CN110060401A - Two dimensional code method for unlocking and device - Google Patents
Two dimensional code method for unlocking and device Download PDFInfo
- Publication number
- CN110060401A CN110060401A CN201910358438.XA CN201910358438A CN110060401A CN 110060401 A CN110060401 A CN 110060401A CN 201910358438 A CN201910358438 A CN 201910358438A CN 110060401 A CN110060401 A CN 110060401A
- Authority
- CN
- China
- Prior art keywords
- dimensional code
- unlocking
- lockset
- user
- interim
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 59
- 230000005540 biological transmission Effects 0.000 claims description 22
- 238000004891 communication Methods 0.000 claims description 20
- 230000015654 memory Effects 0.000 claims description 19
- 230000001960 triggered effect Effects 0.000 claims description 13
- 238000004590 computer program Methods 0.000 claims description 6
- 230000000977 initiatory effect Effects 0.000 claims description 4
- 238000010030 laminating Methods 0.000 claims description 3
- 238000007726 management method Methods 0.000 description 81
- 238000012545 processing Methods 0.000 description 5
- 238000010586 diagram Methods 0.000 description 3
- 238000012790 confirmation Methods 0.000 description 2
- 238000012217 deletion Methods 0.000 description 2
- 230000037430 deletion Effects 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 230000006870 function Effects 0.000 description 2
- 230000002159 abnormal effect Effects 0.000 description 1
- 230000006399 behavior Effects 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 239000012141 concentrate Substances 0.000 description 1
- 230000009977 dual effect Effects 0.000 description 1
- 238000009434 installation Methods 0.000 description 1
- 230000035800 maturation Effects 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 230000035755 proliferation Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K17/00—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
- G06K17/0022—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisions for transferring data to distant stations, e.g. from a sensing device
- G06K17/0025—Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisions for transferring data to distant stations, e.g. from a sensing device the arrangement consisting of a wireless interrogation device in combination with a device for optically marking the record carrier
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Lock And Its Accessories (AREA)
Abstract
The present invention provides a kind of two dimensional code method for unlocking and devices, are related to intelligent lock technical field.This method is applied to the controller of lockset, and above-mentioned lockset further includes scan components and unlocking executive module, this method comprises: control scan components execute two-dimensional code scanning operation, if receiving the unlocking request of user to scan the two dimensional code of user's offer;Judge whether the two dimensional code scanned is legal;If legal, control unlocking executive module executes unlocking operation.This method using two dimensional code as key, unlock as scanning tools by door lock, can effectively promote the reliability of lockset.
Description
Technical field
The present invention relates to intelligent lock technical fields, more particularly, to a kind of two dimensional code method for unlocking and device.
Background technique
In recent years, with the rapid proliferation of smart phone, the function of smart phone is stronger and stronger.With planar bar code technology
It is increasingly mature, be born a series of two dimensional code unlocking technique.It is mark that common two dimensional code unlocking technique, which is by two dimensional code,
Label are attached on lockset, and mobile phone is used to unlock as scanning tools.But the two dimensional code on lockset is attached to as label and is easy
It is altered, lockset reliability is poor.
Summary of the invention
The embodiment of the present invention is designed to provide a kind of two dimensional code method for unlocking and device, using two dimensional code as key,
Door lock is unlocked as scanning tools, can effectively promote the reliability of lockset.
In a first aspect, the embodiment of the invention provides a kind of two dimensional code method for unlocking, it is described applied to the controller of lockset
Lockset further includes scan components and unlocking executive module, which comprises if receiving the unlocking request of user, controls institute
It states scan components and executes two-dimensional code scanning operation, to scan the two dimensional code that the user provides;Judging the two dimensional code scanned is
It is no legal;If legal, control the unlocking executive module and execute unlocking operation.
With reference to first aspect, the embodiment of the invention provides the first possible embodiments of first aspect, wherein institute
Stating lockset further includes alarm, the method also includes: if the two dimensional code is illegal, current illegal number is enabled to add 1,
And start timing;Judge whether the illegal number is greater than preset times;If so, current timing duration is obtained, if institute
It states timing duration and is less than the default unlocking used time, trigger the alarm equipment alarm;If not, initiating for reminding the user to provide
The two dimensional code of new two dimensional code updates prompt, and scan components described in secondary control execute two-dimensional code scanning operation again.
With reference to first aspect, the embodiment of the invention provides second of possible embodiments of first aspect, wherein institute
Stating lockset further includes communication component and reset assembly, if controlling the scanning group in the unlocking request for receiving user
Part executes two-dimensional code scanning operation, the step of to scan two dimensional code that the user provides before, further includes: if by described
Communication component receives the unlocking request of user terminal transmission, and monitors that the reset assembly is triggered within a preset time,
Determine that the user terminal is management terminal;It is sent to the management terminal and agrees to unlocking instruction, so that the management terminal is held
Row benchmark two dimensional code generates operation;It includes that the hardware information based on the management terminal generates that the benchmark two dimensional code, which generates operation,
Id number is managed, and benchmark two dimensional code is generated according to the management id number;Receive and store the base that the management terminal is sent
Quasi- two dimensional code.
The possible embodiment of second with reference to first aspect, the embodiment of the invention provides the third of first aspect
Possible embodiment, wherein if controlling the scan components in the unlocking request for receiving user and executing two dimensional code
Scan operation, the step of to scan two dimensional code that the user provides before, further includes: if received by the communication component
The unlocking request sent to user terminal, and do not monitor that the reset assembly is triggered, and determines the use within a preset time
Family terminal is ephemeral terminations;Unlocking request is sent to the management terminal, is used so that the management terminal is initiated to remind
Examine the prompt of the request of unlocking in family;If receiving the examination & approval that the management terminal is sent passes through message, described will examine
It criticizes and the ephemeral terminations is sent to by message, so that the ephemeral terminations execute interim two dimensional code and generate operation;It is described interim
It includes the interim id number of hardware information generation based on the ephemeral terminations that two dimensional code, which generates operation, and according to the interim ID number
Code generates interim two dimensional code;Receive and store the interim two dimensional code that the ephemeral terminations are sent.
The third possible embodiment with reference to first aspect, the embodiment of the invention provides the 4th kind of first aspect
Possible embodiment, wherein the method also includes: if receive that the management terminal sends carries ephemeral terminations
The two dimensional code of id number delete instruction, delete the interim two dimension that stored id number based on the ephemeral terminations generates
Code.
The third possible embodiment with reference to first aspect, the embodiment of the invention provides the 5th kind of first aspect
Possible embodiment, wherein the whether legal step of the two dimensional code for judging to scan, comprising: judge scan two
Whether dimension code matches with the benchmark two dimensional code or the interim two dimensional code;If so, determining that the two dimensional code scanned closes
Method.
Second aspect, the embodiment of the invention also provides a kind of two dimensional code unlocking apparatus, lockset is arranged in described device
Controller, the lockset further include scan components and unlocking executive module, and described device includes: scan module, for receiving
When the unlocking request of user, controls the scan components and execute two-dimensional code scanning operation, to scan the two dimension that the user provides
Code;Whether two dimensional code judgment module, the two dimensional code for judging to scan are legal;Unlocking execution module, in the two dimension
When code is legal, controls the unlocking executive module and execute unlocking operation.
In conjunction with second aspect, the embodiment of the invention provides the first possible embodiments of second aspect, wherein institute
Stating lockset further includes alarm, described device further include: number laminating module, for when the two dimensional code is illegal, order to be worked as
Preceding illegal number adds 1, and starts timing;Number judgment module, for judging it is default whether the illegal number is greater than
Number;Alarm module, for current timing duration being obtained, if the meter when the illegal number is greater than preset times
Shi Shichang is less than the default unlocking used time, triggers the alarm equipment alarm;User reminding module, for small in the illegal number
When being equal to preset times, initiate to update prompt, and secondary control again for the two dimensional code for reminding the user to provide new two dimensional code
It makes the scan components and executes two-dimensional code scanning operation.
The third aspect, the embodiment of the invention provides a kind of electronic equipment, including memory, processor, the memories
In be stored with the computer program that can be run on the processor, wherein when the processor executes the computer program
The step of realizing method as described in relation to the first aspect.
Fourth aspect, the embodiment of the invention provides a kind of computer-readable mediums, wherein the computer-readable medium
Computer executable instructions are stored with, the computer executable instructions are when being called and being executed by processor, the computer
Executable instruction promotes the method for the processor realization as described in relation to the first aspect.
The present invention provides a kind of two dimensional code method for unlocking and device, this method is applied to the controller of lockset, above-mentioned lock
Tool further includes scan components and unlocking executive module, this method comprises: controlling scanning group if receiving the unlocking request of user
Part executes two-dimensional code scanning operation, to scan the two dimensional code of user's offer;Judge whether the two dimensional code scanned is legal;If closed
Method, control unlocking executive module execute unlocking operation.This method using two dimensional code as key, opened as scanning tools by door lock
Lock, can effectively promote the reliability of lockset.
Detailed description of the invention
It, below will be to specific in order to illustrate more clearly of the specific embodiment of the invention or technical solution in the prior art
Embodiment or attached drawing needed to be used in the description of the prior art be briefly described, it should be apparent that, it is described below
Attached drawing is some embodiments of the present invention, for those of ordinary skill in the art, before not making the creative labor
It puts, is also possible to obtain other drawings based on these drawings.
Fig. 1 is a kind of two dimensional code method for unlocking flow chart provided in an embodiment of the present invention;
Fig. 2 is a kind of two dimensional code method for unlocking flow chart provided in an embodiment of the present invention;
Fig. 3 is a kind of two dimensional code unlocking apparatus structural schematic diagram provided in an embodiment of the present invention;
Fig. 4 is electronic devices structure figure provided in an embodiment of the present invention.
Specific embodiment
Technical solution of the present invention is clearly and completely described below in conjunction with embodiment, it is clear that described reality
Applying example is a part of the embodiment of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, the common skill in this field
Art personnel every other embodiment obtained without making creative work belongs to the model that the present invention protects
It encloses.
Two dimensional code is usually that label is attached on lockset, uses mobile phone as scanning by existing two dimensional code unlocking technique
Tool is unlocked, for example, shared bicycle and express delivery are asked for.But there are disadvantages for this method for unlocking, as label
The two dimensional code being attached on lockset is easy to be altered;Because there are a large amount of lockset relevant informations in two dimensional code, there is also
The risk that leakage information causes any property loss, causes the lockset reliability with two-dimension code label poor.
Based on this, a kind of two dimensional code method for unlocking and device provided in an embodiment of the present invention, applied to the controller of lockset,
The lockset further includes scan components and unlocking executive module.Above-mentioned two dimensional code method for unlocking using two dimensional code as key, make by door lock
It unlocks for scanning tools, not will use family information leakage and cause any property loss.Therefore, the two dimensional code method for unlocking and device
It can be applied to improve the reliability of lockset.
For convenient for understanding the present embodiment, first to a kind of two dimensional code method for unlocking disclosed in the embodiment of the present invention
It describes in detail.
Embodiment one:
A kind of two dimensional code method for unlocking provided in an embodiment of the present invention, applied to the controller of lockset, which further includes
Scan components and unlocking executive module, referring to two dimensional code method for unlocking flow chart as shown in Figure 1, this method includes following step
It is rapid:
Step S102: if receiving the unlocking request of user, control scan components execute two-dimensional code scanning operation, to sweep
The two dimensional code of user's offer is provided.
When the controller of lockset receives the unlocking request of user, the two dimension of control scan components scanning user's offer
The two dimensional code that scanning obtains is sent to controller by code, scan components.Above-mentioned unlocking request can be through connection controller
Button triggering, when user needs to unlock, presses unlocking button trigger controller;It is also possible to the scanning area in scan components
Safety head is set, and when user opens safety head, controller receives unlocking request;It can also be that user can in scan components
The region scanned executes some movement, touches scan components or directly touch the movements such as two dimensional code alignment scanning area
Controller is sent out, to receive the unlocking request of user.The side that user can either be printed by mobile phone terminal, tablet computer
Formula provides two dimensional code.
Step S104: judge whether the two dimensional code scanned is legal.
Controller judges whether two dimensional code that scan components scan is legal two dimensional code, the legal two dimensional code,
The administrator that can be lockset is previously stored the two dimensional code that can open the lockset in the controller.
Step S106: if legal, control unlocking executive module executes unlocking operation.
If the two dimensional code that scan components scan is legal two dimensional code, controls unlocking executive module and execute unlocking
Operation is to open lockset.
The embodiment of the invention provides a kind of two dimensional code method for unlocking, and using two dimensional code as key, door lock is as scanning work
Tool is unlocked, and the reliability of lockset can be effectively promoted.The scan components of above-mentioned lockset need before executing scan operation for the first time
It first to determine benchmark two dimensional code and interim two dimensional code, and be stored in the controller of lockset.Benchmark two dimensional code is the management of lockset
The management two dimensional code that terminal generates, when being stored with benchmark two dimensional code in controller, management is can be used eventually in the manager of lockset
The management two dimensional code at end opens lockset.Interim two dimensional code is interim two that the ephemeral terminations passed through by management terminal examination & approval generate
Code is tieed up, when being stored with interim two dimensional code in controller, user can open lockset by the interim two dimensional code of ephemeral terminations.Pipe
Reason terminal can manage the number of ephemeral terminations.Above-mentioned lockset further includes alarm, communication component and reset assembly.Reset assembly
The opposite side of scan components is set, and user can just see reset assembly after only opening lockset.
The embodiment for present embodiments providing a kind of determining benchmark two dimensional code first, can refer to following steps (1)~
(3):
(1) it if requested by the unlocking that communication component receives user terminal transmission, and monitors within a preset time
Reset assembly is triggered, and determines that user terminal is management terminal.
After if the communication component of lockset received the unlocking request that user terminal passes through bluetooth or wireless signal is sent, meeting
Unlocking request is sent to controller, controller starts timing after receiving the unlocking request of user's transmission, if default
It detects that the reset assembly of lockset is triggered in time, which is determined as management terminal.The user of management terminal is
For the administrator of lockset, each lockset has only one administrator.Above-mentioned preset time can be according to user situation voluntarily
Setting, such as can be set to 10s or 20s etc..
Reset assembly needs to be arranged in the inside of lockset as a preferred method, for example, if lockset is mounted on a door,
Then the side that lockset is located on the inside of room is arranged in reset assembly;If lockset is mounted on car door, reset assembly setting is being locked
Tool is located at interior side.The manager in room or automobile can send to unlock and ask by using user terminal to lockset in this way
It asks, and presses the reset assembly on lockset, the user terminal for using the manager of room or automobile becomes the pipe of corresponding lockset
Manage terminal.
(2) it is sent to management terminal and agrees to unlocking instruction, so that management terminal executes benchmark two dimensional code and generates operation;Benchmark
It includes that the hardware information based on management terminal generates management id number, and generates base according to management id number that two dimensional code, which generates operation,
Quasi- two dimensional code.
After controller determines management terminal, the instruction for agreeing to that management terminal can unlock is sent to management terminal, makes pipe
The hardware information that reason terminal obtains itself generates uniquely management id number corresponding with management terminal, and according to above-mentioned management ID number
Code generates benchmark two dimensional code.After management terminal generates benchmark two dimensional code, benchmark two dimensional code is sent to the controller of lockset.
(3) the benchmark two dimensional code of management terminal transmission is received and stored.
After the controller of lockset receives the benchmark two dimensional code of management terminal transmission, store it in controller.If with
Family sends request of unlocking again by new user terminal, and presses reset assembly within a preset time, and controller redefines
Management terminal, and update storage the benchmark two dimensional code that new management terminal generates.
For the sake of security, the lockset that user newly buys is after being arranged management terminal, if replacement management terminal, in addition to needing
It sends request of unlocking and arrives lock controller, and press outside reset assembly, it is also necessary to the examination & approval agreement Jing Guo current management terminal,
New management terminal could be become.
Secondly, in order to promote the convenience for opening lockset, the present embodiment additionally provides a kind of reality for determining interim two dimensional code
Mode is applied, can refer to following steps 1~4:
Step 1: if requested by the unlocking that communication component receives user terminal transmission, and not supervising within a preset time
It measures reset assembly to be triggered, determines that user terminal is ephemeral terminations.
It, will be above-mentioned after the communication component of lockset receives the unlocking request that user terminal passes through bluetooth or wireless signal is sent
Request of unlocking is sent to the controller of lockset.If the controller of lockset receives the unlocking request of user terminal transmission, start to count
When, if not monitoring that reset assembly is triggered within a preset time, above-mentioned user terminal is determined as ephemeral terminations, it is interim whole
Unlocking function is realized to binding lockset in end, needs the examination & approval by management terminal.
Step 2: the request that will unlock is sent to management terminal, so that management terminal initiates that user is reminded to examine request of unlocking
Prompt.
The controller of lockset requests the unlocking of ephemeral terminations, is sent to management terminal by communication component, so that management
Terminal reminds user to examine request of unlocking.After management terminal receives the examination & approval of user's dual lock request, pass through if it is examination & approval
Message, then the message that passes through of examination & approval is sent to the controller of lockset;If management terminal has rejected the unlocking of ephemeral terminations
Request, i.e. the unlocking request of ephemeral terminations, which is not examined, to be passed through, then without sending information to lock controller, ephemeral terminations will not
Interim two dimensional code is generated, lockset can not be opened.
Step 3: if examination & approval are sent to temporarily by the examination & approval for receiving management terminal transmission by message by message
Terminal, so that ephemeral terminations execute interim two dimensional code and generate operation;It includes based on ephemeral terminations that interim two dimensional code, which generates operation,
Hardware information generates interim id number, and generates interim two dimensional code according to interim id number.
The controller of lockset receives the examination & approval of management terminal transmission by that can be sent to examination & approval by message after message
Ephemeral terminations, so that the hardware information for making ephemeral terminations obtain its own generates unique corresponding interim id number, and root
Interim two dimensional code is generated according to interim id number.Above-mentioned ephemeral terminations can be one, be also possible to multiple, and each ephemeral terminations exist
After generating interim two dimensional code, the interim two dimensional code that can be generated is sent to the controller of lockset
Step 4: receiving and storing the interim two dimensional code of ephemeral terminations transmission.
Lock controller receives and stores the interim two dimensional code of ephemeral terminations transmission.If there is multiple ephemeral terminations, lockset
Controller can distinguish each interim two dimensional code according to the interim id number for including in each interim two dimensional code, can also basis
Interim id number in each interim two dimensional code is to each interim two dimensional code number, to be easy to distinguish.Multiple interim two dimensional codes
Determination, allow administrator remotely controlled by management terminal temporary subscriber open lockset.For example, lockset is arranged in door
On, when homeowners can not come back, it can agree to that the unlocking of the ephemeral terminations of guest is requested, and guest is passed through by management terminal
The interim two dimensional code that ephemeral terminations generate opens door lock, greatly improves the convenience for opening lockset.
As an alternative embodiment, user provides management two dimensional code by management terminal, or pass through ephemeral terminations
It, can only be by showing the software page of unlocking two dimensional code in management terminal or ephemeral terminations when providing interim two dimensional code to open lockset
Face is scanned for scan components, and the management two dimensional code or interim two dimensional code not reproducible or screenshotss can not print.
When user wants to open lockset, management terminal, or transmission unlocking request can only be used to apply to become ephemeral terminations and open lockset, greatly
The safety of lockset is improved greatly.
It can also be other embodiments, the interim two dimensional code of the management two dimensional code and ephemeral terminations of management terminal can also
To be real-time update, two dimensional code will be updated when unlocking every time, but in the two dimensional code updated also forever include its terminal hardware
The id number that information generates, and the controller of lockset can be also sent to after more new management two dimensional code or interim two dimensional code, to update
Management two dimensional code and interim two dimensional code in lock controller.When user by management terminal by stored in controller some face
When terminal deletion after, which cannot open lockset again, can not also update interim two dimensional code.
When can open lockset in view of interim two dimensional code, the problem of safety of lockset cannot be protected, if connect
The two dimensional code for receiving the id number for carrying ephemeral terminations of management terminal transmission deletes instruction, deletes stored based on interim
The interim two dimensional code that the id number of terminal generates.Management terminal can manage the number of interim two dimensional code, according to the need of manager
To delete some ephemeral terminations at any time in management terminal, the interim two dimensional code for being managed terminal deletion cannot open lockset again,
Improve the safety of lockset.
Management terminal can check each ephemeral terminations catalogue for being currently able to open lockset, and can also manage can open
The quantity of the ephemeral terminations of lockset, for example, the lockset is mounted on a door, if owner can pass through management after guest leaves
Terminal sends two dimensional code to the controller of lockset and deletes instruction.The controller of lockset receives carrying for management terminal transmission and faces
When terminal id number two dimensional code delete instruction after, face store that the id number based on ephemeral terminations generates in controller
When two dimensional code delete, the ephemeral terminations for being deleted interim two dimensional code cannot open lockset again.If being deleted interim two dimensional code
Ephemeral terminations issue unlocking request again, and the examination & approval for having obtained management terminal can then generate interim two by message again
It ties up code and opens lockset.
The generation of above-mentioned ephemeral terminations is solved when owner does not get home, has guest to visit in advance the problem of cannot be introduced into.
Guest can generate interim two dimensional code in the case where the management terminal examination & approval by owner pass through, so as to voluntarily open the door,
After guest leaves, owner can be deleted the interim two dimensional code for leaving guest stored in lock controller by user terminal
It removes, avoids the occurrence of safety problem.
In order to improve the safety and unlocking convenience of lockset, the embodiment of the invention provides a kind of two dimensional code method for unlocking
Embodiment can be answered with further reference to two dimensional code method for unlocking flow chart as shown in Figure 2, this method on the basis of Fig. 1
For the controller of lockset, which further includes scan components and unlocking executive module, specifically includes the following steps:
Step S202: if receiving the unlocking request of user, control scan components execute two-dimensional code scanning operation, to sweep
The two dimensional code of user's offer is provided.
Step S204: judge whether the two dimensional code scanned is legal.If the two dimensional code scanned is legal, step is executed
S206;If the two dimensional code scanned is illegal, step S208 is executed.
Judge whether the two dimensional code scanned matches with benchmark two dimensional code or interim two dimensional code.If so, determining that scanning is arrived
Two dimensional code it is legal.As long as that is, one of two dimension in the two dimensional code scanned and benchmark two dimensional code or interim two dimensional code
Code matching, so that it may determine that the two dimensional code scanned is legal.
In a kind of feasible embodiment, if the benchmark two dimension stored in the two dimensional code and lock controller that scan
Code is identical, then the two dimensional code that can confirm that scanning is arrived is matched with benchmark two dimensional code;Similarly, if the two dimensional code scanned and lockset control
The interim two dimensional code stored in device processed is identical, then can confirm that the two dimensional code that scanning is arrived is matched with interim two dimensional code.
In another feasible embodiment, the id number for including in two dimensional code that scanning obtains can be checked, if
Management id number corresponding with benchmark two dimensional code is consistent, if unanimously, confirming that the two dimensional code scanned is matched with benchmark two dimensional code;
Similarly, the id number for including in two dimensional code that scanning obtains can be checked, if pipe corresponding with one of them interim two dimensional code
It is consistent to manage id number, if unanimously, confirming that the two dimensional code scanned is matched with interim two dimensional code.
In practical applications, any of the above-described kind of feasible embodiment can be used, it can also will be above two feasible
Embodiment is used in combination, and such as, the benchmark two dimensional code only stored in the two dimensional code scanned and lock controller is identical,
And the id number management id number corresponding with benchmark two dimensional code that in the two dimensional code scanned includes it is consistent when, just confirmation scanning is arrived
Two dimensional code matched with benchmark two dimensional code.Similarly, wherein one only stored in the two dimensional code and lock controller scanned
A interim two dimensional code is identical, and the id number for including in the two dimensional code scanned management ID number corresponding with above-mentioned interim two dimensional code
When code is consistent, the two dimensional code that just confirmation scans is matched with interim two dimensional code.
Step S206: control unlocking executive module executes unlocking operation.
Step S208: it enables current illegal number add 1, and starts timing.
If the obtained two dimensional code of controller judgement scanning be it is illegal, enable controller to the illegal number of two dimensional code
It is counted, alternatively, the initial value of the illegal number of controller is zero, whenever appearance scans two obtained
Dimension code be it is illegal, enable current illegal number add 1.When the two dimensional code that first time appearance scanning obtains is illegal, control
Device processed starts timing.
Step S210: judge whether illegal number is greater than preset times.If so, executing step S212;If not, holding
Row step S214.
Whether the illegal number that controller judgement counts to get is greater than preset number.Alternatively, in advance
If number can be 3 times or 5 times.
Step S212: obtaining current timing duration, if timing duration is less than the default unlocking used time, triggers alarm report
It is alert.
If the illegal number for scanning obtained two dimensional code is greater than preset times, illustrate in the presence of the abnormal feelings illegally unlocked
Condition, lock controller can further obtain the current timing duration of controller, if current timing duration is less than default unlock and uses
When, illustrate to concentrate in a relatively short period of time there are the same person and attempt to unlock using illegal two dimensional code, therefore controller is to report
Alert device sends alarm signal, makes alarm equipment alarm.For example, the default used time of unlocking is 5 minutes, preset times are 3 times, if user exists
In 5 minutes, be supplied to for continuous 4 times the two dimensional code of scan components scanning be all it is illegal, controller can trigger alarm equipment alarm.
Step S214: it initiates to update prompt for the two dimensional code for reminding user to provide new two dimensional code, and secondary control is swept again
It retouches component and executes two-dimensional code scanning operation.
If the illegal number for scanning obtained two dimensional code is less than preset times, user is also provided with two dimensional code for scanning
The chance of component scans unlock, controller can initiate that user is reminded to provide new two dimensional code to user terminal by communication component
Two dimensional code updates prompt, the new two dimensional code that then control scan components scanning user provides again.
A kind of two dimensional code method for unlocking provided in an embodiment of the present invention, using two dimensional code as key, door lock is as scanning work
Tool is unlocked, and the reliability of lockset is improved;When the number for failure of unlocking is greater than preset times, alarm report is also triggered
It is alert;The unlocking request sent by the ephemeral terminations of guest can also be examined when owner stays out, to generate interim two dimension
Code, remote assistance guest open lockset;Also, the administrator of lockset can manage the ephemeral terminations quantity that can open lockset,
The interim two dimensional code stored in lockset is deleted at any time, improves the convenience of unlocking and the safety of lockset.
Embodiment two:
The embodiment of the invention provides a kind of two dimensional code unlocking apparatus, which is arranged in the controller of lockset, above-mentioned lock
Tool further includes scan components and unlocking executive module, two dimensional code unlocking apparatus structural schematic diagram shown in Figure 3, the device packet
It includes:
Scan module 31, when the unlocking for receiving user is requested, control scan components execute two-dimensional code scanning operation,
To scan the two dimensional code of user's offer.
Whether two dimensional code judgment module 32, the two dimensional code for judging to scan are legal.
Unlocking execution module 33, for when two dimensional code is legal, control unlocking executive module to execute unlocking operation.
Above-mentioned two dimensional code unlocking apparatus provided in this embodiment, using two dimensional code as key, door lock as scanning tools into
Row is unlocked, and the reliability of lockset can be effectively promoted.
Above-mentioned lockset further includes alarm, above-mentioned two-dimensional code scanning device further include:
Number laminating module, for enabling current illegal number add 1, and start timing when two dimensional code is illegal.
Number judgment module, for judging whether illegal number is greater than preset times.
Alarm module, for current timing duration being obtained, if timing duration when illegal number is greater than preset times
Greater than the default unlocking used time, alarm equipment alarm is triggered.
User reminding module, for initiating for reminding user to provide when illegal number is less than or equal to preset times
The two dimensional code of new two dimensional code updates prompt, and control scan components execute two-dimensional code scanning operation again.
Above-mentioned lockset further includes communication component and reset assembly, above-mentioned two-dimensional code scanning device further include:
Benchmark two dimensional code determining module, when for being requested in the unlocking for receiving user terminal transmission by communication component,
And monitor that reset assembly is triggered within a preset time, determine that user terminal is management terminal.It sends and agrees to management terminal
Unlocking instruction, so that management terminal executes benchmark two dimensional code and generates operation;It includes being based on management eventually that benchmark two dimensional code, which generates operation,
The hardware information at end generates management id number, and generates benchmark two dimensional code according to management id number.Receive and store management terminal
The benchmark two dimensional code of transmission.
Interim two dimensional code determining module, when for being requested in the unlocking for receiving user terminal transmission by communication component,
And do not monitor that reset assembly is triggered within a preset time, determine that user terminal is ephemeral terminations.The request that will unlock is sent to
Management terminal, so that management terminal initiates the prompt for reminding user to examine request of unlocking.If receiving management terminal transmission
Examination & approval are then sent to ephemeral terminations by message by message by examination & approval, so that ephemeral terminations execute interim two dimensional code and generate behaviour
Make;It includes the interim id number of hardware information generation based on ephemeral terminations that interim two dimensional code, which generates operation, and according to interim ID number
Code generates interim two dimensional code.Receive and store the interim two dimensional code of ephemeral terminations transmission.
Two dimensional code removing module, for the two dimension in the id number for carrying ephemeral terminations for receiving management terminal transmission
When code deletes instruction, the interim two dimensional code that the stored id number based on ephemeral terminations generates is deleted.
In one embodiment, whether above-mentioned two dimensional code judgment module 32 is further used for the two dimensional code for judging to scan
It is matched with benchmark two dimensional code or interim two dimensional code;If so, determining that the two dimensional code scanned is legal.
The embodiment of the invention provides a kind of two dimensional code unlocking apparatus, the two dimensional code unlocking side provided with above-described embodiment one
Method technical characteristic having the same reaches identical technical effect so also can solve identical technical problem.
The technical effect of device provided by the present embodiment, realization principle and generation is identical with previous embodiment, for letter
It describes, Installation practice part does not refer to place, can refer to corresponding contents in preceding method embodiment.
Embodiment three:
A kind of electronic equipment provided in an embodiment of the present invention, as shown in figure 4, electronic equipment includes processor 41, memory
42, the computer program that can be run on the processor is stored in the memory, the processor executes the calculating
The step of method that above-described embodiment one provides is realized when machine program.
Referring to fig. 4, electronic equipment further include: bus 44 and communication interface 43, processor 41, communication interface 43 and memory
42 are connected by bus 44.Processor 41 is for executing the executable module stored in memory 42, such as computer program.
Wherein, memory 42 may include high-speed random access memory (RAM, Random Access Memory),
It may further include nonvolatile memory (non-volatile memory), for example, at least a magnetic disk storage.By at least
One communication interface 43 (can be wired or wireless) realizes the communication between the system network element and at least one other network element
Connection, can be used internet, wide area network, local network, Metropolitan Area Network (MAN) etc..
Bus 44 can be isa bus, pci bus or eisa bus etc..The bus can be divided into address bus, data
Bus, control bus etc..Only to be indicated with a four-headed arrow convenient for indicating, in Fig. 4, it is not intended that an only bus or
A type of bus.
Wherein, memory 42 is for storing program, and the processor 41 executes the journey after receiving and executing instruction
Sequence, method performed by the device that the stream process that aforementioned any embodiment of the embodiment of the present invention discloses defines can be applied to handle
In device 41, or realized by processor 41.
Processor 41 may be a kind of IC chip, the processing capacity with signal.During realization, above-mentioned side
Each step of method can be completed by the integrated logic circuit of the hardware in processor 41 or the instruction of software form.Above-mentioned
Processor 41 can be general processor, including central processing unit (Central Processing Unit, abbreviation CPU), network
Processor (Network Processor, abbreviation NP) etc..It can also be digital signal processor (Digital Signal
Processing, abbreviation DSP), specific integrated circuit (Application Specific Integrated Circuit, referred to as
ASIC), ready-made programmable gate array (Field-Programmable Gate Array, abbreviation FPGA) or other are programmable
Logical device, discrete gate or transistor logic, discrete hardware components.It may be implemented or execute in the embodiment of the present invention
Disclosed each method, step and logic diagram.General processor can be microprocessor or the processor is also possible to appoint
What conventional processor etc..The step of method in conjunction with disclosed in the embodiment of the present invention, can be embodied directly in hardware decoding processing
Device executes completion, or in decoding processor hardware and software module combination execute completion.Software module can be located at
Machine memory, flash memory, read-only memory, programmable read only memory or electrically erasable programmable memory, register etc. are originally
In the storage medium of field maturation.The storage medium is located at memory 42, and processor 41 reads the information in memory 42, in conjunction with
Its hardware completes the step of above method.
Example IV:
A kind of computer-readable medium provided in an embodiment of the present invention, wherein the computer-readable medium storage has meter
Calculation machine executable instruction, when being called and being executed by processor, the computer is executable to be referred to the computer executable instructions
Order promotes the processor to realize method described in embodiment one.
Finally, it should be noted that the above embodiments are only used to illustrate the technical solution of the present invention., rather than its limitations;To the greatest extent
Pipe present invention has been described in detail with reference to the aforementioned embodiments, those skilled in the art should understand that: its according to
So be possible to modify the technical solutions described in the foregoing embodiments, or to some or all of the technical features into
Row equivalent replacement;And these are modified or replaceed, various embodiments of the present invention technology that it does not separate the essence of the corresponding technical solution
The range of scheme.
Claims (10)
1. a kind of two dimensional code method for unlocking, which is characterized in that applied to the controller of lockset, the lockset further includes scan components
With unlocking executive module, which comprises
If receiving the unlocking request of user, controls the scan components and execute two-dimensional code scanning operation, to scan the use
The two dimensional code that family provides;
Judge whether the two dimensional code scanned is legal;
If legal, control the unlocking executive module and execute unlocking operation.
2. the method according to claim 1, wherein the lockset further includes alarm, the method also includes:
If the two dimensional code is illegal, current illegal number is enabled to add 1, and start timing;
Judge whether the illegal number is greater than preset times;
If so, obtaining current timing duration, if the timing duration is less than the default unlocking used time, the alarm report is triggered
It is alert;
If not, initiating to update prompt for the two dimensional code for reminding the user to provide new two dimensional code, and again described in secondary control
Scan components execute two-dimensional code scanning operation.
3. the method according to claim 1, wherein the lockset further includes communication component and reset assembly,
If the unlocking request for receiving user, controls the scan components and executes two-dimensional code scanning operation, to scan the use
Before the step of two dimensional code that family provides, further includes:
If requested by the unlocking that the communication component receives user terminal transmission, and monitor within a preset time described
Reset assembly is triggered, and determines that the user terminal is management terminal;
It is sent to the management terminal and agrees to unlocking instruction, so that the management terminal executes benchmark two dimensional code and generates operation;Institute
Stating benchmark two dimensional code and generating operation includes the hardware information generation management id number based on the management terminal, and according to the pipe
It manages id number and generates benchmark two dimensional code;
Receive and store the benchmark two dimensional code that the management terminal is sent.
4. if according to the method described in claim 3, it is characterized in that, controlled in the unlocking request for receiving user
The scan components execute two-dimensional code scanning operation, the step of to scan two dimensional code that the user provides before, further includes:
If requested by the unlocking that the communication component receives user terminal transmission, and do not monitor institute within a preset time
It states reset assembly to be triggered, determines that the user terminal is ephemeral terminations;
Unlocking request is sent to the management terminal, so that the management terminal initiates that user is reminded to examine the unlocking
The prompt of request;
If receiving the examination & approval that the management terminal is sent passes through message, the examination & approval are sent to described face by message
When terminal so that the ephemeral terminations execute interim two dimensional code and generate operation;It includes being based on that the interim two dimensional code, which generates operation,
The hardware information of the ephemeral terminations generates interim id number, and generates interim two dimensional code according to the interim id number;
Receive and store the interim two dimensional code that the ephemeral terminations are sent.
5. according to the method described in claim 4, it is characterized in that, the method also includes:
If the two dimensional code for receiving the id number for carrying ephemeral terminations that the management terminal is sent deletes instruction, delete
The interim two dimensional code that the id number based on the ephemeral terminations of storage generates.
6. according to the method described in claim 4, it is characterized in that, the whether legal step of the two dimensional code for judging to scan
Suddenly, comprising:
Judge whether the two dimensional code scanned matches with the benchmark two dimensional code or the interim two dimensional code;
If so, determining that the two dimensional code scanned is legal.
7. a kind of two dimensional code unlocking apparatus, which is characterized in that the controller of lockset is arranged in described device, and the lockset further includes
Scan components and unlocking executive module, described device include:
Scan module when the unlocking for receiving user is requested, controls the scan components and executes two-dimensional code scanning operation, with
Scan the two dimensional code that the user provides;
Whether two dimensional code judgment module, the two dimensional code for judging to scan are legal;
Unlocking execution module executes unlocking operation for when the two dimensional code is legal, controlling the unlocking executive module.
8. device according to claim 7, which is characterized in that the lockset further includes alarm, described device further include:
Number laminating module, for enabling current illegal number add 1, and start timing when the two dimensional code is illegal;
Number judgment module, for judging whether the illegal number is greater than preset times;
Alarm module, for current timing duration being obtained, if the timing when the illegal number is greater than preset times
Duration is less than the default unlocking used time, triggers the alarm equipment alarm;
User reminding module, for initiating for reminding the user when the illegal number is less than or equal to preset times
The two dimensional code for providing new two dimensional code updates prompt, and scan components described in secondary control execute two-dimensional code scanning operation again.
9. a kind of electronic equipment, including memory, processor, be stored in the memory to run on the processor
Computer program, which is characterized in that the processor realizes that the claims 1 to 6 are any when executing the computer program
The step of method described in item.
10. a kind of computer-readable medium, which is characterized in that the computer-readable medium storage has computer is executable to refer to
It enables, for the computer executable instructions when being called and being executed by processor, the computer executable instructions promote the place
It manages device and realizes method as claimed in any one of claims 1 to 6.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910358438.XA CN110060401A (en) | 2019-04-29 | 2019-04-29 | Two dimensional code method for unlocking and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910358438.XA CN110060401A (en) | 2019-04-29 | 2019-04-29 | Two dimensional code method for unlocking and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110060401A true CN110060401A (en) | 2019-07-26 |
Family
ID=67321606
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910358438.XA Pending CN110060401A (en) | 2019-04-29 | 2019-04-29 | Two dimensional code method for unlocking and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110060401A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111462367A (en) * | 2020-04-08 | 2020-07-28 | 广东拓仕达保安服务有限公司 | Security access control system based on owner authorization and management method |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102945574A (en) * | 2012-11-14 | 2013-02-27 | 李凯 | Device and method for controlling locking system permission by mobile equipment |
CN104766395A (en) * | 2015-03-11 | 2015-07-08 | 张瞳 | Security control method of intelligent lock |
CN106340104A (en) * | 2016-08-31 | 2017-01-18 | 谢志豪 | Coded lock and control system and method of coded lock |
CN206470846U (en) * | 2017-01-20 | 2017-09-05 | 福建中庚信息科技有限公司 | A kind of intelligent access control system |
US20170316627A1 (en) * | 2016-04-29 | 2017-11-02 | Fujitsu Technology Solutions Intellectual Property Gmbh | Method of securely opening doors and a system that securely opens doors |
CN108171851A (en) * | 2018-01-15 | 2018-06-15 | 广安众道电子商务有限公司 | A kind of intelligent door lock system and control method with scanning function |
-
2019
- 2019-04-29 CN CN201910358438.XA patent/CN110060401A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102945574A (en) * | 2012-11-14 | 2013-02-27 | 李凯 | Device and method for controlling locking system permission by mobile equipment |
CN104766395A (en) * | 2015-03-11 | 2015-07-08 | 张瞳 | Security control method of intelligent lock |
US20170316627A1 (en) * | 2016-04-29 | 2017-11-02 | Fujitsu Technology Solutions Intellectual Property Gmbh | Method of securely opening doors and a system that securely opens doors |
CN106340104A (en) * | 2016-08-31 | 2017-01-18 | 谢志豪 | Coded lock and control system and method of coded lock |
CN206470846U (en) * | 2017-01-20 | 2017-09-05 | 福建中庚信息科技有限公司 | A kind of intelligent access control system |
CN108171851A (en) * | 2018-01-15 | 2018-06-15 | 广安众道电子商务有限公司 | A kind of intelligent door lock system and control method with scanning function |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111462367A (en) * | 2020-04-08 | 2020-07-28 | 广东拓仕达保安服务有限公司 | Security access control system based on owner authorization and management method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11616654B2 (en) | Secure provisioning of internet of things devices, including electronic locks | |
CN103473844B (en) | Public affairs are rented a house intelligent control method and system | |
EP3941014B1 (en) | Digital key-based identity authentication method, terminal apparatus, and medium | |
CN108537929B (en) | Remote unlocking system and remote unlocking method | |
AT506619B1 (en) | PROCESS FOR THE TEMPORARY PERSONALIZATION OF A COMMUNICATION DEVICE | |
US10290164B2 (en) | Method for controlling door lock of home network system | |
CN110009776B (en) | Identity authentication method and device | |
CN105719374A (en) | Door access control method | |
CN110503758A (en) | Control method, device, electronic equipment and the computer-readable medium of vehicle | |
CN109067881B (en) | Remote authorization method, device, equipment and storage medium thereof | |
CN110930561B (en) | Control method and device of intelligent lock | |
CN112511484B (en) | U shield safety control management system | |
CN110060401A (en) | Two dimensional code method for unlocking and device | |
CN101645124B (en) | Method for unlocking PIN code and intelligent key equipment | |
CN107451464A (en) | Prompt message output method and device | |
CN103177203A (en) | Computer login management system | |
US10788809B2 (en) | Method for the enabling of machine functions on a spinning-mill machine | |
CN110610564A (en) | Key management device, key management method, key management system, and readable storage medium | |
CN105701906B (en) | A kind of self-service device method for managing security based on finger-print puzzle lock | |
KR101480596B1 (en) | Method and device for obtaining real name register status, and terminal thereof | |
EP1935202B1 (en) | Unblocking of mobile telephone cards | |
KR101970393B1 (en) | Method for Providing Monitoring Service of User Authentication Request | |
CN110895840A (en) | Wireless-based remote door opening method and door lock device thereof | |
CN110782562B (en) | Unlocking method and device | |
CN103824363B (en) | Electronic access control system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190726 |