CN110176091A - A method of smart lock safety is improved by mobile terminal device code - Google Patents

A method of smart lock safety is improved by mobile terminal device code Download PDF

Info

Publication number
CN110176091A
CN110176091A CN201910408057.8A CN201910408057A CN110176091A CN 110176091 A CN110176091 A CN 110176091A CN 201910408057 A CN201910408057 A CN 201910408057A CN 110176091 A CN110176091 A CN 110176091A
Authority
CN
China
Prior art keywords
identification code
smart lock
code
mobile terminal
binding
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910408057.8A
Other languages
Chinese (zh)
Other versions
CN110176091B (en
Inventor
沈汉标
王妙玉
童威云
吴宁泉
李思龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Ketyoo Intelligent Technology Co Ltd
Original Assignee
Guangdong Ketyoo Intelligent Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Ketyoo Intelligent Technology Co Ltd filed Critical Guangdong Ketyoo Intelligent Technology Co Ltd
Priority to CN201910408057.8A priority Critical patent/CN110176091B/en
Publication of CN110176091A publication Critical patent/CN110176091A/en
Application granted granted Critical
Publication of CN110176091B publication Critical patent/CN110176091B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • H04M1/72409User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories
    • H04M1/72412User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories using two-way short-range wireless interfaces
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • H04M1/72409User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories
    • H04M1/72415User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by interfacing with external accessories for remote control of appliances

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Human Computer Interaction (AREA)
  • Signal Processing (AREA)
  • Telephone Function (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a kind of methods for improving smart lock safety by mobile terminal device code, which comprises mobile terminal initiates bind request to smart lock, sends the first identification code to smart lock;Smart lock receives the first identification code, and the second identification code of the first identification code and smart lock is sent to remote system;Remote system matches the first identification code and the second identification code, verifies whether to allow mobile terminal binding smart lock.The present invention is by binding the mobile phone imei code of smart lock owner with smart lock, the mobile phone terminal equipment for vetoing other imei codes is forced to manipulate it, to solve the problems, such as that illegal person pretends to be smart lock owner's malice manipulation smart lock, the mode of operation of this method is simple, it is big that amplitude promoted to the safety of smart lock, suitable for using the very high user of safety requirements.

Description

A method of smart lock safety is improved by mobile terminal device code
Technical field
The present invention relates to smart lock technical fields, and in particular to one kind improves smart lock safety by mobile terminal device code The method of property.
Background technique
Currently, with modern society's intelligence, the continuous improvement of the level of informatization, smart lock conduct was incipient in recent years A kind of novel safety lock is used by more and more families.Smart lock as one of defence line most important in household safe, The problem of particularly with regard to property safety, the safety that consumer is used for especially are paid attention to.And as a peace outstanding Full problem, illegal person maliciously can pretend to be smart lock owner by various modes, be bound again to smart lock, realization pair The illegal manipulation of smart lock, jeopardizes the safety of the real owner of smart lock.
Summary of the invention
In order to solve the above technical problems, the present invention provides, one kind is easy to operate, can promote the logical of smart lock safety in utilization Cross the method that mobile terminal device code improves smart lock safety.
In order to achieve the above objectives, the present invention adopts the following technical scheme:
A method of smart lock safety is improved by mobile terminal device code, which comprises
Mobile terminal initiates bind request to smart lock, sends the first identification code to smart lock;
Smart lock receives the first identification code, and the second identification code of the first identification code and smart lock is sent to remote system;
Remote system matches the first identification code and the second identification code, verifies whether to allow mobile terminal binding intelligence Lock.
Preferably, when remote system verifies whether to allow mobile terminal binding smart lock, following method is executed:
Remote system judges whether the first identification code with the second identification code is to bind for the first time;
If the first identification code is to bind for the first time with the second identification code, the first identification code and the second identification code are matched It is right, the first identification code and the second identification code are saved as one group of verifying number sets, and the instruction for allowing to bind is sent to smart lock;
If the first identification code and the second identification code be it is non-bind for the first time, verify current request the first identification code whether with The first identification code after the first identification code or modification binding bound for the first time is identical;
If the first identification code of current request and the first identification code after the first identification code or modification binding bound for the first time It is identical, then the instruction for allowing to bind is sent to smart lock;
If the first identification code of current request and the first identification code after the first identification code or modification binding bound for the first time It is not identical, then the instruction of refusal binding is sent to smart lock.
Preferably, further includes: the identity information of smart lock owner is entered into the number of remote system by mobile terminal According in library, remote system generates a random code simultaneously and is sent to client;The identity information includes smart lock owner ID card information, phone number information, finger print information, facial image information.
Preferably, also modification bind request can be sent to remote system by mobile terminal, is manually verified by remote system Whether the identity information and random code of smart lock owner is consistent, if meeting, allows to modify and the binding of the second identification code First identification code forms one group of new verifying number sets.
Preferably, the mobile terminal is mobile phone, and first identification code is the imei code of mobile phone, second identification code For the exclusive identification code in typing smart lock.
Compared with prior art, the invention has the following beneficial effects:
The present invention forces to veto other imei by binding the mobile phone imei code of smart lock owner with smart lock The mobile phone terminal equipment of code manipulates it, so that solving illegal person pretends to be smart lock owner's malice manipulation smart lock The problem of.The mode of operation of this method is simple, big to the safety promotion amplitude of smart lock, suitable for non-to safety requirements is used Often high user.
Detailed description of the invention
Fig. 1 is the method flow block diagram that the present invention improves smart lock safety by mobile terminal device code;
Fig. 2 is the operating process schematic diagram of the method for the present invention;
Fig. 3 is that remote system verifies whether the method flow block diagram for allowing mobile terminal binding smart lock.
Specific embodiment
Present invention will now be described in further detail with reference to the embodiments and the accompanying drawings, but embodiments of the present invention are unlimited In this.
It is the method flow block diagram that the present invention improves smart lock safety by mobile terminal device code with reference to Fig. 1, Fig. 1, Wherein, the mobile terminal of the present embodiment refers to mobile phone, and the first following identification codes is the imei code of mobile phone, i.e. international mobile device is known Other code is equivalent to mobile phone for identifying the mobile communication equipments such as each independent mobile phone in mobile telephone network Identity card, the second following identification codes are the exclusive identification code in typing smart lock, which can be with smart lock By factory settings and Unique Device identification number of the typing in the memory of smart lock, as smart lock when equipment is dispatched from the factory.Institute The method of stating includes:
S10: mobile terminal initiates bind request to smart lock, sends the first identification code to smart lock;
Illustratively, as shown in Fig. 2, Fig. 2 is the operating process schematic diagram of this method, in this step, mobile phone terminal is logical It crosses the APP (application program) loaded on it and sends binding instruction to smart lock, while mobile phone is obtained by APP (application program) Imei code, imei code is sent to the smart lock for being mounted with wireless data transceiver module by wireless network.Above-mentioned wireless hair Sending mode can be WIFI, bluetooth, 2G/3G/4G/5G, NFC or ZigBee etc..
S20: smart lock receives the first identification code, and the second identification code of the first identification code and smart lock is sent to long-range system System;
Illustratively, in this step, so-called remote system is database server, and smart lock is receiving mobile phone After imei code, the exclusive identification code in imei code and typing smart lock is remotely sent to and APP by APP (application program) (application program) is associated, provides the database server of data service for APP (application program).
S30: remote system matches the first identification code and the second identification code, verifies whether to allow mobile terminal binding Smart lock.
Illustratively, in this step, database server receives unique in the imei code and typing smart lock of mobile phone After identification code, database information in invoking server, by the exclusive identification code in the imei code and typing smart lock of mobile phone into Row matching decides whether to allow the handset binding smart lock.
Further, as shown in figure 3, Fig. 3 is the method that remote system verifies whether to allow mobile terminal binding smart lock Flow diagram, wherein when remote system verifies whether to allow mobile terminal binding smart lock, execute following method:
S301: remote system judges whether the first identification code with the second identification code is to bind for the first time;
Illustratively, in this step, database server judges exclusive identification code in typing smart lock and mobile phone Whether imei code is to bind for the first time.
S302: if the first identification code and the second identification code are to bind for the first time, by the first identification code and the second identification code into Row pairing saves the first identification code and the second identification code as one group of verifying number sets, and allow to bind to smart lock transmission Instruction;
Illustratively, in this step, if the exclusive identification code in the imei code and typing smart lock of mobile phone is to tie up for the first time It is fixed, then the exclusive identification code in this imei code and typing smart lock is matched, is stored in server as one group of verifying number sets Database in, while to smart lock send allow bind instruction.
S303: if the first identification code is bound with the second identification code to be non-for the first time, the first identification code of current request is verified It is whether identical as the first identification code after the first identification code or modification binding bound for the first time;
If the first identification code of current request and the first identification code after the first identification code or modification binding bound for the first time It is identical, then the instruction for allowing to bind is sent to smart lock;
If the first identification code of current request and the first identification code after the first identification code or modification binding bound for the first time It is not identical, then the instruction of refusal binding is sent to smart lock.
Illustratively, in this step, if the exclusive identification code in the imei code and typing smart lock of mobile phone is not for the first time Binding, then database server judge the imei code whether be the imei code bound for the first time or user actively modify bind after with intelligence The imei code matched again can be locked.
If the imei code is that the imei code bound for the first time or user actively match after modification is bound with smart lock again Imei code, then server sends the instruction for allowing to bind to smart lock, and mobile phone terminal and smart lock realize binding at this time;
If the imei code is not the imei code bound for the first time or is not that user actively matches after modification is bound with smart lock again Pair imei code, then server to smart lock send refusal binding instruction, on the Application Program Interface of mobile phone prompt " binding The information such as failure ".
Further, this method further include: be entered into the identity information of smart lock owner remotely by mobile terminal In the database of system, can the identity information of typing include the ID card information of smart lock owner, phone number information, fingerprint Information, facial image information etc..Remote system can generate a random code simultaneously and be sent to client.
Illustratively, in this step, user can by cell phone application (application program), be manually entered by personal body Part information such as ID card information, phone number information remote are uploaded, are entered into the database of server, or pass through mobile phone Personal finger print information, facial image information are entered into the database of server by fingerprint sensor, camera.Server simultaneously A random code can be generated and be transmitted back to user, user need to remember this random code, these identity informations and random code will be made For the data information of Future authentication user identity.In this step, by increasing random code, the safety of verifying is further increased Property.
Further, this method further include: modification bind request is sent to remote system by mobile terminal, by being remotely Whether the artificial identity information for verifying smart lock owner of system and random code are consistent, if meeting, allow to modify and know with second First identification code of other code binding, forms one group of new verifying number sets.
Illustratively, in this step, if user is lost mobile phone and needs to bind smart lock again, hand can be passed through Machine APP (application program) sends modification bind request to server, specifically, need to send personal identity information and random code To server, after server receives request, by manually verify identity information and random code whether with the data that are saved in database Information is consistent, if meeting, allows user to unbind imei code before with smart lock, binds new imei code again, and New verifying number sets update is saved in database.
Method provided by the present invention is forced by binding the mobile phone imei code of smart lock owner with smart lock The mobile phone terminal equipment for vetoing other imei codes manipulates it, pretends to be smart lock owner to dislike to solve illegal person The problem of meaning manipulation smart lock.The mode of operation of this method is simple, and it is big to promote amplitude to the safety of smart lock, suitable for making With the very high user of safety requirements.
Step in the method for the embodiment of the present invention can carry out sequence adjustment, merger or deletion according to actual needs.This Field those of ordinary skill is it is understood that all or part of the steps in the various methods of above-described embodiment is can to pass through Program is completed to instruct the relevant hardware of terminal device, which can be stored in a computer readable storage medium, institute Stating storage medium may include: flash disk, read only memory ROM, random access memory ram, disk or CD etc..
The above, preferable specific embodiment only of the invention, but scope of protection of the present invention is not limited thereto, Anyone skilled in the art in the technical scope disclosed by the present invention, according to the technique and scheme of the present invention and its Design is subject to equivalent substitution or change, should be covered by the protection scope of the present invention.

Claims (5)

1. a kind of method for improving smart lock safety by mobile terminal device code, which is characterized in that the described method includes:
Mobile terminal initiates bind request to smart lock, sends the first identification code to smart lock;
Smart lock receives the first identification code, and the second identification code of the first identification code and smart lock is sent to remote system;
Remote system matches the first identification code and the second identification code, verifies whether to allow mobile terminal binding smart lock.
2. the method according to claim 1 for improving smart lock safety by mobile terminal device code, which is characterized in that When remote system verifies whether to allow mobile terminal binding smart lock, following method is executed:
Remote system judges whether the first identification code with the second identification code is to bind for the first time;
If the first identification code is to bind for the first time with the second identification code, the first identification code and the second identification code are matched, protected The first identification code and the second identification code are deposited as one group of verifying number sets, and sends the instruction for allowing to bind to smart lock;
If the first identification code and the second identification code be it is non-bind for the first time, verify current request the first identification code whether with for the first time The first identification code after first identification code of binding or modification are bound is identical;
If the first identification code of current request is identical as the first identification code after the first identification code or modification binding bound for the first time, The instruction for allowing to bind then is sent to smart lock;
If the first identification code of current request and the first identification code after the first identification code for binding for the first time or modification binding not phase Together, then the instruction of refusal binding is sent to smart lock.
3. the method according to claim 1 for improving smart lock safety by mobile terminal device code, which is characterized in that Further include: the identity information of smart lock owner is entered into the database of remote system by mobile terminal, remote system A random code is generated simultaneously is sent to client;The identity information includes the ID card information of smart lock owner, mobile phone Number information, finger print information, facial image information.
4. the method according to claim 3 for improving smart lock safety by mobile terminal device code, which is characterized in that Also modification bind request can be sent to remote system by mobile terminal, the body of smart lock owner is manually verified by remote system Whether part information and random code are consistent, if meeting, allow to modify the first identification code with the binding of the second identification code, form one The new verifying number sets of group.
5. the method according to claim 1 for improving smart lock safety by mobile terminal device code, which is characterized in that The mobile terminal is mobile phone, and first identification code is the imei code of mobile phone, and second identification code is in typing smart lock Exclusive identification code.
CN201910408057.8A 2019-05-15 2019-05-15 Method for improving security of intelligent lock through mobile terminal equipment code Active CN110176091B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910408057.8A CN110176091B (en) 2019-05-15 2019-05-15 Method for improving security of intelligent lock through mobile terminal equipment code

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910408057.8A CN110176091B (en) 2019-05-15 2019-05-15 Method for improving security of intelligent lock through mobile terminal equipment code

Publications (2)

Publication Number Publication Date
CN110176091A true CN110176091A (en) 2019-08-27
CN110176091B CN110176091B (en) 2022-03-25

Family

ID=67691306

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910408057.8A Active CN110176091B (en) 2019-05-15 2019-05-15 Method for improving security of intelligent lock through mobile terminal equipment code

Country Status (1)

Country Link
CN (1) CN110176091B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110991982A (en) * 2019-10-28 2020-04-10 中船重工海鑫工程管理(北京)有限公司 Construction project building information management method and system
CN111182535A (en) * 2019-12-23 2020-05-19 广东科徕尼智能科技有限公司 Random code binding method and equipment for intelligent door lock and storage medium
CN111508111A (en) * 2020-04-13 2020-08-07 广东科徕尼智能科技有限公司 Method, equipment and storage medium for binding intelligent lock
CN111583451A (en) * 2020-04-09 2020-08-25 惠州拓邦电气技术有限公司 Identity verification method and device of electronic lock, computer equipment and storage medium
CN113256853A (en) * 2021-06-21 2021-08-13 德施曼机电(中国)有限公司 Information transmission method, electronic equipment, door lock, server and storage medium

Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102262793A (en) * 2010-05-26 2011-11-30 中兴通讯股份有限公司 Entrance guard control method and entrance guard control system
CN103971435A (en) * 2014-05-22 2014-08-06 广东欧珀移动通信有限公司 Unlocking method, server, mobile terminal, electronic lock and unlocking system
CN104143056A (en) * 2013-12-31 2014-11-12 腾讯科技(深圳)有限公司 Identity authentication method and system
US20150048927A1 (en) * 2013-08-13 2015-02-19 Directed, Llc Smartphone based passive keyless entry system
CN106228655A (en) * 2016-08-02 2016-12-14 成都荷码科技有限公司 A kind of method of user account binding smart lock
CN106228654A (en) * 2016-08-02 2016-12-14 成都荷码科技有限公司 A kind of method of user account binding smart lock
CN106296899A (en) * 2016-08-02 2017-01-04 成都荷码科技有限公司 A kind of method that user account is unbinding with smart lock
CN106652136A (en) * 2016-12-22 2017-05-10 奇酷互联网络科技(深圳)有限公司 Mobile terminal-based access control management information processing method and device
CN106971442A (en) * 2017-05-03 2017-07-21 河南传通电子科技有限公司 A kind of safe and intelligent lock system
CN106981108A (en) * 2016-01-19 2017-07-25 福建省光速达物联网科技股份有限公司 A kind of bluetooth nurse method for unlocking and system
CN107146307A (en) * 2017-05-03 2017-09-08 河南传通电子科技有限公司 A kind of method of securely unlocking of intelligent lock system
CN107833321A (en) * 2017-11-01 2018-03-23 潍柴动力股份有限公司 A kind of apparatus bound, unbind method, vehicle locking method and relevant device
CN107895415A (en) * 2017-10-31 2018-04-10 美的智慧家居科技有限公司 Intelligent door lock, voice method for burn-recording, server and voice programming system
CN108537923A (en) * 2018-03-27 2018-09-14 丁巨波 Network-based smart lock management control method and system
CN109672683A (en) * 2018-12-25 2019-04-23 深圳市安信认证系统有限公司 Binding method, binding device and the terminal device of internet of things equipment

Patent Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102262793A (en) * 2010-05-26 2011-11-30 中兴通讯股份有限公司 Entrance guard control method and entrance guard control system
US20150048927A1 (en) * 2013-08-13 2015-02-19 Directed, Llc Smartphone based passive keyless entry system
CN104143056A (en) * 2013-12-31 2014-11-12 腾讯科技(深圳)有限公司 Identity authentication method and system
CN103971435A (en) * 2014-05-22 2014-08-06 广东欧珀移动通信有限公司 Unlocking method, server, mobile terminal, electronic lock and unlocking system
CN106981108A (en) * 2016-01-19 2017-07-25 福建省光速达物联网科技股份有限公司 A kind of bluetooth nurse method for unlocking and system
CN106228654A (en) * 2016-08-02 2016-12-14 成都荷码科技有限公司 A kind of method of user account binding smart lock
CN106296899A (en) * 2016-08-02 2017-01-04 成都荷码科技有限公司 A kind of method that user account is unbinding with smart lock
CN106228655A (en) * 2016-08-02 2016-12-14 成都荷码科技有限公司 A kind of method of user account binding smart lock
CN106652136A (en) * 2016-12-22 2017-05-10 奇酷互联网络科技(深圳)有限公司 Mobile terminal-based access control management information processing method and device
CN106971442A (en) * 2017-05-03 2017-07-21 河南传通电子科技有限公司 A kind of safe and intelligent lock system
CN107146307A (en) * 2017-05-03 2017-09-08 河南传通电子科技有限公司 A kind of method of securely unlocking of intelligent lock system
CN107895415A (en) * 2017-10-31 2018-04-10 美的智慧家居科技有限公司 Intelligent door lock, voice method for burn-recording, server and voice programming system
CN107833321A (en) * 2017-11-01 2018-03-23 潍柴动力股份有限公司 A kind of apparatus bound, unbind method, vehicle locking method and relevant device
CN108537923A (en) * 2018-03-27 2018-09-14 丁巨波 Network-based smart lock management control method and system
CN109672683A (en) * 2018-12-25 2019-04-23 深圳市安信认证系统有限公司 Binding method, binding device and the terminal device of internet of things equipment

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
张焕兰: "基于云端的无线智能锁系统设计与实现", 《软件导刊》 *
王安义: "一种新型智能安全锁系统的设计", 《网络与通信》 *

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110991982A (en) * 2019-10-28 2020-04-10 中船重工海鑫工程管理(北京)有限公司 Construction project building information management method and system
CN111182535A (en) * 2019-12-23 2020-05-19 广东科徕尼智能科技有限公司 Random code binding method and equipment for intelligent door lock and storage medium
CN111182535B (en) * 2019-12-23 2023-08-01 广东好太太智能家居有限公司 Random code binding method, device and storage medium for intelligent door lock
CN111583451A (en) * 2020-04-09 2020-08-25 惠州拓邦电气技术有限公司 Identity verification method and device of electronic lock, computer equipment and storage medium
CN111508111A (en) * 2020-04-13 2020-08-07 广东科徕尼智能科技有限公司 Method, equipment and storage medium for binding intelligent lock
CN113256853A (en) * 2021-06-21 2021-08-13 德施曼机电(中国)有限公司 Information transmission method, electronic equipment, door lock, server and storage medium
CN113256853B (en) * 2021-06-21 2021-10-15 德施曼机电(中国)有限公司 Information transmission method, electronic equipment, door lock, server and storage medium

Also Published As

Publication number Publication date
CN110176091B (en) 2022-03-25

Similar Documents

Publication Publication Date Title
CN110176091A (en) A method of smart lock safety is improved by mobile terminal device code
CN106340087A (en) Intelligent switch lock system based on intelligent mobile terminal
CN110177354A (en) A kind of wireless control method and system of vehicle
CN104637131A (en) Authorization method and authorization device for access control system and access control system
CN104167040A (en) Remote control method and system of electronic lock
CN104902465B (en) System of real name is opened an account remote writing-card method and system
CN109067881B (en) Remote authorization method, device, equipment and storage medium thereof
US20160328714A1 (en) Method and apparatus for authenticating payment related information in mobile communication system
CN106127888B (en) Intelligent lock operation method and smart lock operating system
CN105100094B (en) A kind of solution lock control method and terminal
CN104157082A (en) Automatic ticket collecting method and automatic ticket collecting device
CN108920919A (en) Control method, the device and system of interactive intelligence equipment
CN110182093A (en) Charging authentication and charging method and device, vehicle, electrically-charging equipment and storage medium
CN111508111A (en) Method, equipment and storage medium for binding intelligent lock
CN109714769A (en) Information binding method, device, equipment and storage medium
CN105635113A (en) SDK-based remote service processing method and system
CN107948970A (en) System of real name method of network entry, system and the mobile terminal of subordinate terminal
CN104853354A (en) Bluetooth authentication method and system thereof
CN109951437A (en) Safety certifying method, device and server based on recognition of face
CN103107888A (en) Dynamic multi-attribute multilevel identity authentication method for mobile terminal (MT)
CN109214166A (en) Smart machine authentication control method and system
CN105871903A (en) Information security control method and system as well as mobile terminal
CN104640112B (en) A kind of identification authentication method, apparatus and system
CN109379388B (en) Identity recognition method, terminal and wearable device
CN103370713A (en) Method for programming a mobile terminal chip

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: 511434 No.1 and No.2, Shihua Road, Hualong Town, Panyu District, Guangzhou City, Guangdong Province

Applicant after: Guangdong haomadame smart home Co.,Ltd.

Address before: No.1, No.2 highway, No.2, Panyu, Guangzhou

Applicant before: GUANGDONG KELAINI INTELLIGENT TECHNOLOGY Co.,Ltd.

GR01 Patent grant
GR01 Patent grant