CN109636966A - Control method for door lock, system, device, electronic equipment and storage medium - Google Patents

Control method for door lock, system, device, electronic equipment and storage medium Download PDF

Info

Publication number
CN109636966A
CN109636966A CN201811431512.8A CN201811431512A CN109636966A CN 109636966 A CN109636966 A CN 109636966A CN 201811431512 A CN201811431512 A CN 201811431512A CN 109636966 A CN109636966 A CN 109636966A
Authority
CN
China
Prior art keywords
unlocking
information
door lock
unlocking manner
manner
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811431512.8A
Other languages
Chinese (zh)
Other versions
CN109636966B (en
Inventor
董雪
隋学鹏
游延筠
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Lumi United Technology Co Ltd
Original Assignee
Shenzhen Lumi United Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Lumi United Technology Co Ltd filed Critical Shenzhen Lumi United Technology Co Ltd
Priority to CN201811431512.8A priority Critical patent/CN109636966B/en
Publication of CN109636966A publication Critical patent/CN109636966A/en
Application granted granted Critical
Publication of CN109636966B publication Critical patent/CN109636966B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/22Individual registration on entry or exit involving the use of a pass in combination with an identity check of the pass holder
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/20Individual registration on entry or exit involving the use of a pass
    • G07C9/27Individual registration on entry or exit involving the use of a pass with central registration

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Lock And Its Accessories (AREA)

Abstract

This application discloses a kind of control method for door lock, system, device, electronic equipment and storage mediums, are related to Smart Home technical field.The above method includes: the first unlocking information that acquisition is inputted by the first unlocking manner and the second unlocking information inputted by the second unlocking manner when double verification mode is opened;Based on default verification mode, the first unlocking information and the second unlocking information are verified;When the first unlocking information and the second unlocking information are proved to be successful, unlock instruction is generated.The application improves the security level of door lock by adding double verification mode to door lock.

Description

Control method for door lock, system, device, electronic equipment and storage medium
Technical field
This application involves Smart Home technical fields, more particularly, to a kind of control method for door lock, system, device, electricity Sub- equipment and storage medium.
Background technique
House security is always the problem of huge numbers of families more pay close attention to, with increasingly developed, the peace of gate inhibition's setting of society Full property is also by higher and higher attention.With the continuous development of door lock technology, current existing intelligent door lock is tested there are a variety of Demonstrate,prove unlocking manner, including the unlock of unlocked by fingerprint, password, face unlock etc..But the unlocking manner of existing intelligent door lock is single, Such as can only be unlocked by the modes such as verifying fingerprint or input password, safety is lower, and password is also easy leakage, exists Biggish security risk.
Summary of the invention
In view of the above problems, present applicant proposes a kind of control method for door lock, system, device, electronic equipment and storages to be situated between Matter, to solve the above problems.
In a first aspect, the embodiment of the present application provides a kind of control method for door lock, it is applied to intelligent gateway, the method packet It includes: when double verification mode is opened, the first unlocking information and pass through the second solution that acquisition is inputted by the first unlocking manner The second unlocking information that lock mode inputs;Based on default verification mode, to first unlocking information and second unlock Information is verified;When first unlocking information and second unlocking information are proved to be successful, unlock instruction is generated.
Second aspect, the embodiment of the present application provide a kind of door lock control system, including door lock and user terminal, the door Lock is connected with the user terminal communication, and the user terminal is described for being arranged and opening or closing double verification mode Door lock is used for when double verification mode is opened, the first unlocking information that acquisition is inputted by the first unlocking manner and by the Second unlocking information of two unlocking manners input, based on default verification mode, to first unlocking information and described second Unlocking information is verified, and the unlock when first unlocking information and second unlocking information are proved to be successful.
The third aspect, the embodiment of the present application provide a kind of door-lock controller, comprising: acquisition module, for dual When Validation Mode is opened, the first unlocking information and inputted by the second unlocking manner that acquisition is inputted by the first unlocking manner The second unlocking information;Authentication module believes first unlocking information and second unlock based on default verification mode Breath is verified;Directive generation module, for being proved to be successful when first unlocking information and second unlocking information When, generate unlock instruction.
Fourth aspect, the embodiment of the present application provide a kind of electronic equipment, and the electronic equipment includes: one or more places Reason device, memory and one or more application program, wherein one or more application programs are stored in memory and are matched It is set to by being executed in one or more processors, one or more application program is configured to carry out the side such as above-mentioned first aspect Method.
5th aspect, the embodiment of the present application provides a kind of computer-readable storage medium, described computer-readable Program code is stored in storage medium, said program code can call the side executed as described in above-mentioned first aspect by processor Method.
Control method for door lock, system, device, electronic equipment and storage medium provided by the embodiments of the present application, by double When weight Validation Mode is opened, acquisition is defeated by the first unlocking information of the first unlocking manner input and by the second unlocking manner The second unlocking information entered, is then based on default verification mode, verifies to the first unlocking information and the second unlocking information, And when the first unlocking information and the second unlocking information are proved to be successful, unlock instruction is generated.To by opening dual test Card mode so that door lock need to two kinds verifying by when just unlock, improve door lock security level and promotion house security Coefficient.
Detailed description of the invention
In order to more clearly explain the technical solutions in the embodiments of the present application, make required in being described below to embodiment Attached drawing is briefly described, it should be apparent that, the drawings in the following description are only some examples of the present application, for For those skilled in the art, without creative efforts, it can also be obtained according to these attached drawings other attached Figure.
Fig. 1 shows the application environment schematic diagram of control method for door lock provided by the embodiments of the present application;
Fig. 2 shows the flow diagrams for the control method for door lock that the application one embodiment provides;
Fig. 3 shows the flow diagram of the control method for door lock of another embodiment of the application offer;
Fig. 4 shows the flow diagram of step S301 to step S306 in another embodiment of the application;
Fig. 5 shows the timing diagram of the control method for door lock of another embodiment of the application offer;
Fig. 6 show another embodiment of the application offer control method for door lock step S401 in double verification is set The timing diagram of mode;
Fig. 7 shows the module frame chart of door-lock controller provided by the embodiments of the present application;
Fig. 8 shows the embodiment of the present application for executing the electronic equipment of the control method for door lock according to the embodiment of the present application Block diagram;
Fig. 9 shows controlling for saving or carrying realization according to the door lock of the embodiment of the present application for the embodiment of the present application The storage unit of the program code of method.
Specific embodiment
In order to make those skilled in the art more fully understand application scheme, below in conjunction in the embodiment of the present application Attached drawing, the technical scheme in the embodiment of the application is clearly and completely described.
Currently traditional to be difficult to prevent the possibility by people's picking lock in the way of key unlock, there are greater risks, and It is also possible to door lock security risk can be caused to increase suddenly because user loses key.And as development in science and technology and people are to house security The increasingly raising of degree of concern, door lock is also more intelligent, and existing intelligent door lock provides a variety of unlocking manners, including key Unlock, unlocked by fingerprint, password unlock, face unlock etc..Existing intelligent door lock is mostly using single unlocking manner, that is, only A unlocking manner need to be verified, so that it may realize that door lock unlocks, such as verifying fingerprint, by that can unlock after verifying, for another example Password is inputted, can be unlocked after password authentification is correct.But security risk existing for single unlocking manner is higher, such as password holds Easily leakage, specifically, the door of active user can be unlocked at any time when other users get the door lock password of active user Lock, causes great security risk.
In view of the above-mentioned problems, inventor has found by long-term research and proposes door lock control provided by the embodiments of the present application Method, system, device, electronic equipment and storage medium processed, by opening double verification mode, so that door lock need to be verified at two kinds By when just unlock, improve door lock security level and promoted house security coefficient.
First a kind of application environment involved in the application will be introduced below.
Referring to Fig. 1, Fig. 1 shows the door lock control system that can be used for control method for door lock provided by the embodiments of the present application 10, the door lock control system 10 include door lock 100 and user terminal 200, wherein user terminal 200 may include PC, Smart phone, tablet computer, wearable electronic equipment etc., are not limited thereto.In some embodiments, the user terminal 200 between user for interacting, and is carried out telecommunication by user terminal 200 with door lock 100 convenient for user.In addition, User can add same account information in door lock 100 and user terminal 200, realize door lock 100 by the account information and use The synchronizing information of family terminal 200.
Further, door lock control system 10 can also include server 300, and server 300 can use traditional services Device can also use cloud server, it is not limited here.Server 300 can by wireless network respectively with user terminal 200 and door lock 100 be communicatively coupled, to carry out the data interaction between server 300 and user terminal 200, server Data interaction between 300 and door lock 100.
As a kind of mode, door lock 100 is connect with gateway, user terminal 200 can by local area network path and gateway into Row interaction (i.e. user terminal-router-gateway), to realize that the door lock 100 connecting with gateway interacts.Further, User terminal 200 can also interact (i.e. user terminal-server-gateway) by wide area network path and gateway, thus real The door lock 100 now connecting with gateway interacts.
Alternatively, door lock 100 can also be without gateway, and mode is connect with router by wireless communication Afterwards, then with the foundation of user terminal 200 it communicates, interacts.Further, door lock 100 can also pass through ZigBee module or indigo plant The wireless communication modules such as tooth module are communicated with the foundation of user terminal 200, are interacted.
Present embodiments are specifically described below in conjunction with attached drawing.
Referring to Fig. 2, the flow diagram of the control method for door lock provided Fig. 2 shows the application one embodiment, it can Applied to above-mentioned door lock, above-mentioned door lock control system can also be applied to.It will be carried out below for embodiment shown in Fig. 2 detailed It illustrates, the method can specifically include following steps:
Step S101: when double verification mode is opened, acquisition passes through the first unlocking information that the first unlocking manner inputs And the second unlocking information inputted by the second unlocking manner.
In the present embodiment, the first unlocking manner or the second unlocking manner include password unlock, unlocked by fingerprint, face solution At least one of lock, vocal print unlock, bluetooth unlock and near-field communication unlock.Such as first unlocking manner can be password solution Lock, the second unlocking manner can be unlocked by fingerprint.
In a specific application scenarios, such as the first unlocking manner is password unlock, and the second unlocking manner is fingerprint Unlock, when double verification mode is opened, user inputs password on door lock, and door lock acquires the password as the first unlock letter Breath, user's typing fingerprint on door lock, door lock acquire the fingerprint as the second unlocking information.By opening double verification mode, So that user need to input two unlocking informations and can just be unlocked, improves unlock difficulty and then improve the safety of door lock.
In the present embodiment, the first unlocking manner and the second unlocking manner can use same kind of unlocking method, Such as first unlocking manner and the second unlocking manner can be by unlocked by fingerprint, such as the first unlocking manner can be use The right hand index fingerprint of family A, the second unlocking manner can be the hand thumb fingerprint of user A.It is understood that different fingerprints Unlocking manner can consider and be different unlocking manner, it is roughly the same using the method for other unlocking manners, it is no longer superfluous herein It states.So that user still can be used as unlocking manner merely with fingerprint or password etc., meet user's diversified facilities unlock side The demand of formula.
As a kind of mode, door lock be can be set between the acquisition of the first unlocking information and the second unlocking information without successively Sequentially, such as the first unlocking manner is unlocked by fingerprint, and the second unlocking manner is face unlock, and door lock can first acquire fingerprint at this time Face is acquired again, face can also be first acquired and acquire fingerprint again, can also acquire fingerprint and face simultaneously.It is understood that When double verification mode is opened, door lock acquisition can be without sequencing, as long as user's input has the first unlocking information and the Two unlocking informations, door lock are remembered acquisition order with regard to achievable acquisition, without user, are unlocked convenient for user, and double verification is being used While improving door lock safety, the convenience of unlock is improved.
Alternatively, the acquisition order of the first unlocking information and the second unlocking information can be set in door lock, It is exactly the first unlocking information that door lock can be set that first acquisition is inputted by the first unlocking manner, then acquires through the second unlock side Second unlocking information of formula input, such as pre-set first unlocking manner are unlocked by fingerprint, and the second unlocking manner is password Unlock, and being provided with acquisition order is the first unlocking information that first acquisition is inputted by the first unlocking manner, then is acquired by the Second unlocking information of two unlocking manners input need to first acquire fingerprint and acquire password again at this time when user needs to unlock, if with Family first inputs password and inputs fingerprint again, is unable to complete acquisition at this time.It is understood that being used when double verification mode is opened The first unlocking information and the second unlocking information of family input need to meet preset sequencing, door lock just achievable acquisition, from And by setting acquisition order, the difficulty of other users unlock is increased, the safety of door lock is further improved.
In the present embodiment, when double verification mode is not opened, single unlocking manner still can be used locks on the door and be unlocked, To on the basis of retaining single unlocking manner, the selection for improving the double verification for unlocking safety is increased, it can be for Family is selected on demand.
Step S102: based on default verification mode, the first unlocking information and the second unlocking information are verified.
In the present embodiment, default verification mode includes door lock local verification, user terminal verifying and server authentication At least one.Can be in the same verifying main body to the verifying of the first unlocking information and the second unlocking information, it can also be Different verifying main bodys is stored in the first verifying main body for verifying the first verification information of the first unlocking information, for testing The second verification information for demonstrate,proving the second unlocking information is stored in the second verifying main body, so that the first unlocking information need to be led by the first verifying Body is verified, and the second unlocking information need to be verified by the second unlock main body.Further, to the first unlocking information and Two unlocking informations carry out verifying can be in door lock local verification, or verifies in user terminal, can also test in server Card, can also be any combination of two of aforementioned three kinds of verification modes, such as locally tested in door lock the first unlocking information Card, the second unlocking information is verified in server.
As a kind of mode, presetting verification mode is door lock local verification, that is, is locally stored in door lock for verifying The first verification information and the second verification information of first unlocking information and the second unlocking information, and it is local to first in door lock Unlocking information and the second unlocking information are verified.Wherein verification information may include numerical ciphers, bluetooth key, fingerprint with And the information such as face.It is local by the first solution in door lock after door lock collects the first unlocking information and the second unlocking information Lock information is matched with the first verification information, and the second unlocking information is matched with the second verification information, if the first unlock Information and the equal successful match of the second unlocking information, then be proved to be successful.By locally being verified in door lock, greatly improve Verification efficiency, and do not influenced by network, efficient verification can be still completed in Network Abnormal.
Alternatively, verification mode is preset to store for user terminal verifying, that is, in user terminal for testing The first verification information and the second verification information for demonstrate,proving the first unlocking information and the second unlocking information, collect first in door lock After unlocking information and the second unlocking information, the first unlocking information and the second unlocking information are sent to the user terminal, User terminal matches the first unlocking information with the first verification information, and the second unlocking information and the second verification information are carried out Matching, if the first unlocking information and the equal successful match of the second unlocking information, are proved to be successful.By being tested in user terminal Card can show verifying feedback to user by user terminal, including be proved to be successful or unsuccessfully etc., and active user can and Shi get Zhi someone just attempts to solve door lock, timely learning door lock situation, to further increase door lock safety.
As another mode, presetting verification mode is server authentication, that is, in server storage for verifying the The first verification information and the second verification information of one unlocking information and the second unlocking information collect the first unlock in door lock After information and the second unlocking information, the first unlocking information and the second unlocking information are sent to server, in server First unlocking information is matched with the first verification information, the second unlocking information is matched with the second verification information, if First unlocking information and the equal successful match of the second unlocking information, then be proved to be successful.By being verified in server, will verify Information is stored in server, it may not be necessary to occupy the memory space of door lock local, reduce the requirement for locking memory capacity on the door, reduce Door lock cost.
As yet another approach, default verification mode can be any combination of two of above-mentioned three kinds of verification modes, also Being may include two kinds of verifying main bodys, i.e. the first unlocking information need to be verified by the first verifying main body, and the second unlocking information needs It is verified by the second unlock main body.Wherein, the first verifying is stored in for verifying the first verification information of the first unlocking information Main body, the second verification information for verifying the second unlocking information are stored in the second verifying main body.Specifically, for example default verifying Mode is the combination server authentication of door lock local verification, such as user opens the double verification of numerical ciphers and fingerprint, wherein Verifying password storage for verifying numerical ciphers is local in door lock, and the verifying fingerprint for verifying fingerprint is stored in user's end End, at this point, after the numerical ciphers and fingerprint that door lock collects user's input, in the door lock number that locally matching user inputs Word password is proved to be successful if equal successful match in the fingerprint of server matching user input.
It is understood that default verification mode can also be whole for the verifying of door lock local verification combination user terminal or user End verifying combines server authentication, and verification method server authentication in conjunction with above-mentioned door lock local verification is roughly the same, herein not It repeats again.It is verified by the way that multiagent is arranged, is tested so that not influencing another main body when a main body verifying is out of order Card, improves the fault-tolerance of system, in addition to this, allows the verifying to the first unlocking information and the second unlocking information parallel Processing improves verification efficiency, reduces user's unlocked time.
In some embodiments, same verification information can also be stored in multiple verifying main bodys, such as verifying the First verification information of one unlocking information is stored at least two verifyings in local door lock, user terminal and server simultaneously Main body, for example, for verifying finger print information simultaneously be stored in door lock local and user terminal, when network failure makes door lock Communication with user terminal is obstructed and makes user terminal that can not receive the first unlocking information or the second unlock letter that door lock is sent When breath, original verifying subject user terminal can be changed to door lock local, to will believe the first unlocking information or the second unlock The verifying of breath is locally executed in door lock.In this way, by the way that multiple verifying main bodys are arranged, and same verification information is stored in multiple It verifies in main body, so that can switch other verifying main bodys when a verifying main body breaks down and be verified, not influence to use Family unlock, improves the fault-tolerance of system.
In the present embodiment, the verifying sequencing that the first unlocking information and the second unlocking information can be set, can also To be set as specifically can be set without verifying sequencing and first verifying the first unlocking information, then verify the second unlocking information, It can be set and first verify the second unlocking information, then verify the first unlocking information, can also be arranged without verifying sequencing, that is, Both the first unlocking information can be first verified, the second unlocking information can also be first verified, the first unlocking information can also be verified simultaneously And second unlocking information.
As a kind of mode, the first unlocking information is first verified in setting, then verifies the second unlocking information, at this point, when the first solution When lock information verifying is unsuccessful, the second unlocking information can not be verified, to reduce unnecessary calculating, improve verifying Efficiency.Alternatively, the second unlocking information is first verified in setting, then verifies the first unlocking information, verification method with it is aforementioned Roughly the same, details are not described herein.
In some embodiments, the first unlocking information and the second unlocking information can also be verified simultaneously, for example, When the verifying main body of the first unlocking information be located at door lock local, can when the verifying main body of the second unlocking information is located at user terminal Locally to carry out matching verifying to the first unlocking information in door lock simultaneously, and the second unlocking information is matched in user terminal Verifying, by the verifying to the first unlocking information and to the verifying parallel processing of the second unlocking information, improves verification efficiency, adds The fast response speed of unlock.
Step S103: when the first unlocking information and the second unlocking information are proved to be successful, unlock instruction is generated.
In the present embodiment, the verifying of the first unlocking information and the second unlocking information can locally be carried out in door lock, It is understood that the result being proved to be successful is returned to door lock, is generated and is solved by door lock after being verified based on default verification mode Lock instruction, is unlocked.
In some embodiments, after being verified based on default verification mode, the result being proved to be successful can also be returned User terminal, user terminal generate unlock instruction and are sent to door lock, and door lock receives unlock instruction and is unlocked.
As a kind of mode, presetting verification mode is door lock local verification, and first for verifying the first unlocking information tests Card information and the second verification information for verifying the second unlocking information are stored in door lock local, local by the first solution in door lock Lock information is matched with the first verification information, the second unlocking information is matched with the second verification information, when the two equal When with success, the first unlocking information and the second unlocking information are proved to be successful, and locally generate unlock instruction by door lock at this time, can To control door lock unlock.
Alternatively, verification mode is preset as user terminal verifying, and the first verification information and the second verifying are believed Breath is stored in user terminal, is unlocked information in user terminal and matches two-by-two with verification information, when matching successful two-by-two, First unlocking information and the second unlocking information are proved to be successful, and the information being proved to be successful is sent to door by user terminal at this time Lock, generates unlock instruction by door lock, to control door lock unlock.It is understood that presetting authentication as another mode Formula be server authentication when, verification method is roughly the same with user terminal verifying, and server matches success after will verify at The information of function is sent to door lock, generates unlock instruction by door lock, to control door lock unlock, details are not described herein.
It in some embodiments,, can also be in door lock according to verification result after being verified based on default verification mode It is local that verification result is prompted, including voice prompting, light prompt etc., for prompting user's current authentication result.For example, When the authentication succeeds, it " can be proved to be successful, be your unlock " with voice prompting user, when failing the authentication, voice prompting user " authentication failed please be re-entered ".For another example, when the authentication succeeds, green light can be lighted on door lock, and user is prompted to have verified that Success can light red colored lamp when failing the authentication on door lock, prompt user's checking failure.In some other embodiment, Door lock can also include display screen, can show in display screen to verification result, such as display " verifying when the authentication succeeds Success " shows " authentication failed " when failing the authentication.It is understood that being worked as by feedback validation as a result, being learnt convenient for user Preceding verification result improves the convenience that user uses to make corresponding actions.
In a specific application scenarios, user opens the double verification mode of fingerprint and password, presets authentication Formula is door lock local verification, and when user needs to unlock, in door lock local input fingerprint and password, door lock acquires user's input Fingerprint and password, and locally matched in door lock, when fingerprint and password with default verification information successful match when, Then fingerprint and password are proved to be successful, and door lock generates unlock instruction, control unlock according to verification result.
The control method for door lock that the application one embodiment provides, by opening double verification mode, so that user need to be defeated Enter two unlocking informations and can be just unlocked when passing through verifying, improve unlock difficulty and then improves the safety of door lock Property, and still retain single Validation Mode in the case where increasing double verification mode, user is selected on demand, improves and uses Family adjusts the convenience of door lock verifying, to the verifying of the first unlocking information and the second unlocking information can door lock it is local into Row, substantially increases verification efficiency, and still can guarantee efficient verification in Network Abnormal, finally after completing verifying, passes through Voice or light prompt user's checking are as a result, allow user to learn that current authentication result to make corresponding actions, mentions in time The convenience that high user uses.To increase on the basis of improving door lock security level and promoting house security coefficient Verification efficiency and user's ease of use.
Referring to Fig. 3, Fig. 3 shows the flow diagram of the control method for door lock of another embodiment of the application offer, It can be applied to above-mentioned door lock.To be explained in detail below for process shown in Fig. 3, the method can specifically include with Lower step:
Step S201: the first unlocking information that acquisition is inputted by the first unlocking manner.
In the present embodiment, the first unlocking manner can be password unlock, unlocked by fingerprint, face unlock, vocal print unlock, indigo plant Tooth unlock and near-field communication unlock etc..
As a kind of mode, door lock includes voice acquisition device for receiving voice, wherein the first unlocking manner can be Vocal print unlock, by comparing the voice being currently received and existing sound-groove model, judging the voice being currently received and presetting Whether sound-groove model is then proved to be successful by what vocal print unlocked from the same user when being judged as the same user.Benefit Unlocked with vocal print, than unlocked by fingerprint, face unlock etc. biological characteristics unlocking manner it is more convenient, it is not necessary to specific region into Row touching is pressed, and need not also find face acquisition device and by face alignment face acquisition device, the spy for only needing user's sounding and saying Determine voice content, so that it may realize a kind of unlocking manner, whether the identity of verifying unlock people is the owner for presetting sound-groove model, is mentioned The convenience of unlock is improved while high door lock security level.
Alternatively, door lock includes near-field communication (NFC) device for carrying out NFC communication, wherein the first unlock Mode can be near-field communication unlock, issues radiofrequency signal identification by door lock and the terminal device of NFC module, packet are supported in read-write Mobile phone, the wearable device etc. for supporting NFC module are included, when the terminal device is close to door lock, terminal device is issued in door lock By dynamic response in radiofrequency field, the information that is stored in door lock reading terminal equipment.It can accelerate to unlock by near-field communication unlock Speed, and reduce the power consumption of door lock.
Step S202: whether detection double verification mode opens.
In the present embodiment, after door lock collects the first unlocking information, it is in door lock local detection double verification mode No unlatching.
As a kind of mode, preset time threshold can be set, in the preset time threshold, if door lock does not collect Whether two unlocking informations can be opened in door lock local detection double verification mode.
In some other embodiment, after door lock collects the first unlocking information, query information is sent to user terminal, it should Query information is for detecting whether double verification mode opens, in some embodiments, will after the completion of user terminal detection Query result returns to door lock.
Step S203: when double verification mode is opened, double verification prompt information is generated.
In the present embodiment, when double verification mode is opened, double verification prompt information can be locally generated in door lock, Double verification prompt information may include at least one of the prompting mode of voice prompting, light prompt, picture cues etc., be used for Prompt user currently has turned on double verification mode, needs to verify a unlocking information again.In this way, user is made to be without memory It is no to have turned on double verification mode, when having merely entered a unlocking information, it is next to continue to input to can receive prompt Unlocking information improves the convenience of unlock for unlocking.
As a kind of mode, double verification prompt information is prompted in the form of voice, such as in double verification mould When formula is opened, user " having turned on double verification, the second unlocking information please be input " is prompted in door lock local voice.As another kind Mode, double verification prompt information uses the form of light prompt, such as when double verification mode is opened, lights on door lock Amber light prompts user to have turned on double verification mode, also needs to input a unlocking information again.In some other embodiment, Door lock can also include display screen, can show in display screen to verification result, such as when double verification mode is opened, " having turned on double verification, the second unlocking information please be input " is shown in display screen kind.
In further embodiments, it is detected whether to open double verification mode by user terminal, and in double verification mode When unlatching, hint instructions are issued to door lock by user terminal, generate double verification prompt information for controlling door lock.Wherein, The information whether double verification mode opens is stored in user terminal, and upon completion of the assays, can prompt on the subscriber terminal Corresponding second unlocking manner of the second unlocking information of user, realize guarantee door lock it is security verified while, can also to Family is prompted, and is avoided leading to not unlock because forgeing unlocking manner, is improved the ease of use of user.
Step S204: the second unlocking information that acquisition is inputted by the second unlocking manner.
Wherein, the specific descriptions of step S204 please refer to step S201, it should be noted that the first unlocking manner and second Unlocking manner can use same kind of unlocking manner, for example, the first unlocking manner and the second unlocking manner can be By unlocked by fingerprint, specifically, the first unlocking manner can be the right hand index fingerprint of user A, the second unlocking manner be can be The hand thumb fingerprint of user A.It is understood that the unlocking manner of different fingerprints can consider and be different unlocking manner, Details are not described herein.
Step S205: based on default verification mode, the first unlocking information and the second unlocking information are verified.
Step S206: when the first unlocking information and the second unlocking information are proved to be successful, unlock instruction is generated.
Wherein, the specific descriptions of step S205- step S206 please refer to step S102- step S103, and details are not described herein.
Further, when double verification mode is switched to unlatching by closing, step S301 can be executed, can also be executed Step S304.Referring to Fig. 4, Fig. 4 shows the flow diagram that double verification mode is arranged in the present embodiment, can be applied to Above-mentioned door lock also can be applied to above-mentioned door lock control system (as shown in Figure 1).It will be carried out below for process shown in Fig. 4 Detailed elaboration, the method can specifically include following steps:
Step S301: when double verification mode is switched to unlatching by closing, detect whether that there are the unlocks of effective bluetooth Mode or interim unlocking manner.In the present embodiment, interim unlocking manner is set by user effective within a preset period of time Unlocking manner.Interim unlocking manner may include at least one of the interim key of bluetooth and temporary password.It needs to illustrate , the interim key of bluetooth has validity period, and it is only effective within a preset period of time, that is, can only solve within a preset period of time Lock, unlike the interim key of bluetooth, bluetooth unlocking manner be shared with by user other users use it is a kind of without effective Whether temporarily the bluetooth key of phase, the maximum difference of the two are that effectively the interim effective interim key of bluetooth belongs to one kind and faces When unlocking manner, non-provisional effective bluetooth key belongs to a kind of bluetooth unlocking manner.
When double verification mode is switched to unlatching by closing, detect whether that there are bluetooth unlocking manner or interim unlocks Mode is still in effective status, wherein effective interim unlocking manner is still can be by the interim unlocking manner of verifying, also It is currently still in the interim unlocking manner in effective preset time period.
Further, bluetooth unlocking manner or interim unlocking manner can also be used as the first solution under double verification mode At least one of lock mode and the second unlocking manner, for verifying unlock.
As a kind of mode, the interim key of bluetooth or temporary password can be used as two kinds of unlock sides under double verification mode One kind of formula, can also be using the interim key combination temporary password of bluetooth as two kinds of unlocking manners under double verification mode.From And can limit only can just solve door lock in a preset time period.
In a specific application scenarios, user opens the double verification of temporary password and fingerprint, and is arranged interim close Code is only effective in the preset time period of 18:00-22:00, and when having, user inputs the temporary password in 12:00 and this refers at this time Line can not be still proved to be successful, and the temporary password is only inputted in the preset time period and the fingerprint just can verify that success, be carried out Unlock.So that time of the door lock other than preset time period is in the state that can not be unlocked, the safety of door lock is greatly improved Property, and by setting preset time period, during guaranteeing to go on business or leave home in user to go out, door lock can not be unlocked, and meet user Demand.
Alternatively, bluetooth unlocking manner can be used as one of two kinds of unlocking manners under double verification mode Kind, bluetooth unlocking manner can also be combined two kinds of unlock sides under a kind of mode as double verification of interim unlocking manner Formula only can just solve door lock so as to limit in a preset time period, improve door lock safety and in addition to this may be used also To retain bluetooth key for double verification mode, the convenience of unlock is improved.
In a specific application scenarios, user opens the double verification of fingerprint and bluetooth key.User before unlock, Bluetooth can first be opened, establish connection with door lock, when user is close to door lock, door lock can start verify bluetooth key, when with Family verifying fingerprint pass through after unlock can be completed, shorten unlocked time, improve the convenience of unlock, and can also avoid because Unlock delay caused by causing recognition of face relatively slow or inaccuracy for reasons such as light or angles, to improve door in double verification While locking security level, the user experience is improved.
In the present embodiment, when double verification mode is switched to unlatching by closing, whether can be deposited in door lock local detection In effective bluetooth unlocking manner or interim unlocking manner, without being communicated with user terminal, detection efficiency is improved, Accelerate response speed.
In further embodiments, it when double verification mode is switched to unlatching by closing, can be detected in user terminal User is stored in the presence or absence of effective bluetooth unlocking manner or interim unlocking manner, that is, the state of double verification mode Terminal can be detected by user terminal.
Step S302: when there are effective bluetooth unlocking manner or interim unlocking manner, inquiry message is generated.
In the present embodiment, inquiry message is for inquiring bluetooth unlocking manner or interim unlocking manner in double verification mould Whether formula maintains effectively after opening, by inquiring user, so that user can consider indigo plant when double verification mode is arranged together The influence of tooth unlocking manner or interim unlocking manner to door lock safety, on the one hand, avoid because forgeing interim unlocking manner Timeliness causes to be unlocked by interim unlocking manner in the unwitting situation of user, causes biggish security risk, To further increase the safety of door lock.On the other hand, it can also avoid user accidentally by bluetooth unlocking manner or interim solution Lock mode is set to failure, and causing to possess the bluetooth unlocking manner or the other users of interim unlocking manner can not unlock, to using Family brings inconvenience.
As an implementation, inquiry message can locally be generated by door lock, and the inquiry message is sent to user Terminal receives answer of the user for the inquiry message by user terminal.
In further embodiments, when there is effective interim unlocking manner, inquiry letter can be generated by user terminal Breath, and answer of the user for the inquiry message is received in user terminal.
Step S303: obtaining inquiry as a result, and maintaining bluetooth unlocking manner or interim unlocking manner according to inquiry result Effectively or disable.
In the present embodiment, when there is effective interim unlocking manner, door lock locally generates inquiry message, and by the inquiry It asks that information is sent to the user terminal, inquiry is received by user terminal as a result, and will inquire that result returns to door lock, ties according to inquiry Fruit maintains bluetooth unlocking manner or interim unlocking manner effectively or disabling.Specifically, according to inquiry as a result, one can be maintained Or multiple bluetooth unlocking manners are effective or maintain one or more interim unlocking manners effective, or disable one or more bluetooths Unlocking manner or the one or more interim unlocking manners of disabling, that is, all bluetooth unlocking manners can be disabled or faced When unlocking manner, can also at least maintain a bluetooth unlocking manner or interim unlocking manner effective.By selectively tieing up It holds bluetooth unlocking manner or interim unlocking manner effectively or disables, user is allowed to adjust current unlock side according to demand Formula.
In further embodiments, after receiving inquiry result by user terminal, it can remain blue according to inquiry result Tooth unlocking manner or interim unlocking manner effectively or disabling, and will maintain effectively or the command adapted thereto of disabling is sent to door lock, Door lock maintains bluetooth unlocking manner or interim unlocking manner effectively or disabling according to the instruction so that door lock locally can be right Bluetooth unlocking manner or interim unlocking manner are verified.For example, door lock will disable temporary password C according to inquiry result, this When, in the default verification information library of door lock local, temporary password C is deleted from effective white list, so that user is defeated When entering temporary password C, so that the temporary password fails under double verification mode, door lock can not be improved by verifying Security level.
After receiving inquiry result by user terminal in yet other embodiments, bluetooth solution is maintained according to inquiry result Perhaps interim unlocking manner is effective or disables and updates the bluetooth unlocking manner or interim unlocking manner at user's end for lock mode The effective status at end.Such as user terminal disables bluetooth key B according to inquiry result, when user inputs bluetooth key B in door lock When, when user terminal carries out matching verifying, so that unlock instruction can not be generated, door also can not be just unable to control by verifying Lock unlock.So that getting inquiry by user terminal as a result, and having in maintenance bluetooth unlocking manner or interim unlocking manner After effect or disabling, without sending command adapted thereto to door lock, and in the first unlocking information or the second unlock for receiving door lock acquisition It when information, is verified in user terminal, further according to the opening and closing of verification result control door lock.
In some embodiments, after obtaining inquiry result, according to inquiry result maintenance bluetooth unlocking manner or temporarily Unlocking manner is effective, so that using the user of bluetooth unlocking manner or interim unlocking manner when double verification mode is opened, Still bluetooth unlocking manner or the unlock of interim unlocking manner can be used.For example, user Y-direction user Z has shared one temporarily Password C can solve door lock between this Saturday 12:00-14:00, and user Y is opened due to this Friday needing and going on business in this Thursday Double verification mode has been opened, has generated whether inquiry message inquiry user Y maintains temporary password C effective at this time, so that being mentioned in user Y While rising door lock security level, avoids causing unavailable because forgeing the temporary password C being arranged before this, still can choose order User Z can use temporary password C normal release.To improve the ease of use of user while promoting safety, Meet the diversified demand of user.
When double verification mode is switched to unlatching by closing, step S304 can be executed, step can also executed Step S304 is executed after S303.
Step S304: the historical information of a variety of default unlocking manners is obtained.
Step S305: according to historical information, unlocking manner setting instruction is generated.
In the present embodiment, the historical information of default unlocking manner includes the default use of unlocking manner within a preset period of time Frequency and at least one of rate is proved to be successful in default verifying number.
As a kind of mode, the historical information of default unlocking manner includes default unlocking manner making within a preset period of time Use frequency.It is arranged successively from high to low according to frequency of use, generates unlocking manner setting instruction, wherein unlocking manner setting refers to It include the default unlocking manner arranged by frequency of use in order.It is full to the unlocking manner for facilitating user to select frequency of use high The use habit of sufficient user promotes the convenience of user's selection.
Alternatively, the historical information for presetting unlocking manner includes default unlocking manner in default verifying number Be proved to be successful rate.It is arranged successively from high to low according to rate is proved to be successful, generates unlocking manner setting instruction, wherein unlock side It include by the default unlocking manner for being proved to be successful rate arrangement in formula setting instruction.User's selection is facilitated to be proved to be successful the high unlock of rate Mode helps to improve the unlock efficiency and accuracy of user while promoting ease of use.
As another mode, the historical information of default unlocking manner includes presetting unlocking manner within a preset period of time Frequency of use and/or it is proved to be successful rate in default verifying number, according to frequency of use and is proved to be successful rate to default solution Lock mode is arranged, according to the preset ratio of frequency of use and by the preset ratio for the rate that is proved to be successful, by frequency of use compared with It is high and be proved to be successful the higher default unlocking manner prioritization of rate, specifically, such as frequency of use F1 and frequency of use F1 Preset ratio P1 is proved to be successful rate F2 and is proved to be successful the preset ratio P2 of rate F2, and wherein P1 and P2 sum are 1, i.e. P1+ P2=1 calculates composite score S=F1xP1+F2xP2, and arranges from high to low according to composite score S, thus by frequency of use compared with It is high and be proved to be successful the higher default unlocking manner prioritization of rate, facilitate user to take into account frequency of use and is proved to be successful rate choosing Default unlocking manner is selected, the use habit of user can be not only met, but also the unlock efficiency and accuracy of user can be improved, promotes user Ease of use.
Further, it the preset ratio of frequency of use and is proved to be successful the preset ratio of rate and can be default, also Be built in program be also possible to user can customized setting, to frequency of use and be proved to be successful between rate according to user Different degrees of concern be configured.Specifically, can be by the preset ratio of increase frequency of use, so that prioritization is pre- It, can also be by increasing the preset ratio for the rate that is proved to be successful, so that preferentially arranging if unlocking manner more meets the use habit of user The default verification mode of column more easily successfully unlocks, and improves unlock efficiency, to realize default according to user demand prioritization Unlocking manner facilitates user to select, and promotes the ease of use of user.
In the present embodiment, the historical information of a variety of default unlocking manners can locally be obtained by door lock, and according to going through History information generates unlocking manner setting instruction, and unlocking manner setting instruction is sent to the user terminal, is obtained by user terminal The setting of user.
In further embodiments, the historical information of a variety of default unlocking manners can also be obtained by user terminal, When double verification mode is switched to unlatching by closing, the historical information of a variety of default unlocking manners is obtained, and according to historical information Generate unlocking manner setting instruction.
Step S306: being arranged according to unlocking manner and instruct, and the first unlocking manner and the second unlocking manner is arranged.
It include the default unlocking manner arranged from high to low by frequency of use in unlocking manner setting instruction in the present embodiment With at least one of the default unlocking manner arranged from high to low by the rate that is proved to be successful.
In the present embodiment, it is arranged according to unlocking manner and is instructed, user can be obtained by user terminal and be unlocked to first The setting information of mode and the second unlocking manner, and the setting information is sent to door lock, after door lock receives setting information First unlocking manner and the second unlocking manner are set.
As a kind of mode, whether there is no correct for verifying the first unlocking manner in the verification information library of door lock local The first verification information and for verify whether correct second verification information of the second unlocking manner, be sent to door lock at this time Setting information includes the first unlocking manner, the first verification information, the second unlocking manner and the second verification information.So as to The first unlocking manner and the second unlocking manner is locally located in door lock, and is acquiring the first unlocking information and the second unlocking information It can locally be verified in door lock later, promote verification efficiency.
Alternatively, exist in the verification information library of door lock local whether correct for verifying the first unlocking manner The first verification information and for verify whether correct second verification information of the second unlocking manner, be sent to door lock at this time Setting information includes the first unlocking manner and the second unlocking manner, without sending the first verification information and the second verifying letter Breath, reduces the data volume that communicates with door lock of user terminal, raising communication efficiency, can be with after door lock receives the setting information The first unlocking manner and the second unlocking manner are set according to the setting information, and can locally be verified in door lock, promotion is tested Demonstrate,prove efficiency.
As another mode, can also be verified in user terminal, setting information is sent to door lock by user terminal Afterwards, the first unlocking information and the second unlocking information that reception door lock locally acquires are for verifying.Specific verification step is visible Step S102, details are not described herein.
Wherein, it should be noted that the sequencing between step S304- step S306 and step S301- step S303 In the present embodiment without limitation, i.e. step S304- step S306 can be set before step S301- step S303, step S340 also can be set after step S350- step S360, can also only execute step S304- step S306, or only execute Step S301- step S303.
The control method for door lock that another embodiment of the application provides, by the way that when double verification mode is opened, acquisition is logical The first unlocking information of the first unlocking manner input and the second unlocking information by the input of the second unlocking manner are crossed, then base In default verification mode, the first unlocking information and the second unlocking information are verified, and when the first unlocking information and the When two unlocking informations are proved to be successful, unlock instruction is generated.Compared to control method for door lock shown in Fig. 2, the present embodiment is also logical It crosses when double verification mode is opened, generates double verification prompt, so that whether user has turned on double verification mould without memory Formula, improve unlock convenience, while can by door lock local verification, user terminal verifying and server authentication at least A kind of pair of unlocking information is verified, and System Error-tolerance Property and verification efficiency are improved, and in addition to this, is opening double verification mode When, by ask the user whether maintain bluetooth unlocking manner or interim unlocking manner it is effective, lifting door lock security level it is same When, meet the diversified demand of user, according to frequency of use and the default unlocking manner of rate arrangement can also be proved to be successful, it is convenient User's selection, promotes the convenience of user.While improving door lock security level to realize, unlock efficiency and convenience are promoted Property.
Referring to Fig. 5, Fig. 5 shows the control method for door lock of another embodiment of the application offer, it is applied to shown in Fig. 1 Door lock control system, door lock control system includes door lock and user terminal, and door lock is connected with user terminal communication.Below by needle Timing diagram shown in fig. 5 is illustrated, the method can specifically include following steps:
Step S401: user terminal is arranged and opens or closes double verification mode.
Step S402: when double verification mode is opened, acquisition is unlocked door lock by first that the first unlocking manner inputs Information and the second unlocking information inputted by the second unlocking manner.
Step S403: collected first unlocking information and the second unlocking information are sent to user's end by door lock End.
Step S404: user terminal verifies the first unlocking information and the second unlocking information.
Step S405: user terminal generates unlock when the first unlocking information and the second unlocking information are proved to be successful Instruction, and it is sent to door lock.
Step S406: door lock receives unlock instruction and unlocks.
Further, referring to Fig. 6, the process of user terminal setting double verification mode specifically can wrap in step S401 Include following steps:
Step S501: user terminal detects whether to exist effective when double verification mode is switched to unlatching by closing Bluetooth unlocking manner or interim unlocking manner.
Step S502: user terminal generates inquiry when there are effective bluetooth unlocking manner or interim unlocking manner Information.
Step S503: user terminal obtains inquiry as a result, and inquiry result is sent to door lock.
Step S504: door lock is according to inquiry as a result, maintaining bluetooth unlocking manner or interim unlocking manner effectively or disabling.
The control method for door lock that another embodiment of the application provides opens double verification mode, door by user terminal The first unlocking information and believed by the second unlock that the second unlocking manner inputs that lock acquisition is inputted by the first unlocking manner Breath, user terminal generates unlock instruction when the first unlocking information and the second unlocking information are proved to be successful, and is sent to door Lock, door lock receive unlock instruction and unlock, and improve door lock safety.And to the first unlocking information and the second unlocking information Verifying can door lock locally carry out, substantially increase verification efficiency, and in Network Abnormal still can guarantee efficient verification, And when the first unlocking information and the second unlocking information are proved to be successful, unlock instruction is generated, it is in addition to this, dual opening When Validation Mode, maintains bluetooth unlocking manner or interim unlocking manner effective by asking the user whether, meet the more of user Sample demand.To improve door lock security level and promoted house security coefficient on the basis of, increase verification efficiency with And user's ease of use.
The application further embodiment additionally provides a kind of door lock control system, including door lock and user terminal, door lock and User terminal communication connection.Wherein, user terminal can be used for being arranged and opening or closing double verification mode;Door lock can be used for When double verification mode is opened, the first unlocking information and pass through the second unlock side that acquisition is inputted by the first unlocking manner Second unlocking information of formula input, and based on default verification mode, the first unlocking information and the second unlocking information are carried out Verifying, and the unlock when the first unlocking information and the second unlocking information are proved to be successful.
In some embodiments, door lock can also be used to send out collected first unlocking information and the second unlocking information It send to user terminal;User terminal can also be used to verify the first unlocking information and the second unlocking information, and when the When one unlocking information and the second unlocking information are proved to be successful, unlock instruction is generated, and be sent to door lock, and in the first unlock When information and the second unlocking information are proved to be successful, unlock instruction is generated, and be sent to door lock.
In some embodiments, user terminal can also be used in when double verification mode is switched to unlatching by closing, inspection It surveys with the presence or absence of effective bluetooth unlocking manner perhaps interim unlocking manner and when there are effective bluetooth unlocking manner or facing When unlocking manner when, generate inquiry message.Wherein, inquiry message is for inquiring that bluetooth unlocking manner or interim unlocking manner exist Whether double verification mode remains effective after opening, wherein bluetooth unlocking manner is the unlock that user is unlocked using bluetooth key Mode, interim unlocking manner are unlocking manner effective within a preset period of time set by user.
In some embodiments, user terminal can also be used to obtain inquiry as a result, and inquiry result is sent to door lock; Door lock can also be used according to inquiry as a result, maintaining bluetooth unlocking manner or interim unlocking manner effectively or disabling.
It is apparent to those skilled in the art that for convenience and simplicity of description, foregoing description system Specific work process can refer to corresponding processes in the foregoing method embodiment, i.e., above-mentioned door lock control system can be used for reality The control method for door lock in preceding method embodiment is applied, details are not described herein.
Referring to Fig. 7, Fig. 7 shows a kind of module frame chart of door-lock controller 600 provided in an embodiment of the present invention.Under Face will be illustrated for module frame chart shown in Fig. 7, and the door-lock controller 600 includes: acquisition module 610, verifying mould Block 620 and directive generation module 630, in which:
Acquisition module 610, for the first solution that when double verification mode is opened, acquisition is inputted by the first unlocking manner Lock information and the second unlocking information inputted by the second unlocking manner.
Authentication module 620 verifies the first unlocking information and the second unlocking information based on default verification mode.
Directive generation module 630, for generating solution when the first unlocking information and the second unlocking information are proved to be successful Lock instruction.
Further, acquisition module 610 includes: the first acquisition unit, mode checking unit, prompt generation unit and the Two acquisition units, in which:
First acquisition unit, for increasing the heating function of heating tube when current leaving water temperature is lower than the first preset temperature Rate;
Mode checking unit, for acquiring the first unlocking information for passing through the first unlocking manner and inputting;
Generation unit is prompted, it is described dual to test for generating double verification prompt information when double verification mode is opened Card prompt information is for prompting user to input the second unlocking information by the second unlocking manner;
Second acquisition unit, for acquiring the second unlocking information for passing through the second unlocking manner and inputting.
Further, the door-lock controller 600 further include: unlocking manner detection module, inquiry message generation module, Unlocking manner processing module, setting instruction acquisition module, unlocking manner setup module and water inlet control module, in which:
Unlocking manner detection module, for detecting whether to deposit when the double verification mode is switched to unlatching by closing In effective bluetooth unlocking manner or interim unlocking manner.
Inquiry message generation module is used for when there is the effective bluetooth unlocking manner or interim unlocking manner, Inquiry message is generated, the inquiry message is for inquiring the bluetooth unlocking manner or the interim unlocking manner described double Whether weight Validation Mode remains effective after opening;The bluetooth unlocking manner is the unlock side that user is unlocked using bluetooth key Formula;The interim unlocking manner is unlocking manner effective within a preset period of time set by user.
Unlocking manner processing module, for obtaining inquiry as a result, and maintaining the bluetooth to unlock according to the inquiry result Mode or the interim unlocking manner are effectively or disabling.
Instruction acquisition module is set, for obtaining unlock side when the double verification mode is switched to unlatching by closing Formula setting instruction.
Unlocking manner setup module is instructed for being arranged according to the unlocking manner, be arranged first unlocking manner with And second unlocking manner.
Further, the setting instruction acquisition module includes that historical information acquiring unit and setting instruction generate list Member, in which:
Historical information acquiring unit, for obtaining the historical information of a variety of default unlocking manners, the historical information includes Default unlocking manner frequency of use within a preset period of time and being proved to be successful in rate extremely in default verifying number Few one kind.
Instruction generation unit is set, for generating unlocking manner setting instruction according to the historical information.
The embodiment of the invention provides a kind of door-lock controllers, by the way that when double verification mode is opened, acquisition passes through First unlocking information of the first unlocking manner input and the second unlocking information inputted by the second unlocking manner, are then based on Default verification mode, verifies the first unlocking information and the second unlocking information, and when the first unlocking information and second When unlocking information is proved to be successful, unlock instruction is generated.Compared to control method for door lock shown in Fig. 2, the present embodiment also passes through When double verification mode is opened, double verification prompt is generated, so that whether user has turned on double verification mode without memory, Unlock convenience is improved, while at least one in door lock local verification, user terminal verifying and server authentication can be passed through Kind verifies unlocking information, improves System Error-tolerance Property and verification efficiency, in addition to this, when opening double verification mode, By asking the user whether to maintain bluetooth unlocking manner or interim unlocking manner effective, while lifting door lock security level, Meet the diversified demand of user, according to frequency of use and the default unlocking manner of rate arrangement can also be proved to be successful, facilitate use Family selection, promotes the convenience of user.While improving door lock security level to realize, unlock efficiency and convenience are promoted Property.
It is apparent to those skilled in the art that for convenience and simplicity of description, foregoing description device and The specific work process of module, can refer to corresponding processes in the foregoing method embodiment, and details are not described herein.
A kind of electronic equipment provided by the present application is illustrated below in conjunction with Fig. 8.
Referring to Fig. 8, the embodiment of the present application also provides one kind to hold based on above-mentioned control method for door lock, device The electronic equipment 700 of the aforementioned control method for door lock of row.
Electronic equipment 700 in the application may include one or more such as lower component: processor 710, memory 720 with And one or more application program, wherein one or more application programs can be stored in memory 720 and be configured as It is executed by one or more processors 710, one or more programs are configured to carry out as described in preceding method embodiment Method.
Wherein, processor 710 may include one or more processing core.Processor 710 utilizes various interfaces and route The various pieces in entire electronic equipment 700 are connected, by running or executing the instruction being stored in memory 720, program, generation Code collection or instruction set, and the data being stored in memory 720 are called, execute the various functions and processing of electronic equipment 700 Data.Optionally, processor 710 can be using Digital Signal Processing (Digital Signal Processing, DSP), scene Programmable gate array (Field-Programmable Gate Array, FPGA), programmable logic array (Programmable Logic Array, PLA) at least one of example, in hardware realize.Processor 710 can integrating central processor (Central Processing Unit, CPU), in graphics processor (Graphics Processing Unit, GPU) and modem etc. One or more of combinations.Wherein, the main processing operation system of CPU, user interface and application program etc.;GPU is for being responsible for Show the rendering and drafting of content;Modem is for handling wireless communication.It is understood that above-mentioned modem It can not be integrated into processor 710, be realized separately through one piece of communication chip.
Memory 720 may include random access memory (Random Access Memory, RAM), also may include read-only Memory (Read-Only Memory).Memory 720 can be used for store instruction, program, code, code set or instruction set.It deposits Reservoir 720 may include storing program area and storage data area, wherein the finger that storing program area can store for realizing operating system Enable, for realizing at least one function instruction (such as touch function, sound-playing function, image player function etc.), be used for Realize the instruction etc. of following each embodiments of the method.Storage data area can also store electronic equipment 700 and be created in use Data (such as phone directory, audio, video data, chat record data) etc..
Further, electronic equipment 700 can also include touch screen, and touch screen can be liquid crystal display (Liquid Crystal Display, LCD), it can be (Organic Light-Emitting Diode, OLED) etc..The touch screen is used In showing information input by user, the various graphical user interface of the information and electronic equipment 700 that are supplied to user, these Graphical user interface can be made of figure, text, icon, number, video and any combination thereof.
Referring to Fig. 9, it illustrates a kind of structural frames of computer-readable storage medium provided by the embodiments of the present application Figure.Program code is stored in the computer-readable storage medium 800, said program code can be called by processor and be executed State method described in embodiment of the method.
Computer-readable storage medium 800 can be (the read-only storage of electrically erasable of such as flash memory, EEPROM Device), the electronic memory of EPROM, hard disk or ROM etc.Optionally, computer-readable storage medium 800 includes non-easy The property lost computer-readable medium (non-transitory computer-readable storage medium).Computer can Read the memory space that storage medium 800 has the program code 810 for executing any method and step in the above method.These journeys Sequence code can read or be written to this one or more computer journey from one or more computer program product In sequence product.Program code 810 can for example be compressed in a suitable form.
In conclusion control method for door lock provided by the embodiments of the present application, system, device, electronic equipment and storage medium, By the way that when double verification mode is opened, acquisition passes through the first unlocking information that the first unlocking manner inputs and by the second solution The second unlocking information that lock mode inputs, is then based on default verification mode, to the first unlocking information and the second unlocking information It is verified, and when the first unlocking information and the second unlocking information are proved to be successful, generates unlock instruction.To by opening Open double verification mode so that door lock need to two kinds verifying by when just unlock, improve the security level and promotion of door lock House security coefficient.
In the description of this specification, reference term " one embodiment ", " some embodiments ", " example ", " specifically show The description of example " or " some examples " etc. means specific features, structure, material or spy described in conjunction with this embodiment or example Point is contained at least one embodiment or example of the application.In the present specification, schematic expression of the above terms are not It must be directed to identical embodiment or example.Moreover, particular features, structures, materials, or characteristics described can be in office It can be combined in any suitable manner in one or more embodiment or examples.In addition, without conflicting with each other, the skill of this field Art personnel can tie the feature of different embodiments or examples described in this specification and different embodiments or examples It closes and combines.
In addition, term " first ", " second " are used for descriptive purposes only and cannot be understood as indicating or suggesting relative importance Or implicitly indicate the quantity of indicated technical characteristic.Define " first " as a result, the feature of " second " can be expressed or Implicitly include at least one this feature.In the description of the present application, the meaning of " plurality " is at least two, such as two, three It is a etc., unless otherwise specifically defined.
Any process described otherwise above or method description are construed as in flow diagram or herein, are indicated Include the steps that module, the segment of one or more codes for realizing specific logical function or the executable instruction of process Or part, and the range of the preferred embodiment of the application includes other realization, wherein can not be by shown or discussion Sequence, including according to related function by it is basic simultaneously in the way of or in the opposite order, Lai Zhihang function, this should be by this The embodiment person of ordinary skill in the field of application is understood.
Expression or logic and/or step described otherwise above herein in flow diagram, for example, may be considered that It is the order list of the executable instruction for realizing logic function, may be embodied in any computer-readable medium, For instruction execution system, device or equipment (such as computer based system, including the system of processor or other can be from finger Enable the system for executing system, device or equipment instruction fetch and executing instruction) it uses, or combine these instruction execution systems, device Or equipment and use.For the purpose of this specification, " computer-readable medium ", which can be, any may include, store, communicating, propagating Or transfer program uses for instruction execution system, device or equipment or in conjunction with these instruction execution systems, device or equipment Device.The more specific example (non-exhaustive list) of computer-readable medium include the following: there are one or more wirings Electrical connection section (mobile terminal), portable computer diskette box (magnetic device), random access memory (RAM), read-only memory (ROM), erasable edit read-only storage (EPROM or flash memory), fiber device and portable optic disk is read-only deposits Reservoir (CDROM).In addition, computer-readable medium can even is that the paper that can print described program on it or other are suitable Medium, because can then be edited, be interpreted or when necessary with it for example by carrying out optical scanner to paper or other media His suitable method is handled electronically to obtain described program, is then stored in computer storage.
It should be appreciated that each section of the application can be realized with hardware, software, firmware or their combination.Above-mentioned In embodiment, software that multiple steps or method can be executed in memory and by suitable instruction execution system with storage Or firmware is realized.It, and in another embodiment, can be under well known in the art for example, if realized with hardware Any one of column technology or their combination are realized: having a logic gates for realizing logic function to data-signal Discrete logic, with suitable combinational logic gate circuit specific integrated circuit, programmable gate array (PGA), scene Programmable gate array (FPGA) etc..
Those skilled in the art are understood that realize all or part of step that above-described embodiment method carries It suddenly is that relevant hardware can be instructed to complete by program, the program can store in a kind of computer-readable storage In medium, which when being executed, includes the steps that one or a combination set of embodiment of the method.In addition, in each implementation of the application Each functional unit in example can integrate in a processing module, is also possible to each unit and physically exists alone, can also be with Two or more units are integrated in a module.Above-mentioned integrated module both can take the form of hardware realization, It can be realized in the form of software function module.If the integrated module is realized and is made in the form of software function module It is independent product when selling or using, also can store in a computer readable storage medium.
Storage medium mentioned above can be read-only memory, disk or CD etc..Although having been shown and retouching above Embodiments herein is stated, it is to be understood that above-described embodiment is exemplary, and should not be understood as the limit to the application System, those skilled in the art can be changed above-described embodiment, modify, replace and become within the scope of application Type.
Finally, it should be noted that above embodiments are only to illustrate the technical solution of the application, rather than its limitations;Although The application is described in detail with reference to the foregoing embodiments, those skilled in the art are when understanding: it still can be with It modifies the technical solutions described in the foregoing embodiments or equivalent replacement of some of the technical features;And These are modified or replaceed, do not drive corresponding technical solution essence be detached from each embodiment technical solution of the application spirit and Range.

Claims (15)

1. a kind of control method for door lock characterized by comprising
When double verification mode is opened, the first unlocking information and pass through the second solution that acquisition is inputted by the first unlocking manner The second unlocking information that lock mode inputs;
Based on default verification mode, first unlocking information and second unlocking information are verified;
When first unlocking information and second unlocking information are proved to be successful, unlock instruction is generated.
2. the method as described in claim 1, which is characterized in that described when double verification mode is opened, acquisition passes through first First unlocking information of unlocking manner input and the second unlocking information inputted by the second unlocking manner, comprising:
The first unlocking information that acquisition is inputted by the first unlocking manner;
Whether detection double verification mode opens;
When double verification mode is opened, double verification prompt information is generated, the double verification prompt information is used for prompting Family inputs the second unlocking information by the second unlocking manner;
The second unlocking information that acquisition is inputted by the second unlocking manner.
3. method according to claim 1 or 2, which is characterized in that the method also includes:
When the double verification mode is switched to unlatching by closing, detects whether there are effective bluetooth unlocking manner or face When unlocking manner;
When there is the effective bluetooth unlocking manner or interim unlocking manner, inquiry message, the inquiry message are generated For inquiring whether the bluetooth unlocking manner or the interim unlocking manner maintain after double verification mode unlatching Effectively;The bluetooth unlocking manner is the unlocking manner that user is unlocked using bluetooth key;The interim unlocking manner is user The unlocking manner effective within a preset period of time of setting.
4. method as claimed in claim 3, which is characterized in that after the generation inquiry message, the method also includes:
Inquiry is obtained as a result, and maintaining the bluetooth unlocking manner or the interim unlocking manner to have according to the inquiry result Effect or disabling.
5. the method as described in claim 1, which is characterized in that the method also includes:
When the double verification mode is switched to unlatching by closing, unlocking manner setting instruction is obtained;
It is arranged according to the unlocking manner and is instructed, first unlocking manner and second unlocking manner is set.
6. method as claimed in claim 5, which is characterized in that the acquisition unlocking manner setting instruction, comprising:
The historical information of a variety of default unlocking manners is obtained, the historical information includes the default unlocking manner in preset time Frequency of use in section and at least one of rate is proved to be successful in default verifying number;
According to the historical information, unlocking manner setting instruction is generated.
7. the method as described in claim 1, which is characterized in that first unlocking manner or second unlocking manner include Following at least one:
Password unlock, unlocked by fingerprint, face unlock, vocal print unlock, bluetooth unlock and near-field communication unlock.
8. the method as described in claim 1, which is characterized in that the default verification mode comprises at least one of the following:
Door lock local verification, user terminal verifying and server authentication.
9. a kind of door lock control system, which is characterized in that including door lock and user terminal, the door lock and the user terminal are logical Letter connection, in which:
The user terminal, for being arranged and opening or closing double verification mode;
The door lock, for the first unlocking information that when double verification mode is opened, acquisition is inputted by the first unlocking manner And the second unlocking information inputted by the second unlocking manner;
The door lock, for being carried out to first unlocking information and second unlocking information based on default verification mode Verifying;
The door lock, for the unlock when first unlocking information and second unlocking information are proved to be successful.
10. system as claimed in claim 9, which is characterized in that the door lock is also used to collected first unlock Information and second unlocking information are sent to the user terminal;
The user terminal is also used to verify first unlocking information and second unlocking information, when described When one unlocking information and second unlocking information are proved to be successful, unlock instruction is generated, and be sent to the door lock;
The door lock is also used to receive the unlock instruction and unlocks.
11. the system as described in claim 9 or 10, which is characterized in that the user terminal is also used to when the double verification It when mode is switched to unlatching by closing, detects whether that there are effective bluetooth unlocking manner or interim unlocking manners, and works as and deposit In the effective bluetooth unlocking manner or the interim unlocking manner, inquiry message is generated, the inquiry message is for asking Ask whether the bluetooth unlocking manner or the interim unlocking manner remain effective after double verification mode unlatching;Institute Stating bluetooth unlocking manner is the unlocking manner that is unlocked using bluetooth key of user, the interim unlocking manner be it is set by user Effective unlocking manner in preset time period.
12. system as claimed in claim 11, which is characterized in that the user terminal is also used to obtain inquiry as a result, and will The inquiry result is sent to the door lock;
The door lock is also used to according to the inquiry as a result, maintaining the interim unlocking manner effectively or the disabling interim unlock Mode.
13. a kind of door-lock controller characterized by comprising
Acquisition module, for the first unlocking information that when double verification mode is opened, acquisition is inputted by the first unlocking manner And the second unlocking information inputted by the second unlocking manner;
Authentication module verifies first unlocking information and second unlocking information based on default verification mode;
Directive generation module, for generating when first unlocking information and second unlocking information are proved to be successful Unlock instruction.
14. a kind of electronic equipment characterized by comprising
Memory;
One or more processors are coupled with the memory;
One or more programs, wherein one or more of application programs are stored in the memory and are configured as It is executed by one or more of processors, one or more of programs are configured to carry out such as any one of claim 1-8 The method.
15. a kind of computer-readable storage medium, which is characterized in that be stored with journey in the computer-readable storage medium Sequence code, said program code can be called by processor and execute the method according to claim 1.
CN201811431512.8A 2018-11-26 2018-11-26 Door lock control method, system, device, electronic equipment and storage medium Active CN109636966B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811431512.8A CN109636966B (en) 2018-11-26 2018-11-26 Door lock control method, system, device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811431512.8A CN109636966B (en) 2018-11-26 2018-11-26 Door lock control method, system, device, electronic equipment and storage medium

Publications (2)

Publication Number Publication Date
CN109636966A true CN109636966A (en) 2019-04-16
CN109636966B CN109636966B (en) 2021-02-26

Family

ID=66070014

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811431512.8A Active CN109636966B (en) 2018-11-26 2018-11-26 Door lock control method, system, device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN109636966B (en)

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110111462A (en) * 2019-04-30 2019-08-09 珠海吉门第科技有限公司 A kind of right management method and system based on intelligent door lock double authentication
CN110723105A (en) * 2019-08-26 2020-01-24 神通科技集团股份有限公司 B-pillar decorative plate with face recognition and password input functions
CN110956732A (en) * 2019-12-19 2020-04-03 重庆特斯联智慧科技股份有限公司 Safety entrance guard based on thing networking
CN111145398A (en) * 2019-12-31 2020-05-12 深圳绿米联创科技有限公司 Intelligent door lock control method and device, intelligent door lock and storage medium
CN111223218A (en) * 2020-02-22 2020-06-02 沃兴(杭州)科技有限公司 Intelligent door with secondary access control system
CN111768530A (en) * 2020-07-22 2020-10-13 联想(北京)有限公司 Intelligent unlocking method and device
CN111860159A (en) * 2020-06-15 2020-10-30 珠海格力电器股份有限公司 Intelligent door lock control method, intelligent door lock, storage medium and processor
CN112037404A (en) * 2020-08-21 2020-12-04 的卢技术有限公司 Intelligent access control system based on multiple discernment
CN112364673A (en) * 2020-11-25 2021-02-12 Oppo广东移动通信有限公司 Information verification method, terminal equipment, NFC verification device and system
CN113256854A (en) * 2021-07-06 2021-08-13 徐州源勤电子科技有限公司 User behavior encryption method and device based on computer big data
CN113744434A (en) * 2021-08-20 2021-12-03 北京万千维度网络科技有限公司 Automatic multi-mode unlocking method and system
CN113870468A (en) * 2021-12-02 2021-12-31 云丁网络技术(北京)有限公司 Control method and system of intelligent lock
CN114333116A (en) * 2021-12-29 2022-04-12 珠海格力电器股份有限公司 Intelligent door lock, control method, electronic device and storage medium
CN114387712A (en) * 2022-01-27 2022-04-22 深圳优创杰科技有限公司 Method for realizing temporary password setting of offline Bluetooth password lock

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103280007A (en) * 2013-04-28 2013-09-04 青岛歌尔声学科技有限公司 Bluetooth face identification strongbox
CN203941561U (en) * 2014-04-28 2014-11-12 张瞳 Wireless open system for lockset
EP2732579A4 (en) * 2011-07-12 2015-04-08 Assa Abloy Ab Event driven second factor credential authentication
CN106355717A (en) * 2016-09-05 2017-01-25 惠州Tcl移动通信有限公司 Mobile terminal unlocking method and system based on fingerprint recognition and NFC (near field communication)
CN206162731U (en) * 2016-08-12 2017-05-10 燕南国创科技(北京)有限公司 Gate lock
CN106846580A (en) * 2017-01-25 2017-06-13 移康智能科技(上海)股份有限公司 Intelligent unlocking method and system
CN107145212A (en) * 2017-04-12 2017-09-08 广东欧珀移动通信有限公司 Terminal unlock method, device and terminal
CN107481373A (en) * 2017-08-18 2017-12-15 蜂联智能(深圳)有限公司 A kind of intelligent door lock
CN107810526A (en) * 2015-07-01 2018-03-16 三星电子株式会社 User authentication method and equipment

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP5274503B2 (en) * 2010-04-08 2013-08-28 株式会社日立ビルシステム Electric lock management system and management device
CN106898059A (en) * 2015-12-18 2017-06-27 北京奇虎科技有限公司 Electronic door lock system and electronic lock method for unlocking
CN105975824A (en) * 2016-07-21 2016-09-28 深圳市金立通信设备有限公司 Method for switching screen unlocking modes and terminal

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2732579A4 (en) * 2011-07-12 2015-04-08 Assa Abloy Ab Event driven second factor credential authentication
CN103280007A (en) * 2013-04-28 2013-09-04 青岛歌尔声学科技有限公司 Bluetooth face identification strongbox
CN203941561U (en) * 2014-04-28 2014-11-12 张瞳 Wireless open system for lockset
CN107810526A (en) * 2015-07-01 2018-03-16 三星电子株式会社 User authentication method and equipment
CN206162731U (en) * 2016-08-12 2017-05-10 燕南国创科技(北京)有限公司 Gate lock
CN106355717A (en) * 2016-09-05 2017-01-25 惠州Tcl移动通信有限公司 Mobile terminal unlocking method and system based on fingerprint recognition and NFC (near field communication)
CN106846580A (en) * 2017-01-25 2017-06-13 移康智能科技(上海)股份有限公司 Intelligent unlocking method and system
CN107145212A (en) * 2017-04-12 2017-09-08 广东欧珀移动通信有限公司 Terminal unlock method, device and terminal
CN107481373A (en) * 2017-08-18 2017-12-15 蜂联智能(深圳)有限公司 A kind of intelligent door lock

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110111462A (en) * 2019-04-30 2019-08-09 珠海吉门第科技有限公司 A kind of right management method and system based on intelligent door lock double authentication
CN110723105A (en) * 2019-08-26 2020-01-24 神通科技集团股份有限公司 B-pillar decorative plate with face recognition and password input functions
CN110956732A (en) * 2019-12-19 2020-04-03 重庆特斯联智慧科技股份有限公司 Safety entrance guard based on thing networking
CN111145398B (en) * 2019-12-31 2022-04-12 深圳绿米联创科技有限公司 Intelligent door lock control method and device, intelligent door lock and storage medium
CN111145398A (en) * 2019-12-31 2020-05-12 深圳绿米联创科技有限公司 Intelligent door lock control method and device, intelligent door lock and storage medium
CN111223218A (en) * 2020-02-22 2020-06-02 沃兴(杭州)科技有限公司 Intelligent door with secondary access control system
CN111860159A (en) * 2020-06-15 2020-10-30 珠海格力电器股份有限公司 Intelligent door lock control method, intelligent door lock, storage medium and processor
CN111768530A (en) * 2020-07-22 2020-10-13 联想(北京)有限公司 Intelligent unlocking method and device
CN111768530B (en) * 2020-07-22 2022-04-19 联想(北京)有限公司 Intelligent unlocking method and device
CN112037404A (en) * 2020-08-21 2020-12-04 的卢技术有限公司 Intelligent access control system based on multiple discernment
CN112364673A (en) * 2020-11-25 2021-02-12 Oppo广东移动通信有限公司 Information verification method, terminal equipment, NFC verification device and system
CN113256854A (en) * 2021-07-06 2021-08-13 徐州源勤电子科技有限公司 User behavior encryption method and device based on computer big data
CN113744434A (en) * 2021-08-20 2021-12-03 北京万千维度网络科技有限公司 Automatic multi-mode unlocking method and system
CN113744434B (en) * 2021-08-20 2023-09-01 北京万千维度网络科技有限公司 Automatic multi-mode unlocking method and system
CN113870468A (en) * 2021-12-02 2021-12-31 云丁网络技术(北京)有限公司 Control method and system of intelligent lock
CN114333116A (en) * 2021-12-29 2022-04-12 珠海格力电器股份有限公司 Intelligent door lock, control method, electronic device and storage medium
CN114387712A (en) * 2022-01-27 2022-04-22 深圳优创杰科技有限公司 Method for realizing temporary password setting of offline Bluetooth password lock

Also Published As

Publication number Publication date
CN109636966B (en) 2021-02-26

Similar Documents

Publication Publication Date Title
CN109636966A (en) Control method for door lock, system, device, electronic equipment and storage medium
CN103646646B (en) A kind of sound control method and electronic equipment
CN104240342B (en) Access control method and device based on identity authentication
CN109615738A (en) Door lock management method, device, electronic equipment and storage medium
CN105447927B (en) Control method, access controller and the access control system that gate inhibition's electric lock is opened
US20110153791A1 (en) Systems and methods for managing configuration data at disconnected remote devices
CN106716297A (en) Method of fingerprint recognition, device and touch screen terminal
CN106034063A (en) Method and device for starting service in communication software through voice
CN206522020U (en) A kind of intelligent door lock and system
CN107862194B (en) A kind of method, device and mobile terminal of safety verification
CN106067873A (en) Electronic equipment and call processing method thereof
WO2003079204A1 (en) Password input unit, password inputting method and program for executing that method on computer
CN107292147A (en) A kind of data processing method, device and intelligent terminal
CN105391724B (en) Authorization management method and empowerment management device for information system
CN107612880A (en) One kind applies access method and device
CN108734838A (en) It is a kind of that there is the smart lock based on video raw body signature verification device
US11438342B2 (en) Location-based identity authentication (LIA) system
CN110322599A (en) Door lock management method, device, electronic equipment and storage medium
TW201349133A (en) Cloud control the access control management system and the authentication method
CN110378695A (en) Bank card payment method, device, equipment and computer storage medium
CN106063364A (en) Electronic device for controlling an external device using a number and method thereof
CN107370872A (en) Method, terminal and the control device of a kind of terminal lock machine and control terminal lock machine
CN110414246A (en) Shared file method for managing security, device, terminal and storage medium
CN107402875A (en) A kind of log recording method, terminal and computer-readable recording medium
CN106411811A (en) Authentication method, system and device of accessing customer service

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant