CN109979060A - Intelligent door lock pirate of the open recognition methods based on mobile terminal - Google Patents
Intelligent door lock pirate of the open recognition methods based on mobile terminal Download PDFInfo
- Publication number
- CN109979060A CN109979060A CN201910256750.8A CN201910256750A CN109979060A CN 109979060 A CN109979060 A CN 109979060A CN 201910256750 A CN201910256750 A CN 201910256750A CN 109979060 A CN109979060 A CN 109979060A
- Authority
- CN
- China
- Prior art keywords
- door lock
- intelligent door
- mobile terminal
- field communication
- telecommunication
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00571—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/02—Services making use of location information
- H04W4/021—Services related to particular areas, e.g. point of interest [POI] services, venue services or geofences
Abstract
The present invention provides a kind of intelligent door lock pirate of the open recognition methods based on mobile terminal, and intelligent door lock carries out near-field communication with the mobile terminal in its near field communication range, identifies the mobile terminal, verify its legitimacy;If the mobile terminal near-field communication is legal, intelligent door lock is carried out telecommunication with the mobile terminal, is sent to it telecommunication information;If the mobile terminal receives near-field communication information of the intelligent door lock telecommunication information without detecting intelligent door lock, judge that itself is not other people pirate of the open, alert on doorway.The present invention passes through the combination of near-field communication and telecommunication, can find go-between's pirate of the open in time, improves the safety that intelligent door lock is wirelessly unlocked.
Description
Technical field
The present invention relates to smart machines and wireless communication technique, more particularly to one kind to pass through mobile terminal automatic identification intelligence
Door lock is wirelessly unlocked stolen method.
Background technique
Intelligent door lock can wirelessly be unlocked by bluetooth, convenient and efficient, the mode but bluetooth is wirelessly unlocked, and be easy to be passed through
Playback or go-between's pirate of the open bring very big security risk, and at present still without automatic identification intelligent door lock by wireless pirate of the open
Method, intelligent door lock is wirelessly unlocked, and there are security risks.
Summary of the invention
The intelligent door lock pirate of the open recognition methods based on mobile terminal that the object of the present invention is to provide a kind of, when someone passes through nothing
When line unlocking mode pirate of the open intelligent door lock, pass through the automatic alert of mobile terminal.
A kind of intelligent door lock pirate of the open recognition methods based on mobile terminal, feature the following steps are included:
The information of mobile terminal with wireless unlocking authority is established in intelligent door lock;Intelligent door lock be in its near-field communication model
The mobile terminal enclosed carries out near-field communication, identifies the mobile terminal, verifies its legitimacy;If the mobile terminal near field is logical
It is legal to believe, intelligent door lock is carried out telecommunication with the mobile terminal, is sent to it telecommunication information;The mobile terminal is such as
Fruit receives near-field communication information of the intelligent door lock telecommunication information without detecting intelligent door lock, judges itself not in door
It mouthful is other people pirate of the open, alert.
Optionally, the intelligent door lock is controlled according to the legitimacy of mobile terminal near-field communication Information Authentication and is unlocked.
Further, the preset uncaging time section in the intelligent door lock, in uncaging time section, intelligent door lock is according to mobile whole
It holds the legitimacy of near-field communication Information Authentication to control to unlock.
Optionally, the intelligent door lock is verified legal mobile terminal to near-field communication by telecommunication and is sent disposably
Identifying code, the mobile terminal feed back the identifying code to intelligent door lock by telecommunication, and the intelligent door lock is according to
The control of mobile terminal remote communications feedback information authentication results is unlocked.
Further, preset non-uncaging time section in the intelligent door lock, in non-uncaging time section, intelligent door lock is according to movement
The near-field communication and telecommunication double verification result of terminal, which control, unlocks.
Optionally, the preset unlocking condition in the intelligent door lock, the intelligent door lock are triggered and are moved according to unlocking condition
The near-field communication and/or telecommunication of dynamic terminal.
Further, the unlocking condition includes the people of the uncaging time set in intelligent door lock or intelligent door lock detection
Body signal or user's touch signal of intelligent door lock induction.
Optionally, the preset unlocking condition in the mobile terminal, the mobile terminal is triggered according to unlocking condition and intelligence
The near-field communication and telecommunication of energy door lock.
Further, the unlocking condition includes the uncaging time set in the terminal or establishes in the terminal
Fence based on latch position or mobile terminal induction user's trigger signal.
Further, if the mobile terminal receives the long-range of intelligent door lock transmission in the case where not meeting unlocking condition
The communication information issues the user with warning message or issues to prohibit to intelligent door lock by telecommunication and opens instruction.
Intelligent door lock carries out near-field communication with mobile terminal first, and the movement on doorway is according to the identification of near-field communication information
Terminal, then near field link information is fed back to the mobile terminal by telecommunication, if mobile terminal is established with intelligent door lock
Near-field communication connection illustrates itself to be in doorway unlocking, if mobile terminal receives only the telecommunication information of intelligent door lock,
Near-field-communication signal without detecting intelligent door lock illustrates that itself is not on doorway, is other people pirate of the open, issues alarm signal
Breath.
The characteristics of present invention is not limited by distance, should not be shielded using telecommunication, by telecommunication to mobile terminal
It is notified to near-field communication link information, closely judge that precision is high using near-field communication, passes through the close of mobile terminal and intelligent door lock
Communication connection information judge self whether intelligent door lock unlocking range can by the combination of near-field communication and telecommunication
To find go-between's pirate of the open in time, the safety that intelligent door lock is wirelessly unlocked is improved.
With the following Examples, technical solution of the present invention is described respectively.
Detailed description of the invention
Fig. 1 is a kind of system structure diagram of the invention.
Fig. 2 is a kind of wireless stolen recognition methods embodiment flow diagram of unlocking of the invention.
Specific embodiment
In a kind of system structure diagram shown in Fig. 1, remote communication module and near-field communication are set in intelligent door lock
Remote communication module and near-field communication module is arranged, on the one hand, intelligent door lock passes through network server in module in the terminal
Remote wireless network communication connection is carried out between mobile terminal, on the other hand, by close between intelligent door lock and mobile terminal
Field communication module carries out near-field communication connection.
The telecommunication includes Internet of Things Network Communication, internet communication, WIFI local area network communication, the near field communication
Including the wireless communication techniques such as WIFI, NFC, bluetooth, ZigBee, radio frequency, infrared.Wherein, WIFI local area network communication can be used as
Telecommunication mode, the near-field communications such as cooperation bluetooth, WIFI can also be used as the cooperation of the telecommunications such as near-field communication and internet.
One kind shown in Fig. 2 is wireless to unlock in stolen recognition methods embodiment flow diagram, intelligent door lock first with
Mobile terminal carries out near-field communication, then feeds back near field link information to the mobile terminal by telecommunication, by mobile terminal knot
It closes to unlock with the near-field communication link information further progress of intelligent door lock and confirm, specific steps include:
(1) information of mobile terminal with wireless unlocking authority is established in intelligent door lock;
(2) intelligent door lock carries out near-field communication with the mobile terminal in its near field communication range, identifies the mobile terminal, tests
Demonstrate,prove its legitimacy;
(3) if the mobile terminal near-field communication is legal, intelligent door lock is carried out telecommunication with the mobile terminal, by remote
Cheng Tongxin is sent to it near-field communication connection result;
(4) if the mobile terminal receives intelligent door lock telecommunication information without establishing near-field communication with intelligent door lock
Connection judges that itself is not other people pirate of the open, alert on doorway.
In step (1), the information of mobile terminal includes IMSI number or the MSISDN or MAC of customer mobile terminal
Location, ID identification information etc., intelligent door lock carry out telecommunication therewith according to the identification information of mobile terminal.
In step (2), intelligent door lock is established near-field communication with mobile terminal and is connect, according to preset information of mobile terminal
List identifies mobile terminal, and the legitimacy of mobile terminal near-field communication connection is verified by preset key checking algorithm.
In step (3), if the near-field communication connectivity verification of mobile terminal passes through, intelligent door lock is further carried out with it
Telecommunication feeds back near-field communication link information to mobile terminal by telecommunication, so that the mobile terminal is to intelligent door lock
The mobile terminal identity of near-field communication connection is confirmed.
In step (4), since telecommunication is not easy to be shielded, especially when mobile terminal is far from intelligent door lock, such as
In office, if someone palms off the mobile terminal and intelligent door lock carries out near-field communication connection, intelligent door lock is by remotely leading to
Believing can be received to the near field link information of the mobile terminal reporting by real mobile terminal, if the mobile terminal receives
Intelligent door lock telecommunication information is connect without establishing near-field communication with intelligent door lock, judges that itself is not that other people steal on doorway
It opens, alert.
A kind of method that intelligent door lock control is unlocked is conjunction of the intelligent door lock according to mobile terminal near-field communication Information Authentication
Method control is unlocked, and mobile terminal is judged at a distance from intelligent door lock by information such as mobile terminal signal intensity, when mobile whole
It holds near-field communication verifying legal, and is in safe distance, control door-lock opening.
Further, work as door-lock opening, intelligent door lock sends information of having unlocked to the terminal by telecommunication, if institute
It states mobile terminal and receives the information of unlocking of intelligent door lock telecommunication transmission without establishing near-field communication with intelligent door lock
Connection, illustrates oneself, or not door lock region, to judge other people pirate of the open, alert.
It is above-mentioned that intelligent door lock unlocking speed can be improved it is found that do not consider reaction of the mobile terminal to telecommunication information,
But intelligent door lock cannot be prevented by wireless pirate of the open.
In order to improve the anti-theft function of intelligent door lock, intelligent door lock verifies legal shifting to near-field communication by telecommunication
Dynamic terminal sends disposable identifying code, and the mobile terminal feeds back the identifying code to intelligent door lock by telecommunication, described
Intelligent door lock is controlled according to the mobile terminal remote communications feedback information authentication results and is unlocked.It is logical by telecommunication and near field
The double verification of letter can ensure the safety of intelligent door lock, but intelligent door lock needs to wait, verifies the long-range of mobile terminal
Communications feedback information, causing to unlock postpones.
It is further to improve, uncaging time section is set in intelligent door lock, and in uncaging time section, intelligent door lock is according to movement
The legitimacy of terminal near-field communication Information Authentication, which controls, unlocks.Uncaging time section is that user comes home from work the period, unlocking frequency
Height, the probability that intelligent door lock pirate of the open occurs is smaller, can be unlocked using the single verification method control of near-field communication, improve speed of unlocking
Degree, facilitates user to unlock.
It is further to improve, non-uncaging time section is set in intelligent door lock, due to the non-unlocking period be user go out from
Family's period, most times being occupied in one day, the probability that pirate of the open occurs is higher, and the probability that user opens the door is smaller,
Therefore, in non-uncaging time section, intelligent door lock is controlled according to the near-field communication and telecommunication double verification result of mobile terminal
It unlocks, the safety of intelligent door lock can be improved, and influence of the delay to user experience of unlocking is smaller.
It should be noted that if intelligent door lock is if receive the telecommunication feedback letter of two identical mobile terminals
Breath, no matter whether feedback information item consistent, illustrates there are a personator, intelligent door lock may cannot be distinguished it is true and false, can be with
There is personator to mobile terminal feedback again by telecommunication, no thoroughfare, and near field wireless mode is unlocked, and by such as
The control of the not wireless unlocking information such as password or fingerprint is unlocked.
Further, the preset unlocking condition in intelligent door lock, the intelligent door lock are triggered with movement eventually according to unlocking condition
The near-field communication and/or telecommunication at end.The unlocking condition includes the uncaging time or intelligent door set in intelligent door lock
Lock the human body signal of detection or user's touch signal of intelligent door lock induction.Intelligent door lock near-field communication and/or telecommunication function
It can be typically in closing or dormant state, open or wake up near-field communication and/or telecommunications functions by unlocking condition, it can be with
Save intelligent door lock energy consumption.
Further, intelligent door lock can be controlled telecommunication by near-field communication, i.e., according to the near-field communication with mobile terminal
The telecommunications functions with mobile terminal are opened in connection control.
It is clear that can preset unlocking condition in the terminal, the mobile terminal according to the triggering of unlocking condition with
The near-field communication and telecommunication of intelligent door lock.The unlocking condition include the uncaging time set in the terminal or
The fence based on latch position or user's trigger signal of mobile terminal induction are established in mobile terminal.
Uncaging time section is usually that user comes home from work the period, such as noon 12:00 ~ 12:30, afternoon 6:00 ~ 6:30.
In uncaging time section, mobile terminal automatically opens or wakes up near field communication (NFC) function, carries out near-field communication connection with intelligent door lock.
A kind of uncaging time section application scenarios example, when user goes home in uncaging time section, smart phone is controlled according to the time
Bluetooth near field communication (NFC) function is automatically opened or waken up, door lock Bluetooth broadcast information is scanned, when user enters intelligent door lock bluetooth letter
Number coverage area, for example 10 meters of ranges of intelligent door lock are walked close to, smart phone and intelligent door lock establish bluetooth connection, intelligent door automatically
Lock carries out identifying the mobile terminal according to Bluetooth of mobile phone link information, verifies its legitimacy;If the mobile terminal near field
It is legal to communicate, and intelligent door lock is carried out telecommunication with the mobile terminal, is sent to it near field link information by telecommunication;
If the mobile terminal receives intelligent door lock telecommunication information and connect without establishing near-field communication with intelligent door lock, sentence
Break itself is not other people pirate of the open, alert on doorway.
A kind of method for establishing the fence based on latch position in the terminal is set according to wireless location technology
Determine latch position range, determine the position coordinates of door lock by wireless location method first, for example, by the GPS of mobile terminal or
LBS localization method obtains the position coordinates of intelligent door lock, centered on the position coordinates of door lock, sets within the scope of certain radius
Position coordinates are door lock region decision range, if the position coordinates of mobile terminal are in latch position region, triggering movement
Terminal and intelligent door lock carry out near-field communication and telecommunication.
Another method for establishing the fence based on latch position in the terminal is set according to wireless signal transmitting
Standby identification information, the identification information including one or more wireless signal transmission equipments, the knowledge of the wireless signal transmission equipment
Other information includes GSM identification of base stations coding or mac address information of WIFI etc., and smart phone is placed on intelligent door lock position,
One or more wireless signal transmission equipment identification informations that latch position is covered by smart phone detection signal, described one
The signal cover of a or multiple wireless signal transmission equipments is as door lock fence region, if mobile terminal detecting
The identification information of wireless signal transmission equipment is consistent with the fence information of foundation, judges that the mobile terminal is in door lock area
Domain, triggering mobile terminal and intelligent door lock carry out near-field communication and telecommunication.
Since the signal cover of wireless signal transmission equipment transmitting is larger, differentiated by wireless signal transmission equipment
Position range is larger, and the position range for being based especially on single transmitting equipment differentiation is bigger, can be mentioned by location fingerprint technology
High position precision.
Yet another method is to establish the fence based on latch position by fingerprint location technology, including mobile terminal connects
The signal strength information of one or more wireless signal transmission equipments of receipts, such as the intelligent hand by being in intelligent door lock position
Machine detecting wireless signal transmitting device identifying information and signal strength information or reception signal time information establish latch position
Fence, if the identification information and signal strength or receiving time of the wireless signal transmission equipment of mobile terminal detecting with
The fence information of foundation is consistent, judges that the mobile terminal is in door lock region, triggering mobile terminal and intelligent door lock carry out
Near-field communication and telecommunication.
A kind of fence application scenarios example, when user goes home at 100 meters of family, smart phone is according to the setting
The judgement of base station communication information enters latch position fence region, and smart phone automatically opens or wake up bluetooth near-field communication function
Can, door lock Bluetooth broadcast information is scanned, when user enters intelligent door lock Bluetooth signal coverage area, for example walks close to intelligent door lock 10
Rice range, smart phone and intelligent door lock establish bluetooth connection automatically, and intelligent door lock identifies institute according to Bluetooth of mobile phone link information
Mobile terminal is stated, its legitimacy is verified;If the mobile terminal near-field communication is legal, intelligent door lock and the mobile terminal into
Row telecommunication;If the mobile terminal receives intelligent door lock telecommunication information without establishing near field with intelligent door lock
Communication connection judges that itself is not other people pirate of the open, alert on doorway.
Another is based on user and triggers application scenarios example, when user walks close to door lock, by clicking cell phone application opening or waking up
Bluetooth of mobile phone near field communication (NFC) function scans door lock Bluetooth broadcast information, when user enters intelligent door lock Bluetooth signal coverage area,
For example 10 meters of ranges of intelligent door lock are walked close to, smart phone and intelligent door lock establish bluetooth connection automatically, and intelligent door lock is according to mobile phone
Bluetooth connection information identifies the mobile terminal, verifies its legitimacy;If the mobile terminal near-field communication is legal, intelligent door
Lock is carried out telecommunication with the mobile terminal;If the mobile terminal receive intelligent door lock telecommunication information without
Near-field communication is established with intelligent door lock to connect, and judges that itself is not other people pirate of the open, alert on doorway.
Mobile terminal, can also be according to unlocking other than combining the near-field communication connection judgment self position with intelligent door lock
Condition judges other people pirate of the open, if the mobile terminal receives the remote of intelligent door lock in the case where not meeting the unlocking condition
Journey communication connection, such as user receive intelligent door lock in office and are believed by the near-field communication unlocking event that telecommunication is sent
Breath, judges a region of itself staying out, and is that other people prepare pirate of the open, alert or is sent out by telecommunication to intelligent door lock
Prohibit out and opens instruction.
Relative to near-field communication, the communication range of telecommunication is unrestricted, and no matter where mobile terminal can connect
The telecommunication information of intelligent door lock is received, and is not easy to be shielded, relative to telecommunication, the short distance based on near-field communication
Judge more accurate, for example range accuracy is up to 1 meter, can ensure that user is in and open door again in door lock safe distance
Lock.Mobile terminal of the present invention judges that self-position whether near door lock, passes through intelligence by the near-field communication with intelligent door lock
The safety that the telecommunication of door lock and mobile terminal protection intelligent door lock near-field communication is wirelessly unlocked, can find other people in time
Pirate of the open improves the safety that intelligent door lock is wirelessly unlocked.
Claims (10)
1. a kind of intelligent door lock pirate of the open recognition methods based on mobile terminal, feature the following steps are included:
The information of mobile terminal with wireless unlocking authority is established in intelligent door lock;
Intelligent door lock carries out near-field communication with the mobile terminal in its near field communication range, identifies the mobile terminal, verifies
Its legitimacy;
If the mobile terminal near-field communication is legal, intelligent door lock is carried out telecommunication with the mobile terminal;
Connect if the mobile terminal receives intelligent door lock telecommunication information without establishing near-field communication with intelligent door lock
It connects, judges that itself is not other people pirate of the open, alert on doorway.
2. method according to claim 1, it is characterized in that: the intelligent door lock is according to mobile terminal near-field communication Information Authentication
Legitimacy control unlock.
3. method according to claim 1 or claim 2, it is characterized in that: uncaging time section is arranged in the intelligent door lock, when unlocking
Between section, intelligent door lock according to the legitimacy of mobile terminal near-field communication Information Authentication control unlock.
4. method according to claim 1, it is characterized in that: the intelligent door lock verifies conjunction to near-field communication by telecommunication
The mobile terminal of method sends disposable identifying code, and the mobile terminal feeds back the verifying to intelligent door lock by telecommunication
Code, the intelligent door lock are controlled according to the mobile terminal remote communications feedback information authentication results and are unlocked.
5. according to claim 1 or 4 the methods are opened it is characterized in that: non-uncaging time section is arranged in the intelligent door lock non-
It locks the period, intelligent door lock is controlled according to the near-field communication and telecommunication double verification result of mobile terminal and unlocked.
6. method according to claim 1, it is characterized in that: in the intelligent door lock preset unlocking condition, the intelligent door
Lock triggers the near-field communication and/or telecommunication with mobile terminal according to unlocking condition.
7. method according to claim 6, it is characterized in that: when the unlocking condition includes the unlocking set in intelligent door lock
Between or intelligent door lock detection human body signal or intelligent door lock induction user's touch signal.
8. method according to claim 1, it is characterized in that: in the mobile terminal preset unlocking condition, it is described it is mobile eventually
The near-field communication and telecommunication with intelligent door lock are triggered according to unlocking condition in end.
9. method according to claim 8, it is characterized in that: when the unlocking condition includes the unlocking set in the terminal
Between or user's trigger signal of fence based on latch position or mobile terminal induction for establishing in the terminal.
10. according to claim 1 or 4 or 8 or 9 the methods, it is characterized in that: if the mobile terminal is not meeting unlocking item
Receive the telecommunication information of intelligent door lock transmission in the case of part, alert or by telecommunication to intelligent door lock
It issues to prohibit and opens instruction.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910256750.8A CN109979060A (en) | 2019-04-01 | 2019-04-01 | Intelligent door lock pirate of the open recognition methods based on mobile terminal |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910256750.8A CN109979060A (en) | 2019-04-01 | 2019-04-01 | Intelligent door lock pirate of the open recognition methods based on mobile terminal |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109979060A true CN109979060A (en) | 2019-07-05 |
Family
ID=67082138
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910256750.8A Pending CN109979060A (en) | 2019-04-01 | 2019-04-01 | Intelligent door lock pirate of the open recognition methods based on mobile terminal |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109979060A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20210122945A (en) | 2020-04-01 | 2021-10-13 | 중앙대학교 산학협력단 | High Aspect Ratio super capacitor electrode with flexibility and high capacitance and Metal grid for manufacturing the super capacitor electrode |
-
2019
- 2019-04-01 CN CN201910256750.8A patent/CN109979060A/en active Pending
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20210122945A (en) | 2020-04-01 | 2021-10-13 | 중앙대학교 산학협력단 | High Aspect Ratio super capacitor electrode with flexibility and high capacitance and Metal grid for manufacturing the super capacitor electrode |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9218696B2 (en) | Wireless access control system and related methods | |
US9626814B2 (en) | Smart door lock | |
KR101692993B1 (en) | Smart doorlock | |
US10861265B1 (en) | Automated door lock | |
CN100539624C (en) | The security remote-control system and the method for portable terminal and this portable terminal of use | |
CN104806085B (en) | A kind of intelligent door lock system and its intelligent prompt method | |
US20160035165A1 (en) | Wireless access control system and related methods | |
CN109887131A (en) | Intelligent door lock unlocking information is stolen recognition methods | |
US20140292481A1 (en) | Wireless access control system and related methods | |
CN102831682B (en) | System and method for remotely opening door based on mobile phone short message | |
CN106934887A (en) | The smart bluetooth entrance guard device and control method of a kind of integrated position judgment and the direction of motion | |
US20160005247A1 (en) | Arrangement for the authorised access of at least one structural element located in a building | |
CN109712287A (en) | A kind of intelligent district access control system | |
CN109584430A (en) | Intelligent door lock system Bluetooth method | |
CN106127892A (en) | A kind of Household gate control method based on Bluetooth communication | |
CN109993868A (en) | A kind of wireless method for unlocking of intelligent door lock | |
JP4665649B2 (en) | Lock control device and program | |
KR20150137947A (en) | Door Lock System For Vehicle | |
CN107545619A (en) | A kind of sound wave gate control system and sound wave access control method | |
CN110930548A (en) | Face recognition intelligent security system | |
CN109979060A (en) | Intelligent door lock pirate of the open recognition methods based on mobile terminal | |
CN212569880U (en) | Door opening system of Bluetooth induction lock | |
KR101847386B1 (en) | A Management Method For Unmanned Locker Using Smart Phone | |
CN108389289A (en) | A kind of intelligent door lock, unlocking method and locking method | |
CN113470220A (en) | System and method for improving security during electronically controlled key candidate functions |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |