CN107808433A - Control method, system and the lockset of lockset - Google Patents

Control method, system and the lockset of lockset Download PDF

Info

Publication number
CN107808433A
CN107808433A CN201710943042.2A CN201710943042A CN107808433A CN 107808433 A CN107808433 A CN 107808433A CN 201710943042 A CN201710943042 A CN 201710943042A CN 107808433 A CN107808433 A CN 107808433A
Authority
CN
China
Prior art keywords
lockset
door lock
unlocking condition
state
preset limit
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710943042.2A
Other languages
Chinese (zh)
Inventor
李向明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yan Nan Yi Zhi Tong (beijing) Technology Co Ltd
Original Assignee
Yan Nan Yi Zhi Tong (beijing) Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yan Nan Yi Zhi Tong (beijing) Technology Co Ltd filed Critical Yan Nan Yi Zhi Tong (beijing) Technology Co Ltd
Priority to CN201710943042.2A priority Critical patent/CN107808433A/en
Publication of CN107808433A publication Critical patent/CN107808433A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The invention discloses a kind of method, system and lockset for controlling lockset.This method includes:Lockset is received for indicating that lockset enters the limitation instruction of preset limit unlocking condition;Instructed based on limitation, oneself state is changed to the second proofing state by lockset by the first proofing state;Lockset carries out verification operation to the identity of at least a portion people in more individuals;When verification operation meets preset limit unlocking condition, oneself state is changed to opening by lockset by second proofing state.Thus, the embodiment of the present invention can be by receiving limitation instruction, oneself state is changed by lockset, when operation to be verified meets limitation instruction indicated preset limit unlocking condition, is then turned on door lock, so that door lock need not be changed, can realizes change unlocking condition, and change opens authority, not only saves expense, also prevent the opaque caused dispute of unlatching situation, improve the security that lockset protects object.

Description

Control method, system and the lockset of lockset
Technical field
The present invention relates to electronic lock technical field, more particularly to a kind of method, system and lockset for controlling lockset.
Background technology
With the rapid development of the national economy, people are more and more stronger to the protective awareness of property.Some special properties, not With under time or different scenes, its ownership is complex.For example, the short tenant to rent a house can change replacing frequently.In another example safety box Etc. valuable shared article within certain a period of time, multiple different users can be belonged to simultaneously.
The method of existing protection property can be realized by lockset.At present, people can produce enough efficiently Lockset, for example, directly using refer to vein can quick release.People can also produce lockset solid enough, for example, can be with Bear the theftproof lock of very havoc power.But for the complicated property of ownership, for the sake of security, everybody usually needs frequently Lockset is changed, which results in huge waste.For example, short one tenant of every replacing that rents a house, can change a lockset.Even if such as This, can still cause dispute.For example, tenant, in the case of arrearage, owner understands the access entitlements of the lock of folk prescription control door, prevents Tenant's rental housing in the case of arrearage, to avoid rent from losing.On this condition, the access entitlements of room lock are controlled by owner System.After tenant, which pays arrears arrearage, enters room, when finding to lose article, naturally it can be considered that owner has stolen tenant Property, and then produce dispute.
How complicated bona caduca is solved the problems, such as using lockset so that without changing lockset, realize and open authority certainly Dynamic circulation, prevent the opaque caused dispute of unlatching situation, turn into lockset market technical problem urgently to be resolved hurrily.
The content of the invention
In order to solve for complicated bona caduca, it is necessary to change lockset, it can not realize and open authority automatic flow, open feelings Caused by condition is opaque the problem of dispute, the embodiments of the invention provide a kind of method, system and lockset for controlling lockset.
A kind of first aspect, there is provided method for controlling lockset.This method includes:
Lockset is received for indicating that lockset enters the limitation instruction of preset limit unlocking condition;
Instructed based on limitation, oneself state is changed to the second proofing state by lockset by the first proofing state;
Lockset carries out verification operation to the identity of at least a portion people in more individuals;
When verification operation meets preset limit unlocking condition, oneself state is changed to by lockset by the second proofing state Opening.
A kind of second aspect, there is provided method for controlling lockset.This method includes:
In response to presetting trigger event, control system is generated for indicating that lockset enters the limit of preset limit unlocking condition System instruction;
Control system is sent to lockset by instruction is limited, so that lockset:Instructed based on limitation, lockset is by oneself state by the One proofing state is changed to the second proofing state;Verification operation is carried out to the identity of at least a portion people in more individuals;Work as checking When operation meets preset limit unlocking condition, oneself state is changed to opening by the second proofing state.
A kind of third aspect, there is provided lockset.The lockset includes:
Receiving unit, for receiving the limitation instruction for being used for indicating that lockset enters preset limit unlocking condition;
Updating block, instructed based on limitation, oneself state is changed to the second proofing state by the first proofing state;
Authentication unit, for carrying out verification operation to the identity of at least a portion people in more individuals;
Opening unit, for when verification operation meets preset limit unlocking condition, oneself state to be verified by second Status Change is opening.
A kind of fourth aspect, there is provided lockset.The system of the control lockset includes:
Instruction generation unit, in response to presetting trigger event, generate for indicating that lockset enters preset limit open strip The limitation instruction of part;
Instruction sending unit, limitation instruction is sent to lockset, so that lockset:Instructed based on limitation, lockset is by itself shape State is changed to the second proofing state by the first proofing state;Verification operation is carried out to the identity of at least a portion people in more individuals; When verification operation meets preset limit unlocking condition, oneself state is changed to opening by the second proofing state.
A kind of 5th aspect, there is provided lockset.The lockset includes:
Memory, for depositing program;
Processor, for performing the program of memory storage, program causes the method for the above-mentioned first aspect of computing device.
A kind of 6th aspect, there is provided system for controlling lockset.The system includes:
Memory, for depositing program;
Processor, for performing the program of memory storage, program causes the method for the above-mentioned second aspect of computing device.
A kind of 7th aspect, there is provided computer-readable recording medium.Finger is stored with the computer-readable recording medium Order, when run on a computer so that computer performs the method described in above-mentioned each side.
A kind of eighth aspect, there is provided computer program product for including instruction.When the product is run on computers, So that computer performs the method described in above-mentioned each side.
A kind of 9th aspect, there is provided computer program.When the computer program is run on computers so that calculate Machine performs the method described in above-mentioned each side.
Thus, the embodiment of the present invention can be by receiving limitation instruction, and oneself state is changed by lockset, behaviour to be verified When making to meet the preset limit unlocking condition indicated by limitation instruction, door lock is then turned on so that without changing door lock, it is possible to Realize change unlocking condition, change open authority, not only save expense, also prevented unlatching situation it is opaque caused by entangle Confusingly, the security that lockset protects object is improved.
Brief description of the drawings
In order to illustrate the technical solution of the embodiments of the present invention more clearly, it will make below to required in the embodiment of the present invention Accompanying drawing is briefly described, it should be apparent that, drawings described below is only some embodiments of the present invention, for For those of ordinary skill in the art, on the premise of not paying creative work, other can also be obtained according to these accompanying drawings Accompanying drawing.
Fig. 1 is the system architecture schematic diagram of the control lockset of one embodiment of the invention;
Fig. 2 is the schematic flow sheet of the method for the control lockset of one embodiment of the invention;
Fig. 3 is the schematic flow sheet of the method for the control lockset of another embodiment of the present invention;
Fig. 4 is the structural representation of the lockset of one embodiment of the invention;
Fig. 5 is the structural representation of the system of the control lockset of one embodiment of the invention;
Fig. 6 is the block schematic illustration of the lockset of one embodiment of the invention.
Embodiment
To make the purpose, technical scheme and advantage of the embodiment of the present invention clearer, below in conjunction with the embodiment of the present invention In accompanying drawing, the technical scheme in the embodiment of the present invention is clearly and completely described, it is clear that described embodiment is Part of the embodiment of the present invention, rather than whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art The every other embodiment obtained under the premise of creative work is not made, belongs to the scope of protection of the invention.
It should be noted that in the case where not conflicting, the feature in embodiment and embodiment in the application can phase Mutually combination.Describe the application in detail below with reference to the accompanying drawings and in conjunction with the embodiments.
Fig. 1 is the system architecture schematic diagram of the control lockset of one embodiment of the invention.
As shown in figure 1, system architecture can include:Lockset 100, controller 200, network 300.It should be understood that in Fig. 1 The number of equipment is only schematical.According to needs are realized, the system architecture can have any number of lockset 100, control Device 200 processed, network 300.Embodiments below can apply the system architecture of the present embodiment to carry out data interaction or processing.
Wherein, lockset 100 can be the electronic lock for protecting user's employment property.For example, door lock for rental housing, Door lock for safety cabinet, the door lock for vehicle.
Controller 200 can be various electronic equipments.These electronic equipments include but is not limited to PC, smart home Device, server etc..These electronic equipments can be provided with various telecommunication customer end applications, such as JICQ, mailbox Client, social platform software, audio frequency and video software etc..Wherein, these electronic equipments have memory and logical operation process Device, control element etc..These electronic equipments can send request of data, or can receive request of data, can also be to data The processing such as analyzed, verified and stored.Controller 200 can be arranged on the local of lockset, can also be arranged to Cloud Server, Carry out remote monitoring management.
Network 300 can be the medium that communication link is provided between lockset 100 and controller 200.Specifically, network can With including various connection types, such as wired, wireless communication link or fiber optic cables etc..
Each embodiment can carry out lockset control in the system framework below, and each embodiment can mutually join Examine and apply.
Fig. 2 is the schematic flow sheet of the method for the control lockset of one embodiment of the invention.
The present embodiment can describe the implementation of control lockset with the angle of lockset side.
As shown in Fig. 2 this method comprises the following steps:S210, lockset are received for indicating that lockset enters preset limit The limitation instruction of unlocking condition;S220, is instructed based on limitation, and oneself state is changed to second by the first proofing state and tested by lockset Card state;S230, lockset carry out verification operation to the identity of at least a portion people in more individuals;S240, when verification operation meets During preset limit unlocking condition, oneself state is changed to opening by lockset by the second proofing state.
In step S210, lockset can be used for the property for protecting ownership complicated.For example, lockset can be used for rental housing Door lock, the door lock for safety cabinet, the door lock for vehicle, can be used for need change open authority other locksets Deng.
Limitation instruction can be that abnormal trigger of regular event appearance for the object protected based on lockset is generated.Such as, When lockset is the door lock for rental housing, its object protected is exactly rental housing.Regular event so on rental housing can To be rent that tenant periodically pays from rental housing to owner.When rent pays abnormal (such as exceeding the time limit not hand over rent), then regular event Occur abnormal.Thus, the embodiment of the present invention can protect the anomalous event triggering generation limitation instruction of object by lockset, so as to Proofing state automatic flow can be realized, changes verifying authorization automatically, it is operation objective and fair, simple and convenient, avoid dispute.
Preset limit unlocking condition can for example include:In the given time, the people for reaching predetermined threshold data passes through Checking, and/or in the given time, the people of predetermined identity passes through checking etc..In order to expand the scope of application, the preset limit is opened The condition of opening can flexibly be set according to actual conditions.For example, the door lock for safety box or the door lock for locomotive are, it is necessary to half Number is above is owner can so prevent the stealing for lacking criminal by authentication.Safety box or locomotive Owner can be increased or reduced according to financial change situation.So, it is necessary to which the quantity of the owner of checking can also become therewith Change.Thus the embodiment of the present invention is when checking number and checking identity frequently change, it is only necessary in the given time, reaches predetermined threshold The people of Value Data passes through checking by checking, and/or the people of predetermined identity, you can carries out the checking of objective and fair.It is so designed that It can prevent program from frequently changing caused fluctuation of service the static write-in of program.
In step S220, when rent is paid it is normal when, the oneself state for the door lock of rental housing can first be tested Card state.For example, door lock only needs to verify the identity of tenant.Now, only tenant can open door lock, and owner can not open Door lock.
When rent pays abnormal (being such as in arrears with rent), the oneself state for the door lock of rental housing can be the second checking State.For example, door lock needs to verify the identity of tenant and owner (in such as 5 minutes) in preset time.Now, only tenant and After the identity of owner is by checking, door lock can be just opened.
When lockset is the door lock for rental housing, limiting the implementation of instruction can include:
1st, limitation instruction can be the first instruction of the event generation that owner's rent is owed based on tenant.Corresponding preset limit Property unlocking condition can be that tenant and owner are required to pass through authentication.
2nd, limitation instruction can be the second instruction of the event generation that owner's rent is paid up based on tenant.Preset limit is opened The condition of opening is only to need tenant to pass through authentication.
3rd, limitation instruction can be the 3rd instruction generated based on tenant to the event that owner checks out.Preset limit is opened Condition is only to need owner to pass through authentication.
In step S230, verification operation be able to can be included with implementation:Based on cipher authentication, certification of swiping the card, fingerprint One or more kinds of methods in certification, vena identification, iris authentication, voice authentication, recognition of face certification.
In step S240, when verification operation meets preset limit unlocking condition, lockset is opened.
In certain embodiments, when verification operation does not meet preset limit unlocking condition, door lock sends needs and met The verification tip of preset limit unlocking condition.For example, when arrearage occurs for tenant, system (control system or controller) hair Go out the instruction for owner and tenant's co- controlling door lock.After door lock receives the instruction, start relevant control process, it is desirable to In the scheduled time, after owner and tenant pass sequentially through authentication, just door lock is allowed to be opened.
In certain embodiments, when the oneself state of lockset is the first proofing state, at least a portion people in more individuals Identity verified;When the identity of checking meets default identity, oneself state is changed to by lockset by the first proofing state Opening.
For example, in the given time, tenant is first verified, to be verified by rear, door lock prompting owner is verified again, All pass through, be then turned on door lock.Both sides can be referred to vein and be verified with different verification modes, such as tenant's use again, and Owner, which can use, refers to vein or password authentification mode passes through.If in the given time, an only side (tenant or industry Lead) there is a side not over checking by checking, or both sides (tenant and owner), then keep door lock closed mode.When in arrearage In the case of, when having tried to unlock, can voice or panel text importing, must both sides mutual authentication in the case of arrearage Afterwards, just can opening door lock, be so advantageous to enter row information to both sides and disclose, avoid the generation of both sides' sophistry.
In certain embodiments, the specific implementation for controlling door lock to open is, when both sides are verified, door lock master control Plate motor pushing latch, hangs up clutch, can unlocked to electricity on motor.After tenant fully pays rent, system end revocation both sides The instruction of co- controlling door lock, door lock keep usual authentication status.
Fig. 3 is the schematic flow sheet of the method for the control lockset of another embodiment of the present invention.
The present embodiment can describe the implementation of control lockset with the angle of control system side.Fig. 2 embodiments it is thin Section content can be incorporated in this, and the two same or similar place is not repeating.
As shown in figure 3, this method comprises the following steps:S310, in response to presetting trigger event, control system, which generates, to be used for Indicate that lockset enters the limitation instruction of preset limit unlocking condition;S320, control system are sent to lockset by instruction is limited, with Make lockset:Instructed based on limitation, oneself state is changed to the second proofing state by lockset by the first proofing state;To in more individuals The identity of at least a portion people carries out verification operation;When verification operation meets preset limit unlocking condition, by oneself state Opening is changed to by the second proofing state.
In certain embodiments, default trigger event is that the regular event appearance for the object protected based on lockset is abnormal raw Into.
In certain embodiments, preset limit unlocking condition includes:In the given time, predetermined threshold data are reached People by checking, and/or, in the given time, the people of predetermined identity passes through checking.
In certain embodiments, when lockset is the door lock for rental housing, in response to presetting trigger event, control system Generate for indicating that lockset can be with as follows into the implementation of the limitation instruction of preset limit unlocking condition:
1st, control system owes the instruction of event generation first of owner's rent based on tenant, and first instructs for indicating that door lock exists In preset time, owner and tenant are required to pass through authentication.
2nd, control system pays up the second instruction of the event generation of owner's rent based on tenant, and second instructs for indicating door Lock only needs tenant to pass through authentication.
3rd, the 3rd instruction that control system is generated based on tenant to the event that owner checks out, the 3rd instructs for indicating door lock Only owner is needed to pass through authentication.
The terms "and/or", only a kind of incidence relation for describing affiliated partner, expression may have three kinds of passes System, for example, A and/or B, can be represented:Individualism A, while A and B be present, these three situations of individualism B.
It should be noted that in the case where not conflicting, those skilled in the art can according to actual needs will be above-mentioned The order of operating procedure is adjusted flexibly, or above-mentioned steps are carried out into the operation such as flexible combination.For simplicity, repeat no more Various implementations.In addition, the content of each embodiment can mutual reference.
Fig. 4 is the structural representation of the lockset of one embodiment of the invention.
As shown in figure 4, the lockset can include:Receiving unit 410, updating block 420, authentication unit 430 and unlatching are single Member 440.Wherein, the limitation that receiving unit 410 can be used for receiving for indicating lockset into preset limit unlocking condition refers to Order;Updating block 420 can be based on limitation instruction, and oneself state is changed into the second proofing state by the first proofing state;Test Card unit 430 can be used for carrying out verification operation to the identity of at least a portion people in more individuals;Opening unit 440 can be used for When verification operation meets preset limit unlocking condition, oneself state is changed to opening by the second proofing state.
In certain embodiments, lockset can also include:Tip element.Wherein, Tip element can be used for as checking behaviour When not meeting preset limit unlocking condition, the verification tip for needing to meet preset limit unlocking condition is sent.
In certain embodiments, authentication unit 430 can be also used for oneself state when being the first proofing state, to more personal The identity of middle at least a portion people is verified;Opening unit 440 can be also used for when the identity of checking meets default identity, Oneself state is changed to opening by the first proofing state.
In certain embodiments, limitation instruction can be that the regular event for the object protected based on lockset abnormal institute occurs Triggering generation.
In certain embodiments, preset limit unlocking condition can include:In the given time, predetermined threshold number is reached According to people by checking, and/or, in the given time, the people of predetermined identity passes through checking.
In certain embodiments, authentication unit 430 can be also used for:Based on cipher authentication, certification of swiping the card, finger print identifying, One or more kinds of methods in vena identification, iris authentication, voice authentication, recognition of face certification are verified.
In certain embodiments, lockset can include the one or more in following door lock:Door lock for rental housing, Door lock for safety cabinet, the door lock for vehicle.
It should be noted that the device of the various embodiments described above can be as the method for each embodiment of the various embodiments described above In executive agent, it is possible to achieve the corresponding flow in each method, identical technique effect is realized, for sake of simplicity, in this respect Content repeats no more.
Fig. 5 is the structural representation of the system of the control lockset of one embodiment of the invention.
As shown in figure 5, the system of control lockset can include:Instruction generation unit 510 and instruction sending unit 520.Its In, instruction generation unit 510 can be generated for indicating that lockset enters preset limit open strip in response to presetting trigger event The limitation instruction of part;Limitation instruction can be sent to lockset by instruction sending unit 520, so that lockset:Instructed based on limitation, lock Oneself state is changed to the second proofing state by tool by the first proofing state;The identity of at least a portion people in more individuals is carried out Verification operation;When verification operation meets preset limit unlocking condition, oneself state is changed to out by the second proofing state Open state.
In certain embodiments, controlling the system of lockset can also include:Monitoring unit.Monitoring unit can be also used for supervising The regular event for the object that control lockset is protected, when abnormal, the default trigger event of generation occurs in regular event.
In certain embodiments, preset limit unlocking condition includes:In the given time, predetermined threshold data are reached People by checking, and/or, in the given time, the people of predetermined identity passes through checking.
In certain embodiments, lockset can include the one or more in following door lock:Door lock for rental housing, Door lock for safety cabinet, the door lock for vehicle.
In the above-described embodiments, can come wholly or partly by software, hardware, firmware or its any combination real It is existing.Such as request reception unit and request transmitting unit are substituted with a coffret.When implemented in software, Ke Yiquan Portion partly realizes in the form of a computer program product.The computer program product refers to including one or more computers Order, when run on a computer so that computer performs the method described in above-mentioned each embodiment.On computers plus When carrying and performing the computer program instructions, produce whole or in part according to the flow or work(described in the embodiment of the present invention Energy.The computer can be all-purpose computer, special-purpose computer, computer network or other programmable devices.The meter The instruction of calculation machine can store in a computer-readable storage medium, or be counted from a computer-readable recording medium to another Calculation machine readable storage medium storing program for executing transmits, for example, the computer instruction can be from a web-site, computer, server or number According to centrally through wired (such as coaxial cable, optical fiber, Digital Subscriber Line (DSL)) or wireless (such as infrared, wireless, microwave etc.) Mode is transmitted to another web-site, computer, server or data center.The computer-readable recording medium can To be any usable medium that can access of computer or the server integrated comprising one or more usable mediums, data The data storage devices such as center.The usable medium can be magnetic medium, (for example, floppy disk, hard disk, tape), optical medium (example Such as, DVD) or semiconductor medium (such as solid state hard disc Solid State Disk (SSD)) etc..
Fig. 6 is the block schematic illustration of the lockset of one embodiment of the invention.
As shown in fig. 6, the framework can include CPU (CPU) 601, it can be according to being stored in read-only storage Program in device (ROM) 602 performs from the program that storage part 708 is loaded into random access storage device (RAM) 603 The various operations that Fig. 2 embodiments are done.In RAM603, various programs and data needed for system architecture operation are also stored with. CPU 601, ROM 602 and RAM 603 are connected with each other by bus 604.Input/output (I/O) interface 605 is also connected to always Line 604.
I/O interfaces 605 are connected to lower component:Importation 606 including keyboard, mouse etc.;Penetrated including such as negative electrode The output par, c 607 of spool (CRT), liquid crystal display (LCD) etc. and loudspeaker etc.;Storage part 608 including hard disk etc.; And the communications portion 609 of the NIC including LAN card, modem etc..Communications portion 609 via such as because The network of spy's net performs communication process.Driver 610 is also according to needing to be connected to I/O interfaces 605.Detachable media 611, such as Disk, CD, magneto-optic disk, semiconductor memory etc., it is arranged on as needed on driver 610, in order to read from it Computer program be mounted into as needed storage part 608.
Especially, according to an embodiment of the invention, it may be implemented as computer above with reference to the process of flow chart description Software program.For example, embodiments of the invention include a kind of computer program product, it includes being tangibly embodied in machine readable Computer program on medium, the computer program include the program code for being used for the method shown in execution flow chart.At this In the embodiment of sample, the computer program can be downloaded and installed by communications portion 609 from network, and/or from removable Medium 611 is unloaded to be mounted.
In certain embodiments, Fig. 6 frame structure may also adapt in the system of control lockset.Now, central processing Unit (CPU) 601 can according to the program being stored in read-only storage (ROM) 602 or from storage part 708 be loaded into Machine accesses the program in memory (RAM) 603 and performs the various operations that Fig. 3 embodiments are done.
Device embodiment described above is only schematical, wherein the unit illustrated as separating component can To be or may not be physically separate, it can be as the part that unit is shown or may not be physics list Member, you can with positioned at a place, or can also be distributed on multiple NEs.It can be selected according to the actual needs In some or all of module realize the purpose of this embodiment scheme.Those of ordinary skill in the art are not paying creativeness Work in the case of, you can to understand and implement.
Through the above description of the embodiments, those skilled in the art can be understood that each embodiment can Realized by the mode of software plus required general hardware platform, naturally it is also possible to pass through hardware.Based on such understanding, on The part that technical scheme substantially in other words contributes to prior art is stated to embody in the form of software product, should Computer software product can store in a computer-readable storage medium, such as ROM/RAM, magnetic disc, CD, including some fingers Make to cause a computer equipment (can be personal computer, server, or network equipment etc.) to perform each implementation Method described in some parts of example or embodiment.
Finally it should be noted that:The above embodiments are merely illustrative of the technical solutions of the present invention, rather than its limitations;Although The present invention is described in detail with reference to the foregoing embodiments, it will be understood by those within the art that:It still may be used To be modified to the technical scheme described in foregoing embodiments, or equivalent substitution is carried out to which part technical characteristic; And these modification or replace, do not make appropriate technical solution essence depart from various embodiments of the present invention technical scheme spirit and Scope.

Claims (30)

  1. A kind of 1. method for controlling lockset, it is characterised in that including:
    Lockset is received for indicating that the lockset enters the limitation instruction of preset limit unlocking condition;
    Based on the limitation instruction, oneself state is changed to the second proofing state by the lockset by the first proofing state;
    The lockset carries out verification operation to the identity of at least a portion people in more individuals;
    When the verification operation meets the preset limit unlocking condition, the lockset tests oneself state by described second Card Status Change is opening.
  2. 2. according to the method for claim 1, it is characterised in that also include:
    When the verification operation does not meet the preset limit unlocking condition, the door lock, which is sent, to be needed to meet described preset The verification tip of restricted unlocking condition.
  3. 3. according to the method for claim 1, it is characterised in that also include:
    When the oneself state of the lockset is first proofing state, the identity of at least a portion people in more individuals is tested Card;
    When the identity of checking meets default identity, oneself state is changed to open by the lockset by first proofing state State.
  4. 4. according to the method for claim 1, it is characterised in that wherein:
    The limitation instruction, which is that the regular event appearance for the object protected based on the lockset is abnormal, triggers generation.
  5. 5. according to the method for claim 1, it is characterised in that the preset limit unlocking condition includes:
    In the given time, the people of predetermined threshold data is reached by checking, and/or,
    In the given time, the people of predetermined identity passes through checking.
  6. 6. according to the method for claim 1, it is characterised in that the verification operation includes:
    Based in cipher authentication, certification of swiping the card, finger print identifying, vena identification, iris authentication, voice authentication, recognition of face certification One or more kinds of methods verified.
  7. 7. according to the method any one of claim 1-6, it is characterised in that the lockset includes one in following door lock Kind is a variety of:
    Door lock for rental housing, the door lock for safety cabinet, the door lock for vehicle.
  8. 8. according to the method for claim 7, it is characterised in that wherein:
    When the lockset is the door lock for rental housing, the limitation instruction is that the event generation of owner's rent is owed based on tenant First instruction;
    The preset limit unlocking condition is that the tenant and the owner are required to pass through authentication.
  9. 9. according to the method for claim 7, it is characterised in that wherein:
    When the lockset is the door lock for rental housing, the limitation instruction is that the event life of owner's rent is paid up based on tenant Into second instruction;
    The preset limit unlocking condition is only to need the tenant to pass through authentication.
  10. 10. according to the method for claim 7, it is characterised in that wherein:
    When the lockset is the door lock for rental housing, the limitation instruction is to be generated based on tenant to the event that owner checks out The 3rd instruction;
    The preset limit unlocking condition is only to need the owner to pass through authentication.
  11. A kind of 11. method for controlling lockset, it is characterised in that including:
    In response to presetting trigger event, the limitation that control system generates for indicating lockset into preset limit unlocking condition refers to Order;
    The limitation instruction is sent to the lockset by the control system, so that the lockset:Based on the limitation instruction, institute State lockset and oneself state is changed to the second proofing state by the first proofing state;To the identity of at least a portion people in more individuals Carry out verification operation;When the verification operation meets the preset limit unlocking condition, by oneself state by described second Proofing state is changed to opening.
  12. 12. according to the method for claim 11, it is characterised in that also include:
    The default trigger event is that the regular event for the object protected based on the lockset occurs generating extremely.
  13. 13. according to the method for claim 11, it is characterised in that the preset limit unlocking condition includes:
    In the given time, the people of predetermined threshold data is reached by checking, and/or,
    In the given time, the people of predetermined identity passes through checking.
  14. 14. according to the method any one of claim 11-13, it is characterised in that the lockset is included in following door lock One or more:
    Door lock for rental housing, the door lock for safety cabinet, the door lock for vehicle.
  15. 15. according to the method for claim 14, it is characterised in that when the lockset is the door lock for rental housing, institute State in response to presetting trigger event, the limitation that control system generates for indicating lockset into preset limit unlocking condition refers to Order, including;
    The control system owes the instruction of event generation first of owner's rent based on tenant, described first instruct it is described for indicating In preset time, the owner and the tenant are required to pass through authentication door lock.
  16. 16. according to the method for claim 14, it is characterised in that when the lockset is the door lock for rental housing, institute State in response to presetting trigger event, the limitation that control system generates for indicating lockset into preset limit unlocking condition refers to Order, including;
    The control system pays up the second instruction of the event generation of owner's rent based on tenant, and described second instructs for indicating The door lock only needs the tenant to pass through authentication.
  17. 17. according to the method for claim 14, it is characterised in that when the lockset is the door lock for rental housing, institute State in response to presetting trigger event, the limitation that control system generates for indicating lockset into preset limit unlocking condition refers to Order, including;
    The 3rd instruction that the control system is generated based on tenant to the event that owner checks out, the described 3rd instructs for indicating institute Stating door lock only needs the owner to pass through authentication.
  18. A kind of 18. lockset, it is characterised in that including:
    Receiving unit, for receiving the limitation instruction for being used for indicating that the lockset enters preset limit unlocking condition;
    Updating block, based on the limitation instruction, oneself state is changed to the second proofing state by the first proofing state;
    Authentication unit, for carrying out verification operation to the identity of at least a portion people in more individuals;
    Opening unit, for when the verification operation meets the preset limit unlocking condition, by oneself state by described Second proofing state is changed to opening.
  19. 19. lockset according to claim 18, it is characterised in that also include:
    Tip element, for when the verification operation does not meet the preset limit unlocking condition, sending to need to meet institute State the verification tip of preset limit unlocking condition.
  20. 20. lockset according to claim 18, it is characterised in that wherein:
    The authentication unit, when to be additionally operable to oneself state be first proofing state, to it is more it is personal at least a portion people Identity is verified;
    The opening unit, it is additionally operable to when the identity of checking meets default identity, by oneself state by the described first checking shape State is changed to opening.
  21. 21. lockset according to claim 18, it is characterised in that wherein:
    The limitation instruction, which is that the regular event appearance for the object protected based on the lockset is abnormal, triggers generation.
  22. 22. lockset according to claim 18, it is characterised in that the preset limit unlocking condition includes:
    In the given time, the people of predetermined threshold data is reached by checking, and/or,
    In the given time, the people of predetermined identity passes through checking.
  23. 23. lockset according to claim 18, it is characterised in that the authentication unit, be additionally operable to:Based on cipher authentication, The one or more kinds of methods swiped the card in certification, finger print identifying, vena identification, iris authentication, voice authentication, recognition of face certification Verified.
  24. 24. according to the lockset any one of claim 18-23, it is characterised in that the lockset is included in following door lock One or more:
    Door lock for rental housing, the door lock for safety cabinet, the door lock for vehicle.
  25. A kind of 25. system for controlling lockset, it is characterised in that including:
    Instruction generation unit, in response to presetting trigger event, generate for indicating that lockset enters preset limit unlocking condition Limitation instruction;
    Instruction sending unit, the limitation instruction is sent to the lockset, so that the lockset:Instructed based on the limitation, Oneself state is changed to the second proofing state by the lockset by the first proofing state;To the body of at least a portion people in more individuals Part carries out verification operation;When the verification operation meets the preset limit unlocking condition, by oneself state by described Two proofing states are changed to opening.
  26. 26. system according to claim 25, it is characterised in that also include:
    Monitoring unit, the regular event for the object protected for monitoring the lockset, when abnormal, life occurs in the regular event Into the default trigger event.
  27. 27. system according to claim 25, it is characterised in that the preset limit unlocking condition includes:
    In the given time, the people of predetermined threshold data is reached by checking, and/or,
    In the given time, the people of predetermined identity passes through checking.
  28. 28. according to the system any one of claim 25-27, it is characterised in that the lockset is included in following door lock One or more:
    Door lock for rental housing, the door lock for safety cabinet, the door lock for vehicle.
  29. A kind of 29. lockset, it is characterised in that including:
    Memory, for depositing program;
    Processor, for performing the program of the memory storage, described program causes the computing device such as claim Method in 1-10 described in any one.
  30. A kind of 30. system for controlling lockset, it is characterised in that including:
    Memory, for depositing program;
    Processor, for performing the program of the memory storage, described program causes the computing device such as claim Method in 11-17 described in any one.
CN201710943042.2A 2017-10-11 2017-10-11 Control method, system and the lockset of lockset Pending CN107808433A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710943042.2A CN107808433A (en) 2017-10-11 2017-10-11 Control method, system and the lockset of lockset

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710943042.2A CN107808433A (en) 2017-10-11 2017-10-11 Control method, system and the lockset of lockset

Publications (1)

Publication Number Publication Date
CN107808433A true CN107808433A (en) 2018-03-16

Family

ID=61592024

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710943042.2A Pending CN107808433A (en) 2017-10-11 2017-10-11 Control method, system and the lockset of lockset

Country Status (1)

Country Link
CN (1) CN107808433A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110126723A (en) * 2019-05-08 2019-08-16 浙江大华技术股份有限公司 Lock control system, method, apparatus, storage medium and electronic device
CN111949966A (en) * 2020-08-28 2020-11-17 上海依图网络科技有限公司 Encryption and unlocking method, server, terminal and lock
CN116895113A (en) * 2023-08-29 2023-10-17 微网优联科技(成都)有限公司 Intelligent door lock remote interaction system and method

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN201796404U (en) * 2010-09-10 2011-04-13 厦门大学 Renting house entrance guard management device
CN102568064A (en) * 2011-12-14 2012-07-11 深圳市中联创新自控系统有限公司 Access control system control method and access control system
CN102610009A (en) * 2011-07-25 2012-07-25 宋功彬 Multi-user management access control system
JP2016038766A (en) * 2014-08-08 2016-03-22 セコム株式会社 Security device
CN105976470A (en) * 2016-05-18 2016-09-28 南京东屋电气有限公司 Intelligent lockset with rapid switching management and management method thereof
CN205656689U (en) * 2016-05-18 2016-10-19 南京东屋电气有限公司 Intelligence tool to lock with cut tube replacement reason fast
CN106127627A (en) * 2016-07-27 2016-11-16 温州大学瓯江学院 A kind of rental housing management system and method

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN201796404U (en) * 2010-09-10 2011-04-13 厦门大学 Renting house entrance guard management device
CN102610009A (en) * 2011-07-25 2012-07-25 宋功彬 Multi-user management access control system
CN102568064A (en) * 2011-12-14 2012-07-11 深圳市中联创新自控系统有限公司 Access control system control method and access control system
JP2016038766A (en) * 2014-08-08 2016-03-22 セコム株式会社 Security device
CN105976470A (en) * 2016-05-18 2016-09-28 南京东屋电气有限公司 Intelligent lockset with rapid switching management and management method thereof
CN205656689U (en) * 2016-05-18 2016-10-19 南京东屋电气有限公司 Intelligence tool to lock with cut tube replacement reason fast
CN106127627A (en) * 2016-07-27 2016-11-16 温州大学瓯江学院 A kind of rental housing management system and method

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110126723A (en) * 2019-05-08 2019-08-16 浙江大华技术股份有限公司 Lock control system, method, apparatus, storage medium and electronic device
CN111949966A (en) * 2020-08-28 2020-11-17 上海依图网络科技有限公司 Encryption and unlocking method, server, terminal and lock
CN116895113A (en) * 2023-08-29 2023-10-17 微网优联科技(成都)有限公司 Intelligent door lock remote interaction system and method

Similar Documents

Publication Publication Date Title
CN103441986B (en) Data resource security control method in thin client mode
CN109379369A (en) Single-point logging method, device, server and storage medium
CN103473844A (en) Intelligent control method and intelligent control system for public rental housing
CN105430000A (en) Cloud computing security management system
CN104318650A (en) Dynamic coded lock management and control system
DE102008029636A1 (en) Enable a service on an electronic device
CN107808433A (en) Control method, system and the lockset of lockset
CN108986278A (en) A kind of intelligent door lock off-line cipher authorization method and authoring system
CN201037941Y (en) Electronic lock system by using public key system to verify digital signature
CN112543184B (en) Block chain-based equipment authentication activation method
CN106033625A (en) Lockset, mobile terminal, lockset control method, and lockset control system
CN109409041A (en) A kind of server-side safety certifying method and system based on the application of more certificates
DE102016208512A1 (en) Access control with a mobile device
CN109409057A (en) Security system and its control method, control device and storage medium
CN110401613A (en) A kind of authentication management method and relevant device
CN106973035A (en) A kind of document outgoing control system
CN204390320U (en) A kind of dynamic puzzle-lock system
EP4133761A2 (en) Monitoring system with multistage request verification
CN109166200A (en) Authorization method, device, system, electronic lock, digital key and storage medium
CN106506565A (en) A kind of remote command executes method and apparatus
CN110266653A (en) A kind of method for authenticating, system and terminal device
CN112199700B (en) Safety management method and system for MES data system
EP1126655A1 (en) Method of hardware and software authentication in a network system
CN109359450A (en) Safety access method, device, equipment and the storage medium of linux system
CN106097600B (en) Device management method, system and financial self-service equipment based on ATL

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20180316