CN109389727A - Method for unlocking, system and computer readable storage medium - Google Patents
Method for unlocking, system and computer readable storage medium Download PDFInfo
- Publication number
- CN109389727A CN109389727A CN201811285026.XA CN201811285026A CN109389727A CN 109389727 A CN109389727 A CN 109389727A CN 201811285026 A CN201811285026 A CN 201811285026A CN 109389727 A CN109389727 A CN 109389727A
- Authority
- CN
- China
- Prior art keywords
- door lock
- password
- information
- unlocking
- user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00563—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys using personal physical data of the operator, e.g. finger prints, retinal images, voicepatterns
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Lock And Its Accessories (AREA)
Abstract
The invention discloses a kind of method for unlocking, this method comprises: generating the corresponding user account of request and authentication information according to the door lock password when the door lock password for receiving user terminal transmission generates request;Search the true identity information and intelligent door lock information for being associated with and saving with the user account in the preset database according to the user account;Detect whether the authentication information matches with true identity information, to carry out authentication to user;When authentication passes through, it is random to generate door lock password, and door lock password is sent to the user terminal and intelligent door lock corresponding with intelligent door lock information, it unlocks so that user is based on the door lock password, and make the intelligent door lock whether consistent by detecting the input password received and the door lock password, to determine whether to unlock.The invention also discloses a kind of unlocking system and computer readable storage mediums.The present invention can solve the problems, such as that existing unlocking mode safety is lower.
Description
Technical field
The present invention relates to unlocking technique field more particularly to a kind of method for unlocking, system and computer readable storage medium.
Background technique
Currently used security door is generally all opened and closed using metal key, that there are keys is inconvenient to carry,
The defects of key is easy to be lost, key is maliciously prepared, thus safety is lower.With the continuous development of new technology, go out in recent years
Intelligent door lock is showed, user can unlock by inputting password.However, since the password of intelligent door lock is fixed, appearance
Easily known or peep to steal by other people, safety is relatively low.Therefore, that there are safeties is lower for existing unlocking mode
Problem.
Summary of the invention
It is a primary object of the present invention to propose a kind of method for unlocking, system and computer readable storage medium, it is intended to solve
The lower problem of certainly existing unlocking mode safety.
To achieve the above object, the present invention provides a kind of method for unlocking, and the method for unlocking includes the following steps:
When the door lock password for receiving user terminal transmission generates request, request is generated according to the door lock password
Corresponding user account and authentication information;
Search the true identity letter for being associated with and saving with the user account in the preset database according to the user account
Breath and intelligent door lock information;
Detect whether the authentication information matches with the true identity information, to carry out authentication to user;
It is random to generate door lock password when authentication passes through, and the door lock password is sent to the user terminal
It with intelligent door lock corresponding with the intelligent door lock information, unlocks, and makes so that user is based on the door lock password
Whether the intelligent door lock is consistent by detecting the input password received and the door lock password, to determine whether to unlock.
Optionally, described when the door lock password for receiving user terminal transmission generates request, according to the door lock password
Before the step of generating the corresponding user account of request and authentication information, comprising:
When receiving the information bind request of user terminal transmission, corresponding use is obtained according to the information bind request
Family account, true identity information and intelligent door lock information;
The user account, true identity information and intelligent door lock information are bound, and be associated be stored in it is described pre-
If in database.
Optionally, described to bind the user account, true identity information and intelligent door lock information, and it is associated with guarantor
There are before the step in the presetting database, further includes:
It is random to generate verifying password, the verifying password is sent to the user terminal and intelligent door lock, and transmission the
One prompt information is to the user terminal, to prompt user to carry out input verifying within a preset time;
Whether monitoring receives the verifying that the intelligent door lock is returned based on the verifying password in the preset time
Pass through information;
If being received in the preset time and being verified information, then follow the steps: by the user account, true body
Part information is bound with intelligent door lock information, and is associated with and is stored in the presetting database.
Optionally, whether the monitoring receives the intelligent door lock in the preset time and is based on the verifying password
Return the step of being verified information before, further includes:
If not receiving in the preset time and being verified information, refuse the information bind request.
Optionally, described when the door lock password for receiving user terminal transmission generates request, according to the door lock password
The step of generating the corresponding user account of request and authentication information, comprising:
When the door lock password for receiving user terminal transmission generates request, request is generated according to the door lock password
Corresponding user account, authentication information and password effective time;
It is described when authentication passes through, it is random to generate door lock password, and the door lock password is sent to the user
Terminal and intelligent door lock corresponding with the intelligent door lock information are unlocked so that user is based on the door lock password, and
So that whether the intelligent door lock is consistent by detecting the input password received and the door lock password, to determine whether to unlock
The step of, comprising:
It is random to generate door lock password when authentication passes through, and the door lock password and password effective time are sent
To the user terminal and intelligent door lock corresponding with the intelligent door lock information so that user be based on the door lock password into
Row is unlocked, and makes the intelligent door lock by detecting the input password and the door lock that receive in the password effective time
Whether password is consistent, to determine whether to unlock.
Optionally, described when the door lock password for receiving user terminal transmission generates request, according to the door lock password
The step of generating the corresponding user account of request and authentication information, further includes:
When the door lock password for receiving user terminal transmission generates request, request is generated according to the door lock password
Corresponding user account, authentication information and designated contact;
It is described when authentication passes through, it is random to generate door lock password, and the door lock password is sent to the user
Terminal and intelligent door lock corresponding with the intelligent door lock information are unlocked so that user is based on the door lock password, and
So that whether the intelligent door lock is consistent by detecting the input password received and the door lock password, to determine whether to unlock
The step of, comprising:
It is random to generate door lock password when authentication passes through, and the door lock password is sent to the specified connection
People and intelligent door lock corresponding with the intelligent door lock information, so that described instruction contact person is carried out based on the door lock password
It unlocks, and makes the intelligent door lock close by detecting the input password received in the password effective time and the door lock
Whether code is consistent, to determine whether to unlock.
Optionally, the method for unlocking further include:
When receiving the multiple authentication failure information that the intelligent door lock is sent, corresponding second prompt information is generated,
And it is sent to the user terminal, to inform user.
Optionally, the authentication information and true identity information include face information, voice messaging, finger print information and
One of iris information is a variety of.
In addition, to achieve the above object, the present invention also provides a kind of unlocking system, the unlocking system include memory,
Processor and it is stored in the unlocking program that can be run on the memory and on the processor, the unlocking program is described
The step of processor realizes method for unlocking as described above when executing.
In addition, to achieve the above object, it is described computer-readable the present invention also provides a kind of computer readable storage medium
Unlocking program is stored on storage medium, the unlocking program realizes the step of method for unlocking as described above when being executed by processor
Suddenly.
The present invention provides a kind of method for unlocking, unlocking system and computer readable storage medium, is receiving user terminal
When the door lock password of transmission generates request, the corresponding user account of request is generated according to the door lock password and authentication is believed
Breath;It is searched in the preset database according to the user account and is associated with the true identity information saved and intelligent door with the user account
Lock information;Detect whether the authentication information matches with true identity information, to carry out authentication to user;When identity is recognized
It is when card passes through, i.e., random to generate door lock password when authentication information is with true identity information matches, and the door lock password is sent out
It send to user terminal and intelligent door lock corresponding with the intelligent door lock information, so that user can be based on the door lock password that this is received
It unlocks, and makes intelligent door lock whether consistent by detecting the input password received and the door lock password, be with determination
No unlocking.By the above-mentioned means, can avoid using fixed door lock cipher in the prior art, it is easy to be known and peep to steal by other people
The case where, meanwhile, also can avoid unlocking using the personal information such as fingerprint in the prior art, and user not at the scene when, lead
The case where causing others cannot be introduced into, therefore, compared to existing unlocking mode, the present invention improves while increasing safety
Ease of use.
Detailed description of the invention
Fig. 1 is the terminal structure schematic diagram for the hardware running environment that the embodiment of the present invention is related to;
Fig. 2 is the flow diagram of method for unlocking first embodiment of the present invention;
Fig. 3 is the flow diagram of method for unlocking second embodiment of the present invention;
Fig. 4 is the flow diagram of method for unlocking 3rd embodiment of the present invention.
The object of the invention is realized, the embodiments will be further described with reference to the accompanying drawings for functional characteristics and advantage.
Specific embodiment
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
Referring to Fig.1, Fig. 1 is the terminal structure schematic diagram for the hardware running environment that the embodiment of the present invention is related to.
The terminal of that embodiment of the invention can be server, be also possible to PC (Personal Computer, individual calculus
Machine), tablet computer, the terminal devices such as portable computer.
As shown in Figure 1, the terminal may include: processor 1001, such as CPU (Central Processing Unit,
Central processing unit), communication bus 1002, user interface 1003, network interface 1004, memory 1005.Wherein, communication bus
1002 for realizing the connection communication between these components.User interface 1003 may include display screen (Display), input list
First such as keyboard (Keyboard), optional user interface 1003 can also include standard wireline interface and wireless interface.Network connects
Mouth 1004 may include optionally standard wireline interface and wireless interface (such as Wireless Fidelity Wireless-Fidelity, Wi-Fi
Interface).Memory 1005 can be high speed RAM memory, be also possible to stable memory (non-volatile
), such as magnetic disk storage memory.Memory 1005 optionally can also be the storage dress independently of aforementioned processor 1001
It sets.
It will be understood by those skilled in the art that the restriction of the not structure paired terminal of terminal structure shown in Fig. 1, can wrap
It includes than illustrating more or fewer components, perhaps combines certain components or different component layouts.
As shown in Figure 1, as may include that operating system, network are logical in a kind of memory 1005 of computer storage medium
Believe module, Subscriber Interface Module SIM and unlocking program.
In terminal shown in Fig. 1, network interface 1004 is mainly used for connecting background server, carries out with background server
Data communication;User interface 1003 is mainly used for connecting client, carries out data communication with client;And processor 1001 can be with
For calling the unlocking program stored in memory 1005, and execute following operation:
When the door lock password for receiving user terminal transmission generates request, request is generated according to the door lock password
Corresponding user account and authentication information;
Search the true identity letter for being associated with and saving with the user account in the preset database according to the user account
Breath and intelligent door lock information;
Detect whether the authentication information matches with the true identity information, to carry out authentication to user;
It is random to generate door lock password when authentication passes through, and the door lock password is sent to the user terminal
It with intelligent door lock corresponding with the intelligent door lock information, unlocks, and makes so that user is based on the door lock password
Whether the intelligent door lock is consistent by detecting the input password received and the door lock password, to determine whether to unlock.
Further, processor 1001 can call the unlocking program stored in memory 1005, also execute following operation:
When receiving the information bind request of user terminal transmission, corresponding use is obtained according to the information bind request
Family account, true identity information and intelligent door lock information;
The user account, true identity information and intelligent door lock information are bound, and be associated be stored in it is described pre-
If in database.
Further, processor 1001 can call the unlocking program stored in memory 1005, also execute following operation:
It is random to generate verifying password, the verifying password is sent to the user terminal and intelligent door lock, and transmission the
One prompt information is to the user terminal, to prompt user to carry out input verifying within a preset time;
Whether monitoring receives the verifying that the intelligent door lock is returned based on the verifying password in the preset time
Pass through information;
If being received in the preset time and being verified information, then follow the steps: by the user account, true body
Part information is bound with intelligent door lock information, and is associated with and is stored in the presetting database.
Further, processor 1001 can call the unlocking program stored in memory 1005, also execute following operation:
If not receiving in the preset time and being verified information, refuse the information bind request.
Further, processor 1001 can call the unlocking program stored in memory 1005, also execute following operation:
When the door lock password for receiving user terminal transmission generates request, request is generated according to the door lock password
Corresponding user account, authentication information and password effective time;
It is random to generate door lock password when authentication passes through, and the door lock password and password effective time are sent
To the user terminal and intelligent door lock corresponding with the intelligent door lock information so that user be based on the door lock password into
Row is unlocked, and makes the intelligent door lock by detecting the input password and the door lock that receive in the password effective time
Whether password is consistent, to determine whether to unlock.
Further, processor 1001 can call the unlocking program stored in memory 1005, also execute following operation:
When the door lock password for receiving user terminal transmission generates request, request is generated according to the door lock password
Corresponding user account, authentication information and designated contact;
It is random to generate door lock password when authentication passes through, and the door lock password is sent to the specified connection
People and intelligent door lock corresponding with the intelligent door lock information, so that described instruction contact person is carried out based on the door lock password
It unlocks, and makes the intelligent door lock close by detecting the input password received in the password effective time and the door lock
Whether code is consistent, to determine whether to unlock.
Further, processor 1001 can call the unlocking program stored in memory 1005, also execute following operation:
When receiving the multiple authentication failure information that the intelligent door lock is sent, corresponding second prompt information is generated,
And it is sent to the user terminal, to inform user.
Further, the authentication information and true identity information include face information, voice messaging, finger print information
With one of iris information or a variety of.
Based on above-mentioned terminal hardware structure, each embodiment of method for unlocking of the present invention is proposed.
The present invention provides a kind of method for unlocking.
Referring to Fig. 2, Fig. 2 is the flow diagram of method for unlocking first embodiment of the present invention.
In the present embodiment, the method for unlocking includes:
Step S10 is generated when the door lock password for receiving user terminal transmission generates request according to the door lock password
The corresponding user account of request and authentication information;
Currently used security door is generally all opened and closed using metal key, that there are keys is inconvenient to carry,
The defects of key is easy to be lost, key is maliciously prepared, thus safety is lower.With the continuous development of new technology, go out in recent years
Intelligent door lock is showed, user can unlock by inputting password.However, since the password of intelligent door lock is fixed, appearance
Easily known or peep to steal by other people, safety is relatively low.Therefore, that there are safeties is lower for existing unlocking mode
Problem.For this purpose, providing a kind of method for unlocking in the present embodiment, request is generated in the door lock password for receiving user terminal transmission
When, first user identity is authenticated, dynamic door lock password is then generated, and be sent to user terminal, so that user terminal
It the door lock password of the dynamic generation can be used to unlock, in this manner, can avoid fixed door lock password and known by other people
Know and peep the case where stealing, so as to increase safety, meanwhile, it also can avoid unlocking using personal information such as fingerprints,
And user is not at the scene, leads to that others is unapproachable to happen, and ease of use can be improved.
The execution terminal of the present embodiment can be the terminal devices such as server, PC, tablet computer, portable computer, for side
Just illustrate, be illustrated by taking server as an example.The server is communicated to connect with user terminal and intelligent door lock respectively, with user
Terminal and intelligent door lock carry out sending and receiving for data and information respectively, wherein and the user terminal is equipped with corresponding software,
Dynamic door lock password can be obtained by the software.
In the present embodiment, when user needs to unlock, dynamic door lock password can be obtained by logging in software application, due to
What the state of software may log in for default, it is close that can equally door lock be got to guarantee safety, after avoiding other people from usurping mobile phone
Code, therefore user also needs it to provide authentication information when applying for door lock password, which may include face
One of information, voice messaging, finger print information and iris information are a variety of, and type and quantity can initially carry out very in user
It is selected when real identity information typing.Specific scene can be with are as follows: user clicks generation door lock password after logging in software
Option or button, at this point, mobile terminal can initially carry out the type of selected information when true identity data input according to user
And quantity such as calls camera acquisition face information and/or iris letter by calling corresponding component retrieval authentication information
Breath, call microphone acquire voice messaging, complete authentication information acquisition after, can trigger gate lock cipher generation ask
It asks.
At this point, server is when the door lock password for receiving user terminal transmission generates request, it is raw according to the door lock password
At the corresponding user account of request and authentication information, user account is the account that user registers to use in the software
Number.
Step S20 is searched in the preset database according to the user account and is associated with the true of preservation with the user account
Real identity information and intelligent door lock information;
Server is looked into after getting user account and authentication information according to the user account in the preset database
Look for the true identity information and intelligent door lock information for being associated with and saving with the user account.The true identity information is that user is asking
When asking user bound account, true identity information and intelligent door lock information, the identity information of the user of institute's typing, the true identity
Information may include one of face information, voice messaging, finger print information and iris information or a variety of, the intelligent door lock information
For the unique identification of intelligent door lock, form can be two dimensional code, bar code or number.
Step S30, detects whether the authentication information matches with the true identity information, to carry out body to user
Part certification;
Then, server detects whether the authentication information matches with true identity information, to carry out identity to user
Certification.
Step S40, it is random to generate door lock password when authentication passes through, and the door lock password is sent to described
User terminal and intelligent door lock corresponding with the intelligent door lock information are opened so that user is based on the door lock password
Lock, and make the intelligent door lock whether consistent by detecting the input password received and the door lock password, it is with determination
No unlocking.
When authentication passes through, i.e., when authentication information is with true identity information matches, then explanation is user
The door lock password of initiation generates request, at this point, then generate door lock password at random, and the door lock password is sent to the user terminal and
Intelligent door lock corresponding with the intelligent door lock information so that user can be unlocked based on the door lock password that this is received, and makes
It is whether consistent by detecting the input password received and the door lock password to obtain intelligent door lock, to determine whether to unlock.Specifically,
Intelligent door lock obtains input password when user executes unlocking operation, then judges when monitoring that user carries out unlocking operation
Whether the input password and door lock password are consistent, if unanimously, unlocking;If inconsistent, can prompt cipher mistake, do not execute out
Lock.
It should be noted that in a particular embodiment, for the pressure for mitigating server, authentication this process can with
Family terminal carries out, and user terminal can show corresponding prompt information after the door lock password for receiving user's triggering generates request
It prompts user to carry out authentication, after user agrees to, then calls corresponding component retrieval authentication information, and then whole from user
Corresponding true identity information is transferred in the pre-stored data library at end or from the pre-stored data library of server, and is detected the identity and recognized
Whether card information matches with true identity information, upon a match, i.e., after authentication passes through, which is generated request and is turned
Issue server.At this point, server determines corresponding user account after receiving the door lock password and generating request;Then root
The intelligent door lock information that association saves is obtained from the presetting database of server according to the user account;Last random generation door lock
Password, and the door lock password is sent to the user terminal and intelligent door lock corresponding with the intelligent door lock information, so that user
The input password and the door lock that can be unlocked based on the door lock password that this is received, and intelligent door lock is received by detection
Whether password is consistent, to determine whether to unlock.
The present invention provides a kind of method for unlocking, when the door lock password for receiving user terminal transmission generates request, according to
The door lock password generates the corresponding user account of request and authentication information;According to the user account in presetting database
Middle lookup is associated with the true identity information and intelligent door lock information saved with the user account;Detect the authentication information and true
Whether real identity information matches, to carry out authentication to user;When authentication passes through, i.e. authentication information and true
It is random to generate door lock password when identity information matches, and the door lock password is sent to the user terminal and is believed with the intelligent door lock
Corresponding intelligent door lock is ceased, so that user can be unlocked based on the door lock password that this is received, and intelligent door lock is passed through
It detects the input password received and whether the door lock password is consistent, to determine whether to unlock.By the above-mentioned means, can avoid existing
Have in technology using fixed door lock cipher, is easy to know and peep the case where stealing by other people, meanwhile, it also can avoid the prior art
It is middle to be unlocked using the personal information such as fingerprint, and user not at the scene when, the case where causing others cannot be introduced into, therefore, phase
Than in existing unlocking mode, the present invention improves ease of use while increasing safety.
Based on above-mentioned first embodiment shown in FIG. 1, the second embodiment of method for unlocking of the present invention is proposed.
Referring to Fig. 3, in the present embodiment, before step S10, can with the following steps are included:
Step 50, it when receiving the information bind request of user terminal transmission, is obtained according to the information bind request
Corresponding user account, true identity information and intelligent door lock information;
Step 60, the user account, true identity information and intelligent door lock information are bound, and is associated with and is stored in
In the presetting database.
In the present embodiment, user wants the dynamic door lock password of application, need to first carry out account registration and information binding, tool
The account registration process of body is similar with existing account logon mode, does not repeat herein.When user is logging in software progress
When information is bound, corresponding informance binding option or button etc. can be clicked, at this point, user terminal interface can show that corresponding information is filled out
Interface is write, the selection including intelligent door lock information solicitation and identity information, wherein the selection of identity information may include face letter
The options such as breath, voice messaging, finger print information and iris information can call corresponding component retrieval true according to the user's choice
Identity information such as calls camera acquisition face information and/or iris information, microphone is called to acquire voice messaging.In addition, by
In unique identification of the intelligent door lock information as intelligent door lock, form can be two dimensional code, bar code or number, therefore, letter
Breath fill in can scan the two-dimensional code or bar code by way of or input number mode complete.When completion true identity information
Intelligent door lock information acquisition after, that is, can trigger information bind request.
At this point, server is obtained when receiving the information bind request of user terminal transmission according to the information bind request
Take corresponding user account, true identity information and intelligent door lock information.Then, by user account, true identity information and intelligence
Energy door lock information is bound, and is associated with and is stored in the presetting database of server.
Further, after to avoid the false intelligent door lock information of user's input from binding or avoid user's erroneous input information
The generation of binding such case is completed, server can to use before binding information by way of sending and verifying password
Input verifying is completed at family on corresponding intelligent door lock, to determine that the intelligent door lock information of user's input is the intelligent door of user family
Lock, specifically, can refer to Fig. 4, Fig. 4 is the flow diagram of method for unlocking 3rd embodiment of the present invention.Before step S60,
The method for unlocking can also include:
Step S70, it is random to generate verifying password, the verifying password is sent to the user terminal and intelligent door lock,
And the first prompt information is sent to the user terminal, to prompt user to carry out input verifying within a preset time;
Step S80, whether monitoring receives the intelligent door lock in the preset time is returned based on the verifying password
That returns is verified information;
If receiving in the preset time and being verified information, S60 is thened follow the steps: by the user account, very
Real identity information is bound with intelligent door lock information, and is associated with and is stored in the presetting database.
In the present embodiment, server gets corresponding user account, true identity information according to information bind request
After intelligent door lock information, verifying password can be generated at random, be then sent to the user terminal the verifying password and intelligent door
Lock, and the first prompt information is sent to user terminal, to prompt user to carry out input verifying within a preset time.It is default to monitor this
Intelligent door lock whether is received in time and is verified information based on what the verifying password returned, i.e., whether monitoring user is default
Input verifying is completed using verifying password in time.Specifically, intelligent door lock is in the verifying password for receiving server transmission
Afterwards, if receiving user within a preset time has input the verifying password, information is verified to server transmission.It is corresponding
, if server has received within a preset time is verified information, illustrate that user completes input and verifies, needed for user
The intelligent door lock information of binding be it is true, at this point, server by user account, true identity information and intelligent door lock information into
Row binding, and it is associated with preservation in the preset database.
If not received in the preset time and being verified information, then follow the steps: refusing the information binding and ask
It asks.
If server do not receive within a preset time intelligent door lock return be verified information, illustrate that user is not complete
It is verified at input, the intelligent door lock information bound needed for user may be false, at this point, server then refuses information binding
Request.
Further, further to ensure the safety unlocked, when the door lock password setting one of dynamic generation can be given effective
Between, so that the door lock password only could be used to unlock within effective time.In the present embodiment, step S10 may include:
When receiving the door lock password generation request of user terminal transmission, the corresponding user of request is generated according to the door lock password
Account, authentication information and password effective time.
At this point, step S40 may include: the random generation door lock password when authentication passes through, and the door lock is close
Code and password effective time are sent to the user terminal and intelligent door lock corresponding with the intelligent door lock information, so that handy
Family is based on the door lock password and unlocks, and the intelligent door lock is received by detecting in the password effective time
Input password and the door lock password it is whether consistent, to determine whether to unlock.
In the present embodiment, when user initiates the generation request of door lock password by the software of user terminal, the door may be selected
Then the door lock password for being provided with effective time is generated request and is sent to service by the effective time (such as 30min) of lock cipher
Device, when server can generate the corresponding user account of request, authentication information and effective password according to the door lock password
Between;Then the true identity information and intelligence for being associated with and saving with the user account are searched in the preset database according to the user account
Energy door lock information, detects whether the authentication information matches with true identity information, to carry out authentication to user;Most
Afterwards, when authentication passes through, i.e., random to generate door lock password when authentication information is with true identity information matches, and will
The door lock password is sent to the user terminal and intelligent door lock corresponding with the intelligent door lock information, so that user can be based on the receipts
To door lock password unlock, and make intelligent door lock by the input password that is received within password effective time of detection with
Whether the door lock password is consistent, to determine whether to unlock.Specifically, intelligent door lock monitored within password effective time user into
When row unlocking operation, input password when user executes unlocking operation is obtained, then judges that the input password and door lock password are
It is no consistent, if unanimously, unlocking;If inconsistent, can prompt cipher mistake, do not execute unlocking.Intelligent door lock receives this certainly
Door lock password rises, and after password effective time (such as 30min), can remove the door lock password automatically;If hereafter receiving again
User inputs the door lock password, does not execute unlocking.Therefore, can further be increased in the present embodiment by setting code effective time
Add safety.
Further, when there is guest temporarily to come to visit, and user stays out etc. under situations, can directly pass through Software Create door
Lock cipher, and it is sent to guest, so that guest can be entered in family by the door lock password.In the present embodiment, step S10 can
To include: to generate request according to the door lock password when the door lock password for receiving user terminal transmission generates request
Corresponding user account, authentication information and designated contact.
At this point, step S40 may include: the random generation door lock password when authentication passes through, and the door lock is close
Code is sent to the designated contact and intelligent door lock corresponding with the intelligent door lock information, so that described instruction contact person
It is unlocked based on the door lock password, and the intelligent door lock is received in password effective time by detecting
It inputs password and whether the door lock password is consistent, to determine whether to unlock.
In the present embodiment, when user initiates the generation request of door lock password by the software of user terminal, the door may be selected
The recipient of lock cipher, i.e. designated contact, wherein it is more that cell-phone number, mailbox etc. may be selected in the set-up mode of the designated contact
Kind form.Then the door lock password for being provided with designated contact is generated into request and is sent to server, server can be according to this
Door lock password generates the corresponding user account of request, authentication information and designated contact.Then according to user's account
The true identity information and intelligent door lock information for being associated with preservation with the user account are searched number in the preset database, detect the body
Whether part authentication information matches with true identity information, to carry out authentication to user;Finally, when authentication passes through,
That is authentication information and when true identity information matches, it is random to generate door lock password, and the door lock password is sent to specified
Contact person and intelligent door lock corresponding with the intelligent door lock information, so that designated contact can be based on the door lock password that this is received
It unlocks, and intelligent door lock is made to be with the door lock password by the input password that detection receives within password effective time
It is no consistent, to determine whether to unlock.Therefore, the door lock password of dynamic generation is sent to by directly in the present embodiment specified
It is people, is forwarded after being obtained without user, user experience can be promoted.
Certainly, in a particular embodiment, password effective time can also be set while designated contact is set, to increase
Add safety.
Further, the respective embodiments described above are based on, which can also include:
When receiving the multiple authentication failure information that the intelligent door lock is sent, corresponding second prompt information is generated,
And it is sent to the user terminal, to inform user.
In the present embodiment, if intelligent door lock monitor the input password that continuous several times receive be it is wrong, at this time
Multiple authentication failure information can be sent to server, at this point, server is in the multiple authentication failure for receiving intelligent door lock transmission
When information, corresponding second prompt information is produced, and be sent to the user terminal, to inform user's situation.Certainly, in intelligence
The devices such as camera can also be set in door lock, or with setting in other positions (position that can preferably photograph door opener's face)
Camera is communicatively coupled, and intelligent door lock is controllable to take the photograph when the input password for monitoring that continuous several times receive is wrong
As head device is shot, to obtain the photo of attacker, and then while sending multiple authentication failure information to server,
The photo taken is also sent into server;Server is when receiving multiple authentication failure information and photo, by photo and
Two prompt informations are sent to the user terminal, to inform user.By the above-mentioned means, malice can be unlocked in time in the present embodiment
Situation is informed to user, so that user recognizes security risk in time.
The present invention also provides a kind of unlocking system, the unlocking system includes memory, processor and is stored in described deposit
On reservoir and the unlocking program that can run on the processor, realized when the unlocking program is executed by the processor as above
The step of described in any item method for unlocking.
The specific embodiment of unlocking system of the present invention and each embodiment of above-mentioned method for unlocking are essentially identical, do not go to live in the household of one's in-laws on getting married herein
It states.
The present invention also provides a kind of computer readable storage mediums.
Unlocking program is stored on computer readable storage medium of the present invention, it is real when the unlocking program is executed by processor
Now the step of method for unlocking as described in any of the above item embodiment.
The specific embodiment of computer readable storage medium of the present invention and each embodiment of above-mentioned method for unlocking are essentially identical,
This is not repeated.
It should be noted that, in this document, the terms "include", "comprise" or its any other variant are intended to non-row
His property includes, so that the process, method, article or the device that include a series of elements not only include those elements, and
And further include other elements that are not explicitly listed, or further include for this process, method, article or device institute it is intrinsic
Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including being somebody's turn to do
There is also other identical elements in the process, method of element, article or device.
The serial number of the above embodiments of the invention is only for description, does not represent the advantages or disadvantages of the embodiments.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side
Method can be realized by means of software and necessary general hardware platform, naturally it is also possible to by hardware, but in many cases
The former is more preferably embodiment.Based on this understanding, technical solution of the present invention substantially in other words does the prior art
The part contributed out can be embodied in the form of software products, which is stored in a storage medium
In (such as ROM/RAM, magnetic disk, CD), including some instructions are used so that a terminal (can be mobile phone, computer, service
Device or the network equipment etc.) execute method described in each embodiment of the present invention.
The embodiment of the present invention is described with above attached drawing, but the invention is not limited to above-mentioned specific
Embodiment, the above mentioned embodiment is only schematical, rather than restrictive, those skilled in the art
Under the inspiration of the present invention, without breaking away from the scope protected by the purposes and claims of the present invention, it can also make very much
Form, all of these belong to the protection of the present invention.
Claims (10)
1. a kind of method for unlocking, which is characterized in that the method for unlocking includes the following steps:
When the door lock password for receiving user terminal transmission generates request, it is corresponding that request is generated according to the door lock password
User account and authentication information;
Searched in the preset database according to the user account be associated with the user account save true identity information and
Intelligent door lock information;
Detect whether the authentication information matches with the true identity information, to carry out authentication to user;
It is random to generate door lock password when authentication passes through, and by the door lock password be sent to the user terminal and with
The corresponding intelligent door lock of the intelligent door lock information is unlocked so that user is based on the door lock password, and is made described
Whether intelligent door lock is consistent by detecting the input password received and the door lock password, to determine whether to unlock.
2. method for unlocking as described in claim 1, which is characterized in that described in the door lock password for receiving user terminal transmission
When generating request, the step of corresponding user account of request and authentication information are generated according to the door lock password it
Before, comprising:
When receiving the information bind request of user terminal transmission, corresponding user's account is obtained according to the information bind request
Number, true identity information and intelligent door lock information;
The user account, true identity information and intelligent door lock information are bound, and is associated with and is stored in the present count
According in library.
3. method for unlocking as claimed in claim 2, which is characterized in that it is described by the user account, true identity information with
Intelligent door lock information is bound, and is associated with and is stored in front of the step in the presetting database, further includes:
It is random to generate verifying password, the verifying password is sent to the user terminal and intelligent door lock, and send first and mention
Show information to the user terminal, to prompt user to carry out input verifying within a preset time;
Whether monitoring receives the intelligent door lock in the preset time is verified based on what the verifying password returned
Information;
If being received in the preset time and being verified information, then follow the steps: the user account, true identity are believed
Breath is bound with intelligent door lock information, and is associated with and is stored in the presetting database.
4. method for unlocking as claimed in claim 3, which is characterized in that whether the monitoring receives in the preset time
The intelligent door lock based on it is described verifying password return the step of being verified information before, further includes:
If not receiving in the preset time and being verified information, refuse the information bind request.
5. method for unlocking as described in claim 1, which is characterized in that described in the door lock password for receiving user terminal transmission
When generating request, the step of corresponding user account of request and authentication information are generated according to the door lock password, packet
It includes:
When the door lock password for receiving user terminal transmission generates request, it is corresponding that request is generated according to the door lock password
User account, authentication information and password effective time;
It is described when authentication passes through, it is random to generate door lock password, and the door lock password is sent to the user terminal
It with intelligent door lock corresponding with the intelligent door lock information, unlocks, and makes so that user is based on the door lock password
Whether the intelligent door lock is consistent by detecting the input password received and the door lock password, to determine whether the step unlocked
Suddenly, comprising:
It is random to generate door lock password when authentication passes through, and the door lock password and password effective time are sent to institute
User terminal and intelligent door lock corresponding with the intelligent door lock information are stated, is opened so that user is based on the door lock password
Lock, and make the intelligent door lock by detecting the input password and the door lock password that receive in the password effective time
It is whether consistent, to determine whether to unlock.
6. method for unlocking as described in claim 1, which is characterized in that described in the door lock password for receiving user terminal transmission
When generating request, the step of corresponding user account of request and authentication information are generated according to the door lock password, also
Include:
When the door lock password for receiving user terminal transmission generates request, it is corresponding that request is generated according to the door lock password
User account, authentication information and designated contact;
It is described when authentication passes through, it is random to generate door lock password, and the door lock password is sent to the user terminal
It with intelligent door lock corresponding with the intelligent door lock information, unlocks, and makes so that user is based on the door lock password
Whether the intelligent door lock is consistent by detecting the input password received and the door lock password, to determine whether the step unlocked
Suddenly, comprising:
It is random to generate door lock password when authentication passes through, and by the door lock password be sent to the designated contact and
Intelligent door lock corresponding with the intelligent door lock information is opened so that described instruction contact person is based on the door lock password
Lock, and make the intelligent door lock by detecting the input password and the door lock password that receive in the password effective time
It is whether consistent, to determine whether to unlock.
7. such as method for unlocking described in any one of claims 1 to 6, which is characterized in that the method for unlocking further include:
When receiving the multiple authentication failure information that the intelligent door lock is sent, corresponding second prompt information is generated, concurrently
It send to the user terminal, to inform user.
8. such as method for unlocking described in any one of claims 1 to 6, which is characterized in that the authentication information and true
Identity information includes one of face information, voice messaging, finger print information and iris information or a variety of.
9. a kind of unlocking system, which is characterized in that the unlocking system includes memory, processor and is stored in the memory
Unlocking program that is upper and can running on the processor, is realized when the unlocking program is executed by the processor as right is wanted
The step of method for unlocking described in asking any one of 1 to 8.
10. a kind of computer readable storage medium, which is characterized in that be stored with unlocking journey on the computer readable storage medium
Sequence is realized when the unlocking program is executed by processor such as the step of method for unlocking described in any item of the claim 1 to 8.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811285026.XA CN109389727A (en) | 2018-10-30 | 2018-10-30 | Method for unlocking, system and computer readable storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811285026.XA CN109389727A (en) | 2018-10-30 | 2018-10-30 | Method for unlocking, system and computer readable storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109389727A true CN109389727A (en) | 2019-02-26 |
Family
ID=65428296
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811285026.XA Pending CN109389727A (en) | 2018-10-30 | 2018-10-30 | Method for unlocking, system and computer readable storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109389727A (en) |
Cited By (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107248111A (en) * | 2017-08-01 | 2017-10-13 | 成都科耐睿科技有限公司 | A kind of system of renting a house based on finger vena identity recognizing technology |
CN110910544A (en) * | 2019-12-17 | 2020-03-24 | 深圳市深华方科技有限公司 | Dynamic password door opening method and door lock |
CN111182535A (en) * | 2019-12-23 | 2020-05-19 | 广东科徕尼智能科技有限公司 | Random code binding method and equipment for intelligent door lock and storage medium |
CN111508107A (en) * | 2020-03-12 | 2020-08-07 | 深圳市科信通信技术股份有限公司 | Intelligent door lock control method and device, computer equipment and storage medium |
CN112330855A (en) * | 2020-10-15 | 2021-02-05 | 成都市以太节点科技有限公司 | Electronic lock safety management method, equipment and system |
CN112383919A (en) * | 2020-11-13 | 2021-02-19 | 歌尔科技有限公司 | Information processing method and device, intelligent doorbell and storage medium |
CN112712612A (en) * | 2019-10-09 | 2021-04-27 | 云丁网络技术(北京)有限公司 | Method, device, computer readable medium and equipment for controlling intelligent door lock |
CN112836550A (en) * | 2019-11-22 | 2021-05-25 | 杭州海康威视数字技术股份有限公司 | Method, device, system, equipment and storage medium for detecting password peeping behavior |
CN112967433A (en) * | 2021-03-03 | 2021-06-15 | 厦门立林科技有限公司 | Illegal intrusion early warning method and system for intelligent access control system |
CN114419764A (en) * | 2022-01-06 | 2022-04-29 | 徐工汉云技术股份有限公司 | System and unlocking method for unlocking vehicle based on TBOX Bluetooth communication |
CN114495333A (en) * | 2022-01-29 | 2022-05-13 | 青岛海信移动通信技术股份有限公司 | Emergency unlocking method, intelligent operation recorder, system and medium |
CN114926922A (en) * | 2022-03-10 | 2022-08-19 | 珠海格力电器股份有限公司 | Control method and control device of intelligent door lock, intelligent door lock and storage medium |
CN114999030A (en) * | 2022-05-25 | 2022-09-02 | 杭州萤石软件有限公司 | Unlocking method, system, electronic equipment and storage medium |
CN116052309A (en) * | 2023-01-06 | 2023-05-02 | 湖南文宝银行设备有限公司 | Intelligent trunk business library remote identity authorization system |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102262793A (en) * | 2010-05-26 | 2011-11-30 | 中兴通讯股份有限公司 | Entrance guard control method and entrance guard control system |
CN105243718A (en) * | 2015-10-29 | 2016-01-13 | 桂林力拓信息科技有限公司 | Control method and system for access control |
CN105847451A (en) * | 2016-06-12 | 2016-08-10 | 深圳益强信息科技有限公司 | Method and system for controlling intelligent access control unit by using mobile terminal |
CN107452106A (en) * | 2017-07-28 | 2017-12-08 | 重庆翼库网络有限公司 | Gate inhibition's back-stage management platform with personalized reward voucher management |
WO2018000264A1 (en) * | 2016-06-29 | 2018-01-04 | 张志慧 | Method and system for managing smart door access by means of mobile terminal and dual fingerprints |
CN107564142A (en) * | 2017-08-14 | 2018-01-09 | 成都法线网络科技有限公司 | A kind of verification method of intelligent entrance guard |
CN107657692A (en) * | 2017-09-12 | 2018-02-02 | 佛山君兰智能科技有限公司 | A kind of temporary password generates system and method |
CN107978047A (en) * | 2017-12-04 | 2018-05-01 | 北京深思数盾科技股份有限公司 | Use the methods, devices and systems of password unlocking |
-
2018
- 2018-10-30 CN CN201811285026.XA patent/CN109389727A/en active Pending
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102262793A (en) * | 2010-05-26 | 2011-11-30 | 中兴通讯股份有限公司 | Entrance guard control method and entrance guard control system |
CN105243718A (en) * | 2015-10-29 | 2016-01-13 | 桂林力拓信息科技有限公司 | Control method and system for access control |
CN105847451A (en) * | 2016-06-12 | 2016-08-10 | 深圳益强信息科技有限公司 | Method and system for controlling intelligent access control unit by using mobile terminal |
WO2018000264A1 (en) * | 2016-06-29 | 2018-01-04 | 张志慧 | Method and system for managing smart door access by means of mobile terminal and dual fingerprints |
CN107452106A (en) * | 2017-07-28 | 2017-12-08 | 重庆翼库网络有限公司 | Gate inhibition's back-stage management platform with personalized reward voucher management |
CN107564142A (en) * | 2017-08-14 | 2018-01-09 | 成都法线网络科技有限公司 | A kind of verification method of intelligent entrance guard |
CN107657692A (en) * | 2017-09-12 | 2018-02-02 | 佛山君兰智能科技有限公司 | A kind of temporary password generates system and method |
CN107978047A (en) * | 2017-12-04 | 2018-05-01 | 北京深思数盾科技股份有限公司 | Use the methods, devices and systems of password unlocking |
Cited By (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107248111A (en) * | 2017-08-01 | 2017-10-13 | 成都科耐睿科技有限公司 | A kind of system of renting a house based on finger vena identity recognizing technology |
CN112712612A (en) * | 2019-10-09 | 2021-04-27 | 云丁网络技术(北京)有限公司 | Method, device, computer readable medium and equipment for controlling intelligent door lock |
CN112836550A (en) * | 2019-11-22 | 2021-05-25 | 杭州海康威视数字技术股份有限公司 | Method, device, system, equipment and storage medium for detecting password peeping behavior |
CN110910544A (en) * | 2019-12-17 | 2020-03-24 | 深圳市深华方科技有限公司 | Dynamic password door opening method and door lock |
CN111182535A (en) * | 2019-12-23 | 2020-05-19 | 广东科徕尼智能科技有限公司 | Random code binding method and equipment for intelligent door lock and storage medium |
CN111182535B (en) * | 2019-12-23 | 2023-08-01 | 广东好太太智能家居有限公司 | Random code binding method, device and storage medium for intelligent door lock |
CN111508107A (en) * | 2020-03-12 | 2020-08-07 | 深圳市科信通信技术股份有限公司 | Intelligent door lock control method and device, computer equipment and storage medium |
CN112330855B (en) * | 2020-10-15 | 2022-06-28 | 成都市以太节点科技有限公司 | Electronic lock safety management method, equipment and system |
CN112330855A (en) * | 2020-10-15 | 2021-02-05 | 成都市以太节点科技有限公司 | Electronic lock safety management method, equipment and system |
CN112383919A (en) * | 2020-11-13 | 2021-02-19 | 歌尔科技有限公司 | Information processing method and device, intelligent doorbell and storage medium |
CN112967433A (en) * | 2021-03-03 | 2021-06-15 | 厦门立林科技有限公司 | Illegal intrusion early warning method and system for intelligent access control system |
CN114419764A (en) * | 2022-01-06 | 2022-04-29 | 徐工汉云技术股份有限公司 | System and unlocking method for unlocking vehicle based on TBOX Bluetooth communication |
CN114495333A (en) * | 2022-01-29 | 2022-05-13 | 青岛海信移动通信技术股份有限公司 | Emergency unlocking method, intelligent operation recorder, system and medium |
CN114926922A (en) * | 2022-03-10 | 2022-08-19 | 珠海格力电器股份有限公司 | Control method and control device of intelligent door lock, intelligent door lock and storage medium |
CN114999030A (en) * | 2022-05-25 | 2022-09-02 | 杭州萤石软件有限公司 | Unlocking method, system, electronic equipment and storage medium |
CN116052309A (en) * | 2023-01-06 | 2023-05-02 | 湖南文宝银行设备有限公司 | Intelligent trunk business library remote identity authorization system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109389727A (en) | Method for unlocking, system and computer readable storage medium | |
JP5727008B2 (en) | Operating system unlocking method and mobile phone | |
CN105429761B (en) | A kind of key generation method and device | |
CN107800672B (en) | Information verification method, electronic equipment, server and information verification system | |
CN107689936B (en) | Security verification system, method and device for login account | |
CN110502886B (en) | Multiple identity authentication method, device, terminal and computer storage medium | |
US10547624B2 (en) | Identity authentication method, apparatus, and system | |
US9411946B2 (en) | Fingerprint password | |
US20130263240A1 (en) | Method for authentication and verification of user identity | |
CN107291432A (en) | Cloud desktop management-control method, device and cloud desktop access method, device | |
US10282532B2 (en) | Secure storage of fingerprint related elements | |
CN109117616B (en) | Verification method and device, electronic equipment and computer readable storage medium | |
CN109245902A (en) | The guard method of instant messaging message authentication codes and device | |
TWI754964B (en) | Authentication system, authentication device, authentication method, and program product | |
CN106650361A (en) | Unblocking method and device | |
CN104820805A (en) | Method and device for burglary prevention of user identity identification card information | |
CN106921655B (en) | Service authorization method and device | |
WO2018137309A1 (en) | Wireless communication processing method and device | |
CN107045442A (en) | The method of controlling switch and system of function button on a kind of Application Program Interface | |
CN109075972A (en) | The system and method for certification and the encryption of cipher anti theft | |
CN106487754A (en) | Authentication method | |
CN111475793A (en) | Access control method, user registration method, user login method, device and equipment | |
JP4316311B2 (en) | Authentication method using logical password, information processing apparatus, program, and recording medium | |
CN106936761A (en) | A kind of secure log authentication method and system based on Quick Response Code and hardware information | |
CN109165490A (en) | A kind of data inputting method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190226 |