CN108537924B - Method for realizing network intelligent lock - Google Patents

Method for realizing network intelligent lock Download PDF

Info

Publication number
CN108537924B
CN108537924B CN201810293864.5A CN201810293864A CN108537924B CN 108537924 B CN108537924 B CN 108537924B CN 201810293864 A CN201810293864 A CN 201810293864A CN 108537924 B CN108537924 B CN 108537924B
Authority
CN
China
Prior art keywords
lock terminal
terminal
lock
management
gateway
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810293864.5A
Other languages
Chinese (zh)
Other versions
CN108537924A (en
Inventor
郭萌
李鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Anheng Shitong Beijing Network Technology Co ltd
Original Assignee
Anheng Shitong Beijing Network Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Anheng Shitong Beijing Network Technology Co ltd filed Critical Anheng Shitong Beijing Network Technology Co ltd
Priority to CN201810293864.5A priority Critical patent/CN108537924B/en
Publication of CN108537924A publication Critical patent/CN108537924A/en
Application granted granted Critical
Publication of CN108537924B publication Critical patent/CN108537924B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention discloses a method for realizing a network intelligent lock, which comprises a connection step and a control step; the connecting step includes: the management equipment is connected with the lockset terminal; the management and control step comprises the following steps: a lock terminal registration step: registering a lock terminal in a management device; lockset terminal management: managing the registered lock terminal at the management equipment; lockset terminal control step: and controlling the registered lock terminals through the management device or the control device. By adopting the scheme, after the intelligent lock is connected with the network intelligent lock, namely the lock terminal, the management equipment can register, manage and control the lock terminal, so that network management and control of the intelligent lock are realized, and the intelligent lock can be applied to occasions needing network management and control of the intelligent lock, such as communities, apartments, hotels, co-production rooms, rental rooms and the like, and has high market application value.

Description

Method for realizing network intelligent lock
Technical Field
The invention relates to network application of an intelligent lock, in particular to a method for realizing the intelligent lock.
Background
With the development of the technology, the research and the application of the Intelligent Lock (also called Intelligent Lock) have greatly improved, and Intelligent wings are added to the Lock by technologies such as fingerprint unlocking, sound unlocking and remote unlocking. The intelligent lock is different from a traditional mechanical lock, and is a lock which is more intelligent in the aspects of user identification, safety and manageability. The network communication-capable intelligent lock or its control device is understood as a lock terminal in a broad sense, and may also be called a network intelligent lock.
However, how to more effectively manage and control the specific implementation of the smart lock is a technical problem to be solved.
Disclosure of Invention
The invention provides a novel method for realizing an intelligent network lock.
The technical scheme of the invention is as follows: a method for realizing network intelligent lock includes a connection step and a control step;
the connecting step includes: the management equipment is connected with the lockset terminal;
the management and control step comprises the following steps:
a lock terminal registration step: registering a lock terminal in a management device;
lockset terminal management: managing the registered lock terminal at the management equipment;
lockset terminal control step: and controlling the registered lock terminals through the management device or the control device.
Preferably, the step of managing further comprises:
and (3) authority authentication interaction step: acquiring a lock terminal control authority;
and (3) permission interaction step: opening part of lock terminal operation authority;
and the permission forbidding interaction step: forbidding part of lock terminal operation authorities;
database operation interaction: the database operation interaction and the updating of the database information of the locker terminal;
network configuration interaction: setting network parameters;
a heartbeat interaction step: indicating whether the lockset terminal is on line or not through heartbeat interaction;
time configuration interaction step: configuring and acquiring lockset terminal time;
data uploading and interacting steps: and acquiring a data record of the lock terminal.
Preferably, the authority authentication interaction step is executed after the lock terminal registration step and before the lock terminal management step.
Preferably, the heartbeat interaction step is performed before the lock terminal management step.
Preferably, in the lock terminal registration step, the unique serial number of the lock terminal device is acquired and bound in the database of the management device.
Preferably, the implementation method further includes a communication mode setting step: a private communication protocol is set that includes a protocol header, a data portion, and a check field.
Preferably, the implementation method further includes the step of data encryption transmission: the method comprises the steps that communication data are encrypted at a sender and then sent to a receiver, and the receiver decrypts the communication data after receiving the communication data, wherein the sender and the receiver are respectively a management device and a lock terminal.
Preferably, the data encryption transmission step is implemented by using an advanced encryption standard.
Preferably, the connecting step is implemented by a communication mode based on a TCP/IP protocol.
Preferably, the connection step is realized by a Socket long connection mode.
By adopting the scheme, after the intelligent lock is connected with the network intelligent lock, namely the lock terminal, the management equipment can register, manage and control the lock terminal, so that network management and control of the intelligent lock are realized, and the intelligent lock can be applied to occasions needing network management and control of the intelligent lock, such as communities, apartments, hotels, co-production rooms, rental rooms and the like, and has high market application value.
Drawings
FIG. 1 is a schematic step diagram of one embodiment of the present invention.
Detailed Description
In order to facilitate an understanding of the invention, the invention is described in more detail below with reference to the accompanying drawings and specific examples. This invention may, however, be embodied in many different forms and should not be construed as limited to the embodiments set forth herein. It will be understood that when an element is referred to as being "secured to" another element, it can be directly on the other element or intervening elements may also be present. When an element is referred to as being "connected" to another element, it can be directly connected to the other element or intervening elements may also be present.
Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs. The terminology used in the description of the invention herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used herein, the term "and/or" includes any and all combinations of one or more of the associated listed items.
As shown in fig. 1, an embodiment of the present invention is a method for implementing an intelligent network lock, which includes a connection step and a control step; the connecting step includes: the management equipment is connected with the lockset terminal; the management and control step comprises the following steps: a lock terminal registration step: registering a lock terminal in a management device; lockset terminal management: managing the registered lock terminal at the management equipment; lockset terminal control step: and controlling the registered lock terminals through the management device or the control device. By adopting the scheme, after the intelligent lock is connected with the network intelligent lock, namely the lock terminal, the management equipment can register, manage and control the lock terminal, so that network management and control of the intelligent lock are realized, and the intelligent lock can be applied to occasions needing network management and control of the intelligent lock, such as communities, apartments, hotels, co-production rooms, rental rooms and the like, and has high market application value.
Preferably, in the lock terminal registration step, the unique serial number of the lock terminal device is acquired and bound in the database of the management device. Further, in the lock terminal registration step, a management device interacts with a lock terminal to register a command, acquires a unique serial number of the lock terminal device, binds the management device in a database of the management device, mutually authenticates the lock terminal and the management device through the interaction registration command, and only the management device authenticated by the lock terminal has a right to operate the lock terminal; and only if the lock terminal passes the authentication of the management equipment, the management equipment adds the lock terminal into the database and performs subsequent lock terminal management steps and lock terminal control steps on the lock terminal, so that the control on the lock terminal is realized. In this way, in the implementation method, the management device can manage a plurality of lock terminals, for example, one management device in a hotel lobby manages all network intelligent locks of a hotel. For example, in the implementation method, N lockset terminals are managed by M management devices, where M and N are both positive integers, and the magnitude of N is greater than that of M. For example, one management device at each floor of the hotel manages all the network smart locks at that floor of the hotel.
Preferably, the step of managing further comprises: and (3) authority authentication interaction step: acquiring a lock terminal control authority; and (3) permission interaction step: opening part of lock terminal operation authority; and the permission forbidding interaction step: forbidding part of lock terminal operation authorities; database operation interaction: the database operation interaction and the updating of the database information of the locker terminal; network configuration interaction: setting network parameters; a heartbeat interaction step: indicating whether the lockset terminal is on line or not through heartbeat interaction; time configuration interaction step: configuring and acquiring lockset terminal time; data uploading and interacting steps: and acquiring a data record of the lock terminal. For example, an implementation method of an intelligent network lock includes a connection step and a control step; the connecting step includes: the management equipment is connected with the lockset terminal; the management and control step comprises the following steps: a lock terminal registration step: registering a lock terminal in a management device; lockset terminal management: managing the registered lock terminal at the management equipment; lockset terminal control step: controlling the registered lock terminal through the management equipment or the control equipment; and (3) authority authentication interaction step: acquiring a lock terminal control authority; and (3) permission interaction step: opening part of lock terminal operation authority; and the permission forbidding interaction step: forbidding part of lock terminal operation authorities; database operation interaction: the database operation interaction and the updating of the database information of the locker terminal; network configuration interaction: setting network parameters; a heartbeat interaction step: indicating whether the lockset terminal is on line or not through heartbeat interaction; time configuration interaction step: configuring and acquiring lockset terminal time; data uploading and interacting steps: acquiring a data record of a lockset terminal; the rest of the examples are analogized. It can be understood that the lock terminal registration step, the lock terminal management step, the lock terminal control step, the authority authentication interaction step, the authority permission interaction step, the authority prohibition interaction step, the database operation interaction step, the network configuration interaction step, the heartbeat interaction step, the time configuration interaction step and/or the data upload interaction step in the implementation method can be executed in sequence, only one, two or more of the steps can be executed, and the execution can be selected according to actual requirements.
For example, the step of managing further comprises the step of authority authentication interaction: acquiring a lock terminal control authority; in this way, only the server, i.e. the management device, with the successful authority authentication can operate the device. For example, an implementation method of an intelligent network lock includes a connection step and a control step; the connecting step includes: the management equipment is connected with the lockset terminal; the management and control step comprises the following steps: a lock terminal registration step: registering a lock terminal in a management device; lockset terminal management: managing the registered lock terminal at the management equipment; lockset terminal control step: controlling the registered lock terminal through the management equipment or the control equipment; and (3) authority authentication interaction step: acquiring a lock terminal control authority; the rest of the examples are analogized. Further, in the authority authentication interaction step, the management device interacts an authority authentication instruction with the lock terminal, the management device acquires the control authority of the lock terminal, the lock terminal opens the control authority to the management device which is authenticated by the lock terminal and completes the lock terminal registration step, and the management device which succeeds in authority authentication performs lock terminal management steps and lock terminal control steps related operations on the lock terminal.
Preferably, the authority authentication interaction step is executed after the lock terminal registration step and before the lock terminal management step. For example, an implementation method of an intelligent network lock includes a connection step and a control step; the connecting step includes: the management equipment is connected with the lockset terminal; the management and control step comprises the following steps: a lock terminal registration step: registering a lock terminal in a management device; and (3) authority authentication interaction step: acquiring a lock terminal control authority; lockset terminal management: managing the registered lock terminal at the management equipment; lockset terminal control step: controlling the registered lock terminal through the management equipment or the control equipment; the rest of the examples are analogized.
For example, the step of regulating further comprises the step of permission interaction: opening part of lock terminal operation authority; at this moment, the user can directly control the functions of the terminal part of the lockset. Furthermore, in the permission interaction step, the management equipment interacts a permission instruction with the lock terminal, the lock terminal opens part of lock terminal operation permissions, the management equipment which is authenticated by the lock terminal obtains part of lock terminal operation permissions, and the management equipment adopts the part of lock terminal operation permissions to perform subsequent lock terminal management steps and lock terminal control steps on the lock terminal, so that the control of the lock terminal is realized, and thus, a user can directly control the functions of the lock terminal through the management equipment.
For example, the step of regulating further comprises the step of prohibiting interaction by permission: forbidding part of lock terminal operation authorities; at this time, the user may not directly control the functions of the terminal portion of the lockset. Further, in the step of prohibiting the authority, the management device interacts with the lock terminal to prohibit the authority, the lock terminal cancels part of the lock terminal operation authority, the management device authenticated by the lock terminal cancels part of the lock terminal operation authority, the management device can not adopt the part of the lock terminal operation authority to perform the subsequent lock terminal management step and lock terminal control step on the lock terminal, the management equipment does not adopt the partial lockset terminal operation authority to carry out subsequent lockset terminal management steps and lockset terminal control steps on the lockset terminal, so that the management equipment realizes the abandonment control on the lockset terminal; in this way, the user can directly control the functions of the terminal part of the lock through the management device.
For example, the step of managing further comprises a step of interacting database operations: the database operation interaction and the updating of the database information of the locker terminal; for example, the database operation interaction step includes operations of adding a password to the lock terminal, deleting the password and the like. Further, in the database operation interaction step, the management device interacts a database operation instruction with the lock terminal, and the management device authenticated by the lock terminal brings the lock terminal into the database for management, including name management, password management, and/or authority management of the lock terminal. Wherein the name management comprises: adding, modifying and/or deleting names; the password management includes: adding, modifying and/or deleting passwords; the rights management includes: add rights, modify rights, and/or delete rights. For example, the database operation interaction step is subordinate to the lock terminal management step; namely, the lock terminal management step comprises the database operation interaction step. For example, an implementation method of an intelligent network lock includes a connection step and a control step; the connecting step includes: the management equipment is connected with the lockset terminal; the management and control step comprises the following steps: a lock terminal registration step: registering a lock terminal in a management device; lockset terminal management: managing the registered lock terminal at the management equipment; lockset terminal control step: controlling the registered lock terminal through the management equipment or the control equipment; and (3) authority authentication interaction step: acquiring a lock terminal control authority; and (3) permission interaction step: opening part of lock terminal operation authority; and the permission forbidding interaction step: forbidding part of lock terminal operation authorities; network configuration interaction: setting network parameters; a heartbeat interaction step: indicating whether the lockset terminal is on line or not through heartbeat interaction; time configuration interaction step: configuring and acquiring lockset terminal time; data uploading and interacting steps: acquiring a data record of a lockset terminal; the lockset terminal management step comprises a database operation interaction step: the database operation interaction and the updating of the database information of the locker terminal; the rest of the examples are analogized. In this way, the user can update the lock terminal database information of the management device, including operations of adding a name, modifying a name, adding a password, deleting a password, and the like.
For example, the step of managing further comprises a network configuration interaction step of: setting network parameters; for example, setting SSID, PASSWORD, IP address, TCP port, DHCP server, etc. for WIFI; furthermore, the SSID, PASSWORD, IP address, TCP port and/or DHCP server of WIFI and the like are set for one or more lock terminals. For example, the network configuration interaction step is performed after the lock terminal registration step and before the lock terminal management step. As another example, the lock terminal management step includes the network configuration interaction step, for example, the lock terminal management step includes: and registering a lock terminal in the management equipment, and setting network parameters for the lock terminal. For example, in the management device connected to the lock terminal, the management device and the lock terminal establish connection in a bluetooth communication mode or a local area network communication mode; in the network configuration interaction step, the management equipment sets network parameters for the lock terminal; the rest of the examples are analogized. As another example, the managing step further includes: the lock terminal is connected with an external network through the management equipment.
For example, the governing step further includes a heartbeat interaction step: and indicating whether the lockset terminal is on line or not through heartbeat interaction. Preferably, the heartbeat interaction step is performed before the lock terminal management step. For example, an implementation method of an intelligent network lock includes a connection step and a control step; the connecting step includes: the management equipment is connected with the lockset terminal; the management and control step comprises the following steps: a lock terminal registration step: registering a lock terminal in a management device; a heartbeat interaction step: indicating whether the lockset terminal is on line or not through heartbeat interaction; lockset terminal management: managing the registered lock terminal at the management equipment; lockset terminal control step: and controlling the registered lock terminals through the management device or the control device. For another example, an implementation method of an intelligent network lock includes a connection step and a control step; the connecting step includes: the management equipment is connected with the lockset terminal; the management and control step comprises the following steps: a lock terminal registration step: registering a lock terminal in a management device; and (3) authority authentication interaction step: acquiring a lock terminal control authority; a heartbeat interaction step: indicating whether the lockset terminal is on line or not through heartbeat interaction; lockset terminal management: managing the registered lock terminal at the management equipment; lockset terminal control step: controlling the registered lock terminal through the management equipment or the control equipment; the rest of the examples are analogized.
For example, the step of regulating further comprises a step of time configuration interaction: the lock terminal time is configured and obtained, and at the moment, the management equipment can set the lock terminal time and can also obtain the lock terminal time. Furthermore, in the time configuration interaction step, the management device interacts with a lock terminal to configure a time configuration instruction, the lock terminal opens a time configuration authority, the management device which is authenticated by the lock terminal adopts the time configuration authority to set the lock terminal time, and the lock terminal time is acquired, so that the time configuration and acquisition of the lock terminal are realized. Therefore, the user can directly control the time of the lockset terminal through the management equipment, and unified management of a large number of locksets is facilitated.
For example, the step of managing further comprises a step of data uploading interaction: acquiring a data record of a lockset terminal; for example, door opening and closing records and the like are recorded, at the moment, the management device can acquire data records of the lock terminal, the data records are different for different intelligent locks, and the data records provided by some intelligent locks are more detailed, for example, when the fingerprint door is opened in XXXXXX, MM is failed for 3 times in SS seconds in YY month ZZ day HH, and when the fingerprint door is opened in XX, MM is successfully opened in SS seconds in YY month ZZ day HH, in the implementation method of the network intelligent lock, the data records of the registered lock terminal are acquired by adopting a data uploading interaction step, and more comprehensive information can be provided for the management device. Further, the lock terminal management step comprises the data uploading interaction step. For example, the lock terminal management step includes: and managing the registered lock terminal at the management equipment and acquiring the data record of the lock terminal.
Preferably, the connecting step is implemented by a communication mode based on a TCP/IP protocol. Preferably, the connection step is realized by a Socket long connection mode. For example, the management device and the lock terminal adopt a Socket long connection technology of a TCP/IP connection mode, and the communication mode based on the TCP/IP protocol can realize data transmission with less flow and improve the data transmission efficiency. In addition, the long connection can monitor the online state of the door lock in real time, so that the real-time control of the authority and the real-time acquisition of information such as door opening records are achieved. Socket is a bidirectional communication connection implementation, the data communication time has larger randomness, and compared with the prior operation mode that the server requests data to the lock end in a single direction, the Socket can reduce the concurrent pressure of the server and improve the load capacity of the server.
Preferably, the implementation method further includes a communication mode setting step: a private communication protocol is set that includes a protocol header, a data portion, and a check field. The communication between the management device and the lock terminal uses a proprietary protocol, which consists of, for example, a protocol header, a data portion, and a check field. The protocol header is helpful for the server side to extract the instruction. For example, the check field is set as a numerical value obtained by a preset algorithm with respect to the unique serial number or the identification code of the current lock terminal to which the management device is connected, and for example, the number of digits of the numerical value is set according to the length of the check field. For example, the unique serial number or identification code of the current lock terminal is 010-. Therefore, on one hand, the security is enhanced, and the instruction content is prevented from being forged by people; on the other hand, the method is beneficial to improving robustness and identifying data errors caused by electrical interference. Further, the connecting step includes the communication mode setting step; for example, the connecting step includes the management device connecting to the lock terminal and setting a private communication protocol including a protocol header, a data portion, and a check field.
Preferably, the implementation method further includes the step of data encryption transmission: the method comprises the steps that communication data are encrypted at a sender and then sent to a receiver, and the receiver decrypts the communication data after receiving the communication data, wherein the sender and the receiver are respectively a management device and a lock terminal. To prevent network snooping, the communication protocol does not employ plaintext. The communication data is encrypted at the sender and then sent to the receiver, and the receiver decrypts the communication data after receiving the communication data. For example, in each interaction step in the control step, the interaction steps include an authorization authentication interaction step, an authorization permission interaction step, an authorization prohibition interaction step, a database operation interaction step, a network configuration interaction step, a heartbeat interaction step, a time configuration interaction step, and/or a data upload interaction step. Preferably, the data Encryption transmission step is implemented by using Advanced Encryption Standard (AES). AES is a block encryption standard adopted by the federal government in the united states, has been analyzed by many parties and is widely used throughout the world. The encryption algorithm has high calculation speed, is suitable for running in a single chip microcomputer environment, simultaneously supports multiple server languages, and has good compatibility and strong expandability. The most important advantage of the encryption algorithm is safety, and the cracking probability is almost 0. For example, the advanced encryption standard is AES-128. For the lockset terminal, the AES-128 can give consideration to the efficiency and the safety of data communication.
Preferably, the management device in the implementation method is provided with a service architecture adopting a server language (node. js), and the node. js language is light and efficient by using an event-driven and non-blocking I/O model, and is very suitable for running data-intensive real-time application on distributed devices. Js can still carry out concurrent processing on tasks under the condition that additional threads are not added, and the language characteristic is very suitable for being used as a server development language of an intelligent lock to deal with lock terminals or door lock equipment in tens of thousands of levels, so that efficient management and control are carried out.
Continuing to illustrate the embodiment of the present invention, for example, the implementation method further includes a gateway configuration step and a gateway control step, for example, the gateway configuration step includes: in a gateway configuration mode, a gateway is connected through a gateway wireless interface, and network use permission is configured for the gateway; as another example, the gateway controlling step includes: in the gateway working mode, a lock terminal with a wireless receiving function, namely an intelligent lock, is managed. Gateway (Gateway) also called Gateway or protocol converter, which is connected to network such as intelligent lock and management device at network layer, at this time, Gateway can be called intelligent lock Gateway or Gateway directly, and intelligent lock with network interconnection capability is network intelligent lock. Therefore, the lock terminal does not need to independently realize remote communication and can be connected to remote management equipment, and one gateway can be connected with and manage a plurality of lock terminals within the effective communication distance of the gateway or the lock terminals. For example, the connecting step includes the gateway configuring step; the step of managing comprises the step of controlling the gateway. As another example, the lock terminal controlling step includes the gateway controlling step.
For example, configuring network use authority for the gateway at a management device; for example, in a gateway configuration mode, a gateway is connected through a gateway wireless interface, and a management device configures network use authority for the gateway; the rest of the examples are analogized. If the gateway is not in the network use permission, entering a setting page to configure the network use permission for the gateway; for example, in a gateway configuration mode, a gateway is connected through a gateway wireless interface, and a setting page is entered to configure network use permission for the gateway; the rest of the examples are analogized. Preferably, the network usage right is configured for the gateway on a management device entry setting page. For example, in a gateway configuration mode, a gateway is connected through a gateway wireless interface, and a network use permission is configured for the gateway when a management device enters a setting page; the rest of the examples are analogized. In each embodiment, the management device is a mobile terminal, such as a mobile phone, a tablet computer, a notebook computer, a mobile smart device, or the like, and preferably, in the gateway configuration mode, the mobile terminal is connected to the gateway through a gateway wireless interface, and the mobile terminal is used to configure the network usage right for the gateway. Preferably, in the gateway operating mode, a mobile terminal is adopted to manage a lock terminal with a wireless receiving function for the gateway. It can be understood that the mobile terminal used in the gateway configuration mode and the mobile terminal used in the gateway operation mode may be the same mobile terminal or different mobile terminals. Configuring network use authority for the gateway, namely enabling the gateway to have the authority of transmitting data through a network; for example, configuring the gateway with network usage rights includes: and configuring the wifi name and the password of the networking router of the current environment for the gateway. For example, in a gateway configuration mode, a gateway is connected through a gateway wireless interface, and a wifi name and a password of a networking router in the current environment are configured for the gateway; the rest of the examples are analogized. Therefore, the gateway and the lock terminal connected with the gateway can realize network access and data transmission through the networking router of the current environment.
Preferably, the lock terminal having the wireless receiving function includes: and establishing wireless association between the lock terminal with the wireless receiving function and the gateway, and wirelessly managing the lock terminal with the wireless receiving function through the gateway. For example, a lock terminal with a wireless receiving function is wirelessly associated with the gateway at a third-party platform, and the lock terminal with the wireless receiving function is wirelessly managed through the gateway. Further, the third-party platform is a mobile terminal and/or an application program thereof. If necessary, the lock terminal with data transmission function, such as a wired lock terminal, can also be managed, but this will increase the workload of wiring and connecting, and the preferred embodiment of the present invention is that the gateway is wirelessly connected with the lock terminal, wirelessly managed, and network access and/or data transmission is realized through the networking router of the current environment.
Preferably, the lock terminal having a wireless receiving function includes: adding, deleting or modifying the lock terminal for the gateway, and setting the lock terminal adding, deleting or modifying information for the gateway. For example, the lock terminal with a wireless receiving function includes: establishing wireless association between the lock terminal with the wireless receiving function and the gateway, adding, deleting or modifying the lock terminal for the gateway, and setting the adding, deleting or modifying information of the lock terminal for the gateway. Preferably, the information comprises lock terminal self information, lock terminal environment information, control information and/or authority information; the control information includes enabling control information, disabling control information, display control information and/or monitoring control information, and the authority information includes fingerprint information, voice control information, motion control information, door card information, password information, validity time information and/or validity time information, for example, the lock terminal is turned on or turned off within validity times and/or validity time through the password information, the fingerprint information, the voice control information or the motion control information in the authority information. Therefore, when the lock terminal is connected, the information of the lock terminal can be known, such as a certain apartment 1603; when a user lives in a hotel, the environment information of the lockset terminal can be obtained, for example, a public swimming pool or a gymnasium exists in a 4 th building; when a certain room is temporarily used, authority information such as valid time information and the like can be obtained, and the use by a user or the control by a management party is very convenient.
Preferably, the lock terminal having the wireless receiving function includes: and establishing wireless association with the lock terminal in a mode of scanning the unique identifier of the lock terminal. For example, the gateway and the lock terminal are wirelessly associated by scanning the unique identifier of the lock terminal. For example, a serial number two-dimensional code is arranged on the lock terminal and serves as the unique identifier, and the gateway and the lock terminal are wirelessly associated in a mode that the mobile terminal scans the unique identifier of the lock terminal. Preferably, the lock terminal having the wireless receiving function includes: the gateway sends a working state selection notification, a Wifi configuration notification, a mobile phone connection notification, a TCP data notification, a CC1101 forwarding notification, a watchdog notification, and the like to a lock terminal, a mobile terminal, a management device, or the like.
Preferably, the implementation method further comprises the steps of: and controlling the gateway to enter a gateway configuration mode. For example, the gateway is controlled to enter the configuration mode through a configuration key; for another example, the gateway is controlled to enter the configuration mode through the mobile terminal; further, the gateway is controlled to enter the configuration mode through the pre-authorized mobile terminal. In this way, the gateway can be controlled to enter the gateway configuration mode in different ways, either soft or hard. Preferably, the implementation method further comprises the steps of: and controlling the gateway to enter a gateway working mode. For example, the gateway is controlled to enter the working mode through a configuration key; therefore, the user can realize that the gateway is controlled to enter the working mode by a hard configuration key or the gateway is controlled to enter the working mode by a preauthorized mobile phone and the like in a soft mode. Preferably, the lock terminal and the gateway have the same use authority of the internal network. In this way, the lock terminal and the gateway are in the same local area network, and the association can be established through the router. That is to say, the lock terminal can be connected to the router through the gateway to realize network connection, and the lock terminal can also be directly connected to the router to realize network connection, and the latter obviously increases the cost of the lock terminal, and can be realized by adopting different technical paths in the development stages of market and product cost brought by different technologies.
For example, in the gateway operating mode, the gateway waits for data, when receiving the data, the gateway uses AES128 to decrypt and judges whether the address is correct, otherwise, the data is discarded and the data is continuously waited for, if so, the data is processed, uses AES128 to encrypt and judges whether the channel is idle, otherwise, random avoidance is performed, and if so, the encrypted data is sent. Setting a door-opening password for a lockset terminal, carrying out AES128 encryption on the door-opening password, judging whether the sending times is less than 2, if not, directly executing the next process, if so, further judging whether a channel is idle, otherwise, carrying out random avoidance, if so, sending the encrypted door-opening password, then judging whether a receiving end, namely a gateway receives data, otherwise, continuously executing the step of judging whether the sending times is less than 2, if so, adopting the AES128 decryption, executing the next process, and the rest embodiments are analogized.
For example, adding a gateway includes the steps of: the user scans the two-dimensional code on the gateway by adopting the mobile terminal, downloads and manages the APP and installs the APP, registers the user after the installation is completed, for example, the user enters a user registration page, inputs a mobile phone number and a password (personal free setting), clicks to obtain an authentication code, fills the authentication code received by a short message, and clicks to register. After the successful registration, entering a login page, inputting a registered user mobile phone number and a password, clicking to log in, and entering a gateway management page; adding a gateway in the gateway management page, scanning a two-dimensional code on the gateway, inputting a gateway name in a dialog box popped up after scanning, and inputting a name which is easy to identify by a user at the moment, such as a No. 4 floor 2 layer 201 room: 4-2-201, then click to determine. After the gateway is successfully added, the gateway name can be changed. In practical application, according to the spaciousness of the environment, for example, the gateway is arranged in a corridor on a certain floor of a hotel or an apartment, and the gateway can be connected with all lock terminals on the floor without corners. Preferably, the smart lock gateway management system further includes the lock terminal, that is, the smart lock. For example, the lock terminal is provided with a power supply module and a lock terminal low-voltage-difference linear voltage stabilizer connected with the power supply module, wherein the lock terminal low-voltage-difference linear voltage stabilizer is a low-voltage-difference linear voltage stabilizer for the lock terminal; the lock terminal is also provided with a microprocessing controller MCU, an RFID, a Touch Key input unit Touch Key, a motor driving device and a voice prompting device which are respectively connected with the low-dropout linear voltage regulator of the lock terminal, wherein the motor driving device is used for driving unlocking or locking and the voice prompting device is used for giving out a prompting sound; the RFID is used for non-contact unlocking control, and the touch key input device is used for inputting a key; the micro-processing controller is also connected with the KEY manager KEY and the wireless communication CC1101 module. For example, in a gateway operation mode, a lock terminal with a wireless receiving function is managed, including: the lockset terminal sends a key touch notice, a card approach notice, a low voltage notice, a CC1101 forwarding notice and the like to the gateway through the wireless communication CC1101 module.
Furthermore, the embodiment of the invention further includes an implementation method of the network smart lock formed by mutually combining the technical features of the embodiments, which can realize that after the network smart lock is connected with the management equipment, the management equipment can register, manage and control the lock terminal, thereby realizing network management and control of the smart lock, being applicable to occasions requiring network management and control of the smart lock, such as communities, apartments, hotels, co-production rooms, rental rooms and the like, and having high market application value.
The technical features mentioned above are combined with each other to form various embodiments which are not listed above, and all of them are regarded as the scope of the present invention described in the specification; also, modifications and variations may be suggested to those skilled in the art in light of the above teachings, and it is intended to cover all such modifications and variations as fall within the true spirit and scope of the invention as defined by the appended claims.

Claims (9)

1. A method for realizing a network intelligent lock is characterized by comprising a connection step and a control step;
the connecting step includes: the management equipment is connected with the lockset terminal and is provided with a private communication protocol comprising a protocol head, a data part and a check field;
the management and control step comprises the following steps:
a lock terminal registration step: registering a lock terminal in a management device;
lockset terminal management: managing the registered lock terminal at the management equipment;
lockset terminal control step: controlling the registered lock terminal through the management equipment or the control equipment;
and (3) authority authentication interaction step: acquiring a lock terminal control authority;
and (3) permission interaction step: opening part of lock terminal operation authority;
and the permission forbidding interaction step: forbidding part of lock terminal operation authorities;
database operation interaction: the database operation interaction and the updating of the database information of the locker terminal;
network configuration interaction: setting network parameters;
a heartbeat interaction step: indicating whether the lockset terminal is on line or not through heartbeat interaction;
time configuration interaction step: configuring and acquiring lockset terminal time;
data uploading and interacting steps: acquiring a data record of a lockset terminal;
the managing and controlling step further comprises:
in the authority authentication interaction step, the management equipment interacts an authority authentication instruction with the lock terminal, acquires the control authority of the lock terminal, opens the control authority for the management equipment which is authenticated by the lock terminal and completes the lock terminal registration step, and the management equipment with successful authority authentication performs related operations of the lock terminal management step and the lock terminal control step on the lock terminal;
in the permission interaction step, a management device interacts a permission instruction with a lock terminal, the lock terminal opens part of lock terminal operation permissions, the management device which is authenticated by the lock terminal obtains part of lock terminal operation permissions, and the management device adopts the part of lock terminal operation permissions to perform subsequent lock terminal management steps and lock terminal control steps on the lock terminal and is used for realizing the control of the lock terminal;
in the permission prohibition interaction step, a management device interacts a permission prohibition instruction with a lock terminal, the lock terminal cancels part of lock terminal operation permission, the management device authenticated by the lock terminal cancels part of lock terminal operation permission, the management device can not adopt the part of lock terminal operation permission to carry out subsequent lock terminal management step and lock terminal control step on the lock terminal, so that the lock terminal realizes the disengagement control of the management device authenticated by the lock terminal, and/or the management device cancels part of lock terminal operation permission of the lock terminal authenticated by the management device, and the management device does not adopt the part of lock terminal operation permission to carry out subsequent lock terminal management step and lock terminal control step on the lock terminal, so that the management device realizes the abandonment control of the lock terminal;
in the database operation interaction step, a management device interacts a database operation instruction with a lock terminal, and the management device which is authenticated by the lock terminal brings the lock terminal into a database of the lock terminal for management, including name management, password management and/or authority management of the lock terminal; wherein the name management comprises: adding, modifying and/or deleting names; the password management includes: adding, modifying and/or deleting passwords; the rights management includes: add, modify and/or delete permissions;
in the time configuration interaction step, a management device interacts a time configuration instruction with a lock terminal, the lock terminal opens a time configuration authority, the management device authenticated by the lock terminal adopts the time configuration authority to set lock terminal time, and lock terminal time is acquired, so that the time configuration and acquisition of the lock terminal are realized;
the implementation method also comprises the following steps of: the method comprises the steps of setting a private communication protocol comprising a protocol header, a data part and a check field, wherein the check field sets a numerical value obtained by adopting a preset algorithm with a unique serial number or an identification code of a current lock terminal connected with a management device.
2. The implementation method of claim 1, wherein the authorization interaction step is performed after the lock terminal registration step and before the lock terminal management step.
3. The implementation method of claim 1, wherein the heartbeat interaction step is performed before the lock terminal management step.
4. The implementation method of claim 1, wherein in the lock terminal registration step, a unique serial number of the lock terminal device is obtained and is bound in a database of the management device.
5. The method of claim 1, further comprising the steps of: controlling the gateway to enter a gateway configuration mode; the implementation method further comprises the following steps: controlling the gateway to enter a gateway working mode; in the gateway working mode, the gateway waits for data, when receiving the data, the gateway adopts AES128 decryption to judge whether the address is correct, otherwise, the data is discarded and the data is continuously waited for, if so, the data is processed, the AES128 encryption is adopted to judge whether a channel is idle, otherwise, random avoidance is carried out, and if so, the encrypted data is sent; the lock terminal is provided with a power supply module and a low-dropout linear regulator connected with the power supply module and used for the lock terminal; the lockset terminal is also provided with a microprocessing controller MCU, an RFID, a touch key input device, a motor driving device and a voice prompting device which are respectively connected with the lockset terminal low-dropout linear voltage stabilizer, wherein the motor driving device is used for driving unlocking or locking, and the voice prompting device is used for giving out prompting sound; the RFID is used for non-contact unlocking control, and the touch key input device is used for inputting a key; the micro-processing controller is also connected with the key manager and the wireless communication CC1101 module; and, in the gateway mode of operation, manage the tool to lock terminal with wireless receiving function, including: the lockset terminal sends a key touch notice, a card approach notice, a low voltage notice and a CC1101 forwarding notice to the gateway through the wireless communication CC1101 module.
6. The method according to claim 1, wherein the method further comprises the step of data encryption transmission: the method comprises the steps that communication data are encrypted at a sender and then sent to a receiver, and the receiver decrypts the communication data after receiving the communication data, wherein the sender and the receiver are respectively a management device and a lock terminal.
7. The method of claim 6, wherein the data encryption transmission step is implemented using an advanced encryption standard.
8. The method according to any one of claims 1 to 7, wherein the connecting step is implemented by a communication method based on a TCP/IP protocol.
9. The method of claim 8, wherein the connecting step is implemented by using a Socket long connection mode.
CN201810293864.5A 2018-04-04 2018-04-04 Method for realizing network intelligent lock Active CN108537924B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810293864.5A CN108537924B (en) 2018-04-04 2018-04-04 Method for realizing network intelligent lock

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810293864.5A CN108537924B (en) 2018-04-04 2018-04-04 Method for realizing network intelligent lock

Publications (2)

Publication Number Publication Date
CN108537924A CN108537924A (en) 2018-09-14
CN108537924B true CN108537924B (en) 2021-05-14

Family

ID=63482573

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810293864.5A Active CN108537924B (en) 2018-04-04 2018-04-04 Method for realizing network intelligent lock

Country Status (1)

Country Link
CN (1) CN108537924B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113096291A (en) * 2021-03-25 2021-07-09 重庆中科云从科技有限公司 Regional personnel management and control method, system, machine readable medium and equipment
CN113573336B (en) * 2021-07-12 2023-07-14 中国联合网络通信集团有限公司 Communication management and control method and equipment

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040189439A1 (en) * 2003-03-28 2004-09-30 Cansino Juan Miguel Dominguez Local and remote management of lock systems from a network
CN102915588B (en) * 2012-11-02 2015-07-29 凯拔(中国)科技有限公司 Based on intelligent lock system and the control method thereof of Bluetooth technology
CN104574584B (en) * 2014-12-01 2017-03-22 沈阳赛普顿科技有限公司 Management and control system and management and control method of bank vault door
CN205862388U (en) * 2016-04-29 2017-01-04 北京果心科技有限公司 Password smart lock long-distance management system based on Wi Fi Yu Bluetooth technology
CN106558130B (en) * 2016-11-14 2020-03-27 安恒世通(北京)网络科技有限公司 Intelligent door lock management system
CN206584426U (en) * 2017-01-12 2017-10-24 深圳达实信息技术有限公司 A kind of Yunmen access control system

Also Published As

Publication number Publication date
CN108537924A (en) 2018-09-14

Similar Documents

Publication Publication Date Title
US8549584B2 (en) Physical security triggered dynamic network authentication and authorization
CN108510626B (en) Dynamic password access control management method and management system thereof
CN110178161B (en) Access control system with secure pass through
CN101297282B (en) Unified network and physical premises access control server
CN104517338B (en) Distance entrance and its implementation based on wireless network
CN108537927B (en) Lockset terminal and method for controlling lockset terminal through regional management
CN105141584A (en) Smart home system equipment authentication methods, and devices
CN104680630A (en) Method and system for controlling door locks
CN103489233A (en) Electronic door control system with dynamic password
CN103248484A (en) Door access control system and method
CN106355708A (en) Door control system capable of conferring opening authority to visitors and door control management method
US20140208406A1 (en) Two-factor authentication
CN105261100A (en) Entrance guard unlocking method and system
CN207008746U (en) A kind of smart electronicses lock system
CN104052817A (en) Intelligent door and intelligent door control method and system
US11373472B2 (en) Compact encoding of static permissions for real-time access control
WO2014139331A1 (en) Smart entry system and controller
CN105574968A (en) Intelligent building visitor system
CN103544749A (en) Cloud control access control management system and authentication method thereof
CN108734812A (en) Remote unlocking method, apparatus based on ZigBee and system
CN108537924B (en) Method for realizing network intelligent lock
CN105931343A (en) Smart door lock system and control method for same
CN113037736B (en) Authentication method, device, system and computer storage medium
CN106652116A (en) Application for managing multifunctional opening and closing door locks by two-dimensional codes of mobile phone
CN207123882U (en) A kind of antitheft cloud service door-locking system of multiple intelligent

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant