CN110060401A - Two dimensional code method for unlocking and device - Google Patents

Two dimensional code method for unlocking and device Download PDF

Info

Publication number
CN110060401A
CN110060401A CN201910358438.XA CN201910358438A CN110060401A CN 110060401 A CN110060401 A CN 110060401A CN 201910358438 A CN201910358438 A CN 201910358438A CN 110060401 A CN110060401 A CN 110060401A
Authority
CN
China
Prior art keywords
dimensional code
unlocking
lockset
user
interim
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910358438.XA
Other languages
Chinese (zh)
Inventor
靳尧凯
邢计元
焦运良
岳洋
马英翔
戴贻康
吴晖
刘书萌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
No6 Research Institute Of China Electronics Corp
Original Assignee
No6 Research Institute Of China Electronics Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by No6 Research Institute Of China Electronics Corp filed Critical No6 Research Institute Of China Electronics Corp
Priority to CN201910358438.XA priority Critical patent/CN110060401A/en
Publication of CN110060401A publication Critical patent/CN110060401A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
    • G06K17/0022Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisions for transferring data to distant stations, e.g. from a sensing device
    • G06K17/0025Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisions for transferring data to distant stations, e.g. from a sensing device the arrangement consisting of a wireless interrogation device in combination with a device for optically marking the record carrier
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The present invention provides a kind of two dimensional code method for unlocking and devices, are related to intelligent lock technical field.This method is applied to the controller of lockset, and above-mentioned lockset further includes scan components and unlocking executive module, this method comprises: control scan components execute two-dimensional code scanning operation, if receiving the unlocking request of user to scan the two dimensional code of user's offer;Judge whether the two dimensional code scanned is legal;If legal, control unlocking executive module executes unlocking operation.This method using two dimensional code as key, unlock as scanning tools by door lock, can effectively promote the reliability of lockset.

Description

Two dimensional code method for unlocking and device
Technical field
The present invention relates to intelligent lock technical fields, more particularly, to a kind of two dimensional code method for unlocking and device.
Background technique
In recent years, with the rapid proliferation of smart phone, the function of smart phone is stronger and stronger.With planar bar code technology It is increasingly mature, be born a series of two dimensional code unlocking technique.It is mark that common two dimensional code unlocking technique, which is by two dimensional code, Label are attached on lockset, and mobile phone is used to unlock as scanning tools.But the two dimensional code on lockset is attached to as label and is easy It is altered, lockset reliability is poor.
Summary of the invention
The embodiment of the present invention is designed to provide a kind of two dimensional code method for unlocking and device, using two dimensional code as key, Door lock is unlocked as scanning tools, can effectively promote the reliability of lockset.
In a first aspect, the embodiment of the invention provides a kind of two dimensional code method for unlocking, it is described applied to the controller of lockset Lockset further includes scan components and unlocking executive module, which comprises if receiving the unlocking request of user, controls institute It states scan components and executes two-dimensional code scanning operation, to scan the two dimensional code that the user provides;Judging the two dimensional code scanned is It is no legal;If legal, control the unlocking executive module and execute unlocking operation.
With reference to first aspect, the embodiment of the invention provides the first possible embodiments of first aspect, wherein institute Stating lockset further includes alarm, the method also includes: if the two dimensional code is illegal, current illegal number is enabled to add 1, And start timing;Judge whether the illegal number is greater than preset times;If so, current timing duration is obtained, if institute It states timing duration and is less than the default unlocking used time, trigger the alarm equipment alarm;If not, initiating for reminding the user to provide The two dimensional code of new two dimensional code updates prompt, and scan components described in secondary control execute two-dimensional code scanning operation again.
With reference to first aspect, the embodiment of the invention provides second of possible embodiments of first aspect, wherein institute Stating lockset further includes communication component and reset assembly, if controlling the scanning group in the unlocking request for receiving user Part executes two-dimensional code scanning operation, the step of to scan two dimensional code that the user provides before, further includes: if by described Communication component receives the unlocking request of user terminal transmission, and monitors that the reset assembly is triggered within a preset time, Determine that the user terminal is management terminal;It is sent to the management terminal and agrees to unlocking instruction, so that the management terminal is held Row benchmark two dimensional code generates operation;It includes that the hardware information based on the management terminal generates that the benchmark two dimensional code, which generates operation, Id number is managed, and benchmark two dimensional code is generated according to the management id number;Receive and store the base that the management terminal is sent Quasi- two dimensional code.
The possible embodiment of second with reference to first aspect, the embodiment of the invention provides the third of first aspect Possible embodiment, wherein if controlling the scan components in the unlocking request for receiving user and executing two dimensional code Scan operation, the step of to scan two dimensional code that the user provides before, further includes: if received by the communication component The unlocking request sent to user terminal, and do not monitor that the reset assembly is triggered, and determines the use within a preset time Family terminal is ephemeral terminations;Unlocking request is sent to the management terminal, is used so that the management terminal is initiated to remind Examine the prompt of the request of unlocking in family;If receiving the examination & approval that the management terminal is sent passes through message, described will examine It criticizes and the ephemeral terminations is sent to by message, so that the ephemeral terminations execute interim two dimensional code and generate operation;It is described interim It includes the interim id number of hardware information generation based on the ephemeral terminations that two dimensional code, which generates operation, and according to the interim ID number Code generates interim two dimensional code;Receive and store the interim two dimensional code that the ephemeral terminations are sent.
The third possible embodiment with reference to first aspect, the embodiment of the invention provides the 4th kind of first aspect Possible embodiment, wherein the method also includes: if receive that the management terminal sends carries ephemeral terminations The two dimensional code of id number delete instruction, delete the interim two dimension that stored id number based on the ephemeral terminations generates Code.
The third possible embodiment with reference to first aspect, the embodiment of the invention provides the 5th kind of first aspect Possible embodiment, wherein the whether legal step of the two dimensional code for judging to scan, comprising: judge scan two Whether dimension code matches with the benchmark two dimensional code or the interim two dimensional code;If so, determining that the two dimensional code scanned closes Method.
Second aspect, the embodiment of the invention also provides a kind of two dimensional code unlocking apparatus, lockset is arranged in described device Controller, the lockset further include scan components and unlocking executive module, and described device includes: scan module, for receiving When the unlocking request of user, controls the scan components and execute two-dimensional code scanning operation, to scan the two dimension that the user provides Code;Whether two dimensional code judgment module, the two dimensional code for judging to scan are legal;Unlocking execution module, in the two dimension When code is legal, controls the unlocking executive module and execute unlocking operation.
In conjunction with second aspect, the embodiment of the invention provides the first possible embodiments of second aspect, wherein institute Stating lockset further includes alarm, described device further include: number laminating module, for when the two dimensional code is illegal, order to be worked as Preceding illegal number adds 1, and starts timing;Number judgment module, for judging it is default whether the illegal number is greater than Number;Alarm module, for current timing duration being obtained, if the meter when the illegal number is greater than preset times Shi Shichang is less than the default unlocking used time, triggers the alarm equipment alarm;User reminding module, for small in the illegal number When being equal to preset times, initiate to update prompt, and secondary control again for the two dimensional code for reminding the user to provide new two dimensional code It makes the scan components and executes two-dimensional code scanning operation.
The third aspect, the embodiment of the invention provides a kind of electronic equipment, including memory, processor, the memories In be stored with the computer program that can be run on the processor, wherein when the processor executes the computer program The step of realizing method as described in relation to the first aspect.
Fourth aspect, the embodiment of the invention provides a kind of computer-readable mediums, wherein the computer-readable medium Computer executable instructions are stored with, the computer executable instructions are when being called and being executed by processor, the computer Executable instruction promotes the method for the processor realization as described in relation to the first aspect.
The present invention provides a kind of two dimensional code method for unlocking and device, this method is applied to the controller of lockset, above-mentioned lock Tool further includes scan components and unlocking executive module, this method comprises: controlling scanning group if receiving the unlocking request of user Part executes two-dimensional code scanning operation, to scan the two dimensional code of user's offer;Judge whether the two dimensional code scanned is legal;If closed Method, control unlocking executive module execute unlocking operation.This method using two dimensional code as key, opened as scanning tools by door lock Lock, can effectively promote the reliability of lockset.
Detailed description of the invention
It, below will be to specific in order to illustrate more clearly of the specific embodiment of the invention or technical solution in the prior art Embodiment or attached drawing needed to be used in the description of the prior art be briefly described, it should be apparent that, it is described below Attached drawing is some embodiments of the present invention, for those of ordinary skill in the art, before not making the creative labor It puts, is also possible to obtain other drawings based on these drawings.
Fig. 1 is a kind of two dimensional code method for unlocking flow chart provided in an embodiment of the present invention;
Fig. 2 is a kind of two dimensional code method for unlocking flow chart provided in an embodiment of the present invention;
Fig. 3 is a kind of two dimensional code unlocking apparatus structural schematic diagram provided in an embodiment of the present invention;
Fig. 4 is electronic devices structure figure provided in an embodiment of the present invention.
Specific embodiment
Technical solution of the present invention is clearly and completely described below in conjunction with embodiment, it is clear that described reality Applying example is a part of the embodiment of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, the common skill in this field Art personnel every other embodiment obtained without making creative work belongs to the model that the present invention protects It encloses.
Two dimensional code is usually that label is attached on lockset, uses mobile phone as scanning by existing two dimensional code unlocking technique Tool is unlocked, for example, shared bicycle and express delivery are asked for.But there are disadvantages for this method for unlocking, as label The two dimensional code being attached on lockset is easy to be altered;Because there are a large amount of lockset relevant informations in two dimensional code, there is also The risk that leakage information causes any property loss, causes the lockset reliability with two-dimension code label poor.
Based on this, a kind of two dimensional code method for unlocking and device provided in an embodiment of the present invention, applied to the controller of lockset, The lockset further includes scan components and unlocking executive module.Above-mentioned two dimensional code method for unlocking using two dimensional code as key, make by door lock It unlocks for scanning tools, not will use family information leakage and cause any property loss.Therefore, the two dimensional code method for unlocking and device It can be applied to improve the reliability of lockset.
For convenient for understanding the present embodiment, first to a kind of two dimensional code method for unlocking disclosed in the embodiment of the present invention It describes in detail.
Embodiment one:
A kind of two dimensional code method for unlocking provided in an embodiment of the present invention, applied to the controller of lockset, which further includes Scan components and unlocking executive module, referring to two dimensional code method for unlocking flow chart as shown in Figure 1, this method includes following step It is rapid:
Step S102: if receiving the unlocking request of user, control scan components execute two-dimensional code scanning operation, to sweep The two dimensional code of user's offer is provided.
When the controller of lockset receives the unlocking request of user, the two dimension of control scan components scanning user's offer The two dimensional code that scanning obtains is sent to controller by code, scan components.Above-mentioned unlocking request can be through connection controller Button triggering, when user needs to unlock, presses unlocking button trigger controller;It is also possible to the scanning area in scan components Safety head is set, and when user opens safety head, controller receives unlocking request;It can also be that user can in scan components The region scanned executes some movement, touches scan components or directly touch the movements such as two dimensional code alignment scanning area Controller is sent out, to receive the unlocking request of user.The side that user can either be printed by mobile phone terminal, tablet computer Formula provides two dimensional code.
Step S104: judge whether the two dimensional code scanned is legal.
Controller judges whether two dimensional code that scan components scan is legal two dimensional code, the legal two dimensional code, The administrator that can be lockset is previously stored the two dimensional code that can open the lockset in the controller.
Step S106: if legal, control unlocking executive module executes unlocking operation.
If the two dimensional code that scan components scan is legal two dimensional code, controls unlocking executive module and execute unlocking Operation is to open lockset.
The embodiment of the invention provides a kind of two dimensional code method for unlocking, and using two dimensional code as key, door lock is as scanning work Tool is unlocked, and the reliability of lockset can be effectively promoted.The scan components of above-mentioned lockset need before executing scan operation for the first time It first to determine benchmark two dimensional code and interim two dimensional code, and be stored in the controller of lockset.Benchmark two dimensional code is the management of lockset The management two dimensional code that terminal generates, when being stored with benchmark two dimensional code in controller, management is can be used eventually in the manager of lockset The management two dimensional code at end opens lockset.Interim two dimensional code is interim two that the ephemeral terminations passed through by management terminal examination & approval generate Code is tieed up, when being stored with interim two dimensional code in controller, user can open lockset by the interim two dimensional code of ephemeral terminations.Pipe Reason terminal can manage the number of ephemeral terminations.Above-mentioned lockset further includes alarm, communication component and reset assembly.Reset assembly The opposite side of scan components is set, and user can just see reset assembly after only opening lockset.
The embodiment for present embodiments providing a kind of determining benchmark two dimensional code first, can refer to following steps (1)~ (3):
(1) it if requested by the unlocking that communication component receives user terminal transmission, and monitors within a preset time Reset assembly is triggered, and determines that user terminal is management terminal.
After if the communication component of lockset received the unlocking request that user terminal passes through bluetooth or wireless signal is sent, meeting Unlocking request is sent to controller, controller starts timing after receiving the unlocking request of user's transmission, if default It detects that the reset assembly of lockset is triggered in time, which is determined as management terminal.The user of management terminal is For the administrator of lockset, each lockset has only one administrator.Above-mentioned preset time can be according to user situation voluntarily Setting, such as can be set to 10s or 20s etc..
Reset assembly needs to be arranged in the inside of lockset as a preferred method, for example, if lockset is mounted on a door, Then the side that lockset is located on the inside of room is arranged in reset assembly;If lockset is mounted on car door, reset assembly setting is being locked Tool is located at interior side.The manager in room or automobile can send to unlock and ask by using user terminal to lockset in this way It asks, and presses the reset assembly on lockset, the user terminal for using the manager of room or automobile becomes the pipe of corresponding lockset Manage terminal.
(2) it is sent to management terminal and agrees to unlocking instruction, so that management terminal executes benchmark two dimensional code and generates operation;Benchmark It includes that the hardware information based on management terminal generates management id number, and generates base according to management id number that two dimensional code, which generates operation, Quasi- two dimensional code.
After controller determines management terminal, the instruction for agreeing to that management terminal can unlock is sent to management terminal, makes pipe The hardware information that reason terminal obtains itself generates uniquely management id number corresponding with management terminal, and according to above-mentioned management ID number Code generates benchmark two dimensional code.After management terminal generates benchmark two dimensional code, benchmark two dimensional code is sent to the controller of lockset.
(3) the benchmark two dimensional code of management terminal transmission is received and stored.
After the controller of lockset receives the benchmark two dimensional code of management terminal transmission, store it in controller.If with Family sends request of unlocking again by new user terminal, and presses reset assembly within a preset time, and controller redefines Management terminal, and update storage the benchmark two dimensional code that new management terminal generates.
For the sake of security, the lockset that user newly buys is after being arranged management terminal, if replacement management terminal, in addition to needing It sends request of unlocking and arrives lock controller, and press outside reset assembly, it is also necessary to the examination & approval agreement Jing Guo current management terminal, New management terminal could be become.
Secondly, in order to promote the convenience for opening lockset, the present embodiment additionally provides a kind of reality for determining interim two dimensional code Mode is applied, can refer to following steps 1~4:
Step 1: if requested by the unlocking that communication component receives user terminal transmission, and not supervising within a preset time It measures reset assembly to be triggered, determines that user terminal is ephemeral terminations.
It, will be above-mentioned after the communication component of lockset receives the unlocking request that user terminal passes through bluetooth or wireless signal is sent Request of unlocking is sent to the controller of lockset.If the controller of lockset receives the unlocking request of user terminal transmission, start to count When, if not monitoring that reset assembly is triggered within a preset time, above-mentioned user terminal is determined as ephemeral terminations, it is interim whole Unlocking function is realized to binding lockset in end, needs the examination & approval by management terminal.
Step 2: the request that will unlock is sent to management terminal, so that management terminal initiates that user is reminded to examine request of unlocking Prompt.
The controller of lockset requests the unlocking of ephemeral terminations, is sent to management terminal by communication component, so that management Terminal reminds user to examine request of unlocking.After management terminal receives the examination & approval of user's dual lock request, pass through if it is examination & approval Message, then the message that passes through of examination & approval is sent to the controller of lockset;If management terminal has rejected the unlocking of ephemeral terminations Request, i.e. the unlocking request of ephemeral terminations, which is not examined, to be passed through, then without sending information to lock controller, ephemeral terminations will not Interim two dimensional code is generated, lockset can not be opened.
Step 3: if examination & approval are sent to temporarily by the examination & approval for receiving management terminal transmission by message by message Terminal, so that ephemeral terminations execute interim two dimensional code and generate operation;It includes based on ephemeral terminations that interim two dimensional code, which generates operation, Hardware information generates interim id number, and generates interim two dimensional code according to interim id number.
The controller of lockset receives the examination & approval of management terminal transmission by that can be sent to examination & approval by message after message Ephemeral terminations, so that the hardware information for making ephemeral terminations obtain its own generates unique corresponding interim id number, and root Interim two dimensional code is generated according to interim id number.Above-mentioned ephemeral terminations can be one, be also possible to multiple, and each ephemeral terminations exist After generating interim two dimensional code, the interim two dimensional code that can be generated is sent to the controller of lockset
Step 4: receiving and storing the interim two dimensional code of ephemeral terminations transmission.
Lock controller receives and stores the interim two dimensional code of ephemeral terminations transmission.If there is multiple ephemeral terminations, lockset Controller can distinguish each interim two dimensional code according to the interim id number for including in each interim two dimensional code, can also basis Interim id number in each interim two dimensional code is to each interim two dimensional code number, to be easy to distinguish.Multiple interim two dimensional codes Determination, allow administrator remotely controlled by management terminal temporary subscriber open lockset.For example, lockset is arranged in door On, when homeowners can not come back, it can agree to that the unlocking of the ephemeral terminations of guest is requested, and guest is passed through by management terminal The interim two dimensional code that ephemeral terminations generate opens door lock, greatly improves the convenience for opening lockset.
As an alternative embodiment, user provides management two dimensional code by management terminal, or pass through ephemeral terminations It, can only be by showing the software page of unlocking two dimensional code in management terminal or ephemeral terminations when providing interim two dimensional code to open lockset Face is scanned for scan components, and the management two dimensional code or interim two dimensional code not reproducible or screenshotss can not print. When user wants to open lockset, management terminal, or transmission unlocking request can only be used to apply to become ephemeral terminations and open lockset, greatly The safety of lockset is improved greatly.
It can also be other embodiments, the interim two dimensional code of the management two dimensional code and ephemeral terminations of management terminal can also To be real-time update, two dimensional code will be updated when unlocking every time, but in the two dimensional code updated also forever include its terminal hardware The id number that information generates, and the controller of lockset can be also sent to after more new management two dimensional code or interim two dimensional code, to update Management two dimensional code and interim two dimensional code in lock controller.When user by management terminal by stored in controller some face When terminal deletion after, which cannot open lockset again, can not also update interim two dimensional code.
When can open lockset in view of interim two dimensional code, the problem of safety of lockset cannot be protected, if connect The two dimensional code for receiving the id number for carrying ephemeral terminations of management terminal transmission deletes instruction, deletes stored based on interim The interim two dimensional code that the id number of terminal generates.Management terminal can manage the number of interim two dimensional code, according to the need of manager To delete some ephemeral terminations at any time in management terminal, the interim two dimensional code for being managed terminal deletion cannot open lockset again, Improve the safety of lockset.
Management terminal can check each ephemeral terminations catalogue for being currently able to open lockset, and can also manage can open The quantity of the ephemeral terminations of lockset, for example, the lockset is mounted on a door, if owner can pass through management after guest leaves Terminal sends two dimensional code to the controller of lockset and deletes instruction.The controller of lockset receives carrying for management terminal transmission and faces When terminal id number two dimensional code delete instruction after, face store that the id number based on ephemeral terminations generates in controller When two dimensional code delete, the ephemeral terminations for being deleted interim two dimensional code cannot open lockset again.If being deleted interim two dimensional code Ephemeral terminations issue unlocking request again, and the examination & approval for having obtained management terminal can then generate interim two by message again It ties up code and opens lockset.
The generation of above-mentioned ephemeral terminations is solved when owner does not get home, has guest to visit in advance the problem of cannot be introduced into. Guest can generate interim two dimensional code in the case where the management terminal examination & approval by owner pass through, so as to voluntarily open the door, After guest leaves, owner can be deleted the interim two dimensional code for leaving guest stored in lock controller by user terminal It removes, avoids the occurrence of safety problem.
In order to improve the safety and unlocking convenience of lockset, the embodiment of the invention provides a kind of two dimensional code method for unlocking Embodiment can be answered with further reference to two dimensional code method for unlocking flow chart as shown in Figure 2, this method on the basis of Fig. 1 For the controller of lockset, which further includes scan components and unlocking executive module, specifically includes the following steps:
Step S202: if receiving the unlocking request of user, control scan components execute two-dimensional code scanning operation, to sweep The two dimensional code of user's offer is provided.
Step S204: judge whether the two dimensional code scanned is legal.If the two dimensional code scanned is legal, step is executed S206;If the two dimensional code scanned is illegal, step S208 is executed.
Judge whether the two dimensional code scanned matches with benchmark two dimensional code or interim two dimensional code.If so, determining that scanning is arrived Two dimensional code it is legal.As long as that is, one of two dimension in the two dimensional code scanned and benchmark two dimensional code or interim two dimensional code Code matching, so that it may determine that the two dimensional code scanned is legal.
In a kind of feasible embodiment, if the benchmark two dimension stored in the two dimensional code and lock controller that scan Code is identical, then the two dimensional code that can confirm that scanning is arrived is matched with benchmark two dimensional code;Similarly, if the two dimensional code scanned and lockset control The interim two dimensional code stored in device processed is identical, then can confirm that the two dimensional code that scanning is arrived is matched with interim two dimensional code.
In another feasible embodiment, the id number for including in two dimensional code that scanning obtains can be checked, if Management id number corresponding with benchmark two dimensional code is consistent, if unanimously, confirming that the two dimensional code scanned is matched with benchmark two dimensional code; Similarly, the id number for including in two dimensional code that scanning obtains can be checked, if pipe corresponding with one of them interim two dimensional code It is consistent to manage id number, if unanimously, confirming that the two dimensional code scanned is matched with interim two dimensional code.
In practical applications, any of the above-described kind of feasible embodiment can be used, it can also will be above two feasible Embodiment is used in combination, and such as, the benchmark two dimensional code only stored in the two dimensional code scanned and lock controller is identical, And the id number management id number corresponding with benchmark two dimensional code that in the two dimensional code scanned includes it is consistent when, just confirmation scanning is arrived Two dimensional code matched with benchmark two dimensional code.Similarly, wherein one only stored in the two dimensional code and lock controller scanned A interim two dimensional code is identical, and the id number for including in the two dimensional code scanned management ID number corresponding with above-mentioned interim two dimensional code When code is consistent, the two dimensional code that just confirmation scans is matched with interim two dimensional code.
Step S206: control unlocking executive module executes unlocking operation.
Step S208: it enables current illegal number add 1, and starts timing.
If the obtained two dimensional code of controller judgement scanning be it is illegal, enable controller to the illegal number of two dimensional code It is counted, alternatively, the initial value of the illegal number of controller is zero, whenever appearance scans two obtained Dimension code be it is illegal, enable current illegal number add 1.When the two dimensional code that first time appearance scanning obtains is illegal, control Device processed starts timing.
Step S210: judge whether illegal number is greater than preset times.If so, executing step S212;If not, holding Row step S214.
Whether the illegal number that controller judgement counts to get is greater than preset number.Alternatively, in advance If number can be 3 times or 5 times.
Step S212: obtaining current timing duration, if timing duration is less than the default unlocking used time, triggers alarm report It is alert.
If the illegal number for scanning obtained two dimensional code is greater than preset times, illustrate in the presence of the abnormal feelings illegally unlocked Condition, lock controller can further obtain the current timing duration of controller, if current timing duration is less than default unlock and uses When, illustrate to concentrate in a relatively short period of time there are the same person and attempt to unlock using illegal two dimensional code, therefore controller is to report Alert device sends alarm signal, makes alarm equipment alarm.For example, the default used time of unlocking is 5 minutes, preset times are 3 times, if user exists In 5 minutes, be supplied to for continuous 4 times the two dimensional code of scan components scanning be all it is illegal, controller can trigger alarm equipment alarm.
Step S214: it initiates to update prompt for the two dimensional code for reminding user to provide new two dimensional code, and secondary control is swept again It retouches component and executes two-dimensional code scanning operation.
If the illegal number for scanning obtained two dimensional code is less than preset times, user is also provided with two dimensional code for scanning The chance of component scans unlock, controller can initiate that user is reminded to provide new two dimensional code to user terminal by communication component Two dimensional code updates prompt, the new two dimensional code that then control scan components scanning user provides again.
A kind of two dimensional code method for unlocking provided in an embodiment of the present invention, using two dimensional code as key, door lock is as scanning work Tool is unlocked, and the reliability of lockset is improved;When the number for failure of unlocking is greater than preset times, alarm report is also triggered It is alert;The unlocking request sent by the ephemeral terminations of guest can also be examined when owner stays out, to generate interim two dimension Code, remote assistance guest open lockset;Also, the administrator of lockset can manage the ephemeral terminations quantity that can open lockset, The interim two dimensional code stored in lockset is deleted at any time, improves the convenience of unlocking and the safety of lockset.
Embodiment two:
The embodiment of the invention provides a kind of two dimensional code unlocking apparatus, which is arranged in the controller of lockset, above-mentioned lock Tool further includes scan components and unlocking executive module, two dimensional code unlocking apparatus structural schematic diagram shown in Figure 3, the device packet It includes:
Scan module 31, when the unlocking for receiving user is requested, control scan components execute two-dimensional code scanning operation, To scan the two dimensional code of user's offer.
Whether two dimensional code judgment module 32, the two dimensional code for judging to scan are legal.
Unlocking execution module 33, for when two dimensional code is legal, control unlocking executive module to execute unlocking operation.
Above-mentioned two dimensional code unlocking apparatus provided in this embodiment, using two dimensional code as key, door lock as scanning tools into Row is unlocked, and the reliability of lockset can be effectively promoted.
Above-mentioned lockset further includes alarm, above-mentioned two-dimensional code scanning device further include:
Number laminating module, for enabling current illegal number add 1, and start timing when two dimensional code is illegal.
Number judgment module, for judging whether illegal number is greater than preset times.
Alarm module, for current timing duration being obtained, if timing duration when illegal number is greater than preset times Greater than the default unlocking used time, alarm equipment alarm is triggered.
User reminding module, for initiating for reminding user to provide when illegal number is less than or equal to preset times The two dimensional code of new two dimensional code updates prompt, and control scan components execute two-dimensional code scanning operation again.
Above-mentioned lockset further includes communication component and reset assembly, above-mentioned two-dimensional code scanning device further include:
Benchmark two dimensional code determining module, when for being requested in the unlocking for receiving user terminal transmission by communication component, And monitor that reset assembly is triggered within a preset time, determine that user terminal is management terminal.It sends and agrees to management terminal Unlocking instruction, so that management terminal executes benchmark two dimensional code and generates operation;It includes being based on management eventually that benchmark two dimensional code, which generates operation, The hardware information at end generates management id number, and generates benchmark two dimensional code according to management id number.Receive and store management terminal The benchmark two dimensional code of transmission.
Interim two dimensional code determining module, when for being requested in the unlocking for receiving user terminal transmission by communication component, And do not monitor that reset assembly is triggered within a preset time, determine that user terminal is ephemeral terminations.The request that will unlock is sent to Management terminal, so that management terminal initiates the prompt for reminding user to examine request of unlocking.If receiving management terminal transmission Examination & approval are then sent to ephemeral terminations by message by message by examination & approval, so that ephemeral terminations execute interim two dimensional code and generate behaviour Make;It includes the interim id number of hardware information generation based on ephemeral terminations that interim two dimensional code, which generates operation, and according to interim ID number Code generates interim two dimensional code.Receive and store the interim two dimensional code of ephemeral terminations transmission.
Two dimensional code removing module, for the two dimension in the id number for carrying ephemeral terminations for receiving management terminal transmission When code deletes instruction, the interim two dimensional code that the stored id number based on ephemeral terminations generates is deleted.
In one embodiment, whether above-mentioned two dimensional code judgment module 32 is further used for the two dimensional code for judging to scan It is matched with benchmark two dimensional code or interim two dimensional code;If so, determining that the two dimensional code scanned is legal.
The embodiment of the invention provides a kind of two dimensional code unlocking apparatus, the two dimensional code unlocking side provided with above-described embodiment one Method technical characteristic having the same reaches identical technical effect so also can solve identical technical problem.
The technical effect of device provided by the present embodiment, realization principle and generation is identical with previous embodiment, for letter It describes, Installation practice part does not refer to place, can refer to corresponding contents in preceding method embodiment.
Embodiment three:
A kind of electronic equipment provided in an embodiment of the present invention, as shown in figure 4, electronic equipment includes processor 41, memory 42, the computer program that can be run on the processor is stored in the memory, the processor executes the calculating The step of method that above-described embodiment one provides is realized when machine program.
Referring to fig. 4, electronic equipment further include: bus 44 and communication interface 43, processor 41, communication interface 43 and memory 42 are connected by bus 44.Processor 41 is for executing the executable module stored in memory 42, such as computer program.
Wherein, memory 42 may include high-speed random access memory (RAM, Random Access Memory), It may further include nonvolatile memory (non-volatile memory), for example, at least a magnetic disk storage.By at least One communication interface 43 (can be wired or wireless) realizes the communication between the system network element and at least one other network element Connection, can be used internet, wide area network, local network, Metropolitan Area Network (MAN) etc..
Bus 44 can be isa bus, pci bus or eisa bus etc..The bus can be divided into address bus, data Bus, control bus etc..Only to be indicated with a four-headed arrow convenient for indicating, in Fig. 4, it is not intended that an only bus or A type of bus.
Wherein, memory 42 is for storing program, and the processor 41 executes the journey after receiving and executing instruction Sequence, method performed by the device that the stream process that aforementioned any embodiment of the embodiment of the present invention discloses defines can be applied to handle In device 41, or realized by processor 41.
Processor 41 may be a kind of IC chip, the processing capacity with signal.During realization, above-mentioned side Each step of method can be completed by the integrated logic circuit of the hardware in processor 41 or the instruction of software form.Above-mentioned Processor 41 can be general processor, including central processing unit (Central Processing Unit, abbreviation CPU), network Processor (Network Processor, abbreviation NP) etc..It can also be digital signal processor (Digital Signal Processing, abbreviation DSP), specific integrated circuit (Application Specific Integrated Circuit, referred to as ASIC), ready-made programmable gate array (Field-Programmable Gate Array, abbreviation FPGA) or other are programmable Logical device, discrete gate or transistor logic, discrete hardware components.It may be implemented or execute in the embodiment of the present invention Disclosed each method, step and logic diagram.General processor can be microprocessor or the processor is also possible to appoint What conventional processor etc..The step of method in conjunction with disclosed in the embodiment of the present invention, can be embodied directly in hardware decoding processing Device executes completion, or in decoding processor hardware and software module combination execute completion.Software module can be located at Machine memory, flash memory, read-only memory, programmable read only memory or electrically erasable programmable memory, register etc. are originally In the storage medium of field maturation.The storage medium is located at memory 42, and processor 41 reads the information in memory 42, in conjunction with Its hardware completes the step of above method.
Example IV:
A kind of computer-readable medium provided in an embodiment of the present invention, wherein the computer-readable medium storage has meter Calculation machine executable instruction, when being called and being executed by processor, the computer is executable to be referred to the computer executable instructions Order promotes the processor to realize method described in embodiment one.
Finally, it should be noted that the above embodiments are only used to illustrate the technical solution of the present invention., rather than its limitations;To the greatest extent Pipe present invention has been described in detail with reference to the aforementioned embodiments, those skilled in the art should understand that: its according to So be possible to modify the technical solutions described in the foregoing embodiments, or to some or all of the technical features into Row equivalent replacement;And these are modified or replaceed, various embodiments of the present invention technology that it does not separate the essence of the corresponding technical solution The range of scheme.

Claims (10)

1. a kind of two dimensional code method for unlocking, which is characterized in that applied to the controller of lockset, the lockset further includes scan components With unlocking executive module, which comprises
If receiving the unlocking request of user, controls the scan components and execute two-dimensional code scanning operation, to scan the use The two dimensional code that family provides;
Judge whether the two dimensional code scanned is legal;
If legal, control the unlocking executive module and execute unlocking operation.
2. the method according to claim 1, wherein the lockset further includes alarm, the method also includes:
If the two dimensional code is illegal, current illegal number is enabled to add 1, and start timing;
Judge whether the illegal number is greater than preset times;
If so, obtaining current timing duration, if the timing duration is less than the default unlocking used time, the alarm report is triggered It is alert;
If not, initiating to update prompt for the two dimensional code for reminding the user to provide new two dimensional code, and again described in secondary control Scan components execute two-dimensional code scanning operation.
3. the method according to claim 1, wherein the lockset further includes communication component and reset assembly, If the unlocking request for receiving user, controls the scan components and executes two-dimensional code scanning operation, to scan the use Before the step of two dimensional code that family provides, further includes:
If requested by the unlocking that the communication component receives user terminal transmission, and monitor within a preset time described Reset assembly is triggered, and determines that the user terminal is management terminal;
It is sent to the management terminal and agrees to unlocking instruction, so that the management terminal executes benchmark two dimensional code and generates operation;Institute Stating benchmark two dimensional code and generating operation includes the hardware information generation management id number based on the management terminal, and according to the pipe It manages id number and generates benchmark two dimensional code;
Receive and store the benchmark two dimensional code that the management terminal is sent.
4. if according to the method described in claim 3, it is characterized in that, controlled in the unlocking request for receiving user The scan components execute two-dimensional code scanning operation, the step of to scan two dimensional code that the user provides before, further includes:
If requested by the unlocking that the communication component receives user terminal transmission, and do not monitor institute within a preset time It states reset assembly to be triggered, determines that the user terminal is ephemeral terminations;
Unlocking request is sent to the management terminal, so that the management terminal initiates that user is reminded to examine the unlocking The prompt of request;
If receiving the examination & approval that the management terminal is sent passes through message, the examination & approval are sent to described face by message When terminal so that the ephemeral terminations execute interim two dimensional code and generate operation;It includes being based on that the interim two dimensional code, which generates operation, The hardware information of the ephemeral terminations generates interim id number, and generates interim two dimensional code according to the interim id number;
Receive and store the interim two dimensional code that the ephemeral terminations are sent.
5. according to the method described in claim 4, it is characterized in that, the method also includes:
If the two dimensional code for receiving the id number for carrying ephemeral terminations that the management terminal is sent deletes instruction, delete The interim two dimensional code that the id number based on the ephemeral terminations of storage generates.
6. according to the method described in claim 4, it is characterized in that, the whether legal step of the two dimensional code for judging to scan Suddenly, comprising:
Judge whether the two dimensional code scanned matches with the benchmark two dimensional code or the interim two dimensional code;
If so, determining that the two dimensional code scanned is legal.
7. a kind of two dimensional code unlocking apparatus, which is characterized in that the controller of lockset is arranged in described device, and the lockset further includes Scan components and unlocking executive module, described device include:
Scan module when the unlocking for receiving user is requested, controls the scan components and executes two-dimensional code scanning operation, with Scan the two dimensional code that the user provides;
Whether two dimensional code judgment module, the two dimensional code for judging to scan are legal;
Unlocking execution module executes unlocking operation for when the two dimensional code is legal, controlling the unlocking executive module.
8. device according to claim 7, which is characterized in that the lockset further includes alarm, described device further include:
Number laminating module, for enabling current illegal number add 1, and start timing when the two dimensional code is illegal;
Number judgment module, for judging whether the illegal number is greater than preset times;
Alarm module, for current timing duration being obtained, if the timing when the illegal number is greater than preset times Duration is less than the default unlocking used time, triggers the alarm equipment alarm;
User reminding module, for initiating for reminding the user when the illegal number is less than or equal to preset times The two dimensional code for providing new two dimensional code updates prompt, and scan components described in secondary control execute two-dimensional code scanning operation again.
9. a kind of electronic equipment, including memory, processor, be stored in the memory to run on the processor Computer program, which is characterized in that the processor realizes that the claims 1 to 6 are any when executing the computer program The step of method described in item.
10. a kind of computer-readable medium, which is characterized in that the computer-readable medium storage has computer is executable to refer to It enables, for the computer executable instructions when being called and being executed by processor, the computer executable instructions promote the place It manages device and realizes method as claimed in any one of claims 1 to 6.
CN201910358438.XA 2019-04-29 2019-04-29 Two dimensional code method for unlocking and device Pending CN110060401A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910358438.XA CN110060401A (en) 2019-04-29 2019-04-29 Two dimensional code method for unlocking and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910358438.XA CN110060401A (en) 2019-04-29 2019-04-29 Two dimensional code method for unlocking and device

Publications (1)

Publication Number Publication Date
CN110060401A true CN110060401A (en) 2019-07-26

Family

ID=67321606

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910358438.XA Pending CN110060401A (en) 2019-04-29 2019-04-29 Two dimensional code method for unlocking and device

Country Status (1)

Country Link
CN (1) CN110060401A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111462367A (en) * 2020-04-08 2020-07-28 广东拓仕达保安服务有限公司 Security access control system based on owner authorization and management method

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102945574A (en) * 2012-11-14 2013-02-27 李凯 Device and method for controlling locking system permission by mobile equipment
CN104766395A (en) * 2015-03-11 2015-07-08 张瞳 Security control method of intelligent lock
CN106340104A (en) * 2016-08-31 2017-01-18 谢志豪 Coded lock and control system and method of coded lock
CN206470846U (en) * 2017-01-20 2017-09-05 福建中庚信息科技有限公司 A kind of intelligent access control system
US20170316627A1 (en) * 2016-04-29 2017-11-02 Fujitsu Technology Solutions Intellectual Property Gmbh Method of securely opening doors and a system that securely opens doors
CN108171851A (en) * 2018-01-15 2018-06-15 广安众道电子商务有限公司 A kind of intelligent door lock system and control method with scanning function

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102945574A (en) * 2012-11-14 2013-02-27 李凯 Device and method for controlling locking system permission by mobile equipment
CN104766395A (en) * 2015-03-11 2015-07-08 张瞳 Security control method of intelligent lock
US20170316627A1 (en) * 2016-04-29 2017-11-02 Fujitsu Technology Solutions Intellectual Property Gmbh Method of securely opening doors and a system that securely opens doors
CN106340104A (en) * 2016-08-31 2017-01-18 谢志豪 Coded lock and control system and method of coded lock
CN206470846U (en) * 2017-01-20 2017-09-05 福建中庚信息科技有限公司 A kind of intelligent access control system
CN108171851A (en) * 2018-01-15 2018-06-15 广安众道电子商务有限公司 A kind of intelligent door lock system and control method with scanning function

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111462367A (en) * 2020-04-08 2020-07-28 广东拓仕达保安服务有限公司 Security access control system based on owner authorization and management method

Similar Documents

Publication Publication Date Title
US11616654B2 (en) Secure provisioning of internet of things devices, including electronic locks
CN103473844B (en) Public affairs are rented a house intelligent control method and system
EP3941014B1 (en) Digital key-based identity authentication method, terminal apparatus, and medium
CN108537929B (en) Remote unlocking system and remote unlocking method
AT506619B1 (en) PROCESS FOR THE TEMPORARY PERSONALIZATION OF A COMMUNICATION DEVICE
US10290164B2 (en) Method for controlling door lock of home network system
CN110009776B (en) Identity authentication method and device
CN105719374A (en) Door access control method
CN110503758A (en) Control method, device, electronic equipment and the computer-readable medium of vehicle
CN109067881B (en) Remote authorization method, device, equipment and storage medium thereof
CN110930561B (en) Control method and device of intelligent lock
CN112511484B (en) U shield safety control management system
CN110060401A (en) Two dimensional code method for unlocking and device
CN101645124B (en) Method for unlocking PIN code and intelligent key equipment
CN107451464A (en) Prompt message output method and device
CN103177203A (en) Computer login management system
US10788809B2 (en) Method for the enabling of machine functions on a spinning-mill machine
CN110610564A (en) Key management device, key management method, key management system, and readable storage medium
CN105701906B (en) A kind of self-service device method for managing security based on finger-print puzzle lock
KR101480596B1 (en) Method and device for obtaining real name register status, and terminal thereof
EP1935202B1 (en) Unblocking of mobile telephone cards
KR101970393B1 (en) Method for Providing Monitoring Service of User Authentication Request
CN110895840A (en) Wireless-based remote door opening method and door lock device thereof
CN110782562B (en) Unlocking method and device
CN103824363B (en) Electronic access control system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190726