CN109523661A - Security monitoring method, device, system, server and readable storage medium - Google Patents
Security monitoring method, device, system, server and readable storage medium Download PDFInfo
- Publication number
- CN109523661A CN109523661A CN201811222031.6A CN201811222031A CN109523661A CN 109523661 A CN109523661 A CN 109523661A CN 201811222031 A CN201811222031 A CN 201811222031A CN 109523661 A CN109523661 A CN 109523661A
- Authority
- CN
- China
- Prior art keywords
- door lock
- server
- unlocking
- opened
- time
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000012544 monitoring process Methods 0.000 title claims abstract description 41
- 238000000034 method Methods 0.000 title claims abstract description 37
- 230000002159 abnormal effect Effects 0.000 claims abstract description 22
- 238000004891 communication Methods 0.000 claims description 93
- 230000006870 function Effects 0.000 claims description 42
- 238000004590 computer program Methods 0.000 claims description 13
- 230000009471 action Effects 0.000 claims description 10
- 238000012806 monitoring device Methods 0.000 claims description 5
- 230000006399 behavior Effects 0.000 abstract description 12
- 238000010586 diagram Methods 0.000 description 16
- 230000005540 biological transmission Effects 0.000 description 11
- 230000008569 process Effects 0.000 description 7
- 238000012545 processing Methods 0.000 description 7
- 238000012986 modification Methods 0.000 description 5
- 230000004048 modification Effects 0.000 description 5
- 238000004458 analytical method Methods 0.000 description 2
- 238000007405 data analysis Methods 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 238000012795 verification Methods 0.000 description 2
- 230000004075 alteration Effects 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000009434 installation Methods 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 238000005065 mining Methods 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 238000011160 research Methods 0.000 description 1
- 230000004044 response Effects 0.000 description 1
- 238000012216 screening Methods 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
- 239000007787 solid Substances 0.000 description 1
- 230000001960 triggered effect Effects 0.000 description 1
- 239000002699 waste material Substances 0.000 description 1
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00571—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Lock And Its Accessories (AREA)
- Alarm Systems (AREA)
Abstract
The invention discloses a safety monitoring method, a device, a system, a server and a readable storage medium, wherein the method comprises the following steps: if the fact that the door lock connected with the server is opened is recognized, acquiring the time when the door lock is opened; judging whether the time for opening the door lock is within a normal unlocking time period corresponding to the door lock which is preserved in advance; if not, the prompt information that the door lock is opened within the abnormal unlocking time period is pushed to the user terminal corresponding to the door lock. When the door lock connected with the server is opened, if the time for opening the door lock is not within the pre-stored normal unlocking time period, the user terminal corresponding to the door lock is prompted that the door lock is opened within the abnormal unlocking time period, so that a user of the user terminal can know that unsafe unlocking behaviors exist in time, and the safety of the environment where the door lock is located is improved to a certain extent.
Description
Technical Field
The invention relates to the technical field of smart home, in particular to a safety monitoring method, a safety monitoring device, a safety monitoring system, a safety monitoring server and a readable storage medium.
Background
The existing intelligent door lock provides multiple unlocking modes for users, such as fingerprint unlocking, password unlocking and the like, and greatly facilitates the life of people. However, at present, there is no reasonable mechanism for monitoring whether the unlocking behavior of the door lock is safe, which results in greatly reduced safety of the environment where the door lock is located.
Disclosure of Invention
The invention provides a security monitoring method, a security monitoring device, a security monitoring system, a server and a readable storage medium, which are used for solving the problem of low security of the environment where a door lock is located in the prior art.
The invention provides a safety monitoring method, which is applied to a server and comprises the following steps:
if the fact that the door lock connected with the server is opened is recognized, acquiring the time when the door lock is opened;
judging whether the time for opening the door lock is within a normal unlocking time period corresponding to the door lock which is preserved in advance;
if not, the prompt information that the door lock is opened within the abnormal unlocking time period is pushed to the user terminal corresponding to the door lock.
Further, the process of recognizing that the door lock connected to the server is opened includes:
and if unlocking data sent by a door lock connected with the server is received, determining that the door lock is opened, wherein the unlocking data is sent after the door lock identifies that the lock core built-in circuit of the door lock completes the unlocking action.
Further, the acquiring the time when the door lock is opened comprises:
and determining the time when the unlocking data is received as the time when the door lock is opened.
Further, if the unlocking data carries the time when the door lock is opened, the acquiring the time when the door lock is opened includes:
and acquiring the time when the door lock is opened in the unlocking data.
Further, if the unlocking data is encrypted data, the obtaining the time when the door lock is opened in the unlocking data includes:
and decrypting the unlocking data, and acquiring the time of the door lock being opened from the decrypted unlocking data.
Further, if the unlocking data is encrypted by an encryption key and/or an encryption function, the decrypting the unlocking data includes:
decrypting the unlocking data by adopting a decryption key corresponding to the encryption key; and/or
And decrypting the unlocking data by adopting a decryption function corresponding to the encryption function.
Further, receiving unlocking data sent by a door lock connected with the server comprises:
and receiving unlocking data sent by a door lock connected with the server in a preset communication mode, wherein the preset communication mode comprises wireless fidelity (WiFi) communication or ZigBee communication.
Further, if ZigBee communication is adopted, the receiving unlocking data sent by the door lock connected to the server includes:
and receiving unlocking data sent by a door lock connected with the server through the ZigBee gateway and the router.
Further, the method further comprises:
and storing the received unlocking data.
The invention provides a safety monitoring device, which is applied to a server and comprises:
the acquisition module is used for acquiring the time when the door lock connected with the server is opened if the door lock connected with the server is identified to be opened;
the judging module is used for judging whether the time for opening the door lock is within the normal unlocking time period corresponding to the door lock which is stored in advance; if not, triggering a pushing module;
the pushing module is used for pushing prompt information that the door lock is opened within an abnormal unlocking time period to a user terminal corresponding to the door lock.
Further, the obtaining module is specifically configured to determine that the door lock is opened if unlocking data sent by the door lock connected to the server is received, where the unlocking data is sent after the door lock recognizes that the lock cylinder built-in circuit of the door lock completes an unlocking action.
Further, the obtaining module is specifically configured to determine a time when the unlocking data is received as a time when the door lock is opened.
Further, if the unlocking data carries the time when the door lock is opened, the obtaining module is specifically configured to obtain the time when the door lock is opened in the unlocking data.
Further, if the unlocking data is encrypted data, the obtaining module is specifically configured to decrypt the unlocking data, and obtain the time when the door lock is opened from the decrypted unlocking data.
Further, if the unlocking data is encrypted by an encryption key and/or an encryption function, the obtaining module is specifically configured to decrypt the unlocking data by using a decryption key corresponding to the encryption key; and/or decrypting the unlocking data by adopting a decryption function corresponding to the encryption function.
Further, the obtaining module is specifically configured to receive unlocking data sent by a door lock connected to the server in a preset communication mode, where the preset communication mode includes wireless fidelity WiFi communication or ZigBee communication.
Further, if the ZigBee communication is adopted, the obtaining module is specifically used for receiving unlocking data sent by a door lock connected with the server through the ZigBee gateway and the router.
Further, the apparatus further comprises:
and the storage module is used for storing the received unlocking data.
The present invention provides a server, comprising: the system comprises a processor, a communication interface, a memory and a communication bus, wherein the processor, the communication interface and the memory complete mutual communication through the communication bus;
the memory has stored therein a computer program which, when executed by the processor, causes the processor to perform the steps of any of the methods described above.
The present invention provides a computer readable storage medium storing a computer program executable by a server, the program, when run on the server, causing the server to perform the steps of any of the methods described above.
The invention provides a safety monitoring system, which comprises a door lock, a server and a user terminal, wherein the door lock is arranged on the server; wherein,
the server is used for acquiring the time when the door lock connected with the server is opened if the door lock is identified to be opened; judging whether the time for opening the door lock is within a normal unlocking time period corresponding to the door lock which is preserved in advance; if not, pushing prompt information that the door lock is opened within an abnormal unlocking time period to a user terminal corresponding to the door lock;
and the user terminal is used for receiving prompt information that the door lock is opened within an abnormal unlocking time period.
Further, the door lock is specifically used for sending unlocking data if the lock core built-in circuit of the door lock is recognized to complete the unlocking action;
the server is specifically configured to determine that the door lock is opened if unlocking data sent by the door lock connected to the server is received.
Further, the server is specifically configured to determine a time when the unlocking data is received as a time when the door lock is opened.
Further, the server is specifically configured to, if the unlocking data carries the time when the door lock is opened, obtain, in the unlocking data, the time when the door lock is opened.
Further, the server is specifically configured to decrypt the unlocking data if the unlocking data is encrypted data, and obtain the time when the door lock is opened in the decrypted unlocking data.
Further, the server is specifically configured to decrypt the unlocking data by using a decryption key corresponding to the encryption key if the unlocking data is encrypted by using an encryption key and/or an encryption function; and/or decrypting the unlocking data by adopting a decryption function corresponding to the encryption function.
Further, the door lock is specifically used for sending unlocking data in a preset communication mode, wherein the preset communication mode comprises wireless fidelity (WiFi) communication or ZigBee communication;
the server is specifically used for receiving unlocking data sent by the door lock in a preset communication mode.
Furthermore, the system also comprises a ZigBee gateway and a router;
the door lock is specifically used for sending unlocking data through a ZigBee gateway and a router if ZigBee communication is adopted;
the server is specifically used for receiving unlocking data sent by the door lock through the ZigBee gateway and the router.
Further, the server is further configured to store the received unlocking data.
The invention provides a safety monitoring method, a device, a system, a server and a readable storage medium, wherein the method comprises the following steps: if the fact that the door lock connected with the server is opened is recognized, acquiring the time when the door lock is opened; judging whether the time for opening the door lock is within a normal unlocking time period corresponding to the door lock which is preserved in advance; if not, the prompt information that the door lock is opened within the abnormal unlocking time period is pushed to the user terminal corresponding to the door lock. When the door lock connected with the server is opened, if the time for opening the door lock is not within the pre-stored normal unlocking time period, the user terminal corresponding to the door lock is prompted that the door lock is opened within the abnormal unlocking time period, so that a user of the user terminal can know that unsafe unlocking behaviors exist in time, and the safety of the environment where the door lock is located is improved to a certain extent.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a schematic diagram of a security monitoring process provided in embodiment 1 of the present invention;
fig. 2 is a schematic diagram of a data transmission process according to embodiment 5 of the present invention;
fig. 3 is a schematic structural diagram of a security monitoring system according to embodiment 7 of the present invention;
fig. 4 is a schematic structural diagram of a security monitoring system according to embodiment 7 of the present invention;
fig. 5 is a schematic structural diagram of a server according to embodiment 8 of the present invention;
fig. 6 is a schematic diagram of a safety monitoring device according to an embodiment of the present invention.
Detailed Description
In order to facilitate a user terminal user to obtain unsafe unlocking behaviors in time and improve the safety of the environment where the door lock is located, the embodiment of the invention provides a safety monitoring method, a device, a system, a server and a readable storage medium.
In order to make the objects, technical solutions and advantages of the present invention clearer, the present invention will be described in further detail with reference to the accompanying drawings, and it is apparent that the described embodiments are only a part of the embodiments of the present invention, not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Example 1:
fig. 1 is a schematic diagram of a security monitoring process according to an embodiment of the present invention, where the process includes the following steps:
s101: and if the fact that the door lock connected with the server is opened is recognized, acquiring the time when the door lock is opened.
The security monitoring method provided by the embodiment of the invention is applied to a server, the server is connected with one or more door locks, the connection mode of the server and the door locks can determine the communication mode between the server and the door locks, the server can store the identification information of the door locks connected with the server, and the identification information of the door locks can be information which can uniquely identify the door locks, such as communication address information of the door locks.
When the server is performing security monitoring, the security monitoring may be performed on one door lock, may be performed on a plurality of door locks, and if the security monitoring is performed on the plurality of door locks, the security monitoring is performed on each of the plurality of door locks.
The server can identify whether the door lock connected with the server is opened, for example, when the door lock identifies that the server is opened, the server mainly sends information of door lock opening or unlocking data to the connected server, if the information of door lock opening or unlocking data sent by the door lock is received, the server considers that the door lock is opened, otherwise, the server considers that the door lock is not opened; the server may send an inquiry request to the door lock connected to the server at a set time interval, determine that the door lock is opened if an already opened response replied by the door lock is received, and otherwise, consider that the door lock is not opened, and the like.
If the server recognizes that the door lock connected with the server is opened, the server acquires the time when the opened door lock is opened, when the server acquires the time when the door lock is opened, the server determines the time when the door lock is opened as the time when the door lock is opened, the server can actively transmit the time when the door lock is opened to the server, the server determines the time when the door lock is transmitted as the time when the door lock is opened, and the like. The Time that the door lock is opened may be UTC (coordinated universal Time).
S102: judging whether the time for opening the door lock is within a normal unlocking time period corresponding to the door lock which is preserved in advance; if not, S103 is carried out; if so, proceed to S104.
The server stores in advance a normal unlocking time period corresponding to the door lock connected thereto, and specifically, may store a correspondence relationship between identification information of each door lock connected to the server and the normal start time period, so that the server can determine the normal unlocking time period corresponding to the opened door lock.
The normal unlocking time period corresponding to the door lock pre-stored in the server can be set by the user, can be stored by the server according to the habit of using the door lock of the user acquired within the set time period, and the like.
And after the server acquires the time for opening the door lock, judging whether the time for opening the door lock is within a normal unlocking time period corresponding to the door lock, and executing different steps according to different judgment results.
S103: and pushing prompt information that the door lock is opened within an abnormal unlocking time period to a user terminal corresponding to the door lock.
If the time for opening the door lock is not within the normal unlocking time period corresponding to the door lock, the door lock can be considered to be opened within the abnormal unlocking time period, and in order to improve the safety of the environment where the door lock is located, prompt information for opening the door lock within the abnormal unlocking time period can be pushed to a user terminal corresponding to the door lock, so that a user of the user terminal can know that unsafe unlocking behaviors exist in time and perform corresponding processing.
The server also stores a user terminal corresponding to the door lock, and the user terminal may be a user terminal used by a user, a manager, or the like for monitoring the door lock. Specifically, the server may store in advance a correspondence between identification information of the door lock and identification information of the user terminal, and the identification information of the user terminal may include information that can uniquely identify the user terminal, such as communication address information of the user terminal.
S104: the push of the prompt information is not performed.
If the time when the door lock is opened is within the normal unlocking time period corresponding to the door lock, the door lock can be considered to be opened within the normal unlocking time period, and the prompt message can not be pushed at the moment in order to avoid pushing the message to disturb the user every time the door lock is opened.
When the door lock connected with the server is opened in the embodiment of the invention, if the time for opening the door lock is not within the pre-stored normal unlocking time period, the user terminal corresponding to the door lock is prompted that the door lock is opened within the abnormal unlocking time period, so that a user of the user terminal can know that unsafe unlocking behaviors exist in time, and the safety of the environment where the door lock is located is improved to a certain extent.
Example 2:
in order to improve the real-time performance of security monitoring and save network resources, on the basis of the foregoing embodiments, in an embodiment of the present invention, a process of identifying that a door lock connected to the server is opened includes:
and if unlocking data sent by a door lock connected with the server is received, determining that the door lock is opened, wherein the unlocking data is sent after the door lock identifies that the lock core built-in circuit of the door lock completes the unlocking action.
If the server inquires whether the door lock is opened or not according to the set time interval, the fact that the door lock is opened cannot be timely recognized, and before the fact that the door lock is opened is recognized, the server may send inquiry requests for multiple times, waste of network resources is caused, therefore, when the door lock determines that the door lock is opened, unlocking data can be actively sent to the server, the server is informed that the door lock is opened timely, and the network resources can be saved.
The door lock is provided with a lock cylinder built-in circuit, the door lock can identify whether the lock cylinder built-in circuit completes unlocking action, when the door lock identifies that the lock cylinder built-in circuit of the door lock completes the unlocking action, the door lock determines that the door lock is opened, the unlocking data acquired by the door lock is sent to a connected server, and the server receives the unlocking data sent by the door lock and determines that the door lock is opened.
The process of identifying whether the unlocking action is completed by the door lock belongs to the prior art, and is not described in detail in the embodiment of the invention.
If the server does not receive the unlocking data sent by the door lock, the door lock can be considered not to be opened.
The unlocking data of the door lock can be simultaneously sent to the user terminal when the server pushes the prompt message to the user terminal, and a user using the user terminal can judge whether the unlocking behavior is abnormal or not according to the unlocking data.
According to the embodiment of the invention, the unlocking data is sent to the server after the door lock is determined to be opened, and the server determines that the door lock is opened, so that the real-time performance of safety monitoring can be improved, and network resources can be saved.
Example 3:
on the basis of the foregoing embodiments, in an embodiment of the present invention, the acquiring the time when the door lock is opened includes:
and determining the time when the unlocking data is received as the time when the door lock is opened.
If the unlocking data carries the time when the door lock is opened, the acquiring the time when the door lock is opened comprises:
and acquiring the time when the door lock is opened in the unlocking data.
In order to improve the flexibility of safety monitoring, the embodiment of the invention provides various modes for acquiring the time when the door lock is opened.
The server can obtain and record the time of receiving the unlocking data when receiving the unlocking data sent by the door lock, and determine the time of receiving the unlocking data as the time of opening the door lock.
The unlock data may or may not carry the time the door lock was opened. Whether the unlocking data carries the time when the door lock is opened or not, the server can determine the time when the unlocking data is received as the time when the door lock is opened.
Of course, in order to improve the accuracy of security monitoring, the door lock may carry the time when the door lock is opened in the unlocking data and send the unlocking data to the server when determining that the door lock is opened, and at this time, the server receives the unlocking data and carries the time when the door lock is opened.
If the server confirms that the received unlocking data carries the time when the door lock is opened, the server can acquire the time when the door lock is opened from the unlocking data, and specifically, the time when the door lock carried in the unlocking data is opened can be determined as the time when the door lock is opened. At the moment, when the server judges whether the subsequent time for opening the door lock is within the normal unlocking time period corresponding to the door lock, a more accurate judgment result can be obtained, and the accuracy of safety monitoring is never improved.
In addition, the unlocking data may also include identification information of the door lock, such as communication address information of the door lock, identification information of a family to which the door lock belongs, a location position where the door lock is located, an unlocking mode of the door lock, and the like. If the unlocking data of the door lock is sent to the user terminal at the same time, a user using the user terminal can judge whether the unlocking behavior is abnormal according to the unlocking data, the user can determine which door lock in which family the door lock belongs to according to the identification information of the family to which the door lock belongs and the positioning position of the door lock, and can more visually determine the position of the door lock, for example, the door lock can be used as a bedroom door lock in a family, a hotel or an industrial park and the like, a door lock of a guest room or a park gate and the like, and the user can determine whether the unlocking behavior is an unlocking mode commonly used by the user in the environment where the door lock is located according to the unlocking mode of the door lock and the like. The unlocking mode of the door lock comprises at least one of password unlocking, fingerprint unlocking, iris unlocking, face unlocking and the like.
The unlocking data can be transmitted in a plaintext mode in the transmission process, and in order to guarantee data safety, ciphertext transmission can be adopted, namely encrypted unlocking data are transmitted.
The embodiment of the invention provides a plurality of modes for acquiring the time when the door lock is opened, thereby improving the flexibility of safety monitoring.
Example 4:
in order to ensure the security of the unlocking data and improve the accuracy of security monitoring, on the basis of the above embodiments, in an embodiment of the present invention, if the unlocking data is encrypted data, the acquiring, in the unlocking data, the time when the door lock is opened includes:
and decrypting the unlocking data, and acquiring the time of the door lock being opened from the decrypted unlocking data.
If the unlocking data is encrypted by an encryption key and/or an encryption function, the decrypting the unlocking data comprises:
decrypting the unlocking data by adopting a decryption key corresponding to the encryption key; and/or
And decrypting the unlocking data by adopting a decryption function corresponding to the encryption function.
If the unlocking data is transmitted in a plaintext, the unlocking data is easy to intercept or tamper, and the result of safety monitoring is possibly deviated, so that the unlocking data can be encrypted in order to ensure the safety of the unlocking data and improve the safety of the safety monitoring.
If the unlocking data is encrypted data, in order to ensure that the time for obtaining the door lock opening time in the unlocking data is accurately obtained, the server can decrypt the unlocking data firstly and obtain the time for obtaining the door lock opening time in the decrypted unlocking data.
The server can decrypt by adopting a decryption mode corresponding to the encryption mode in the unlocking data encryption process when decrypting, and the unlocking data in the form of the ciphertext is restored into the plaintext.
If the unlock data is encrypted by the encryption key, the server may decrypt with a decryption key corresponding to the encryption key. The encryption key may be the same or different from the corresponding decryption key.
If the unlocking data is encrypted through the encryption function, the server can decrypt through a decryption function corresponding to the encryption function. The encryption function may be the same or different from the corresponding decryption key.
If the unlocking data is decrypted through the encryption key and the encryption function, the server can decrypt by adopting the decryption key corresponding to the encryption key and the decryption function corresponding to the encryption function. It should be noted that, in the decryption, the order of decryption using the decryption key and the decryption function should be opposite to the order of encryption using the encryption key and the encryption function.
In order to further ensure the security of security monitoring, before the unlocking data is decrypted, the user information or the network information may be verified, and after the verification is passed, the subsequent decryption operation may be performed.
Taking the verification of the network information as an example, it may be verified whether the transmission network is a preset communication network, whether the communication address information of the transmitting end, i.e., the door lock, is correct when the transmission network is the preset communication network, and the like.
In the embodiment of the invention, the data encryption technology is adopted when the data is transmitted between the devices, the command is converted into the ciphertext through the encryption key and the encryption function, and the plaintext is restored by using the decryption key and the function at the receiving end, so that the possibility of tampering the data in the transmission process is reduced, the safety in the command transmission process is ensured, and the safety of safety monitoring is also improved.
Example 5:
in addition to the above embodiments, in an embodiment of the present invention, the receiving the unlocking data transmitted by the door lock connected to the server includes:
and receiving unlocking data sent by a door lock connected with the server in a preset communication mode, wherein the preset communication mode comprises WiFi (Wireless-Fidelity) communication or ZigBee communication.
If ZigBee communication is adopted, the receiving unlocking data sent by the door lock connected with the server comprises the following steps:
and receiving unlocking data sent by a door lock connected with the server through the ZigBee gateway and the router.
In order to improve the flexibility of security monitoring, the embodiment of the invention provides a plurality of communication modes for data transmission between devices.
When the door lock sends the unlocking data to the server, the unlocking data can be sent to the server by adopting a preset communication mode, correspondingly, the server can receive the unlocking data sent by the door lock by adopting the preset communication mode, and certainly, the server can also receive the unlocking data without adopting the preset communication mode and is related to the connection relation between the door lock and the server during deployment.
The preset communication mode can be WiFi communication or ZigBee communication.
Because the WiFi communication is not limited by distance, the short-distance and long-distance communication is supported, and therefore if the environment where the door lock is located is wide, the WiFi communication can be adopted.
If the lock adopts the wiFi communication to send the data of unblanking to the server, if the server is located same environment with the lock, then the lock can adopt the wiFi communication directly to send the data of unblanking to the server, if the server is not located same environment with the lock, then the lock can adopt the wiFi communication, and data of unblanking is forwardded to the server through the router, and the server can be regarded as the cloud platform this moment.
ZigBee is a wireless network protocol for low-speed short-distance transmission. It is similar to bluetooth and has the characteristics of low power consumption, low cost, low speed, short distance, short time delay, high capacity and the like. Therefore, if the range of the environment where the door lock is located is not large, in order to reduce installation cost and power consumption, ZigBee communication can be adopted.
If the door lock adopts ZigBee communication to send the unlocking data to the server, if the server and the door lock are located in the same environment, the door lock can adopt ZigBee communication to forward the unlocking data to the server through a ZigBee gateway, if the server and the door lock are not located in the same environment, the door lock can adopt ZigBee communication to forward the unlocking data to the server through the ZigBee gateway and the router, at the moment, the server can be regarded as a cloud platform, as shown in figure 2, at the moment, the unlocking data can be transmitted in an encrypted mode.
The embodiment of the invention provides a plurality of communication modes for data transmission between devices, thereby improving the flexibility of safety monitoring.
Example 6:
in order to implement subsequent analysis and tracking of user requirements and improve user experience, on the basis of the above embodiments, in the embodiment of the present invention, the method further includes:
and storing the received unlocking data.
The server can preserve received unlocking data, collects mass data through preserving user unlocking data, and after screening and mining, carries out big data analysis on effective data, can carry out safety monitoring, and a series of after-sale behaviors such as market research and accurate propelling movement realize follow-up analysis and tracking to user's demand, can improve user experience better.
When the server stores the unlocking data, the unlocking data and the door lock can be correspondingly stored, and when the unlocking data is stored, the unlocking data and the door lock can be stored in a database in a data serialization mode.
The server saves the unlocking data, wherein the unlocking data can be encrypted and decrypted, so that the unlocking data can be decrypted at the time of avoiding subsequent data analysis, processing resources are wasted, and the decrypted unlocking data can be saved.
A media platform is provided for the integral home network operating system to carry out external communication, so that communication between 'internal' and 'external' is realized, and the requirements of remote control, uploading and information exchange are met.
In the whole user behavior record uploading process, the ends are tightly connected and are buckled with each other, so that the safety and the transmission efficiency are ensured.
Example 7:
on the basis of the foregoing embodiments, fig. 3 is a security monitoring system provided in an embodiment of the present invention, where the system includes a door lock 301, a server 302, and a user terminal 303; wherein,
a server 302, configured to acquire a time when a door lock 301 connected to the server 302 is opened if it is recognized that the door lock 301 is opened; judging whether the time for which the door lock 301 is opened is within a normal unlocking time period corresponding to the door lock 301 which is preserved in advance; if not, pushing prompt information that the door lock 301 is opened within an abnormal unlocking time period to a user terminal 303 corresponding to the door lock 301;
the user terminal 303 is configured to receive a prompt that the door lock 301 is opened in an abnormal unlocking time period.
The door lock 301 is specifically used for sending unlocking data if the lock core built-in circuit of the door lock is recognized to complete the unlocking action;
the server 302 is specifically configured to determine that the door lock 301 is opened if the unlocking data sent by the door lock 301 connected to the server 302 is received.
The server 302 is specifically configured to determine a time when the unlocking data is received as a time when the door lock 301 is opened.
The server 302 is specifically configured to, if the unlocking data carries the time when the door lock 301 is opened, obtain, in the unlocking data, the time when the door lock 301 is opened.
The server 302 is specifically configured to decrypt the unlocking data if the unlocking data is encrypted data, and obtain the time when the door lock 301 is opened from the decrypted unlocking data.
The server 302 is specifically configured to decrypt the unlocking data with a decryption key corresponding to the encryption key if the unlocking data is encrypted by an encryption key and/or an encryption function; and/or decrypting the unlocking data by adopting a decryption function corresponding to the encryption function.
The door lock 301 is specifically configured to send unlocking data in a preset communication mode, where the preset communication mode includes wireless fidelity WiFi communication or ZigBee communication;
the server 302 is specifically configured to receive unlocking data sent by the door lock 301 in a preset communication manner.
As shown in fig. 4, the system further includes a ZigBee gateway 404 and a router 405;
the door lock 301 is specifically configured to send unlocking data through a ZigBee gateway 404 and a router 405 if ZigBee communication is adopted;
the server 302 is specifically configured to receive unlocking data transmitted by the door lock 301 through the ZigBee gateway 404 and the router 405.
The server 302 is further configured to store the received unlocking data.
Example 8:
on the basis of the foregoing embodiments, an embodiment of the present invention further provides a server 500, as shown in fig. 5, including: the system comprises a processor 501, a communication interface 502, a memory 503 and a communication bus 504, wherein the processor 501, the communication interface 502 and the memory 503 are communicated with each other through the communication bus 504;
the memory 503 has stored therein a computer program, which, when executed by the processor 501, causes the processor 501 to perform any of the above embodiments applied to a server.
The communication bus mentioned in the above server may be a Peripheral Component Interconnect (PCI) bus, an Extended Industry Standard Architecture (EISA) bus, or the like. The communication bus may be divided into an address bus, a data bus, a control bus, etc. For ease of illustration, only one thick line is shown, but this does not mean that there is only one bus or one type of bus.
The communication interface 502 is used for communication between the above-described server and other devices.
The Memory may include a Random Access Memory (RAM) or a Non-Volatile Memory (NVM), such as at least one disk Memory. Alternatively, the memory may be at least one memory device located remotely from the processor.
The processor may be a general-purpose processor, including a central processing unit, a Network Processor (NP), and the like; but may also be a Digital instruction processor (DSP), an application specific integrated circuit, a field programmable gate array or other programmable logic device, discrete gate or transistor logic, discrete hardware components, or the like.
Example 9:
on the basis of the foregoing embodiments, the present invention further provides a computer storage readable storage medium, which stores therein a computer program executable by a server, and when the program runs on the server, the server is caused to execute any of the above embodiments applied to the server.
The computer readable storage medium may be any available medium or data storage device that can be accessed by a processor in a server, including but not limited to magnetic memory such as a floppy disk, a hard disk, magnetic tape, a magneto-optical disk (MO), etc., optical memory such as a CD, DVD, BD, HVD, etc., and semiconductor memory such as a ROM, EPROM, EEPROM, nonvolatile memory (NANDFLASH), a Solid State Disk (SSD), etc.
Fig. 6 is a schematic diagram of a security monitoring apparatus 600 according to an embodiment of the present invention, applied to a server, the apparatus including:
an obtaining module 601, configured to obtain a time when a door lock connected to the server is opened if it is recognized that the door lock is opened;
the judging module 602 is configured to judge whether the time for which the door lock is opened is within a normal unlocking time period corresponding to the door lock that is pre-stored; if not, the pushing module 603 is triggered;
the pushing module 603 is configured to push, to the user terminal corresponding to the door lock, prompt information that the door lock is opened within an abnormal unlocking time period.
The obtaining module 601 is specifically configured to determine that the door lock is opened if unlocking data sent by the door lock connected to the server is received, where the unlocking data is sent after the door lock identifies that the lock cylinder built-in circuit of the door lock completes an unlocking action.
The obtaining module 601 is specifically configured to determine a time when the unlocking data is received as a time when the door lock is opened.
If the unlocking data carries the time when the door lock is opened, the obtaining module 601 is specifically configured to obtain the time when the door lock is opened in the unlocking data.
If the unlocking data is encrypted data, the obtaining module 601 is specifically configured to decrypt the unlocking data, and obtain the time when the door lock is opened from the decrypted unlocking data.
If the unlocking data is encrypted by an encryption key and/or an encryption function, the obtaining module 601 is specifically configured to decrypt the unlocking data by using a decryption key corresponding to the encryption key; and/or decrypting the unlocking data by adopting a decryption function corresponding to the encryption function.
The obtaining module 601 is specifically configured to receive unlocking data sent by a door lock connected to the server in a preset communication mode, where the preset communication mode includes wireless fidelity WiFi communication or ZigBee communication.
If the ZigBee communication is adopted, the obtaining module 601 is specifically configured to receive unlocking data sent by a door lock connected to the server through a ZigBee gateway and a router.
The device further comprises:
a saving module 604, configured to save the received unlocking data.
When the door lock connected with the server is opened in the embodiment of the invention, if the time for opening the door lock is not within the pre-stored normal unlocking time period, the user terminal corresponding to the door lock is prompted that the door lock is opened within the abnormal unlocking time period, so that a user of the user terminal can know that unsafe unlocking behaviors exist in time, and the safety of the environment where the door lock is located is improved to a certain extent.
For the system/apparatus embodiments, since they are substantially similar to the method embodiments, the description is relatively simple, and reference may be made to some descriptions of the method embodiments for relevant points.
It is to be noted that, in this document, relational terms such as first and second, and the like are used solely to distinguish one entity or operation from another entity or operation without necessarily requiring or implying any actual such relationship or order between such entities or operations.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
While the preferred embodiments of the present application have been described, additional variations and modifications in those embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims be interpreted as including preferred embodiments and all alterations and modifications as fall within the scope of the application.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present invention without departing from the spirit and scope of the invention. Thus, if such modifications and variations of the present invention fall within the scope of the claims of the present invention and their equivalents, the present invention is also intended to include such modifications and variations.
Claims (29)
1. A security monitoring method is applied to a server, and comprises the following steps:
if the fact that the door lock connected with the server is opened is recognized, acquiring the time when the door lock is opened;
judging whether the time for opening the door lock is within a normal unlocking time period corresponding to the door lock which is preserved in advance;
if not, the prompt information that the door lock is opened within the abnormal unlocking time period is pushed to the user terminal corresponding to the door lock.
2. The method of claim 1, wherein identifying that a door lock connected to the server is opened comprises:
and if unlocking data sent by a door lock connected with the server is received, determining that the door lock is opened, wherein the unlocking data is sent after the door lock identifies that the lock core built-in circuit of the door lock completes the unlocking action.
3. The method of claim 2, wherein the obtaining the time the door lock is opened comprises:
and determining the time when the unlocking data is received as the time when the door lock is opened.
4. The method of claim 2, wherein if the unlock data carries a time a door lock was opened, the obtaining the time the door lock was opened comprises:
and acquiring the time when the door lock is opened in the unlocking data.
5. The method of claim 4, wherein if the unlocking data is encrypted data, the obtaining the time the door lock is opened in the unlocking data comprises:
and decrypting the unlocking data, and acquiring the time of the door lock being opened from the decrypted unlocking data.
6. The method of claim 5, wherein if the unlocking data is encrypted via an encryption key and/or encryption function, the decrypting the unlocking data comprises:
decrypting the unlocking data by adopting a decryption key corresponding to the encryption key; and/or
And decrypting the unlocking data by adopting a decryption function corresponding to the encryption function.
7. The method of claim 2, wherein receiving unlocking data sent by a door lock connected to the server comprises:
and receiving unlocking data sent by a door lock connected with the server in a preset communication mode, wherein the preset communication mode comprises wireless fidelity (WiFi) communication or ZigBee communication.
8. The method of claim 7, wherein if ZigBee communication is used, the receiving unlocking data transmitted by a door lock connected with the server comprises:
and receiving unlocking data sent by a door lock connected with the server through the ZigBee gateway and the router.
9. The method of any one of claims 2-8, further comprising:
and storing the received unlocking data.
10. A safety monitoring device is applied to a server, and comprises:
the acquisition module is used for acquiring the time when the door lock connected with the server is opened if the door lock connected with the server is identified to be opened;
the judging module is used for judging whether the time for opening the door lock is within the normal unlocking time period corresponding to the door lock which is stored in advance; if not, triggering a pushing module;
the pushing module is used for pushing prompt information that the door lock is opened within an abnormal unlocking time period to a user terminal corresponding to the door lock.
11. The apparatus according to claim 10, wherein the obtaining module is specifically configured to determine that the door lock is unlocked if receiving unlocking data sent by a door lock connected to the server, where the unlocking data is sent after the door lock recognizes that the lock core built-in circuit of the door lock completes an unlocking operation.
12. The apparatus of claim 11, wherein the obtaining module is specifically configured to determine a time at which the unlocking data is received as a time at which the door lock is opened.
13. The apparatus of claim 11, wherein the obtaining module is specifically configured to obtain the time at which the door lock was opened in the unlocking data if the unlocking data carries the time at which the door lock was opened.
14. The apparatus according to claim 13, wherein if the unlocking data is encrypted data, the obtaining module is specifically configured to decrypt the unlocking data, and obtain the time when the door lock is opened from the decrypted unlocking data.
15. The apparatus according to claim 14, wherein the obtaining module is configured to decrypt the unlocking data using a decryption key corresponding to the encryption key if the unlocking data is encrypted using an encryption key and/or an encryption function; and/or decrypting the unlocking data by adopting a decryption function corresponding to the encryption function.
16. The apparatus of claim 11, wherein the obtaining module is specifically configured to receive unlocking data sent by a door lock connected to the server in a preset communication manner, where the preset communication manner includes WiFi communication or ZigBee communication.
17. The device according to claim 16, wherein if ZigBee communication is used, the obtaining module is specifically configured to receive unlocking data sent by a door lock connected to the server through a ZigBee gateway and a router.
18. The apparatus of any one of claims 11-17, wherein the apparatus further comprises:
and the storage module is used for storing the received unlocking data.
19. A server, comprising: the system comprises a processor, a communication interface, a memory and a communication bus, wherein the processor, the communication interface and the memory complete mutual communication through the communication bus;
the memory has stored therein a computer program which, when executed by the processor, causes the processor to carry out the steps of the method of any one of claims 1 to 9.
20. A computer-readable storage medium, in which a computer program executable by a server is stored, which program, when run on the server, causes the server to carry out the steps of the method of any one of claims 1 to 9.
21. A safety monitoring system is characterized by comprising a door lock, a server and a user terminal; wherein,
the server is used for acquiring the time when the door lock connected with the server is opened if the door lock is identified to be opened; judging whether the time for opening the door lock is within a normal unlocking time period corresponding to the door lock which is preserved in advance; if not, pushing prompt information that the door lock is opened within an abnormal unlocking time period to a user terminal corresponding to the door lock;
and the user terminal is used for receiving prompt information that the door lock is opened within an abnormal unlocking time period.
22. The system of claim 21, wherein the door lock is specifically configured to send unlocking data if it is recognized that the lock core built-in circuit of the door lock completes the unlocking operation;
the server is specifically configured to determine that the door lock is opened if unlocking data sent by the door lock connected to the server is received.
23. The system of claim 22, wherein the server is specifically configured to determine a time at which the unlock data is received as a time at which the door lock is opened.
24. The system of claim 22, wherein the server is specifically configured to obtain the time a door lock was opened in the unlock data if the unlock data carries the time the door lock was opened.
25. The system of claim 24, wherein the server is specifically configured to decrypt the unlocking data if the unlocking data is encrypted data, and obtain the time when the door lock is opened from the decrypted unlocking data.
26. The system according to claim 25, wherein the server is specifically configured to decrypt the unlocking data using a decryption key corresponding to the encryption key if the unlocking data is encrypted by an encryption key and/or an encryption function; and/or decrypting the unlocking data by adopting a decryption function corresponding to the encryption function.
27. The system of claim 22, wherein the door lock is specifically configured to send the unlocking data in a preset communication manner, wherein the preset communication manner includes WiFi communication or ZigBee communication;
the server is specifically used for receiving unlocking data sent by the door lock in a preset communication mode.
28. The system of claim 27, further comprising a ZigBee gateway and router;
the door lock is specifically used for sending unlocking data through a ZigBee gateway and a router if ZigBee communication is adopted;
the server is specifically used for receiving unlocking data sent by the door lock through the ZigBee gateway and the router.
29. The system of any one of claims 22-28, wherein the server is further configured to store the received unlock data.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811222031.6A CN109523661A (en) | 2018-10-19 | 2018-10-19 | Security monitoring method, device, system, server and readable storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811222031.6A CN109523661A (en) | 2018-10-19 | 2018-10-19 | Security monitoring method, device, system, server and readable storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109523661A true CN109523661A (en) | 2019-03-26 |
Family
ID=65770965
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811222031.6A Pending CN109523661A (en) | 2018-10-19 | 2018-10-19 | Security monitoring method, device, system, server and readable storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109523661A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110782563A (en) * | 2019-11-05 | 2020-02-11 | 珠海格力电器股份有限公司 | Help seeking information broadcasting method based on intelligent door lock, storage medium and intelligent door lock |
CN111340986A (en) * | 2020-02-28 | 2020-06-26 | 广东科徕尼智能科技有限公司 | Intelligent lock abnormity alarm method, intelligent lock and storage medium |
CN111899381A (en) * | 2020-07-13 | 2020-11-06 | 珠海格力电器股份有限公司 | Unlocking verification method and device, door lock, door lock system and storage medium |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH0932377A (en) * | 1995-07-15 | 1997-02-04 | Omron Corp | Locking-release device and locking-release system |
WO2001001323A1 (en) * | 1999-06-28 | 2001-01-04 | Interlogix, Inc. | Personal digital assistant key for an electronic lock |
CN102425338A (en) * | 2008-11-04 | 2012-04-25 | 邓睿 | Method and device for controlling electronic lock by utilizing computer programs |
CN104806085A (en) * | 2015-03-20 | 2015-07-29 | 云丁网络技术(北京)有限公司 | Intelligent door lock system and intelligent reminding method |
WO2015187731A1 (en) * | 2014-06-02 | 2015-12-10 | Schlage Lock Company Llc | System and method for signifying intent for lock operation |
-
2018
- 2018-10-19 CN CN201811222031.6A patent/CN109523661A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH0932377A (en) * | 1995-07-15 | 1997-02-04 | Omron Corp | Locking-release device and locking-release system |
WO2001001323A1 (en) * | 1999-06-28 | 2001-01-04 | Interlogix, Inc. | Personal digital assistant key for an electronic lock |
WO2001001323A9 (en) * | 1999-06-28 | 2002-07-25 | Interlogix Inc | Personal digital assistant key for an electronic lock |
CN102425338A (en) * | 2008-11-04 | 2012-04-25 | 邓睿 | Method and device for controlling electronic lock by utilizing computer programs |
WO2015187731A1 (en) * | 2014-06-02 | 2015-12-10 | Schlage Lock Company Llc | System and method for signifying intent for lock operation |
CN104806085A (en) * | 2015-03-20 | 2015-07-29 | 云丁网络技术(北京)有限公司 | Intelligent door lock system and intelligent reminding method |
Non-Patent Citations (2)
Title |
---|
强静仁,王斌: "《智能家居基本原理及应用》", 31 May 2017, 华中科技大学出版社 * |
聂晓民,林卫: "《饭店计算机管理》", 31 July 1997, 中国民航出版社 * |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110782563A (en) * | 2019-11-05 | 2020-02-11 | 珠海格力电器股份有限公司 | Help seeking information broadcasting method based on intelligent door lock, storage medium and intelligent door lock |
CN110782563B (en) * | 2019-11-05 | 2020-09-04 | 珠海格力电器股份有限公司 | Help seeking information broadcasting method based on intelligent door lock, storage medium and intelligent door lock |
CN111340986A (en) * | 2020-02-28 | 2020-06-26 | 广东科徕尼智能科技有限公司 | Intelligent lock abnormity alarm method, intelligent lock and storage medium |
CN111899381A (en) * | 2020-07-13 | 2020-11-06 | 珠海格力电器股份有限公司 | Unlocking verification method and device, door lock, door lock system and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN112714193B (en) | Community data processing system, method, device and equipment based on Internet of things platform | |
CA2769104C (en) | Methods and apparatus to control access | |
CN105118127B (en) | A kind of guest system and control method thereof | |
CN105099984B (en) | The method and apparatus of account intercommunication between a kind of APP | |
EP3941014B1 (en) | Digital key-based identity authentication method, terminal apparatus, and medium | |
CN104103111A (en) | Automatic access control system based on mobile phone Bluetooth communication and implementation method thereof | |
CN105719374A (en) | Door access control method | |
CN105321240A (en) | Control method and device of intelligent door lock and intelligent door control system | |
CN109523661A (en) | Security monitoring method, device, system, server and readable storage medium | |
CN109067881B (en) | Remote authorization method, device, equipment and storage medium thereof | |
CN112333212B (en) | Encryption management method and device for business data of power Internet of things | |
CN104794780A (en) | Smart door, smart door control system and control method | |
CN108961501A (en) | A kind of intelligent door lock control method, relevant device and system | |
WO2021120975A1 (en) | Monitoring method and apparatus | |
CN104282061A (en) | Safety intelligent lock system and unlocking and locking methods thereof | |
CN108547514B (en) | Unlocking method and device of intelligent door lock | |
CN103021054A (en) | Method and system for monitoring lock state in real time | |
CN105201290B (en) | Logistic track monitoring anti-theft device | |
CN110727938B (en) | Configuration method and device of intelligent equipment, electronic equipment and storage medium | |
CN113569226B (en) | Parking space management system and method based on block chain | |
KR101795451B1 (en) | Method and apparatus for controling security of target device using security tunnel | |
CN110708357A (en) | Data management method, storage medium and system based on NB-IOT | |
CN115116162B (en) | Digital key deleting method, device, equipment, system and storage medium | |
CN113676474A (en) | Equipment unlocking method and device, storage medium and electronic device | |
CN104657365A (en) | Method and system for accessing automobile data through applicable programming interface (API) |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190326 |
|
RJ01 | Rejection of invention patent application after publication |