CN109636966A - Control method for door lock, system, device, electronic equipment and storage medium - Google Patents
Control method for door lock, system, device, electronic equipment and storage medium Download PDFInfo
- Publication number
- CN109636966A CN109636966A CN201811431512.8A CN201811431512A CN109636966A CN 109636966 A CN109636966 A CN 109636966A CN 201811431512 A CN201811431512 A CN 201811431512A CN 109636966 A CN109636966 A CN 109636966A
- Authority
- CN
- China
- Prior art keywords
- unlocking
- information
- door lock
- unlocking manner
- manner
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/22—Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/27—Individual registration on entry or exit involving the use of a pass with central registration
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Lock And Its Accessories (AREA)
Abstract
This application discloses a kind of control method for door lock, system, device, electronic equipment and storage mediums, are related to Smart Home technical field.The above method includes: the first unlocking information that acquisition is inputted by the first unlocking manner and the second unlocking information inputted by the second unlocking manner when double verification mode is opened;Based on default verification mode, the first unlocking information and the second unlocking information are verified;When the first unlocking information and the second unlocking information are proved to be successful, unlock instruction is generated.The application improves the security level of door lock by adding double verification mode to door lock.
Description
Technical field
This application involves Smart Home technical fields, more particularly, to a kind of control method for door lock, system, device, electricity
Sub- equipment and storage medium.
Background technique
House security is always the problem of huge numbers of families more pay close attention to, with increasingly developed, the peace of gate inhibition's setting of society
Full property is also by higher and higher attention.With the continuous development of door lock technology, current existing intelligent door lock is tested there are a variety of
Demonstrate,prove unlocking manner, including the unlock of unlocked by fingerprint, password, face unlock etc..But the unlocking manner of existing intelligent door lock is single,
Such as can only be unlocked by the modes such as verifying fingerprint or input password, safety is lower, and password is also easy leakage, exists
Biggish security risk.
Summary of the invention
In view of the above problems, present applicant proposes a kind of control method for door lock, system, device, electronic equipment and storages to be situated between
Matter, to solve the above problems.
In a first aspect, the embodiment of the present application provides a kind of control method for door lock, it is applied to intelligent gateway, the method packet
It includes: when double verification mode is opened, the first unlocking information and pass through the second solution that acquisition is inputted by the first unlocking manner
The second unlocking information that lock mode inputs;Based on default verification mode, to first unlocking information and second unlock
Information is verified;When first unlocking information and second unlocking information are proved to be successful, unlock instruction is generated.
Second aspect, the embodiment of the present application provide a kind of door lock control system, including door lock and user terminal, the door
Lock is connected with the user terminal communication, and the user terminal is described for being arranged and opening or closing double verification mode
Door lock is used for when double verification mode is opened, the first unlocking information that acquisition is inputted by the first unlocking manner and by the
Second unlocking information of two unlocking manners input, based on default verification mode, to first unlocking information and described second
Unlocking information is verified, and the unlock when first unlocking information and second unlocking information are proved to be successful.
The third aspect, the embodiment of the present application provide a kind of door-lock controller, comprising: acquisition module, for dual
When Validation Mode is opened, the first unlocking information and inputted by the second unlocking manner that acquisition is inputted by the first unlocking manner
The second unlocking information;Authentication module believes first unlocking information and second unlock based on default verification mode
Breath is verified;Directive generation module, for being proved to be successful when first unlocking information and second unlocking information
When, generate unlock instruction.
Fourth aspect, the embodiment of the present application provide a kind of electronic equipment, and the electronic equipment includes: one or more places
Reason device, memory and one or more application program, wherein one or more application programs are stored in memory and are matched
It is set to by being executed in one or more processors, one or more application program is configured to carry out the side such as above-mentioned first aspect
Method.
5th aspect, the embodiment of the present application provides a kind of computer-readable storage medium, described computer-readable
Program code is stored in storage medium, said program code can call the side executed as described in above-mentioned first aspect by processor
Method.
Control method for door lock, system, device, electronic equipment and storage medium provided by the embodiments of the present application, by double
When weight Validation Mode is opened, acquisition is defeated by the first unlocking information of the first unlocking manner input and by the second unlocking manner
The second unlocking information entered, is then based on default verification mode, verifies to the first unlocking information and the second unlocking information,
And when the first unlocking information and the second unlocking information are proved to be successful, unlock instruction is generated.To by opening dual test
Card mode so that door lock need to two kinds verifying by when just unlock, improve door lock security level and promotion house security
Coefficient.
Detailed description of the invention
In order to more clearly explain the technical solutions in the embodiments of the present application, make required in being described below to embodiment
Attached drawing is briefly described, it should be apparent that, the drawings in the following description are only some examples of the present application, for
For those skilled in the art, without creative efforts, it can also be obtained according to these attached drawings other attached
Figure.
Fig. 1 shows the application environment schematic diagram of control method for door lock provided by the embodiments of the present application;
Fig. 2 shows the flow diagrams for the control method for door lock that the application one embodiment provides;
Fig. 3 shows the flow diagram of the control method for door lock of another embodiment of the application offer;
Fig. 4 shows the flow diagram of step S301 to step S306 in another embodiment of the application;
Fig. 5 shows the timing diagram of the control method for door lock of another embodiment of the application offer;
Fig. 6 show another embodiment of the application offer control method for door lock step S401 in double verification is set
The timing diagram of mode;
Fig. 7 shows the module frame chart of door-lock controller provided by the embodiments of the present application;
Fig. 8 shows the embodiment of the present application for executing the electronic equipment of the control method for door lock according to the embodiment of the present application
Block diagram;
Fig. 9 shows controlling for saving or carrying realization according to the door lock of the embodiment of the present application for the embodiment of the present application
The storage unit of the program code of method.
Specific embodiment
In order to make those skilled in the art more fully understand application scheme, below in conjunction in the embodiment of the present application
Attached drawing, the technical scheme in the embodiment of the application is clearly and completely described.
Currently traditional to be difficult to prevent the possibility by people's picking lock in the way of key unlock, there are greater risks, and
It is also possible to door lock security risk can be caused to increase suddenly because user loses key.And as development in science and technology and people are to house security
The increasingly raising of degree of concern, door lock is also more intelligent, and existing intelligent door lock provides a variety of unlocking manners, including key
Unlock, unlocked by fingerprint, password unlock, face unlock etc..Existing intelligent door lock is mostly using single unlocking manner, that is, only
A unlocking manner need to be verified, so that it may realize that door lock unlocks, such as verifying fingerprint, by that can unlock after verifying, for another example
Password is inputted, can be unlocked after password authentification is correct.But security risk existing for single unlocking manner is higher, such as password holds
Easily leakage, specifically, the door of active user can be unlocked at any time when other users get the door lock password of active user
Lock, causes great security risk.
In view of the above-mentioned problems, inventor has found by long-term research and proposes door lock control provided by the embodiments of the present application
Method, system, device, electronic equipment and storage medium processed, by opening double verification mode, so that door lock need to be verified at two kinds
By when just unlock, improve door lock security level and promoted house security coefficient.
First a kind of application environment involved in the application will be introduced below.
Referring to Fig. 1, Fig. 1 shows the door lock control system that can be used for control method for door lock provided by the embodiments of the present application
10, the door lock control system 10 include door lock 100 and user terminal 200, wherein user terminal 200 may include PC,
Smart phone, tablet computer, wearable electronic equipment etc., are not limited thereto.In some embodiments, the user terminal
200 between user for interacting, and is carried out telecommunication by user terminal 200 with door lock 100 convenient for user.In addition,
User can add same account information in door lock 100 and user terminal 200, realize door lock 100 by the account information and use
The synchronizing information of family terminal 200.
Further, door lock control system 10 can also include server 300, and server 300 can use traditional services
Device can also use cloud server, it is not limited here.Server 300 can by wireless network respectively with user terminal
200 and door lock 100 be communicatively coupled, to carry out the data interaction between server 300 and user terminal 200, server
Data interaction between 300 and door lock 100.
As a kind of mode, door lock 100 is connect with gateway, user terminal 200 can by local area network path and gateway into
Row interaction (i.e. user terminal-router-gateway), to realize that the door lock 100 connecting with gateway interacts.Further,
User terminal 200 can also interact (i.e. user terminal-server-gateway) by wide area network path and gateway, thus real
The door lock 100 now connecting with gateway interacts.
Alternatively, door lock 100 can also be without gateway, and mode is connect with router by wireless communication
Afterwards, then with the foundation of user terminal 200 it communicates, interacts.Further, door lock 100 can also pass through ZigBee module or indigo plant
The wireless communication modules such as tooth module are communicated with the foundation of user terminal 200, are interacted.
Present embodiments are specifically described below in conjunction with attached drawing.
Referring to Fig. 2, the flow diagram of the control method for door lock provided Fig. 2 shows the application one embodiment, it can
Applied to above-mentioned door lock, above-mentioned door lock control system can also be applied to.It will be carried out below for embodiment shown in Fig. 2 detailed
It illustrates, the method can specifically include following steps:
Step S101: when double verification mode is opened, acquisition passes through the first unlocking information that the first unlocking manner inputs
And the second unlocking information inputted by the second unlocking manner.
In the present embodiment, the first unlocking manner or the second unlocking manner include password unlock, unlocked by fingerprint, face solution
At least one of lock, vocal print unlock, bluetooth unlock and near-field communication unlock.Such as first unlocking manner can be password solution
Lock, the second unlocking manner can be unlocked by fingerprint.
In a specific application scenarios, such as the first unlocking manner is password unlock, and the second unlocking manner is fingerprint
Unlock, when double verification mode is opened, user inputs password on door lock, and door lock acquires the password as the first unlock letter
Breath, user's typing fingerprint on door lock, door lock acquire the fingerprint as the second unlocking information.By opening double verification mode,
So that user need to input two unlocking informations and can just be unlocked, improves unlock difficulty and then improve the safety of door lock.
In the present embodiment, the first unlocking manner and the second unlocking manner can use same kind of unlocking method,
Such as first unlocking manner and the second unlocking manner can be by unlocked by fingerprint, such as the first unlocking manner can be use
The right hand index fingerprint of family A, the second unlocking manner can be the hand thumb fingerprint of user A.It is understood that different fingerprints
Unlocking manner can consider and be different unlocking manner, it is roughly the same using the method for other unlocking manners, it is no longer superfluous herein
It states.So that user still can be used as unlocking manner merely with fingerprint or password etc., meet user's diversified facilities unlock side
The demand of formula.
As a kind of mode, door lock be can be set between the acquisition of the first unlocking information and the second unlocking information without successively
Sequentially, such as the first unlocking manner is unlocked by fingerprint, and the second unlocking manner is face unlock, and door lock can first acquire fingerprint at this time
Face is acquired again, face can also be first acquired and acquire fingerprint again, can also acquire fingerprint and face simultaneously.It is understood that
When double verification mode is opened, door lock acquisition can be without sequencing, as long as user's input has the first unlocking information and the
Two unlocking informations, door lock are remembered acquisition order with regard to achievable acquisition, without user, are unlocked convenient for user, and double verification is being used
While improving door lock safety, the convenience of unlock is improved.
Alternatively, the acquisition order of the first unlocking information and the second unlocking information can be set in door lock,
It is exactly the first unlocking information that door lock can be set that first acquisition is inputted by the first unlocking manner, then acquires through the second unlock side
Second unlocking information of formula input, such as pre-set first unlocking manner are unlocked by fingerprint, and the second unlocking manner is password
Unlock, and being provided with acquisition order is the first unlocking information that first acquisition is inputted by the first unlocking manner, then is acquired by the
Second unlocking information of two unlocking manners input need to first acquire fingerprint and acquire password again at this time when user needs to unlock, if with
Family first inputs password and inputs fingerprint again, is unable to complete acquisition at this time.It is understood that being used when double verification mode is opened
The first unlocking information and the second unlocking information of family input need to meet preset sequencing, door lock just achievable acquisition, from
And by setting acquisition order, the difficulty of other users unlock is increased, the safety of door lock is further improved.
In the present embodiment, when double verification mode is not opened, single unlocking manner still can be used locks on the door and be unlocked,
To on the basis of retaining single unlocking manner, the selection for improving the double verification for unlocking safety is increased, it can be for
Family is selected on demand.
Step S102: based on default verification mode, the first unlocking information and the second unlocking information are verified.
In the present embodiment, default verification mode includes door lock local verification, user terminal verifying and server authentication
At least one.Can be in the same verifying main body to the verifying of the first unlocking information and the second unlocking information, it can also be
Different verifying main bodys is stored in the first verifying main body for verifying the first verification information of the first unlocking information, for testing
The second verification information for demonstrate,proving the second unlocking information is stored in the second verifying main body, so that the first unlocking information need to be led by the first verifying
Body is verified, and the second unlocking information need to be verified by the second unlock main body.Further, to the first unlocking information and
Two unlocking informations carry out verifying can be in door lock local verification, or verifies in user terminal, can also test in server
Card, can also be any combination of two of aforementioned three kinds of verification modes, such as locally tested in door lock the first unlocking information
Card, the second unlocking information is verified in server.
As a kind of mode, presetting verification mode is door lock local verification, that is, is locally stored in door lock for verifying
The first verification information and the second verification information of first unlocking information and the second unlocking information, and it is local to first in door lock
Unlocking information and the second unlocking information are verified.Wherein verification information may include numerical ciphers, bluetooth key, fingerprint with
And the information such as face.It is local by the first solution in door lock after door lock collects the first unlocking information and the second unlocking information
Lock information is matched with the first verification information, and the second unlocking information is matched with the second verification information, if the first unlock
Information and the equal successful match of the second unlocking information, then be proved to be successful.By locally being verified in door lock, greatly improve
Verification efficiency, and do not influenced by network, efficient verification can be still completed in Network Abnormal.
Alternatively, verification mode is preset to store for user terminal verifying, that is, in user terminal for testing
The first verification information and the second verification information for demonstrate,proving the first unlocking information and the second unlocking information, collect first in door lock
After unlocking information and the second unlocking information, the first unlocking information and the second unlocking information are sent to the user terminal,
User terminal matches the first unlocking information with the first verification information, and the second unlocking information and the second verification information are carried out
Matching, if the first unlocking information and the equal successful match of the second unlocking information, are proved to be successful.By being tested in user terminal
Card can show verifying feedback to user by user terminal, including be proved to be successful or unsuccessfully etc., and active user can and
Shi get Zhi someone just attempts to solve door lock, timely learning door lock situation, to further increase door lock safety.
As another mode, presetting verification mode is server authentication, that is, in server storage for verifying the
The first verification information and the second verification information of one unlocking information and the second unlocking information collect the first unlock in door lock
After information and the second unlocking information, the first unlocking information and the second unlocking information are sent to server, in server
First unlocking information is matched with the first verification information, the second unlocking information is matched with the second verification information, if
First unlocking information and the equal successful match of the second unlocking information, then be proved to be successful.By being verified in server, will verify
Information is stored in server, it may not be necessary to occupy the memory space of door lock local, reduce the requirement for locking memory capacity on the door, reduce
Door lock cost.
As yet another approach, default verification mode can be any combination of two of above-mentioned three kinds of verification modes, also
Being may include two kinds of verifying main bodys, i.e. the first unlocking information need to be verified by the first verifying main body, and the second unlocking information needs
It is verified by the second unlock main body.Wherein, the first verifying is stored in for verifying the first verification information of the first unlocking information
Main body, the second verification information for verifying the second unlocking information are stored in the second verifying main body.Specifically, for example default verifying
Mode is the combination server authentication of door lock local verification, such as user opens the double verification of numerical ciphers and fingerprint, wherein
Verifying password storage for verifying numerical ciphers is local in door lock, and the verifying fingerprint for verifying fingerprint is stored in user's end
End, at this point, after the numerical ciphers and fingerprint that door lock collects user's input, in the door lock number that locally matching user inputs
Word password is proved to be successful if equal successful match in the fingerprint of server matching user input.
It is understood that default verification mode can also be whole for the verifying of door lock local verification combination user terminal or user
End verifying combines server authentication, and verification method server authentication in conjunction with above-mentioned door lock local verification is roughly the same, herein not
It repeats again.It is verified by the way that multiagent is arranged, is tested so that not influencing another main body when a main body verifying is out of order
Card, improves the fault-tolerance of system, in addition to this, allows the verifying to the first unlocking information and the second unlocking information parallel
Processing improves verification efficiency, reduces user's unlocked time.
In some embodiments, same verification information can also be stored in multiple verifying main bodys, such as verifying the
First verification information of one unlocking information is stored at least two verifyings in local door lock, user terminal and server simultaneously
Main body, for example, for verifying finger print information simultaneously be stored in door lock local and user terminal, when network failure makes door lock
Communication with user terminal is obstructed and makes user terminal that can not receive the first unlocking information or the second unlock letter that door lock is sent
When breath, original verifying subject user terminal can be changed to door lock local, to will believe the first unlocking information or the second unlock
The verifying of breath is locally executed in door lock.In this way, by the way that multiple verifying main bodys are arranged, and same verification information is stored in multiple
It verifies in main body, so that can switch other verifying main bodys when a verifying main body breaks down and be verified, not influence to use
Family unlock, improves the fault-tolerance of system.
In the present embodiment, the verifying sequencing that the first unlocking information and the second unlocking information can be set, can also
To be set as specifically can be set without verifying sequencing and first verifying the first unlocking information, then verify the second unlocking information,
It can be set and first verify the second unlocking information, then verify the first unlocking information, can also be arranged without verifying sequencing, that is,
Both the first unlocking information can be first verified, the second unlocking information can also be first verified, the first unlocking information can also be verified simultaneously
And second unlocking information.
As a kind of mode, the first unlocking information is first verified in setting, then verifies the second unlocking information, at this point, when the first solution
When lock information verifying is unsuccessful, the second unlocking information can not be verified, to reduce unnecessary calculating, improve verifying
Efficiency.Alternatively, the second unlocking information is first verified in setting, then verifies the first unlocking information, verification method with it is aforementioned
Roughly the same, details are not described herein.
In some embodiments, the first unlocking information and the second unlocking information can also be verified simultaneously, for example,
When the verifying main body of the first unlocking information be located at door lock local, can when the verifying main body of the second unlocking information is located at user terminal
Locally to carry out matching verifying to the first unlocking information in door lock simultaneously, and the second unlocking information is matched in user terminal
Verifying, by the verifying to the first unlocking information and to the verifying parallel processing of the second unlocking information, improves verification efficiency, adds
The fast response speed of unlock.
Step S103: when the first unlocking information and the second unlocking information are proved to be successful, unlock instruction is generated.
In the present embodiment, the verifying of the first unlocking information and the second unlocking information can locally be carried out in door lock,
It is understood that the result being proved to be successful is returned to door lock, is generated and is solved by door lock after being verified based on default verification mode
Lock instruction, is unlocked.
In some embodiments, after being verified based on default verification mode, the result being proved to be successful can also be returned
User terminal, user terminal generate unlock instruction and are sent to door lock, and door lock receives unlock instruction and is unlocked.
As a kind of mode, presetting verification mode is door lock local verification, and first for verifying the first unlocking information tests
Card information and the second verification information for verifying the second unlocking information are stored in door lock local, local by the first solution in door lock
Lock information is matched with the first verification information, the second unlocking information is matched with the second verification information, when the two equal
When with success, the first unlocking information and the second unlocking information are proved to be successful, and locally generate unlock instruction by door lock at this time, can
To control door lock unlock.
Alternatively, verification mode is preset as user terminal verifying, and the first verification information and the second verifying are believed
Breath is stored in user terminal, is unlocked information in user terminal and matches two-by-two with verification information, when matching successful two-by-two,
First unlocking information and the second unlocking information are proved to be successful, and the information being proved to be successful is sent to door by user terminal at this time
Lock, generates unlock instruction by door lock, to control door lock unlock.It is understood that presetting authentication as another mode
Formula be server authentication when, verification method is roughly the same with user terminal verifying, and server matches success after will verify at
The information of function is sent to door lock, generates unlock instruction by door lock, to control door lock unlock, details are not described herein.
It in some embodiments,, can also be in door lock according to verification result after being verified based on default verification mode
It is local that verification result is prompted, including voice prompting, light prompt etc., for prompting user's current authentication result.For example,
When the authentication succeeds, it " can be proved to be successful, be your unlock " with voice prompting user, when failing the authentication, voice prompting user
" authentication failed please be re-entered ".For another example, when the authentication succeeds, green light can be lighted on door lock, and user is prompted to have verified that
Success can light red colored lamp when failing the authentication on door lock, prompt user's checking failure.In some other embodiment,
Door lock can also include display screen, can show in display screen to verification result, such as display " verifying when the authentication succeeds
Success " shows " authentication failed " when failing the authentication.It is understood that being worked as by feedback validation as a result, being learnt convenient for user
Preceding verification result improves the convenience that user uses to make corresponding actions.
In a specific application scenarios, user opens the double verification mode of fingerprint and password, presets authentication
Formula is door lock local verification, and when user needs to unlock, in door lock local input fingerprint and password, door lock acquires user's input
Fingerprint and password, and locally matched in door lock, when fingerprint and password with default verification information successful match when,
Then fingerprint and password are proved to be successful, and door lock generates unlock instruction, control unlock according to verification result.
The control method for door lock that the application one embodiment provides, by opening double verification mode, so that user need to be defeated
Enter two unlocking informations and can be just unlocked when passing through verifying, improve unlock difficulty and then improves the safety of door lock
Property, and still retain single Validation Mode in the case where increasing double verification mode, user is selected on demand, improves and uses
Family adjusts the convenience of door lock verifying, to the verifying of the first unlocking information and the second unlocking information can door lock it is local into
Row, substantially increases verification efficiency, and still can guarantee efficient verification in Network Abnormal, finally after completing verifying, passes through
Voice or light prompt user's checking are as a result, allow user to learn that current authentication result to make corresponding actions, mentions in time
The convenience that high user uses.To increase on the basis of improving door lock security level and promoting house security coefficient
Verification efficiency and user's ease of use.
Referring to Fig. 3, Fig. 3 shows the flow diagram of the control method for door lock of another embodiment of the application offer,
It can be applied to above-mentioned door lock.To be explained in detail below for process shown in Fig. 3, the method can specifically include with
Lower step:
Step S201: the first unlocking information that acquisition is inputted by the first unlocking manner.
In the present embodiment, the first unlocking manner can be password unlock, unlocked by fingerprint, face unlock, vocal print unlock, indigo plant
Tooth unlock and near-field communication unlock etc..
As a kind of mode, door lock includes voice acquisition device for receiving voice, wherein the first unlocking manner can be
Vocal print unlock, by comparing the voice being currently received and existing sound-groove model, judging the voice being currently received and presetting
Whether sound-groove model is then proved to be successful by what vocal print unlocked from the same user when being judged as the same user.Benefit
Unlocked with vocal print, than unlocked by fingerprint, face unlock etc. biological characteristics unlocking manner it is more convenient, it is not necessary to specific region into
Row touching is pressed, and need not also find face acquisition device and by face alignment face acquisition device, the spy for only needing user's sounding and saying
Determine voice content, so that it may realize a kind of unlocking manner, whether the identity of verifying unlock people is the owner for presetting sound-groove model, is mentioned
The convenience of unlock is improved while high door lock security level.
Alternatively, door lock includes near-field communication (NFC) device for carrying out NFC communication, wherein the first unlock
Mode can be near-field communication unlock, issues radiofrequency signal identification by door lock and the terminal device of NFC module, packet are supported in read-write
Mobile phone, the wearable device etc. for supporting NFC module are included, when the terminal device is close to door lock, terminal device is issued in door lock
By dynamic response in radiofrequency field, the information that is stored in door lock reading terminal equipment.It can accelerate to unlock by near-field communication unlock
Speed, and reduce the power consumption of door lock.
Step S202: whether detection double verification mode opens.
In the present embodiment, after door lock collects the first unlocking information, it is in door lock local detection double verification mode
No unlatching.
As a kind of mode, preset time threshold can be set, in the preset time threshold, if door lock does not collect
Whether two unlocking informations can be opened in door lock local detection double verification mode.
In some other embodiment, after door lock collects the first unlocking information, query information is sent to user terminal, it should
Query information is for detecting whether double verification mode opens, in some embodiments, will after the completion of user terminal detection
Query result returns to door lock.
Step S203: when double verification mode is opened, double verification prompt information is generated.
In the present embodiment, when double verification mode is opened, double verification prompt information can be locally generated in door lock,
Double verification prompt information may include at least one of the prompting mode of voice prompting, light prompt, picture cues etc., be used for
Prompt user currently has turned on double verification mode, needs to verify a unlocking information again.In this way, user is made to be without memory
It is no to have turned on double verification mode, when having merely entered a unlocking information, it is next to continue to input to can receive prompt
Unlocking information improves the convenience of unlock for unlocking.
As a kind of mode, double verification prompt information is prompted in the form of voice, such as in double verification mould
When formula is opened, user " having turned on double verification, the second unlocking information please be input " is prompted in door lock local voice.As another kind
Mode, double verification prompt information uses the form of light prompt, such as when double verification mode is opened, lights on door lock
Amber light prompts user to have turned on double verification mode, also needs to input a unlocking information again.In some other embodiment,
Door lock can also include display screen, can show in display screen to verification result, such as when double verification mode is opened,
" having turned on double verification, the second unlocking information please be input " is shown in display screen kind.
In further embodiments, it is detected whether to open double verification mode by user terminal, and in double verification mode
When unlatching, hint instructions are issued to door lock by user terminal, generate double verification prompt information for controlling door lock.Wherein,
The information whether double verification mode opens is stored in user terminal, and upon completion of the assays, can prompt on the subscriber terminal
Corresponding second unlocking manner of the second unlocking information of user, realize guarantee door lock it is security verified while, can also to
Family is prompted, and is avoided leading to not unlock because forgeing unlocking manner, is improved the ease of use of user.
Step S204: the second unlocking information that acquisition is inputted by the second unlocking manner.
Wherein, the specific descriptions of step S204 please refer to step S201, it should be noted that the first unlocking manner and second
Unlocking manner can use same kind of unlocking manner, for example, the first unlocking manner and the second unlocking manner can be
By unlocked by fingerprint, specifically, the first unlocking manner can be the right hand index fingerprint of user A, the second unlocking manner be can be
The hand thumb fingerprint of user A.It is understood that the unlocking manner of different fingerprints can consider and be different unlocking manner,
Details are not described herein.
Step S205: based on default verification mode, the first unlocking information and the second unlocking information are verified.
Step S206: when the first unlocking information and the second unlocking information are proved to be successful, unlock instruction is generated.
Wherein, the specific descriptions of step S205- step S206 please refer to step S102- step S103, and details are not described herein.
Further, when double verification mode is switched to unlatching by closing, step S301 can be executed, can also be executed
Step S304.Referring to Fig. 4, Fig. 4 shows the flow diagram that double verification mode is arranged in the present embodiment, can be applied to
Above-mentioned door lock also can be applied to above-mentioned door lock control system (as shown in Figure 1).It will be carried out below for process shown in Fig. 4
Detailed elaboration, the method can specifically include following steps:
Step S301: when double verification mode is switched to unlatching by closing, detect whether that there are the unlocks of effective bluetooth
Mode or interim unlocking manner.In the present embodiment, interim unlocking manner is set by user effective within a preset period of time
Unlocking manner.Interim unlocking manner may include at least one of the interim key of bluetooth and temporary password.It needs to illustrate
, the interim key of bluetooth has validity period, and it is only effective within a preset period of time, that is, can only solve within a preset period of time
Lock, unlike the interim key of bluetooth, bluetooth unlocking manner be shared with by user other users use it is a kind of without effective
Whether temporarily the bluetooth key of phase, the maximum difference of the two are that effectively the interim effective interim key of bluetooth belongs to one kind and faces
When unlocking manner, non-provisional effective bluetooth key belongs to a kind of bluetooth unlocking manner.
When double verification mode is switched to unlatching by closing, detect whether that there are bluetooth unlocking manner or interim unlocks
Mode is still in effective status, wherein effective interim unlocking manner is still can be by the interim unlocking manner of verifying, also
It is currently still in the interim unlocking manner in effective preset time period.
Further, bluetooth unlocking manner or interim unlocking manner can also be used as the first solution under double verification mode
At least one of lock mode and the second unlocking manner, for verifying unlock.
As a kind of mode, the interim key of bluetooth or temporary password can be used as two kinds of unlock sides under double verification mode
One kind of formula, can also be using the interim key combination temporary password of bluetooth as two kinds of unlocking manners under double verification mode.From
And can limit only can just solve door lock in a preset time period.
In a specific application scenarios, user opens the double verification of temporary password and fingerprint, and is arranged interim close
Code is only effective in the preset time period of 18:00-22:00, and when having, user inputs the temporary password in 12:00 and this refers at this time
Line can not be still proved to be successful, and the temporary password is only inputted in the preset time period and the fingerprint just can verify that success, be carried out
Unlock.So that time of the door lock other than preset time period is in the state that can not be unlocked, the safety of door lock is greatly improved
Property, and by setting preset time period, during guaranteeing to go on business or leave home in user to go out, door lock can not be unlocked, and meet user
Demand.
Alternatively, bluetooth unlocking manner can be used as one of two kinds of unlocking manners under double verification mode
Kind, bluetooth unlocking manner can also be combined two kinds of unlock sides under a kind of mode as double verification of interim unlocking manner
Formula only can just solve door lock so as to limit in a preset time period, improve door lock safety and in addition to this may be used also
To retain bluetooth key for double verification mode, the convenience of unlock is improved.
In a specific application scenarios, user opens the double verification of fingerprint and bluetooth key.User before unlock,
Bluetooth can first be opened, establish connection with door lock, when user is close to door lock, door lock can start verify bluetooth key, when with
Family verifying fingerprint pass through after unlock can be completed, shorten unlocked time, improve the convenience of unlock, and can also avoid because
Unlock delay caused by causing recognition of face relatively slow or inaccuracy for reasons such as light or angles, to improve door in double verification
While locking security level, the user experience is improved.
In the present embodiment, when double verification mode is switched to unlatching by closing, whether can be deposited in door lock local detection
In effective bluetooth unlocking manner or interim unlocking manner, without being communicated with user terminal, detection efficiency is improved,
Accelerate response speed.
In further embodiments, it when double verification mode is switched to unlatching by closing, can be detected in user terminal
User is stored in the presence or absence of effective bluetooth unlocking manner or interim unlocking manner, that is, the state of double verification mode
Terminal can be detected by user terminal.
Step S302: when there are effective bluetooth unlocking manner or interim unlocking manner, inquiry message is generated.
In the present embodiment, inquiry message is for inquiring bluetooth unlocking manner or interim unlocking manner in double verification mould
Whether formula maintains effectively after opening, by inquiring user, so that user can consider indigo plant when double verification mode is arranged together
The influence of tooth unlocking manner or interim unlocking manner to door lock safety, on the one hand, avoid because forgeing interim unlocking manner
Timeliness causes to be unlocked by interim unlocking manner in the unwitting situation of user, causes biggish security risk,
To further increase the safety of door lock.On the other hand, it can also avoid user accidentally by bluetooth unlocking manner or interim solution
Lock mode is set to failure, and causing to possess the bluetooth unlocking manner or the other users of interim unlocking manner can not unlock, to using
Family brings inconvenience.
As an implementation, inquiry message can locally be generated by door lock, and the inquiry message is sent to user
Terminal receives answer of the user for the inquiry message by user terminal.
In further embodiments, when there is effective interim unlocking manner, inquiry letter can be generated by user terminal
Breath, and answer of the user for the inquiry message is received in user terminal.
Step S303: obtaining inquiry as a result, and maintaining bluetooth unlocking manner or interim unlocking manner according to inquiry result
Effectively or disable.
In the present embodiment, when there is effective interim unlocking manner, door lock locally generates inquiry message, and by the inquiry
It asks that information is sent to the user terminal, inquiry is received by user terminal as a result, and will inquire that result returns to door lock, ties according to inquiry
Fruit maintains bluetooth unlocking manner or interim unlocking manner effectively or disabling.Specifically, according to inquiry as a result, one can be maintained
Or multiple bluetooth unlocking manners are effective or maintain one or more interim unlocking manners effective, or disable one or more bluetooths
Unlocking manner or the one or more interim unlocking manners of disabling, that is, all bluetooth unlocking manners can be disabled or faced
When unlocking manner, can also at least maintain a bluetooth unlocking manner or interim unlocking manner effective.By selectively tieing up
It holds bluetooth unlocking manner or interim unlocking manner effectively or disables, user is allowed to adjust current unlock side according to demand
Formula.
In further embodiments, after receiving inquiry result by user terminal, it can remain blue according to inquiry result
Tooth unlocking manner or interim unlocking manner effectively or disabling, and will maintain effectively or the command adapted thereto of disabling is sent to door lock,
Door lock maintains bluetooth unlocking manner or interim unlocking manner effectively or disabling according to the instruction so that door lock locally can be right
Bluetooth unlocking manner or interim unlocking manner are verified.For example, door lock will disable temporary password C according to inquiry result, this
When, in the default verification information library of door lock local, temporary password C is deleted from effective white list, so that user is defeated
When entering temporary password C, so that the temporary password fails under double verification mode, door lock can not be improved by verifying
Security level.
After receiving inquiry result by user terminal in yet other embodiments, bluetooth solution is maintained according to inquiry result
Perhaps interim unlocking manner is effective or disables and updates the bluetooth unlocking manner or interim unlocking manner at user's end for lock mode
The effective status at end.Such as user terminal disables bluetooth key B according to inquiry result, when user inputs bluetooth key B in door lock
When, when user terminal carries out matching verifying, so that unlock instruction can not be generated, door also can not be just unable to control by verifying
Lock unlock.So that getting inquiry by user terminal as a result, and having in maintenance bluetooth unlocking manner or interim unlocking manner
After effect or disabling, without sending command adapted thereto to door lock, and in the first unlocking information or the second unlock for receiving door lock acquisition
It when information, is verified in user terminal, further according to the opening and closing of verification result control door lock.
In some embodiments, after obtaining inquiry result, according to inquiry result maintenance bluetooth unlocking manner or temporarily
Unlocking manner is effective, so that using the user of bluetooth unlocking manner or interim unlocking manner when double verification mode is opened,
Still bluetooth unlocking manner or the unlock of interim unlocking manner can be used.For example, user Y-direction user Z has shared one temporarily
Password C can solve door lock between this Saturday 12:00-14:00, and user Y is opened due to this Friday needing and going on business in this Thursday
Double verification mode has been opened, has generated whether inquiry message inquiry user Y maintains temporary password C effective at this time, so that being mentioned in user Y
While rising door lock security level, avoids causing unavailable because forgeing the temporary password C being arranged before this, still can choose order
User Z can use temporary password C normal release.To improve the ease of use of user while promoting safety,
Meet the diversified demand of user.
When double verification mode is switched to unlatching by closing, step S304 can be executed, step can also executed
Step S304 is executed after S303.
Step S304: the historical information of a variety of default unlocking manners is obtained.
Step S305: according to historical information, unlocking manner setting instruction is generated.
In the present embodiment, the historical information of default unlocking manner includes the default use of unlocking manner within a preset period of time
Frequency and at least one of rate is proved to be successful in default verifying number.
As a kind of mode, the historical information of default unlocking manner includes default unlocking manner making within a preset period of time
Use frequency.It is arranged successively from high to low according to frequency of use, generates unlocking manner setting instruction, wherein unlocking manner setting refers to
It include the default unlocking manner arranged by frequency of use in order.It is full to the unlocking manner for facilitating user to select frequency of use high
The use habit of sufficient user promotes the convenience of user's selection.
Alternatively, the historical information for presetting unlocking manner includes default unlocking manner in default verifying number
Be proved to be successful rate.It is arranged successively from high to low according to rate is proved to be successful, generates unlocking manner setting instruction, wherein unlock side
It include by the default unlocking manner for being proved to be successful rate arrangement in formula setting instruction.User's selection is facilitated to be proved to be successful the high unlock of rate
Mode helps to improve the unlock efficiency and accuracy of user while promoting ease of use.
As another mode, the historical information of default unlocking manner includes presetting unlocking manner within a preset period of time
Frequency of use and/or it is proved to be successful rate in default verifying number, according to frequency of use and is proved to be successful rate to default solution
Lock mode is arranged, according to the preset ratio of frequency of use and by the preset ratio for the rate that is proved to be successful, by frequency of use compared with
It is high and be proved to be successful the higher default unlocking manner prioritization of rate, specifically, such as frequency of use F1 and frequency of use F1
Preset ratio P1 is proved to be successful rate F2 and is proved to be successful the preset ratio P2 of rate F2, and wherein P1 and P2 sum are 1, i.e. P1+
P2=1 calculates composite score S=F1xP1+F2xP2, and arranges from high to low according to composite score S, thus by frequency of use compared with
It is high and be proved to be successful the higher default unlocking manner prioritization of rate, facilitate user to take into account frequency of use and is proved to be successful rate choosing
Default unlocking manner is selected, the use habit of user can be not only met, but also the unlock efficiency and accuracy of user can be improved, promotes user
Ease of use.
Further, it the preset ratio of frequency of use and is proved to be successful the preset ratio of rate and can be default, also
Be built in program be also possible to user can customized setting, to frequency of use and be proved to be successful between rate according to user
Different degrees of concern be configured.Specifically, can be by the preset ratio of increase frequency of use, so that prioritization is pre-
It, can also be by increasing the preset ratio for the rate that is proved to be successful, so that preferentially arranging if unlocking manner more meets the use habit of user
The default verification mode of column more easily successfully unlocks, and improves unlock efficiency, to realize default according to user demand prioritization
Unlocking manner facilitates user to select, and promotes the ease of use of user.
In the present embodiment, the historical information of a variety of default unlocking manners can locally be obtained by door lock, and according to going through
History information generates unlocking manner setting instruction, and unlocking manner setting instruction is sent to the user terminal, is obtained by user terminal
The setting of user.
In further embodiments, the historical information of a variety of default unlocking manners can also be obtained by user terminal,
When double verification mode is switched to unlatching by closing, the historical information of a variety of default unlocking manners is obtained, and according to historical information
Generate unlocking manner setting instruction.
Step S306: being arranged according to unlocking manner and instruct, and the first unlocking manner and the second unlocking manner is arranged.
It include the default unlocking manner arranged from high to low by frequency of use in unlocking manner setting instruction in the present embodiment
With at least one of the default unlocking manner arranged from high to low by the rate that is proved to be successful.
In the present embodiment, it is arranged according to unlocking manner and is instructed, user can be obtained by user terminal and be unlocked to first
The setting information of mode and the second unlocking manner, and the setting information is sent to door lock, after door lock receives setting information
First unlocking manner and the second unlocking manner are set.
As a kind of mode, whether there is no correct for verifying the first unlocking manner in the verification information library of door lock local
The first verification information and for verify whether correct second verification information of the second unlocking manner, be sent to door lock at this time
Setting information includes the first unlocking manner, the first verification information, the second unlocking manner and the second verification information.So as to
The first unlocking manner and the second unlocking manner is locally located in door lock, and is acquiring the first unlocking information and the second unlocking information
It can locally be verified in door lock later, promote verification efficiency.
Alternatively, exist in the verification information library of door lock local whether correct for verifying the first unlocking manner
The first verification information and for verify whether correct second verification information of the second unlocking manner, be sent to door lock at this time
Setting information includes the first unlocking manner and the second unlocking manner, without sending the first verification information and the second verifying letter
Breath, reduces the data volume that communicates with door lock of user terminal, raising communication efficiency, can be with after door lock receives the setting information
The first unlocking manner and the second unlocking manner are set according to the setting information, and can locally be verified in door lock, promotion is tested
Demonstrate,prove efficiency.
As another mode, can also be verified in user terminal, setting information is sent to door lock by user terminal
Afterwards, the first unlocking information and the second unlocking information that reception door lock locally acquires are for verifying.Specific verification step is visible
Step S102, details are not described herein.
Wherein, it should be noted that the sequencing between step S304- step S306 and step S301- step S303
In the present embodiment without limitation, i.e. step S304- step S306 can be set before step S301- step S303, step
S340 also can be set after step S350- step S360, can also only execute step S304- step S306, or only execute
Step S301- step S303.
The control method for door lock that another embodiment of the application provides, by the way that when double verification mode is opened, acquisition is logical
The first unlocking information of the first unlocking manner input and the second unlocking information by the input of the second unlocking manner are crossed, then base
In default verification mode, the first unlocking information and the second unlocking information are verified, and when the first unlocking information and the
When two unlocking informations are proved to be successful, unlock instruction is generated.Compared to control method for door lock shown in Fig. 2, the present embodiment is also logical
It crosses when double verification mode is opened, generates double verification prompt, so that whether user has turned on double verification mould without memory
Formula, improve unlock convenience, while can by door lock local verification, user terminal verifying and server authentication at least
A kind of pair of unlocking information is verified, and System Error-tolerance Property and verification efficiency are improved, and in addition to this, is opening double verification mode
When, by ask the user whether maintain bluetooth unlocking manner or interim unlocking manner it is effective, lifting door lock security level it is same
When, meet the diversified demand of user, according to frequency of use and the default unlocking manner of rate arrangement can also be proved to be successful, it is convenient
User's selection, promotes the convenience of user.While improving door lock security level to realize, unlock efficiency and convenience are promoted
Property.
Referring to Fig. 5, Fig. 5 shows the control method for door lock of another embodiment of the application offer, it is applied to shown in Fig. 1
Door lock control system, door lock control system includes door lock and user terminal, and door lock is connected with user terminal communication.Below by needle
Timing diagram shown in fig. 5 is illustrated, the method can specifically include following steps:
Step S401: user terminal is arranged and opens or closes double verification mode.
Step S402: when double verification mode is opened, acquisition is unlocked door lock by first that the first unlocking manner inputs
Information and the second unlocking information inputted by the second unlocking manner.
Step S403: collected first unlocking information and the second unlocking information are sent to user's end by door lock
End.
Step S404: user terminal verifies the first unlocking information and the second unlocking information.
Step S405: user terminal generates unlock when the first unlocking information and the second unlocking information are proved to be successful
Instruction, and it is sent to door lock.
Step S406: door lock receives unlock instruction and unlocks.
Further, referring to Fig. 6, the process of user terminal setting double verification mode specifically can wrap in step S401
Include following steps:
Step S501: user terminal detects whether to exist effective when double verification mode is switched to unlatching by closing
Bluetooth unlocking manner or interim unlocking manner.
Step S502: user terminal generates inquiry when there are effective bluetooth unlocking manner or interim unlocking manner
Information.
Step S503: user terminal obtains inquiry as a result, and inquiry result is sent to door lock.
Step S504: door lock is according to inquiry as a result, maintaining bluetooth unlocking manner or interim unlocking manner effectively or disabling.
The control method for door lock that another embodiment of the application provides opens double verification mode, door by user terminal
The first unlocking information and believed by the second unlock that the second unlocking manner inputs that lock acquisition is inputted by the first unlocking manner
Breath, user terminal generates unlock instruction when the first unlocking information and the second unlocking information are proved to be successful, and is sent to door
Lock, door lock receive unlock instruction and unlock, and improve door lock safety.And to the first unlocking information and the second unlocking information
Verifying can door lock locally carry out, substantially increase verification efficiency, and in Network Abnormal still can guarantee efficient verification,
And when the first unlocking information and the second unlocking information are proved to be successful, unlock instruction is generated, it is in addition to this, dual opening
When Validation Mode, maintains bluetooth unlocking manner or interim unlocking manner effective by asking the user whether, meet the more of user
Sample demand.To improve door lock security level and promoted house security coefficient on the basis of, increase verification efficiency with
And user's ease of use.
The application further embodiment additionally provides a kind of door lock control system, including door lock and user terminal, door lock and
User terminal communication connection.Wherein, user terminal can be used for being arranged and opening or closing double verification mode;Door lock can be used for
When double verification mode is opened, the first unlocking information and pass through the second unlock side that acquisition is inputted by the first unlocking manner
Second unlocking information of formula input, and based on default verification mode, the first unlocking information and the second unlocking information are carried out
Verifying, and the unlock when the first unlocking information and the second unlocking information are proved to be successful.
In some embodiments, door lock can also be used to send out collected first unlocking information and the second unlocking information
It send to user terminal;User terminal can also be used to verify the first unlocking information and the second unlocking information, and when the
When one unlocking information and the second unlocking information are proved to be successful, unlock instruction is generated, and be sent to door lock, and in the first unlock
When information and the second unlocking information are proved to be successful, unlock instruction is generated, and be sent to door lock.
In some embodiments, user terminal can also be used in when double verification mode is switched to unlatching by closing, inspection
It surveys with the presence or absence of effective bluetooth unlocking manner perhaps interim unlocking manner and when there are effective bluetooth unlocking manner or facing
When unlocking manner when, generate inquiry message.Wherein, inquiry message is for inquiring that bluetooth unlocking manner or interim unlocking manner exist
Whether double verification mode remains effective after opening, wherein bluetooth unlocking manner is the unlock that user is unlocked using bluetooth key
Mode, interim unlocking manner are unlocking manner effective within a preset period of time set by user.
In some embodiments, user terminal can also be used to obtain inquiry as a result, and inquiry result is sent to door lock;
Door lock can also be used according to inquiry as a result, maintaining bluetooth unlocking manner or interim unlocking manner effectively or disabling.
It is apparent to those skilled in the art that for convenience and simplicity of description, foregoing description system
Specific work process can refer to corresponding processes in the foregoing method embodiment, i.e., above-mentioned door lock control system can be used for reality
The control method for door lock in preceding method embodiment is applied, details are not described herein.
Referring to Fig. 7, Fig. 7 shows a kind of module frame chart of door-lock controller 600 provided in an embodiment of the present invention.Under
Face will be illustrated for module frame chart shown in Fig. 7, and the door-lock controller 600 includes: acquisition module 610, verifying mould
Block 620 and directive generation module 630, in which:
Acquisition module 610, for the first solution that when double verification mode is opened, acquisition is inputted by the first unlocking manner
Lock information and the second unlocking information inputted by the second unlocking manner.
Authentication module 620 verifies the first unlocking information and the second unlocking information based on default verification mode.
Directive generation module 630, for generating solution when the first unlocking information and the second unlocking information are proved to be successful
Lock instruction.
Further, acquisition module 610 includes: the first acquisition unit, mode checking unit, prompt generation unit and the
Two acquisition units, in which:
First acquisition unit, for increasing the heating function of heating tube when current leaving water temperature is lower than the first preset temperature
Rate;
Mode checking unit, for acquiring the first unlocking information for passing through the first unlocking manner and inputting;
Generation unit is prompted, it is described dual to test for generating double verification prompt information when double verification mode is opened
Card prompt information is for prompting user to input the second unlocking information by the second unlocking manner;
Second acquisition unit, for acquiring the second unlocking information for passing through the second unlocking manner and inputting.
Further, the door-lock controller 600 further include: unlocking manner detection module, inquiry message generation module,
Unlocking manner processing module, setting instruction acquisition module, unlocking manner setup module and water inlet control module, in which:
Unlocking manner detection module, for detecting whether to deposit when the double verification mode is switched to unlatching by closing
In effective bluetooth unlocking manner or interim unlocking manner.
Inquiry message generation module is used for when there is the effective bluetooth unlocking manner or interim unlocking manner,
Inquiry message is generated, the inquiry message is for inquiring the bluetooth unlocking manner or the interim unlocking manner described double
Whether weight Validation Mode remains effective after opening;The bluetooth unlocking manner is the unlock side that user is unlocked using bluetooth key
Formula;The interim unlocking manner is unlocking manner effective within a preset period of time set by user.
Unlocking manner processing module, for obtaining inquiry as a result, and maintaining the bluetooth to unlock according to the inquiry result
Mode or the interim unlocking manner are effectively or disabling.
Instruction acquisition module is set, for obtaining unlock side when the double verification mode is switched to unlatching by closing
Formula setting instruction.
Unlocking manner setup module is instructed for being arranged according to the unlocking manner, be arranged first unlocking manner with
And second unlocking manner.
Further, the setting instruction acquisition module includes that historical information acquiring unit and setting instruction generate list
Member, in which:
Historical information acquiring unit, for obtaining the historical information of a variety of default unlocking manners, the historical information includes
Default unlocking manner frequency of use within a preset period of time and being proved to be successful in rate extremely in default verifying number
Few one kind.
Instruction generation unit is set, for generating unlocking manner setting instruction according to the historical information.
The embodiment of the invention provides a kind of door-lock controllers, by the way that when double verification mode is opened, acquisition passes through
First unlocking information of the first unlocking manner input and the second unlocking information inputted by the second unlocking manner, are then based on
Default verification mode, verifies the first unlocking information and the second unlocking information, and when the first unlocking information and second
When unlocking information is proved to be successful, unlock instruction is generated.Compared to control method for door lock shown in Fig. 2, the present embodiment also passes through
When double verification mode is opened, double verification prompt is generated, so that whether user has turned on double verification mode without memory,
Unlock convenience is improved, while at least one in door lock local verification, user terminal verifying and server authentication can be passed through
Kind verifies unlocking information, improves System Error-tolerance Property and verification efficiency, in addition to this, when opening double verification mode,
By asking the user whether to maintain bluetooth unlocking manner or interim unlocking manner effective, while lifting door lock security level,
Meet the diversified demand of user, according to frequency of use and the default unlocking manner of rate arrangement can also be proved to be successful, facilitate use
Family selection, promotes the convenience of user.While improving door lock security level to realize, unlock efficiency and convenience are promoted
Property.
It is apparent to those skilled in the art that for convenience and simplicity of description, foregoing description device and
The specific work process of module, can refer to corresponding processes in the foregoing method embodiment, and details are not described herein.
A kind of electronic equipment provided by the present application is illustrated below in conjunction with Fig. 8.
Referring to Fig. 8, the embodiment of the present application also provides one kind to hold based on above-mentioned control method for door lock, device
The electronic equipment 700 of the aforementioned control method for door lock of row.
Electronic equipment 700 in the application may include one or more such as lower component: processor 710, memory 720 with
And one or more application program, wherein one or more application programs can be stored in memory 720 and be configured as
It is executed by one or more processors 710, one or more programs are configured to carry out as described in preceding method embodiment
Method.
Wherein, processor 710 may include one or more processing core.Processor 710 utilizes various interfaces and route
The various pieces in entire electronic equipment 700 are connected, by running or executing the instruction being stored in memory 720, program, generation
Code collection or instruction set, and the data being stored in memory 720 are called, execute the various functions and processing of electronic equipment 700
Data.Optionally, processor 710 can be using Digital Signal Processing (Digital Signal Processing, DSP), scene
Programmable gate array (Field-Programmable Gate Array, FPGA), programmable logic array (Programmable
Logic Array, PLA) at least one of example, in hardware realize.Processor 710 can integrating central processor (Central
Processing Unit, CPU), in graphics processor (Graphics Processing Unit, GPU) and modem etc.
One or more of combinations.Wherein, the main processing operation system of CPU, user interface and application program etc.;GPU is for being responsible for
Show the rendering and drafting of content;Modem is for handling wireless communication.It is understood that above-mentioned modem
It can not be integrated into processor 710, be realized separately through one piece of communication chip.
Memory 720 may include random access memory (Random Access Memory, RAM), also may include read-only
Memory (Read-Only Memory).Memory 720 can be used for store instruction, program, code, code set or instruction set.It deposits
Reservoir 720 may include storing program area and storage data area, wherein the finger that storing program area can store for realizing operating system
Enable, for realizing at least one function instruction (such as touch function, sound-playing function, image player function etc.), be used for
Realize the instruction etc. of following each embodiments of the method.Storage data area can also store electronic equipment 700 and be created in use
Data (such as phone directory, audio, video data, chat record data) etc..
Further, electronic equipment 700 can also include touch screen, and touch screen can be liquid crystal display (Liquid
Crystal Display, LCD), it can be (Organic Light-Emitting Diode, OLED) etc..The touch screen is used
In showing information input by user, the various graphical user interface of the information and electronic equipment 700 that are supplied to user, these
Graphical user interface can be made of figure, text, icon, number, video and any combination thereof.
Referring to Fig. 9, it illustrates a kind of structural frames of computer-readable storage medium provided by the embodiments of the present application
Figure.Program code is stored in the computer-readable storage medium 800, said program code can be called by processor and be executed
State method described in embodiment of the method.
Computer-readable storage medium 800 can be (the read-only storage of electrically erasable of such as flash memory, EEPROM
Device), the electronic memory of EPROM, hard disk or ROM etc.Optionally, computer-readable storage medium 800 includes non-easy
The property lost computer-readable medium (non-transitory computer-readable storage medium).Computer can
Read the memory space that storage medium 800 has the program code 810 for executing any method and step in the above method.These journeys
Sequence code can read or be written to this one or more computer journey from one or more computer program product
In sequence product.Program code 810 can for example be compressed in a suitable form.
In conclusion control method for door lock provided by the embodiments of the present application, system, device, electronic equipment and storage medium,
By the way that when double verification mode is opened, acquisition passes through the first unlocking information that the first unlocking manner inputs and by the second solution
The second unlocking information that lock mode inputs, is then based on default verification mode, to the first unlocking information and the second unlocking information
It is verified, and when the first unlocking information and the second unlocking information are proved to be successful, generates unlock instruction.To by opening
Open double verification mode so that door lock need to two kinds verifying by when just unlock, improve the security level and promotion of door lock
House security coefficient.
In the description of this specification, reference term " one embodiment ", " some embodiments ", " example ", " specifically show
The description of example " or " some examples " etc. means specific features, structure, material or spy described in conjunction with this embodiment or example
Point is contained at least one embodiment or example of the application.In the present specification, schematic expression of the above terms are not
It must be directed to identical embodiment or example.Moreover, particular features, structures, materials, or characteristics described can be in office
It can be combined in any suitable manner in one or more embodiment or examples.In addition, without conflicting with each other, the skill of this field
Art personnel can tie the feature of different embodiments or examples described in this specification and different embodiments or examples
It closes and combines.
In addition, term " first ", " second " are used for descriptive purposes only and cannot be understood as indicating or suggesting relative importance
Or implicitly indicate the quantity of indicated technical characteristic.Define " first " as a result, the feature of " second " can be expressed or
Implicitly include at least one this feature.In the description of the present application, the meaning of " plurality " is at least two, such as two, three
It is a etc., unless otherwise specifically defined.
Any process described otherwise above or method description are construed as in flow diagram or herein, are indicated
Include the steps that module, the segment of one or more codes for realizing specific logical function or the executable instruction of process
Or part, and the range of the preferred embodiment of the application includes other realization, wherein can not be by shown or discussion
Sequence, including according to related function by it is basic simultaneously in the way of or in the opposite order, Lai Zhihang function, this should be by this
The embodiment person of ordinary skill in the field of application is understood.
Expression or logic and/or step described otherwise above herein in flow diagram, for example, may be considered that
It is the order list of the executable instruction for realizing logic function, may be embodied in any computer-readable medium,
For instruction execution system, device or equipment (such as computer based system, including the system of processor or other can be from finger
Enable the system for executing system, device or equipment instruction fetch and executing instruction) it uses, or combine these instruction execution systems, device
Or equipment and use.For the purpose of this specification, " computer-readable medium ", which can be, any may include, store, communicating, propagating
Or transfer program uses for instruction execution system, device or equipment or in conjunction with these instruction execution systems, device or equipment
Device.The more specific example (non-exhaustive list) of computer-readable medium include the following: there are one or more wirings
Electrical connection section (mobile terminal), portable computer diskette box (magnetic device), random access memory (RAM), read-only memory
(ROM), erasable edit read-only storage (EPROM or flash memory), fiber device and portable optic disk is read-only deposits
Reservoir (CDROM).In addition, computer-readable medium can even is that the paper that can print described program on it or other are suitable
Medium, because can then be edited, be interpreted or when necessary with it for example by carrying out optical scanner to paper or other media
His suitable method is handled electronically to obtain described program, is then stored in computer storage.
It should be appreciated that each section of the application can be realized with hardware, software, firmware or their combination.Above-mentioned
In embodiment, software that multiple steps or method can be executed in memory and by suitable instruction execution system with storage
Or firmware is realized.It, and in another embodiment, can be under well known in the art for example, if realized with hardware
Any one of column technology or their combination are realized: having a logic gates for realizing logic function to data-signal
Discrete logic, with suitable combinational logic gate circuit specific integrated circuit, programmable gate array (PGA), scene
Programmable gate array (FPGA) etc..
Those skilled in the art are understood that realize all or part of step that above-described embodiment method carries
It suddenly is that relevant hardware can be instructed to complete by program, the program can store in a kind of computer-readable storage
In medium, which when being executed, includes the steps that one or a combination set of embodiment of the method.In addition, in each implementation of the application
Each functional unit in example can integrate in a processing module, is also possible to each unit and physically exists alone, can also be with
Two or more units are integrated in a module.Above-mentioned integrated module both can take the form of hardware realization,
It can be realized in the form of software function module.If the integrated module is realized and is made in the form of software function module
It is independent product when selling or using, also can store in a computer readable storage medium.
Storage medium mentioned above can be read-only memory, disk or CD etc..Although having been shown and retouching above
Embodiments herein is stated, it is to be understood that above-described embodiment is exemplary, and should not be understood as the limit to the application
System, those skilled in the art can be changed above-described embodiment, modify, replace and become within the scope of application
Type.
Finally, it should be noted that above embodiments are only to illustrate the technical solution of the application, rather than its limitations;Although
The application is described in detail with reference to the foregoing embodiments, those skilled in the art are when understanding: it still can be with
It modifies the technical solutions described in the foregoing embodiments or equivalent replacement of some of the technical features;And
These are modified or replaceed, do not drive corresponding technical solution essence be detached from each embodiment technical solution of the application spirit and
Range.
Claims (15)
1. a kind of control method for door lock characterized by comprising
When double verification mode is opened, the first unlocking information and pass through the second solution that acquisition is inputted by the first unlocking manner
The second unlocking information that lock mode inputs;
Based on default verification mode, first unlocking information and second unlocking information are verified;
When first unlocking information and second unlocking information are proved to be successful, unlock instruction is generated.
2. the method as described in claim 1, which is characterized in that described when double verification mode is opened, acquisition passes through first
First unlocking information of unlocking manner input and the second unlocking information inputted by the second unlocking manner, comprising:
The first unlocking information that acquisition is inputted by the first unlocking manner;
Whether detection double verification mode opens;
When double verification mode is opened, double verification prompt information is generated, the double verification prompt information is used for prompting
Family inputs the second unlocking information by the second unlocking manner;
The second unlocking information that acquisition is inputted by the second unlocking manner.
3. method according to claim 1 or 2, which is characterized in that the method also includes:
When the double verification mode is switched to unlatching by closing, detects whether there are effective bluetooth unlocking manner or face
When unlocking manner;
When there is the effective bluetooth unlocking manner or interim unlocking manner, inquiry message, the inquiry message are generated
For inquiring whether the bluetooth unlocking manner or the interim unlocking manner maintain after double verification mode unlatching
Effectively;The bluetooth unlocking manner is the unlocking manner that user is unlocked using bluetooth key;The interim unlocking manner is user
The unlocking manner effective within a preset period of time of setting.
4. method as claimed in claim 3, which is characterized in that after the generation inquiry message, the method also includes:
Inquiry is obtained as a result, and maintaining the bluetooth unlocking manner or the interim unlocking manner to have according to the inquiry result
Effect or disabling.
5. the method as described in claim 1, which is characterized in that the method also includes:
When the double verification mode is switched to unlatching by closing, unlocking manner setting instruction is obtained;
It is arranged according to the unlocking manner and is instructed, first unlocking manner and second unlocking manner is set.
6. method as claimed in claim 5, which is characterized in that the acquisition unlocking manner setting instruction, comprising:
The historical information of a variety of default unlocking manners is obtained, the historical information includes the default unlocking manner in preset time
Frequency of use in section and at least one of rate is proved to be successful in default verifying number;
According to the historical information, unlocking manner setting instruction is generated.
7. the method as described in claim 1, which is characterized in that first unlocking manner or second unlocking manner include
Following at least one:
Password unlock, unlocked by fingerprint, face unlock, vocal print unlock, bluetooth unlock and near-field communication unlock.
8. the method as described in claim 1, which is characterized in that the default verification mode comprises at least one of the following:
Door lock local verification, user terminal verifying and server authentication.
9. a kind of door lock control system, which is characterized in that including door lock and user terminal, the door lock and the user terminal are logical
Letter connection, in which:
The user terminal, for being arranged and opening or closing double verification mode;
The door lock, for the first unlocking information that when double verification mode is opened, acquisition is inputted by the first unlocking manner
And the second unlocking information inputted by the second unlocking manner;
The door lock, for being carried out to first unlocking information and second unlocking information based on default verification mode
Verifying;
The door lock, for the unlock when first unlocking information and second unlocking information are proved to be successful.
10. system as claimed in claim 9, which is characterized in that the door lock is also used to collected first unlock
Information and second unlocking information are sent to the user terminal;
The user terminal is also used to verify first unlocking information and second unlocking information, when described
When one unlocking information and second unlocking information are proved to be successful, unlock instruction is generated, and be sent to the door lock;
The door lock is also used to receive the unlock instruction and unlocks.
11. the system as described in claim 9 or 10, which is characterized in that the user terminal is also used to when the double verification
It when mode is switched to unlatching by closing, detects whether that there are effective bluetooth unlocking manner or interim unlocking manners, and works as and deposit
In the effective bluetooth unlocking manner or the interim unlocking manner, inquiry message is generated, the inquiry message is for asking
Ask whether the bluetooth unlocking manner or the interim unlocking manner remain effective after double verification mode unlatching;Institute
Stating bluetooth unlocking manner is the unlocking manner that is unlocked using bluetooth key of user, the interim unlocking manner be it is set by user
Effective unlocking manner in preset time period.
12. system as claimed in claim 11, which is characterized in that the user terminal is also used to obtain inquiry as a result, and will
The inquiry result is sent to the door lock;
The door lock is also used to according to the inquiry as a result, maintaining the interim unlocking manner effectively or the disabling interim unlock
Mode.
13. a kind of door-lock controller characterized by comprising
Acquisition module, for the first unlocking information that when double verification mode is opened, acquisition is inputted by the first unlocking manner
And the second unlocking information inputted by the second unlocking manner;
Authentication module verifies first unlocking information and second unlocking information based on default verification mode;
Directive generation module, for generating when first unlocking information and second unlocking information are proved to be successful
Unlock instruction.
14. a kind of electronic equipment characterized by comprising
Memory;
One or more processors are coupled with the memory;
One or more programs, wherein one or more of application programs are stored in the memory and are configured as
It is executed by one or more of processors, one or more of programs are configured to carry out such as any one of claim 1-8
The method.
15. a kind of computer-readable storage medium, which is characterized in that be stored with journey in the computer-readable storage medium
Sequence code, said program code can be called by processor and execute the method according to claim 1.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811431512.8A CN109636966B (en) | 2018-11-26 | 2018-11-26 | Door lock control method, system, device, electronic equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811431512.8A CN109636966B (en) | 2018-11-26 | 2018-11-26 | Door lock control method, system, device, electronic equipment and storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109636966A true CN109636966A (en) | 2019-04-16 |
CN109636966B CN109636966B (en) | 2021-02-26 |
Family
ID=66070014
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811431512.8A Active CN109636966B (en) | 2018-11-26 | 2018-11-26 | Door lock control method, system, device, electronic equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109636966B (en) |
Cited By (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110111462A (en) * | 2019-04-30 | 2019-08-09 | 珠海吉门第科技有限公司 | A kind of right management method and system based on intelligent door lock double authentication |
CN110723105A (en) * | 2019-08-26 | 2020-01-24 | 神通科技集团股份有限公司 | B-pillar decorative plate with face recognition and password input functions |
CN110956732A (en) * | 2019-12-19 | 2020-04-03 | 重庆特斯联智慧科技股份有限公司 | Safety entrance guard based on thing networking |
CN111145398A (en) * | 2019-12-31 | 2020-05-12 | 深圳绿米联创科技有限公司 | Intelligent door lock control method and device, intelligent door lock and storage medium |
CN111223218A (en) * | 2020-02-22 | 2020-06-02 | 沃兴(杭州)科技有限公司 | Intelligent door with secondary access control system |
CN111768530A (en) * | 2020-07-22 | 2020-10-13 | 联想(北京)有限公司 | Intelligent unlocking method and device |
CN111860159A (en) * | 2020-06-15 | 2020-10-30 | 珠海格力电器股份有限公司 | Intelligent door lock control method, intelligent door lock, storage medium and processor |
CN112037404A (en) * | 2020-08-21 | 2020-12-04 | 的卢技术有限公司 | Intelligent access control system based on multiple discernment |
CN112364673A (en) * | 2020-11-25 | 2021-02-12 | Oppo广东移动通信有限公司 | Information verification method, terminal equipment, NFC verification device and system |
CN113256854A (en) * | 2021-07-06 | 2021-08-13 | 徐州源勤电子科技有限公司 | User behavior encryption method and device based on computer big data |
CN113744434A (en) * | 2021-08-20 | 2021-12-03 | 北京万千维度网络科技有限公司 | Automatic multi-mode unlocking method and system |
CN113870468A (en) * | 2021-12-02 | 2021-12-31 | 云丁网络技术(北京)有限公司 | Control method and system of intelligent lock |
CN114333116A (en) * | 2021-12-29 | 2022-04-12 | 珠海格力电器股份有限公司 | Intelligent door lock, control method, electronic device and storage medium |
CN114387712A (en) * | 2022-01-27 | 2022-04-22 | 深圳优创杰科技有限公司 | Method for realizing temporary password setting of offline Bluetooth password lock |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103280007A (en) * | 2013-04-28 | 2013-09-04 | 青岛歌尔声学科技有限公司 | Bluetooth face identification strongbox |
CN203941561U (en) * | 2014-04-28 | 2014-11-12 | 张瞳 | Wireless open system for lockset |
EP2732579A4 (en) * | 2011-07-12 | 2015-04-08 | Assa Abloy Ab | Event driven second factor credential authentication |
CN106355717A (en) * | 2016-09-05 | 2017-01-25 | 惠州Tcl移动通信有限公司 | Mobile terminal unlocking method and system based on fingerprint recognition and NFC (near field communication) |
CN206162731U (en) * | 2016-08-12 | 2017-05-10 | 燕南国创科技(北京)有限公司 | Gate lock |
CN106846580A (en) * | 2017-01-25 | 2017-06-13 | 移康智能科技(上海)股份有限公司 | Intelligent unlocking method and system |
CN107145212A (en) * | 2017-04-12 | 2017-09-08 | 广东欧珀移动通信有限公司 | Terminal unlock method, device and terminal |
CN107481373A (en) * | 2017-08-18 | 2017-12-15 | 蜂联智能(深圳)有限公司 | A kind of intelligent door lock |
CN107810526A (en) * | 2015-07-01 | 2018-03-16 | 三星电子株式会社 | User authentication method and equipment |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP5274503B2 (en) * | 2010-04-08 | 2013-08-28 | 株式会社日立ビルシステム | Electric lock management system and management device |
CN106898059A (en) * | 2015-12-18 | 2017-06-27 | 北京奇虎科技有限公司 | Electronic door lock system and electronic lock method for unlocking |
CN105975824A (en) * | 2016-07-21 | 2016-09-28 | 深圳市金立通信设备有限公司 | Method for switching screen unlocking modes and terminal |
-
2018
- 2018-11-26 CN CN201811431512.8A patent/CN109636966B/en active Active
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2732579A4 (en) * | 2011-07-12 | 2015-04-08 | Assa Abloy Ab | Event driven second factor credential authentication |
CN103280007A (en) * | 2013-04-28 | 2013-09-04 | 青岛歌尔声学科技有限公司 | Bluetooth face identification strongbox |
CN203941561U (en) * | 2014-04-28 | 2014-11-12 | 张瞳 | Wireless open system for lockset |
CN107810526A (en) * | 2015-07-01 | 2018-03-16 | 三星电子株式会社 | User authentication method and equipment |
CN206162731U (en) * | 2016-08-12 | 2017-05-10 | 燕南国创科技(北京)有限公司 | Gate lock |
CN106355717A (en) * | 2016-09-05 | 2017-01-25 | 惠州Tcl移动通信有限公司 | Mobile terminal unlocking method and system based on fingerprint recognition and NFC (near field communication) |
CN106846580A (en) * | 2017-01-25 | 2017-06-13 | 移康智能科技(上海)股份有限公司 | Intelligent unlocking method and system |
CN107145212A (en) * | 2017-04-12 | 2017-09-08 | 广东欧珀移动通信有限公司 | Terminal unlock method, device and terminal |
CN107481373A (en) * | 2017-08-18 | 2017-12-15 | 蜂联智能(深圳)有限公司 | A kind of intelligent door lock |
Cited By (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110111462A (en) * | 2019-04-30 | 2019-08-09 | 珠海吉门第科技有限公司 | A kind of right management method and system based on intelligent door lock double authentication |
CN110723105A (en) * | 2019-08-26 | 2020-01-24 | 神通科技集团股份有限公司 | B-pillar decorative plate with face recognition and password input functions |
CN110956732A (en) * | 2019-12-19 | 2020-04-03 | 重庆特斯联智慧科技股份有限公司 | Safety entrance guard based on thing networking |
CN111145398B (en) * | 2019-12-31 | 2022-04-12 | 深圳绿米联创科技有限公司 | Intelligent door lock control method and device, intelligent door lock and storage medium |
CN111145398A (en) * | 2019-12-31 | 2020-05-12 | 深圳绿米联创科技有限公司 | Intelligent door lock control method and device, intelligent door lock and storage medium |
CN111223218A (en) * | 2020-02-22 | 2020-06-02 | 沃兴(杭州)科技有限公司 | Intelligent door with secondary access control system |
CN111860159A (en) * | 2020-06-15 | 2020-10-30 | 珠海格力电器股份有限公司 | Intelligent door lock control method, intelligent door lock, storage medium and processor |
CN111768530A (en) * | 2020-07-22 | 2020-10-13 | 联想(北京)有限公司 | Intelligent unlocking method and device |
CN111768530B (en) * | 2020-07-22 | 2022-04-19 | 联想(北京)有限公司 | Intelligent unlocking method and device |
CN112037404A (en) * | 2020-08-21 | 2020-12-04 | 的卢技术有限公司 | Intelligent access control system based on multiple discernment |
CN112364673A (en) * | 2020-11-25 | 2021-02-12 | Oppo广东移动通信有限公司 | Information verification method, terminal equipment, NFC verification device and system |
CN113256854A (en) * | 2021-07-06 | 2021-08-13 | 徐州源勤电子科技有限公司 | User behavior encryption method and device based on computer big data |
CN113744434A (en) * | 2021-08-20 | 2021-12-03 | 北京万千维度网络科技有限公司 | Automatic multi-mode unlocking method and system |
CN113744434B (en) * | 2021-08-20 | 2023-09-01 | 北京万千维度网络科技有限公司 | Automatic multi-mode unlocking method and system |
CN113870468A (en) * | 2021-12-02 | 2021-12-31 | 云丁网络技术(北京)有限公司 | Control method and system of intelligent lock |
CN114333116A (en) * | 2021-12-29 | 2022-04-12 | 珠海格力电器股份有限公司 | Intelligent door lock, control method, electronic device and storage medium |
CN114387712A (en) * | 2022-01-27 | 2022-04-22 | 深圳优创杰科技有限公司 | Method for realizing temporary password setting of offline Bluetooth password lock |
Also Published As
Publication number | Publication date |
---|---|
CN109636966B (en) | 2021-02-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109636966A (en) | Control method for door lock, system, device, electronic equipment and storage medium | |
CN103646646B (en) | A kind of sound control method and electronic equipment | |
US9280365B2 (en) | Systems and methods for managing configuration data at disconnected remote devices | |
CN103092503B (en) | The unblock of mobile terminal and verification method and unblock and checking device | |
CN104240342B (en) | Access control method and device based on identity authentication | |
CN109615738A (en) | Door lock management method, device, electronic equipment and storage medium | |
CN105447927B (en) | Control method, access controller and the access control system that gate inhibition's electric lock is opened | |
US9026785B2 (en) | Method and apparatus for smart-key management | |
CN106034063A (en) | Method and device for starting service in communication software through voice | |
CN206522020U (en) | A kind of intelligent door lock and system | |
CN107292147A (en) | A kind of data processing method, device and intelligent terminal | |
CN106067873A (en) | Electronic equipment and call processing method thereof | |
CN107612880A (en) | One kind applies access method and device | |
US11438342B2 (en) | Location-based identity authentication (LIA) system | |
CN110378695A (en) | Bank card payment method, device, equipment and computer storage medium | |
CN110322599A (en) | Door lock management method, device, electronic equipment and storage medium | |
CN106063364A (en) | Electronic device for controlling an external device using a number and method thereof | |
CN107370872A (en) | Method, terminal and the control device of a kind of terminal lock machine and control terminal lock machine | |
CN110414246A (en) | Shared file method for managing security, device, terminal and storage medium | |
CN107402875A (en) | A kind of log recording method, terminal and computer-readable recording medium | |
CN105653285B (en) | The display control method of address list, the display control program of address list and terminal | |
CN112418469A (en) | Reservation management method, device and readable storage medium | |
US11232179B2 (en) | Automated user identification for cross-platform group and device collaboration | |
CN107181753A (en) | Mobile terminal financial system and method | |
WO2019041782A1 (en) | Control method for use of object, authentication device, terminal device, and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |