CN109389727A - Method for unlocking, system and computer readable storage medium - Google Patents

Method for unlocking, system and computer readable storage medium Download PDF

Info

Publication number
CN109389727A
CN109389727A CN201811285026.XA CN201811285026A CN109389727A CN 109389727 A CN109389727 A CN 109389727A CN 201811285026 A CN201811285026 A CN 201811285026A CN 109389727 A CN109389727 A CN 109389727A
Authority
CN
China
Prior art keywords
door lock
password
information
unlocking
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811285026.XA
Other languages
Chinese (zh)
Inventor
张小娟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nubia Technology Co Ltd
Nanchang Nubia Technology Co Ltd
Original Assignee
Nubia Technology Co Ltd
Nanchang Nubia Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nubia Technology Co Ltd, Nanchang Nubia Technology Co Ltd filed Critical Nubia Technology Co Ltd
Priority to CN201811285026.XA priority Critical patent/CN109389727A/en
Publication of CN109389727A publication Critical patent/CN109389727A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00563Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys using personal physical data of the operator, e.g. finger prints, retinal images, voicepatterns

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The invention discloses a kind of method for unlocking, this method comprises: generating the corresponding user account of request and authentication information according to the door lock password when the door lock password for receiving user terminal transmission generates request;Search the true identity information and intelligent door lock information for being associated with and saving with the user account in the preset database according to the user account;Detect whether the authentication information matches with true identity information, to carry out authentication to user;When authentication passes through, it is random to generate door lock password, and door lock password is sent to the user terminal and intelligent door lock corresponding with intelligent door lock information, it unlocks so that user is based on the door lock password, and make the intelligent door lock whether consistent by detecting the input password received and the door lock password, to determine whether to unlock.The invention also discloses a kind of unlocking system and computer readable storage mediums.The present invention can solve the problems, such as that existing unlocking mode safety is lower.

Description

Method for unlocking, system and computer readable storage medium
Technical field
The present invention relates to unlocking technique field more particularly to a kind of method for unlocking, system and computer readable storage medium.
Background technique
Currently used security door is generally all opened and closed using metal key, that there are keys is inconvenient to carry, The defects of key is easy to be lost, key is maliciously prepared, thus safety is lower.With the continuous development of new technology, go out in recent years Intelligent door lock is showed, user can unlock by inputting password.However, since the password of intelligent door lock is fixed, appearance Easily known or peep to steal by other people, safety is relatively low.Therefore, that there are safeties is lower for existing unlocking mode Problem.
Summary of the invention
It is a primary object of the present invention to propose a kind of method for unlocking, system and computer readable storage medium, it is intended to solve The lower problem of certainly existing unlocking mode safety.
To achieve the above object, the present invention provides a kind of method for unlocking, and the method for unlocking includes the following steps:
When the door lock password for receiving user terminal transmission generates request, request is generated according to the door lock password Corresponding user account and authentication information;
Search the true identity letter for being associated with and saving with the user account in the preset database according to the user account Breath and intelligent door lock information;
Detect whether the authentication information matches with the true identity information, to carry out authentication to user;
It is random to generate door lock password when authentication passes through, and the door lock password is sent to the user terminal It with intelligent door lock corresponding with the intelligent door lock information, unlocks, and makes so that user is based on the door lock password Whether the intelligent door lock is consistent by detecting the input password received and the door lock password, to determine whether to unlock.
Optionally, described when the door lock password for receiving user terminal transmission generates request, according to the door lock password Before the step of generating the corresponding user account of request and authentication information, comprising:
When receiving the information bind request of user terminal transmission, corresponding use is obtained according to the information bind request Family account, true identity information and intelligent door lock information;
The user account, true identity information and intelligent door lock information are bound, and be associated be stored in it is described pre- If in database.
Optionally, described to bind the user account, true identity information and intelligent door lock information, and it is associated with guarantor There are before the step in the presetting database, further includes:
It is random to generate verifying password, the verifying password is sent to the user terminal and intelligent door lock, and transmission the One prompt information is to the user terminal, to prompt user to carry out input verifying within a preset time;
Whether monitoring receives the verifying that the intelligent door lock is returned based on the verifying password in the preset time Pass through information;
If being received in the preset time and being verified information, then follow the steps: by the user account, true body Part information is bound with intelligent door lock information, and is associated with and is stored in the presetting database.
Optionally, whether the monitoring receives the intelligent door lock in the preset time and is based on the verifying password Return the step of being verified information before, further includes:
If not receiving in the preset time and being verified information, refuse the information bind request.
Optionally, described when the door lock password for receiving user terminal transmission generates request, according to the door lock password The step of generating the corresponding user account of request and authentication information, comprising:
When the door lock password for receiving user terminal transmission generates request, request is generated according to the door lock password Corresponding user account, authentication information and password effective time;
It is described when authentication passes through, it is random to generate door lock password, and the door lock password is sent to the user Terminal and intelligent door lock corresponding with the intelligent door lock information are unlocked so that user is based on the door lock password, and So that whether the intelligent door lock is consistent by detecting the input password received and the door lock password, to determine whether to unlock The step of, comprising:
It is random to generate door lock password when authentication passes through, and the door lock password and password effective time are sent To the user terminal and intelligent door lock corresponding with the intelligent door lock information so that user be based on the door lock password into Row is unlocked, and makes the intelligent door lock by detecting the input password and the door lock that receive in the password effective time Whether password is consistent, to determine whether to unlock.
Optionally, described when the door lock password for receiving user terminal transmission generates request, according to the door lock password The step of generating the corresponding user account of request and authentication information, further includes:
When the door lock password for receiving user terminal transmission generates request, request is generated according to the door lock password Corresponding user account, authentication information and designated contact;
It is described when authentication passes through, it is random to generate door lock password, and the door lock password is sent to the user Terminal and intelligent door lock corresponding with the intelligent door lock information are unlocked so that user is based on the door lock password, and So that whether the intelligent door lock is consistent by detecting the input password received and the door lock password, to determine whether to unlock The step of, comprising:
It is random to generate door lock password when authentication passes through, and the door lock password is sent to the specified connection People and intelligent door lock corresponding with the intelligent door lock information, so that described instruction contact person is carried out based on the door lock password It unlocks, and makes the intelligent door lock close by detecting the input password received in the password effective time and the door lock Whether code is consistent, to determine whether to unlock.
Optionally, the method for unlocking further include:
When receiving the multiple authentication failure information that the intelligent door lock is sent, corresponding second prompt information is generated, And it is sent to the user terminal, to inform user.
Optionally, the authentication information and true identity information include face information, voice messaging, finger print information and One of iris information is a variety of.
In addition, to achieve the above object, the present invention also provides a kind of unlocking system, the unlocking system include memory, Processor and it is stored in the unlocking program that can be run on the memory and on the processor, the unlocking program is described The step of processor realizes method for unlocking as described above when executing.
In addition, to achieve the above object, it is described computer-readable the present invention also provides a kind of computer readable storage medium Unlocking program is stored on storage medium, the unlocking program realizes the step of method for unlocking as described above when being executed by processor Suddenly.
The present invention provides a kind of method for unlocking, unlocking system and computer readable storage medium, is receiving user terminal When the door lock password of transmission generates request, the corresponding user account of request is generated according to the door lock password and authentication is believed Breath;It is searched in the preset database according to the user account and is associated with the true identity information saved and intelligent door with the user account Lock information;Detect whether the authentication information matches with true identity information, to carry out authentication to user;When identity is recognized It is when card passes through, i.e., random to generate door lock password when authentication information is with true identity information matches, and the door lock password is sent out It send to user terminal and intelligent door lock corresponding with the intelligent door lock information, so that user can be based on the door lock password that this is received It unlocks, and makes intelligent door lock whether consistent by detecting the input password received and the door lock password, be with determination No unlocking.By the above-mentioned means, can avoid using fixed door lock cipher in the prior art, it is easy to be known and peep to steal by other people The case where, meanwhile, also can avoid unlocking using the personal information such as fingerprint in the prior art, and user not at the scene when, lead The case where causing others cannot be introduced into, therefore, compared to existing unlocking mode, the present invention improves while increasing safety Ease of use.
Detailed description of the invention
Fig. 1 is the terminal structure schematic diagram for the hardware running environment that the embodiment of the present invention is related to;
Fig. 2 is the flow diagram of method for unlocking first embodiment of the present invention;
Fig. 3 is the flow diagram of method for unlocking second embodiment of the present invention;
Fig. 4 is the flow diagram of method for unlocking 3rd embodiment of the present invention.
The object of the invention is realized, the embodiments will be further described with reference to the accompanying drawings for functional characteristics and advantage.
Specific embodiment
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
Referring to Fig.1, Fig. 1 is the terminal structure schematic diagram for the hardware running environment that the embodiment of the present invention is related to.
The terminal of that embodiment of the invention can be server, be also possible to PC (Personal Computer, individual calculus Machine), tablet computer, the terminal devices such as portable computer.
As shown in Figure 1, the terminal may include: processor 1001, such as CPU (Central Processing Unit, Central processing unit), communication bus 1002, user interface 1003, network interface 1004, memory 1005.Wherein, communication bus 1002 for realizing the connection communication between these components.User interface 1003 may include display screen (Display), input list First such as keyboard (Keyboard), optional user interface 1003 can also include standard wireline interface and wireless interface.Network connects Mouth 1004 may include optionally standard wireline interface and wireless interface (such as Wireless Fidelity Wireless-Fidelity, Wi-Fi Interface).Memory 1005 can be high speed RAM memory, be also possible to stable memory (non-volatile ), such as magnetic disk storage memory.Memory 1005 optionally can also be the storage dress independently of aforementioned processor 1001 It sets.
It will be understood by those skilled in the art that the restriction of the not structure paired terminal of terminal structure shown in Fig. 1, can wrap It includes than illustrating more or fewer components, perhaps combines certain components or different component layouts.
As shown in Figure 1, as may include that operating system, network are logical in a kind of memory 1005 of computer storage medium Believe module, Subscriber Interface Module SIM and unlocking program.
In terminal shown in Fig. 1, network interface 1004 is mainly used for connecting background server, carries out with background server Data communication;User interface 1003 is mainly used for connecting client, carries out data communication with client;And processor 1001 can be with For calling the unlocking program stored in memory 1005, and execute following operation:
When the door lock password for receiving user terminal transmission generates request, request is generated according to the door lock password Corresponding user account and authentication information;
Search the true identity letter for being associated with and saving with the user account in the preset database according to the user account Breath and intelligent door lock information;
Detect whether the authentication information matches with the true identity information, to carry out authentication to user;
It is random to generate door lock password when authentication passes through, and the door lock password is sent to the user terminal It with intelligent door lock corresponding with the intelligent door lock information, unlocks, and makes so that user is based on the door lock password Whether the intelligent door lock is consistent by detecting the input password received and the door lock password, to determine whether to unlock.
Further, processor 1001 can call the unlocking program stored in memory 1005, also execute following operation:
When receiving the information bind request of user terminal transmission, corresponding use is obtained according to the information bind request Family account, true identity information and intelligent door lock information;
The user account, true identity information and intelligent door lock information are bound, and be associated be stored in it is described pre- If in database.
Further, processor 1001 can call the unlocking program stored in memory 1005, also execute following operation:
It is random to generate verifying password, the verifying password is sent to the user terminal and intelligent door lock, and transmission the One prompt information is to the user terminal, to prompt user to carry out input verifying within a preset time;
Whether monitoring receives the verifying that the intelligent door lock is returned based on the verifying password in the preset time Pass through information;
If being received in the preset time and being verified information, then follow the steps: by the user account, true body Part information is bound with intelligent door lock information, and is associated with and is stored in the presetting database.
Further, processor 1001 can call the unlocking program stored in memory 1005, also execute following operation:
If not receiving in the preset time and being verified information, refuse the information bind request.
Further, processor 1001 can call the unlocking program stored in memory 1005, also execute following operation:
When the door lock password for receiving user terminal transmission generates request, request is generated according to the door lock password Corresponding user account, authentication information and password effective time;
It is random to generate door lock password when authentication passes through, and the door lock password and password effective time are sent To the user terminal and intelligent door lock corresponding with the intelligent door lock information so that user be based on the door lock password into Row is unlocked, and makes the intelligent door lock by detecting the input password and the door lock that receive in the password effective time Whether password is consistent, to determine whether to unlock.
Further, processor 1001 can call the unlocking program stored in memory 1005, also execute following operation:
When the door lock password for receiving user terminal transmission generates request, request is generated according to the door lock password Corresponding user account, authentication information and designated contact;
It is random to generate door lock password when authentication passes through, and the door lock password is sent to the specified connection People and intelligent door lock corresponding with the intelligent door lock information, so that described instruction contact person is carried out based on the door lock password It unlocks, and makes the intelligent door lock close by detecting the input password received in the password effective time and the door lock Whether code is consistent, to determine whether to unlock.
Further, processor 1001 can call the unlocking program stored in memory 1005, also execute following operation:
When receiving the multiple authentication failure information that the intelligent door lock is sent, corresponding second prompt information is generated, And it is sent to the user terminal, to inform user.
Further, the authentication information and true identity information include face information, voice messaging, finger print information With one of iris information or a variety of.
Based on above-mentioned terminal hardware structure, each embodiment of method for unlocking of the present invention is proposed.
The present invention provides a kind of method for unlocking.
Referring to Fig. 2, Fig. 2 is the flow diagram of method for unlocking first embodiment of the present invention.
In the present embodiment, the method for unlocking includes:
Step S10 is generated when the door lock password for receiving user terminal transmission generates request according to the door lock password The corresponding user account of request and authentication information;
Currently used security door is generally all opened and closed using metal key, that there are keys is inconvenient to carry, The defects of key is easy to be lost, key is maliciously prepared, thus safety is lower.With the continuous development of new technology, go out in recent years Intelligent door lock is showed, user can unlock by inputting password.However, since the password of intelligent door lock is fixed, appearance Easily known or peep to steal by other people, safety is relatively low.Therefore, that there are safeties is lower for existing unlocking mode Problem.For this purpose, providing a kind of method for unlocking in the present embodiment, request is generated in the door lock password for receiving user terminal transmission When, first user identity is authenticated, dynamic door lock password is then generated, and be sent to user terminal, so that user terminal It the door lock password of the dynamic generation can be used to unlock, in this manner, can avoid fixed door lock password and known by other people Know and peep the case where stealing, so as to increase safety, meanwhile, it also can avoid unlocking using personal information such as fingerprints, And user is not at the scene, leads to that others is unapproachable to happen, and ease of use can be improved.
The execution terminal of the present embodiment can be the terminal devices such as server, PC, tablet computer, portable computer, for side Just illustrate, be illustrated by taking server as an example.The server is communicated to connect with user terminal and intelligent door lock respectively, with user Terminal and intelligent door lock carry out sending and receiving for data and information respectively, wherein and the user terminal is equipped with corresponding software, Dynamic door lock password can be obtained by the software.
In the present embodiment, when user needs to unlock, dynamic door lock password can be obtained by logging in software application, due to What the state of software may log in for default, it is close that can equally door lock be got to guarantee safety, after avoiding other people from usurping mobile phone Code, therefore user also needs it to provide authentication information when applying for door lock password, which may include face One of information, voice messaging, finger print information and iris information are a variety of, and type and quantity can initially carry out very in user It is selected when real identity information typing.Specific scene can be with are as follows: user clicks generation door lock password after logging in software Option or button, at this point, mobile terminal can initially carry out the type of selected information when true identity data input according to user And quantity such as calls camera acquisition face information and/or iris letter by calling corresponding component retrieval authentication information Breath, call microphone acquire voice messaging, complete authentication information acquisition after, can trigger gate lock cipher generation ask It asks.
At this point, server is when the door lock password for receiving user terminal transmission generates request, it is raw according to the door lock password At the corresponding user account of request and authentication information, user account is the account that user registers to use in the software Number.
Step S20 is searched in the preset database according to the user account and is associated with the true of preservation with the user account Real identity information and intelligent door lock information;
Server is looked into after getting user account and authentication information according to the user account in the preset database Look for the true identity information and intelligent door lock information for being associated with and saving with the user account.The true identity information is that user is asking When asking user bound account, true identity information and intelligent door lock information, the identity information of the user of institute's typing, the true identity Information may include one of face information, voice messaging, finger print information and iris information or a variety of, the intelligent door lock information For the unique identification of intelligent door lock, form can be two dimensional code, bar code or number.
Step S30, detects whether the authentication information matches with the true identity information, to carry out body to user Part certification;
Then, server detects whether the authentication information matches with true identity information, to carry out identity to user Certification.
Step S40, it is random to generate door lock password when authentication passes through, and the door lock password is sent to described User terminal and intelligent door lock corresponding with the intelligent door lock information are opened so that user is based on the door lock password Lock, and make the intelligent door lock whether consistent by detecting the input password received and the door lock password, it is with determination No unlocking.
When authentication passes through, i.e., when authentication information is with true identity information matches, then explanation is user The door lock password of initiation generates request, at this point, then generate door lock password at random, and the door lock password is sent to the user terminal and Intelligent door lock corresponding with the intelligent door lock information so that user can be unlocked based on the door lock password that this is received, and makes It is whether consistent by detecting the input password received and the door lock password to obtain intelligent door lock, to determine whether to unlock.Specifically, Intelligent door lock obtains input password when user executes unlocking operation, then judges when monitoring that user carries out unlocking operation Whether the input password and door lock password are consistent, if unanimously, unlocking;If inconsistent, can prompt cipher mistake, do not execute out Lock.
It should be noted that in a particular embodiment, for the pressure for mitigating server, authentication this process can with Family terminal carries out, and user terminal can show corresponding prompt information after the door lock password for receiving user's triggering generates request It prompts user to carry out authentication, after user agrees to, then calls corresponding component retrieval authentication information, and then whole from user Corresponding true identity information is transferred in the pre-stored data library at end or from the pre-stored data library of server, and is detected the identity and recognized Whether card information matches with true identity information, upon a match, i.e., after authentication passes through, which is generated request and is turned Issue server.At this point, server determines corresponding user account after receiving the door lock password and generating request;Then root The intelligent door lock information that association saves is obtained from the presetting database of server according to the user account;Last random generation door lock Password, and the door lock password is sent to the user terminal and intelligent door lock corresponding with the intelligent door lock information, so that user The input password and the door lock that can be unlocked based on the door lock password that this is received, and intelligent door lock is received by detection Whether password is consistent, to determine whether to unlock.
The present invention provides a kind of method for unlocking, when the door lock password for receiving user terminal transmission generates request, according to The door lock password generates the corresponding user account of request and authentication information;According to the user account in presetting database Middle lookup is associated with the true identity information and intelligent door lock information saved with the user account;Detect the authentication information and true Whether real identity information matches, to carry out authentication to user;When authentication passes through, i.e. authentication information and true It is random to generate door lock password when identity information matches, and the door lock password is sent to the user terminal and is believed with the intelligent door lock Corresponding intelligent door lock is ceased, so that user can be unlocked based on the door lock password that this is received, and intelligent door lock is passed through It detects the input password received and whether the door lock password is consistent, to determine whether to unlock.By the above-mentioned means, can avoid existing Have in technology using fixed door lock cipher, is easy to know and peep the case where stealing by other people, meanwhile, it also can avoid the prior art It is middle to be unlocked using the personal information such as fingerprint, and user not at the scene when, the case where causing others cannot be introduced into, therefore, phase Than in existing unlocking mode, the present invention improves ease of use while increasing safety.
Based on above-mentioned first embodiment shown in FIG. 1, the second embodiment of method for unlocking of the present invention is proposed.
Referring to Fig. 3, in the present embodiment, before step S10, can with the following steps are included:
Step 50, it when receiving the information bind request of user terminal transmission, is obtained according to the information bind request Corresponding user account, true identity information and intelligent door lock information;
Step 60, the user account, true identity information and intelligent door lock information are bound, and is associated with and is stored in In the presetting database.
In the present embodiment, user wants the dynamic door lock password of application, need to first carry out account registration and information binding, tool The account registration process of body is similar with existing account logon mode, does not repeat herein.When user is logging in software progress When information is bound, corresponding informance binding option or button etc. can be clicked, at this point, user terminal interface can show that corresponding information is filled out Interface is write, the selection including intelligent door lock information solicitation and identity information, wherein the selection of identity information may include face letter The options such as breath, voice messaging, finger print information and iris information can call corresponding component retrieval true according to the user's choice Identity information such as calls camera acquisition face information and/or iris information, microphone is called to acquire voice messaging.In addition, by In unique identification of the intelligent door lock information as intelligent door lock, form can be two dimensional code, bar code or number, therefore, letter Breath fill in can scan the two-dimensional code or bar code by way of or input number mode complete.When completion true identity information Intelligent door lock information acquisition after, that is, can trigger information bind request.
At this point, server is obtained when receiving the information bind request of user terminal transmission according to the information bind request Take corresponding user account, true identity information and intelligent door lock information.Then, by user account, true identity information and intelligence Energy door lock information is bound, and is associated with and is stored in the presetting database of server.
Further, after to avoid the false intelligent door lock information of user's input from binding or avoid user's erroneous input information The generation of binding such case is completed, server can to use before binding information by way of sending and verifying password Input verifying is completed at family on corresponding intelligent door lock, to determine that the intelligent door lock information of user's input is the intelligent door of user family Lock, specifically, can refer to Fig. 4, Fig. 4 is the flow diagram of method for unlocking 3rd embodiment of the present invention.Before step S60, The method for unlocking can also include:
Step S70, it is random to generate verifying password, the verifying password is sent to the user terminal and intelligent door lock, And the first prompt information is sent to the user terminal, to prompt user to carry out input verifying within a preset time;
Step S80, whether monitoring receives the intelligent door lock in the preset time is returned based on the verifying password That returns is verified information;
If receiving in the preset time and being verified information, S60 is thened follow the steps: by the user account, very Real identity information is bound with intelligent door lock information, and is associated with and is stored in the presetting database.
In the present embodiment, server gets corresponding user account, true identity information according to information bind request After intelligent door lock information, verifying password can be generated at random, be then sent to the user terminal the verifying password and intelligent door Lock, and the first prompt information is sent to user terminal, to prompt user to carry out input verifying within a preset time.It is default to monitor this Intelligent door lock whether is received in time and is verified information based on what the verifying password returned, i.e., whether monitoring user is default Input verifying is completed using verifying password in time.Specifically, intelligent door lock is in the verifying password for receiving server transmission Afterwards, if receiving user within a preset time has input the verifying password, information is verified to server transmission.It is corresponding , if server has received within a preset time is verified information, illustrate that user completes input and verifies, needed for user The intelligent door lock information of binding be it is true, at this point, server by user account, true identity information and intelligent door lock information into Row binding, and it is associated with preservation in the preset database.
If not received in the preset time and being verified information, then follow the steps: refusing the information binding and ask It asks.
If server do not receive within a preset time intelligent door lock return be verified information, illustrate that user is not complete It is verified at input, the intelligent door lock information bound needed for user may be false, at this point, server then refuses information binding Request.
Further, further to ensure the safety unlocked, when the door lock password setting one of dynamic generation can be given effective Between, so that the door lock password only could be used to unlock within effective time.In the present embodiment, step S10 may include: When receiving the door lock password generation request of user terminal transmission, the corresponding user of request is generated according to the door lock password Account, authentication information and password effective time.
At this point, step S40 may include: the random generation door lock password when authentication passes through, and the door lock is close Code and password effective time are sent to the user terminal and intelligent door lock corresponding with the intelligent door lock information, so that handy Family is based on the door lock password and unlocks, and the intelligent door lock is received by detecting in the password effective time Input password and the door lock password it is whether consistent, to determine whether to unlock.
In the present embodiment, when user initiates the generation request of door lock password by the software of user terminal, the door may be selected Then the door lock password for being provided with effective time is generated request and is sent to service by the effective time (such as 30min) of lock cipher Device, when server can generate the corresponding user account of request, authentication information and effective password according to the door lock password Between;Then the true identity information and intelligence for being associated with and saving with the user account are searched in the preset database according to the user account Energy door lock information, detects whether the authentication information matches with true identity information, to carry out authentication to user;Most Afterwards, when authentication passes through, i.e., random to generate door lock password when authentication information is with true identity information matches, and will The door lock password is sent to the user terminal and intelligent door lock corresponding with the intelligent door lock information, so that user can be based on the receipts To door lock password unlock, and make intelligent door lock by the input password that is received within password effective time of detection with Whether the door lock password is consistent, to determine whether to unlock.Specifically, intelligent door lock monitored within password effective time user into When row unlocking operation, input password when user executes unlocking operation is obtained, then judges that the input password and door lock password are It is no consistent, if unanimously, unlocking;If inconsistent, can prompt cipher mistake, do not execute unlocking.Intelligent door lock receives this certainly Door lock password rises, and after password effective time (such as 30min), can remove the door lock password automatically;If hereafter receiving again User inputs the door lock password, does not execute unlocking.Therefore, can further be increased in the present embodiment by setting code effective time Add safety.
Further, when there is guest temporarily to come to visit, and user stays out etc. under situations, can directly pass through Software Create door Lock cipher, and it is sent to guest, so that guest can be entered in family by the door lock password.In the present embodiment, step S10 can To include: to generate request according to the door lock password when the door lock password for receiving user terminal transmission generates request Corresponding user account, authentication information and designated contact.
At this point, step S40 may include: the random generation door lock password when authentication passes through, and the door lock is close Code is sent to the designated contact and intelligent door lock corresponding with the intelligent door lock information, so that described instruction contact person It is unlocked based on the door lock password, and the intelligent door lock is received in password effective time by detecting It inputs password and whether the door lock password is consistent, to determine whether to unlock.
In the present embodiment, when user initiates the generation request of door lock password by the software of user terminal, the door may be selected The recipient of lock cipher, i.e. designated contact, wherein it is more that cell-phone number, mailbox etc. may be selected in the set-up mode of the designated contact Kind form.Then the door lock password for being provided with designated contact is generated into request and is sent to server, server can be according to this Door lock password generates the corresponding user account of request, authentication information and designated contact.Then according to user's account The true identity information and intelligent door lock information for being associated with preservation with the user account are searched number in the preset database, detect the body Whether part authentication information matches with true identity information, to carry out authentication to user;Finally, when authentication passes through, That is authentication information and when true identity information matches, it is random to generate door lock password, and the door lock password is sent to specified Contact person and intelligent door lock corresponding with the intelligent door lock information, so that designated contact can be based on the door lock password that this is received It unlocks, and intelligent door lock is made to be with the door lock password by the input password that detection receives within password effective time It is no consistent, to determine whether to unlock.Therefore, the door lock password of dynamic generation is sent to by directly in the present embodiment specified It is people, is forwarded after being obtained without user, user experience can be promoted.
Certainly, in a particular embodiment, password effective time can also be set while designated contact is set, to increase Add safety.
Further, the respective embodiments described above are based on, which can also include:
When receiving the multiple authentication failure information that the intelligent door lock is sent, corresponding second prompt information is generated, And it is sent to the user terminal, to inform user.
In the present embodiment, if intelligent door lock monitor the input password that continuous several times receive be it is wrong, at this time Multiple authentication failure information can be sent to server, at this point, server is in the multiple authentication failure for receiving intelligent door lock transmission When information, corresponding second prompt information is produced, and be sent to the user terminal, to inform user's situation.Certainly, in intelligence The devices such as camera can also be set in door lock, or with setting in other positions (position that can preferably photograph door opener's face) Camera is communicatively coupled, and intelligent door lock is controllable to take the photograph when the input password for monitoring that continuous several times receive is wrong As head device is shot, to obtain the photo of attacker, and then while sending multiple authentication failure information to server, The photo taken is also sent into server;Server is when receiving multiple authentication failure information and photo, by photo and Two prompt informations are sent to the user terminal, to inform user.By the above-mentioned means, malice can be unlocked in time in the present embodiment Situation is informed to user, so that user recognizes security risk in time.
The present invention also provides a kind of unlocking system, the unlocking system includes memory, processor and is stored in described deposit On reservoir and the unlocking program that can run on the processor, realized when the unlocking program is executed by the processor as above The step of described in any item method for unlocking.
The specific embodiment of unlocking system of the present invention and each embodiment of above-mentioned method for unlocking are essentially identical, do not go to live in the household of one's in-laws on getting married herein It states.
The present invention also provides a kind of computer readable storage mediums.
Unlocking program is stored on computer readable storage medium of the present invention, it is real when the unlocking program is executed by processor Now the step of method for unlocking as described in any of the above item embodiment.
The specific embodiment of computer readable storage medium of the present invention and each embodiment of above-mentioned method for unlocking are essentially identical, This is not repeated.
It should be noted that, in this document, the terms "include", "comprise" or its any other variant are intended to non-row His property includes, so that the process, method, article or the device that include a series of elements not only include those elements, and And further include other elements that are not explicitly listed, or further include for this process, method, article or device institute it is intrinsic Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including being somebody's turn to do There is also other identical elements in the process, method of element, article or device.
The serial number of the above embodiments of the invention is only for description, does not represent the advantages or disadvantages of the embodiments.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side Method can be realized by means of software and necessary general hardware platform, naturally it is also possible to by hardware, but in many cases The former is more preferably embodiment.Based on this understanding, technical solution of the present invention substantially in other words does the prior art The part contributed out can be embodied in the form of software products, which is stored in a storage medium In (such as ROM/RAM, magnetic disk, CD), including some instructions are used so that a terminal (can be mobile phone, computer, service Device or the network equipment etc.) execute method described in each embodiment of the present invention.
The embodiment of the present invention is described with above attached drawing, but the invention is not limited to above-mentioned specific Embodiment, the above mentioned embodiment is only schematical, rather than restrictive, those skilled in the art Under the inspiration of the present invention, without breaking away from the scope protected by the purposes and claims of the present invention, it can also make very much Form, all of these belong to the protection of the present invention.

Claims (10)

1. a kind of method for unlocking, which is characterized in that the method for unlocking includes the following steps:
When the door lock password for receiving user terminal transmission generates request, it is corresponding that request is generated according to the door lock password User account and authentication information;
Searched in the preset database according to the user account be associated with the user account save true identity information and Intelligent door lock information;
Detect whether the authentication information matches with the true identity information, to carry out authentication to user;
It is random to generate door lock password when authentication passes through, and by the door lock password be sent to the user terminal and with The corresponding intelligent door lock of the intelligent door lock information is unlocked so that user is based on the door lock password, and is made described Whether intelligent door lock is consistent by detecting the input password received and the door lock password, to determine whether to unlock.
2. method for unlocking as described in claim 1, which is characterized in that described in the door lock password for receiving user terminal transmission When generating request, the step of corresponding user account of request and authentication information are generated according to the door lock password it Before, comprising:
When receiving the information bind request of user terminal transmission, corresponding user's account is obtained according to the information bind request Number, true identity information and intelligent door lock information;
The user account, true identity information and intelligent door lock information are bound, and is associated with and is stored in the present count According in library.
3. method for unlocking as claimed in claim 2, which is characterized in that it is described by the user account, true identity information with Intelligent door lock information is bound, and is associated with and is stored in front of the step in the presetting database, further includes:
It is random to generate verifying password, the verifying password is sent to the user terminal and intelligent door lock, and send first and mention Show information to the user terminal, to prompt user to carry out input verifying within a preset time;
Whether monitoring receives the intelligent door lock in the preset time is verified based on what the verifying password returned Information;
If being received in the preset time and being verified information, then follow the steps: the user account, true identity are believed Breath is bound with intelligent door lock information, and is associated with and is stored in the presetting database.
4. method for unlocking as claimed in claim 3, which is characterized in that whether the monitoring receives in the preset time The intelligent door lock based on it is described verifying password return the step of being verified information before, further includes:
If not receiving in the preset time and being verified information, refuse the information bind request.
5. method for unlocking as described in claim 1, which is characterized in that described in the door lock password for receiving user terminal transmission When generating request, the step of corresponding user account of request and authentication information are generated according to the door lock password, packet It includes:
When the door lock password for receiving user terminal transmission generates request, it is corresponding that request is generated according to the door lock password User account, authentication information and password effective time;
It is described when authentication passes through, it is random to generate door lock password, and the door lock password is sent to the user terminal It with intelligent door lock corresponding with the intelligent door lock information, unlocks, and makes so that user is based on the door lock password Whether the intelligent door lock is consistent by detecting the input password received and the door lock password, to determine whether the step unlocked Suddenly, comprising:
It is random to generate door lock password when authentication passes through, and the door lock password and password effective time are sent to institute User terminal and intelligent door lock corresponding with the intelligent door lock information are stated, is opened so that user is based on the door lock password Lock, and make the intelligent door lock by detecting the input password and the door lock password that receive in the password effective time It is whether consistent, to determine whether to unlock.
6. method for unlocking as described in claim 1, which is characterized in that described in the door lock password for receiving user terminal transmission When generating request, the step of corresponding user account of request and authentication information are generated according to the door lock password, also Include:
When the door lock password for receiving user terminal transmission generates request, it is corresponding that request is generated according to the door lock password User account, authentication information and designated contact;
It is described when authentication passes through, it is random to generate door lock password, and the door lock password is sent to the user terminal It with intelligent door lock corresponding with the intelligent door lock information, unlocks, and makes so that user is based on the door lock password Whether the intelligent door lock is consistent by detecting the input password received and the door lock password, to determine whether the step unlocked Suddenly, comprising:
It is random to generate door lock password when authentication passes through, and by the door lock password be sent to the designated contact and Intelligent door lock corresponding with the intelligent door lock information is opened so that described instruction contact person is based on the door lock password Lock, and make the intelligent door lock by detecting the input password and the door lock password that receive in the password effective time It is whether consistent, to determine whether to unlock.
7. such as method for unlocking described in any one of claims 1 to 6, which is characterized in that the method for unlocking further include:
When receiving the multiple authentication failure information that the intelligent door lock is sent, corresponding second prompt information is generated, concurrently It send to the user terminal, to inform user.
8. such as method for unlocking described in any one of claims 1 to 6, which is characterized in that the authentication information and true Identity information includes one of face information, voice messaging, finger print information and iris information or a variety of.
9. a kind of unlocking system, which is characterized in that the unlocking system includes memory, processor and is stored in the memory Unlocking program that is upper and can running on the processor, is realized when the unlocking program is executed by the processor as right is wanted The step of method for unlocking described in asking any one of 1 to 8.
10. a kind of computer readable storage medium, which is characterized in that be stored with unlocking journey on the computer readable storage medium Sequence is realized when the unlocking program is executed by processor such as the step of method for unlocking described in any item of the claim 1 to 8.
CN201811285026.XA 2018-10-30 2018-10-30 Method for unlocking, system and computer readable storage medium Pending CN109389727A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811285026.XA CN109389727A (en) 2018-10-30 2018-10-30 Method for unlocking, system and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811285026.XA CN109389727A (en) 2018-10-30 2018-10-30 Method for unlocking, system and computer readable storage medium

Publications (1)

Publication Number Publication Date
CN109389727A true CN109389727A (en) 2019-02-26

Family

ID=65428296

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811285026.XA Pending CN109389727A (en) 2018-10-30 2018-10-30 Method for unlocking, system and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN109389727A (en)

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107248111A (en) * 2017-08-01 2017-10-13 成都科耐睿科技有限公司 A kind of system of renting a house based on finger vena identity recognizing technology
CN110910544A (en) * 2019-12-17 2020-03-24 深圳市深华方科技有限公司 Dynamic password door opening method and door lock
CN111182535A (en) * 2019-12-23 2020-05-19 广东科徕尼智能科技有限公司 Random code binding method and equipment for intelligent door lock and storage medium
CN111508107A (en) * 2020-03-12 2020-08-07 深圳市科信通信技术股份有限公司 Intelligent door lock control method and device, computer equipment and storage medium
CN112330855A (en) * 2020-10-15 2021-02-05 成都市以太节点科技有限公司 Electronic lock safety management method, equipment and system
CN112383919A (en) * 2020-11-13 2021-02-19 歌尔科技有限公司 Information processing method and device, intelligent doorbell and storage medium
CN112712612A (en) * 2019-10-09 2021-04-27 云丁网络技术(北京)有限公司 Method, device, computer readable medium and equipment for controlling intelligent door lock
CN112836550A (en) * 2019-11-22 2021-05-25 杭州海康威视数字技术股份有限公司 Method, device, system, equipment and storage medium for detecting password peeping behavior
CN112967433A (en) * 2021-03-03 2021-06-15 厦门立林科技有限公司 Illegal intrusion early warning method and system for intelligent access control system
CN114419764A (en) * 2022-01-06 2022-04-29 徐工汉云技术股份有限公司 System and unlocking method for unlocking vehicle based on TBOX Bluetooth communication
CN114495333A (en) * 2022-01-29 2022-05-13 青岛海信移动通信技术股份有限公司 Emergency unlocking method, intelligent operation recorder, system and medium
CN114926922A (en) * 2022-03-10 2022-08-19 珠海格力电器股份有限公司 Control method and control device of intelligent door lock, intelligent door lock and storage medium
CN114999030A (en) * 2022-05-25 2022-09-02 杭州萤石软件有限公司 Unlocking method, system, electronic equipment and storage medium
CN116052309A (en) * 2023-01-06 2023-05-02 湖南文宝银行设备有限公司 Intelligent trunk business library remote identity authorization system

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102262793A (en) * 2010-05-26 2011-11-30 中兴通讯股份有限公司 Entrance guard control method and entrance guard control system
CN105243718A (en) * 2015-10-29 2016-01-13 桂林力拓信息科技有限公司 Control method and system for access control
CN105847451A (en) * 2016-06-12 2016-08-10 深圳益强信息科技有限公司 Method and system for controlling intelligent access control unit by using mobile terminal
CN107452106A (en) * 2017-07-28 2017-12-08 重庆翼库网络有限公司 Gate inhibition's back-stage management platform with personalized reward voucher management
WO2018000264A1 (en) * 2016-06-29 2018-01-04 张志慧 Method and system for managing smart door access by means of mobile terminal and dual fingerprints
CN107564142A (en) * 2017-08-14 2018-01-09 成都法线网络科技有限公司 A kind of verification method of intelligent entrance guard
CN107657692A (en) * 2017-09-12 2018-02-02 佛山君兰智能科技有限公司 A kind of temporary password generates system and method
CN107978047A (en) * 2017-12-04 2018-05-01 北京深思数盾科技股份有限公司 Use the methods, devices and systems of password unlocking

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102262793A (en) * 2010-05-26 2011-11-30 中兴通讯股份有限公司 Entrance guard control method and entrance guard control system
CN105243718A (en) * 2015-10-29 2016-01-13 桂林力拓信息科技有限公司 Control method and system for access control
CN105847451A (en) * 2016-06-12 2016-08-10 深圳益强信息科技有限公司 Method and system for controlling intelligent access control unit by using mobile terminal
WO2018000264A1 (en) * 2016-06-29 2018-01-04 张志慧 Method and system for managing smart door access by means of mobile terminal and dual fingerprints
CN107452106A (en) * 2017-07-28 2017-12-08 重庆翼库网络有限公司 Gate inhibition's back-stage management platform with personalized reward voucher management
CN107564142A (en) * 2017-08-14 2018-01-09 成都法线网络科技有限公司 A kind of verification method of intelligent entrance guard
CN107657692A (en) * 2017-09-12 2018-02-02 佛山君兰智能科技有限公司 A kind of temporary password generates system and method
CN107978047A (en) * 2017-12-04 2018-05-01 北京深思数盾科技股份有限公司 Use the methods, devices and systems of password unlocking

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107248111A (en) * 2017-08-01 2017-10-13 成都科耐睿科技有限公司 A kind of system of renting a house based on finger vena identity recognizing technology
CN112712612A (en) * 2019-10-09 2021-04-27 云丁网络技术(北京)有限公司 Method, device, computer readable medium and equipment for controlling intelligent door lock
CN112836550A (en) * 2019-11-22 2021-05-25 杭州海康威视数字技术股份有限公司 Method, device, system, equipment and storage medium for detecting password peeping behavior
CN110910544A (en) * 2019-12-17 2020-03-24 深圳市深华方科技有限公司 Dynamic password door opening method and door lock
CN111182535A (en) * 2019-12-23 2020-05-19 广东科徕尼智能科技有限公司 Random code binding method and equipment for intelligent door lock and storage medium
CN111182535B (en) * 2019-12-23 2023-08-01 广东好太太智能家居有限公司 Random code binding method, device and storage medium for intelligent door lock
CN111508107A (en) * 2020-03-12 2020-08-07 深圳市科信通信技术股份有限公司 Intelligent door lock control method and device, computer equipment and storage medium
CN112330855B (en) * 2020-10-15 2022-06-28 成都市以太节点科技有限公司 Electronic lock safety management method, equipment and system
CN112330855A (en) * 2020-10-15 2021-02-05 成都市以太节点科技有限公司 Electronic lock safety management method, equipment and system
CN112383919A (en) * 2020-11-13 2021-02-19 歌尔科技有限公司 Information processing method and device, intelligent doorbell and storage medium
CN112967433A (en) * 2021-03-03 2021-06-15 厦门立林科技有限公司 Illegal intrusion early warning method and system for intelligent access control system
CN114419764A (en) * 2022-01-06 2022-04-29 徐工汉云技术股份有限公司 System and unlocking method for unlocking vehicle based on TBOX Bluetooth communication
CN114495333A (en) * 2022-01-29 2022-05-13 青岛海信移动通信技术股份有限公司 Emergency unlocking method, intelligent operation recorder, system and medium
CN114926922A (en) * 2022-03-10 2022-08-19 珠海格力电器股份有限公司 Control method and control device of intelligent door lock, intelligent door lock and storage medium
CN114999030A (en) * 2022-05-25 2022-09-02 杭州萤石软件有限公司 Unlocking method, system, electronic equipment and storage medium
CN116052309A (en) * 2023-01-06 2023-05-02 湖南文宝银行设备有限公司 Intelligent trunk business library remote identity authorization system

Similar Documents

Publication Publication Date Title
CN109389727A (en) Method for unlocking, system and computer readable storage medium
JP5727008B2 (en) Operating system unlocking method and mobile phone
CN105429761B (en) A kind of key generation method and device
CN107800672B (en) Information verification method, electronic equipment, server and information verification system
CN107689936B (en) Security verification system, method and device for login account
CN110502886B (en) Multiple identity authentication method, device, terminal and computer storage medium
US10547624B2 (en) Identity authentication method, apparatus, and system
US9411946B2 (en) Fingerprint password
US20130263240A1 (en) Method for authentication and verification of user identity
CN107291432A (en) Cloud desktop management-control method, device and cloud desktop access method, device
US10282532B2 (en) Secure storage of fingerprint related elements
CN109117616B (en) Verification method and device, electronic equipment and computer readable storage medium
CN109245902A (en) The guard method of instant messaging message authentication codes and device
TWI754964B (en) Authentication system, authentication device, authentication method, and program product
CN106650361A (en) Unblocking method and device
CN104820805A (en) Method and device for burglary prevention of user identity identification card information
CN106921655B (en) Service authorization method and device
WO2018137309A1 (en) Wireless communication processing method and device
CN107045442A (en) The method of controlling switch and system of function button on a kind of Application Program Interface
CN109075972A (en) The system and method for certification and the encryption of cipher anti theft
CN106487754A (en) Authentication method
CN111475793A (en) Access control method, user registration method, user login method, device and equipment
JP4316311B2 (en) Authentication method using logical password, information processing apparatus, program, and recording medium
CN106936761A (en) A kind of secure log authentication method and system based on Quick Response Code and hardware information
CN109165490A (en) A kind of data inputting method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190226