be unlocked possesses network communicating function in itself, it is no longer needed by treating school
Test terminal and forward the unlock instruction, but the unlock instruction is directly received from service end by network interface.In terminal to be unlocked
Processor unlock instruction can be sent to the smart lock of terminal built-in to be unlocked, to open smart lock.If however, clothes
The verification of business end does not pass through, then it is assumed that terminal to be verified does not possess the administration authority for treating unblock terminal, and then service end can incite somebody to action
The notification message that terminal to be verified does not possess the administration authority for treating unblock terminal is sent to terminal to be verified.
The above-mentioned process that is preferable to carry out is described in further detail below in conjunction with the preferred embodiment shown in Fig. 5.
Fig. 5 is according to the implementation process schematic diagram of the present invention wherein unlocking method of the smart lock of a preferred embodiment, is somebody's turn to do
Method is applied to system for unlocking, as shown in figure 5, the system for unlocking can include:Terminal 10 (equivalent to above-mentioned terminal to be unlocked)
Can through network connection to one or more servers 20 (equivalent to above-mentioned service end), wherein, network connection can be local
Net connection, wide area network connection, Internet connection, or other kinds of network connection.Terminal 30 is (equivalent to above-mentioned end to be verified
End) equally can be via network connection to one or more servers 20.
Specifically, by the way that installation application program initiates registration request to service end in advance in terminal 30, wherein, the registration please
The authentication information of terminal 30 is carried in asking.If succeeded in registration, keeper is on backstage according to authentication information for eventually
End 30 allocates management of authority, i.e. establishes corresponding relation between the identification information of terminal 30 and the identification information of terminal 10.
Respond unlocking request in terminal 10, the processor in terminal 10 can read the terminal identification information (such as:
MAC Address, IP address, product ID), computing then is encrypted to the identification information of the terminal 10, obtains encrypted result.
By the identification information after encryption in terminal 10, ultrasonic signal is converted digital signals into by loudspeaker.Terminal 30 passes through wheat
Ultrasonic signal is simultaneously converted into data signal by gram wind received ultrasonic signal, and therefrom parses the identification information of terminal 10,
After the identification information for the terminal 10 that the application program installed in terminal 30 is monitored and obtained, by the identification information and terminal of terminal 10
30 identification information is sent to server 20 in the lump.Server 20 searches whether terminal 10 be present in locally stored database
Corresponding relation between identification information and the identification information of terminal 30, i.e. server 20 needs to verify whether terminal 30 possesses pair
The administration authority of terminal 10.If the verification of server 20 passes through, unlock instruction is sent to terminal 10.Processing in terminal 10
Device control the smart lock built in it be unlocked during, it is necessary to verify the identification information carried in unlock instruction and end simultaneously
Whether the identification information at end 10 is consistent, and checking issues the first moment of unlock instruction from service end and terminal 10 receives unblock
Whether the time interval between the second moment of instruction is in preset time range;Only meet what is carried in unlock instruction simultaneously
Identification information is consistent with the identification information of terminal 10 and time interval is in preset time range, and terminal 10 can just start unblock
Operation.Unlock instruction can be sent to the smart lock built in terminal 10 by the processor in terminal 10, to open smart lock.So
And if server 20 is verified and not passed through, then it is assumed that terminal 30 does not possess the administration authority to terminal 10, and then server 20 can
The notification message of the administration authority of terminal 10 is sent to terminal 30 so that terminal 30 is not possessed.
It should be noted that for foregoing each method embodiment, in order to be briefly described, therefore it is all expressed as a series of
Combination of actions, but those skilled in the art should know, the present invention is not limited by described sequence of movement because
According to the present invention, some steps can use other orders or carry out simultaneously.Secondly, those skilled in the art should also know
Know, embodiment described in this description belongs to preferred embodiment, and involved action and module are not necessarily of the invention
It is necessary.
Through the above description of the embodiments, those skilled in the art can be understood that according to above-mentioned implementation
The unlocking method of the smart lock of example can add the mode of required general hardware platform to realize by software, naturally it is also possible to pass through
Hardware, but the former is more preferably embodiment in many cases.Based on such understanding, technical scheme substantially or
Person says that the part to be contributed to prior art can be embodied in the form of software product, computer software product storage
In a storage medium (such as ROM/RAM, magnetic disc, CD), including some instructions are causing a station terminal equipment (can be
Mobile phone, computer, server, or network equipment etc.) perform method described in each embodiment of the present invention.
Embodiment 3
Embodiments of the invention can provide a kind of system, and the system can be located at computer network Computer terminal group
In any one terminal in, either in any one mobile terminal in mobile terminal group or positioned at meter
In any one server in calculation machine network in service end cluster.
The system can include:One or more processors and memory.
Wherein, memory can be used for storage software program and module, such as the unblock of the smart lock in the embodiment of the present invention
Programmed instruction corresponding to method, processor are stored in the software program in memory by operation, should so as to perform various functions
With and data processing, that is, realize the unlocking method of above-mentioned smart lock.Memory may include high speed random access memory, can also wrap
Nonvolatile memory is included, such as one or more magnetic storage device, flash memory or other non-volatile solid state memories.
Processor can call the information and application program of memory storage, to perform following step:Respond unlocking request,
Ultrasonic signal is sent to terminal to be verified, verification request is initiated to service end to trigger terminal to be verified, wherein, ultrasonic wave letter
Carried in number and need to be unlocked the first identification information of terminal, the first identification information and terminal to be verified are carried in verification request
Second identification information;The unlock instruction for coming from service end is received, wherein, unlock instruction is to be believed in service end according to the first mark
The corresponding relation of breath and the second identification information determines that terminal to be verified possesses and treats the authority that unblock terminal is unlocked and issue;
The smart lock in unblock terminal is treated using unlock instruction to be unlocked.
Optionally, above-mentioned processor can also carry out the program code of following steps:Read the first identification information;According to pre-
If the first identification information is encrypted AES, the first identification information after being encrypted;By first after encryption
Identification information is converted into ultrasonic signal.
Optionally, above-mentioned processor can also carry out the program code of following steps:Prompt message is sent, wherein, prompt
Information is used to prompt the application program that terminal operating to be verified matches with ultrasonic signal, waits received ultrasonic signal.
Optionally, above-mentioned processor can also carry out the program code of following steps:The mark carried in checking unlock instruction
Know information and whether the first identification information is consistent and checking issues the first moment of unlock instruction from service end and treats that unblock is whole
Whether the time interval between the second moment of end reception unlock instruction is in preset time range;If identification information it is consistent and
Time interval is then unlocked in preset time range using unlock instruction to smart lock.
Optionally, above-mentioned processor can also carry out the program code of following steps:Reception comes from terminal to be unlocked
Ultrasonic signal, wherein, carried in ultrasonic signal and need to be unlocked the first identification information of terminal;Parsed from ultrasonic signal
Go out the first identification information;Verification request is initiated to service end, unlock instruction is issued to terminal to be unlocked to trigger service end, its
In, the first identification information and the second identification information of terminal to be verified are carried in verification request, unlock instruction is in service end
According to the corresponding relation of the first identification information and the second identification information determine terminal to be verified possess treat unblock terminal solved
Lock authority and issue.
Optionally, above-mentioned processor can also carry out the program code of following steps:Reception comes from terminal to be verified
Verification request, wherein, the second mark for needing to be unlocked the first identification information of terminal and terminal to be verified is carried in verification request
Information, the first identification information are that parsing obtains in the ultrasonic signal that terminal to be verified is sent from terminal to be unlocked;According to
The corresponding relation of one identification information and the second identification information determines that terminal to be verified possesses the power that unblock terminal is unlocked for the treatment of
In limited time, unlock instruction is issued.
The embodiments of the present invention are for illustration only, do not represent the quality of embodiment.
In the above embodiment of the present invention, the description to each embodiment all emphasizes particularly on different fields, and does not have in some embodiment
The part of detailed description, it may refer to the associated description of other embodiment.
In several embodiments provided herein, it should be understood that disclosed technology contents, others can be passed through
Mode is realized.Wherein, device embodiment described above is only schematical, such as the division of the unit, is only
A kind of division of logic function, can there is an other dividing mode when actually realizing, for example, multiple units or component can combine or
Person is desirably integrated into another system, or some features can be ignored, or does not perform.Another, shown or discussed is mutual
Between coupling or direct-coupling or communication connection can be INDIRECT COUPLING or communication link by some interfaces, unit or module
Connect, can be electrical or other forms.
The unit illustrated as separating component can be or may not be physically separate, show as unit
The part shown can be or may not be physical location, you can with positioned at a place, or can also be distributed to multiple
On NE.Some or all of unit therein can be selected to realize the mesh of this embodiment scheme according to the actual needs
's.
In addition, each functional unit in each embodiment of the present invention can be integrated in a processing unit, can also
That unit is individually physically present, can also two or more units it is integrated in a unit.Above-mentioned integrated list
Member can both be realized in the form of hardware, can also be realized in the form of SFU software functional unit.
If the integrated unit is realized in the form of SFU software functional unit and is used as independent production marketing or use
When, it can be stored in a computer read/write memory medium.Based on such understanding, technical scheme is substantially
The part to be contributed in other words to prior art or all or part of the technical scheme can be in the form of software products
Embody, the computer software product is stored in a storage medium, including some instructions are causing a computer
Equipment (can be personal computer, server or network equipment etc.) perform each embodiment methods described of the present invention whole or
Part steps.
Described above is only the preferred embodiment of the present invention, it is noted that for the ordinary skill people of the art
For member, under the premise without departing from the principles of the invention, some improvements and modifications can also be made, these improvements and modifications also should
It is considered as protection scope of the present invention.