CN110728774A - Intelligent lock unlocking method, device and system, storage medium and electronic equipment - Google Patents

Intelligent lock unlocking method, device and system, storage medium and electronic equipment Download PDF

Info

Publication number
CN110728774A
CN110728774A CN201910833113.2A CN201910833113A CN110728774A CN 110728774 A CN110728774 A CN 110728774A CN 201910833113 A CN201910833113 A CN 201910833113A CN 110728774 A CN110728774 A CN 110728774A
Authority
CN
China
Prior art keywords
unlocking
preset
intelligent lock
target
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910833113.2A
Other languages
Chinese (zh)
Inventor
张学智
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Coolpad Technologies Co Ltd
Original Assignee
Shenzhen Coolpad Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Coolpad Technologies Co Ltd filed Critical Shenzhen Coolpad Technologies Co Ltd
Priority to CN201910833113.2A priority Critical patent/CN110728774A/en
Publication of CN110728774A publication Critical patent/CN110728774A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00563Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys using personal physical data of the operator, e.g. finger prints, retinal images, voicepatterns
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00817Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00817Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed
    • G07C2009/00825Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed remotely by lines or wireless communication

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The embodiment of the application discloses an intelligent lock unlocking method, an intelligent lock unlocking device, an intelligent lock unlocking system, a storage medium and electronic equipment, wherein the method comprises the following steps: monitoring an unlocking instruction input to the intelligent lock, acquiring target unlocking information corresponding to the unlocking instruction, wherein the target unlocking information comprises a target unlocking password, target unlocking time and a target unlocking position, judging whether the target unlocking password is matched with a preset unlocking password or not, judging whether the target unlocking time is matched with the preset unlocking time or not, judging whether the target unlocking position is matched with the preset unlocking position or not, and controlling unlocking when the target unlocking password is matched with the preset unlocking password, and matching the target unlocking time with the preset unlocking time, and matching the target unlocking position with the preset unlocking position. By adopting the embodiment of the application, the potential safety hazard caused by loss of the intelligent lock key or password leakage can be avoided, and the risk of losing articles is reduced.

Description

Intelligent lock unlocking method, device and system, storage medium and electronic equipment
Technical Field
The application relates to the technical field of intelligent locks, in particular to an intelligent lock unlocking method, an intelligent lock unlocking device, an intelligent lock unlocking system, a storage medium and electronic equipment.
Background
With the rapid development of society, the degree of informatization is higher and higher, and people also face the problem of article safety, which relates to aspects of production and life, particularly in some special occasions, people need to send important articles such as documents, ornaments, properties and the like to a specified place. In general, in order to ensure that important articles are not lost or compromised during transportation, it is necessary to secure and store the important articles in an encrypted manner, such as a movable lock, a suitcase with a lock, a confidential box, and the like.
At present, most of the existing locks are mechanical locks or coded locks, and articles are encrypted and stored in a key or code mode. However, when the key of the mechanical lock is lost and stolen or the password of the coded lock is leaked, potential safety hazards such as article theft can be brought, and the risk of article loss is high.
Disclosure of Invention
The embodiment of the application provides an intelligent lock unlocking method, an intelligent lock unlocking device, an intelligent lock unlocking system, a storage medium and electronic equipment, which can avoid potential safety hazards caused by loss of an intelligent lock key or password leakage and reduce the risk of article loss. The technical scheme is as follows:
in a first aspect, an embodiment of the present application provides an intelligent lock unlocking method, where the method includes:
monitoring an unlocking instruction input aiming at the intelligent lock, and acquiring target unlocking information corresponding to the unlocking instruction, wherein the target unlocking information comprises a target unlocking password, target unlocking time and a target unlocking position;
judging whether the target unlocking password is matched with a preset unlocking password, whether the target unlocking time is matched with the preset unlocking time, and whether the target unlocking position is matched with the preset unlocking position;
and when the target unlocking password is matched with the preset unlocking password, the target unlocking time is matched with the preset unlocking time, and the target unlocking position is matched with the preset unlocking position, controlling unlocking.
In a second aspect, an embodiment of the present application provides an unlocking device for an intelligent lock, where the unlocking device includes:
the intelligent lock comprises an information acquisition module, a target unlocking module and a target unlocking module, wherein the information acquisition module is used for monitoring an unlocking instruction input aiming at the intelligent lock and acquiring target unlocking information corresponding to the unlocking instruction, and the target unlocking information comprises a target unlocking password, target unlocking time and a target unlocking position;
the unlocking matching module is used for judging whether the target unlocking password is matched with a preset unlocking password, whether the target unlocking time is matched with the preset unlocking time, and whether the target unlocking position is matched with the preset unlocking position;
and the unlocking control module is used for controlling unlocking when the target unlocking password is matched with the preset unlocking password, the target unlocking time is matched with the preset unlocking time, and the target unlocking position is matched with the preset unlocking position.
In a third aspect, embodiments of the present application provide a computer storage medium storing a plurality of instructions adapted to be loaded by a processor and to perform the above-mentioned method steps.
In a fourth aspect, an embodiment of the present application provides an electronic device, which may include: a processor and a memory; wherein the memory stores a computer program adapted to be loaded by the processor and to perform the above-mentioned method steps.
The beneficial effects brought by the technical scheme provided by some embodiments of the application at least comprise:
in one or more embodiments of the application, when the intelligent lock monitors that the unlocking instruction is input, the target unlocking information corresponding to the unlocking instruction is acquired, the target unlocking information comprises a target unlocking password, target unlocking time and a target unlocking position, whether the target unlocking password is matched with a preset unlocking password or not is judged, whether the target unlocking time is matched with the preset unlocking time or not is matched with the preset unlocking position or not, and when the target unlocking password is matched with the preset unlocking password, the target unlocking time is matched with the preset unlocking time, and when the target unlocking position is matched with the preset unlocking position, the unlocking is controlled. Through right the target unblock information that the unblock instruction corresponds matches, when target unblock information matches with preset unblock information, just unblock the intelligence lock, can avoid the potential safety hazard that the intelligence lock key lost or the password reveals and bring, reduced article and lost the risk.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present application, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a schematic structural diagram of an intelligent lock unlocking system provided in an embodiment of the present application;
FIG. 2 is an interaction diagram of an intelligent lock unlocking system provided by an embodiment of the present application;
fig. 3 is a schematic view of a motion trajectory display interface involved in an intelligent lock unlocking method provided in an embodiment of the present application;
fig. 4 is a schematic diagram illustrating a low power prompt related to an unlocking method of an intelligent lock according to an embodiment of the present application;
fig. 5 is a schematic diagram illustrating another low power prompt related to an unlocking method of an intelligent lock according to an embodiment of the present application;
fig. 6 is a schematic flowchart of an unlocking method for an intelligent lock according to an embodiment of the present application;
FIG. 7 is a schematic flowchart of another method for unlocking an intelligent lock according to an embodiment of the present application;
fig. 8 is a schematic interface diagram relating to an unlocking method of an intelligent lock according to an embodiment of the present application;
fig. 9 is a schematic diagram of a preset unlocking information setting related to an unlocking method of an intelligent lock provided in an embodiment of the present application;
fig. 10 is a schematic diagram of another preset unlocking information setting related to an unlocking method of an intelligent lock provided by an embodiment of the application;
fig. 11 is a schematic structural diagram of an intelligent lock unlocking device provided in an embodiment of the present application;
FIG. 12 is a schematic structural diagram of another unlocking device for an intelligent lock according to an embodiment of the present disclosure;
fig. 13 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
In the description of the present application, it is to be understood that the terms "first," "second," and the like are used for descriptive purposes only and are not to be construed as indicating or implying relative importance. In the description of the present application, it is noted that, unless explicitly stated or limited otherwise, "including" and "having" and any variations thereof, are intended to cover non-exclusive inclusions. For example, a process, method, system, article, or apparatus that comprises a list of steps or elements is not limited to only those steps or elements listed, but may alternatively include other steps or elements not listed, or inherent to such process, method, article, or apparatus. The specific meaning of the above terms in the present application can be understood in a specific case by those of ordinary skill in the art. Further, in the description of the present application, "a plurality" means two or more unless otherwise specified. "and/or" describes the association relationship of the associated objects, meaning that there may be three relationships, e.g., a and/or B, which may mean: a exists alone, A and B exist simultaneously, and B exists alone. The character "/" generally indicates that the former and latter associated objects are in an "or" relationship.
The present application will be described in detail with reference to specific examples.
Referring to fig. 1, fig. 1 is a schematic structural diagram of an intelligent lock unlocking system according to an embodiment of the present disclosure. As shown in fig. 1, the smart lock unlocking system may include a server 100, a user terminal 110, and a smart lock cluster. The intelligent lock cluster may include a plurality of intelligent locks, as shown in fig. 1, specifically including an intelligent lock 1, an intelligent lock 2, …, and an intelligent lock n, where n is an integer greater than 0; for convenience of understanding, the embodiment of the present invention is described by taking the server 100, the user terminal 110 and the smart lock 1 in fig. 1 as an example.
The server 100 may be a separate server device, such as: rack, blade, tower or cabinet type server equipment, or hardware equipment with stronger computing power such as a workstation and a large computer; the server cluster can also be a server cluster formed by a plurality of servers, each server in the service cluster can be formed in a symmetrical mode, wherein each server has equivalent functions and equivalent positions in a service link, each server can provide services for the outside independently, and the independent service can be understood as the assistance without other servers.
The user terminal 110 may be a terminal device with a file playing function, including but not limited to: a mobile terminal, a handheld device, a personal computer, a tablet computer, a vehicle mounted device, a computing device or other processing device connected to a wireless modem, etc.
The intelligent lock can be an intelligent device with encryption keeping and unlocking functions, can be an independent device, can be integrated into an independent tool device for keeping articles, and can be called different names in different environments. For example: a mobile safe, a briefcase, an intelligent bag, a suitcase and the like.
The user terminal and the intelligent lock communicate with the server through a network, wherein the network can be a wireless network including but not limited to a cellular network, a wireless local area network, an infrared network or a bluetooth network, or a wired network including but not limited to an ethernet, a Universal Serial Bus (USB) or a controller area network.
Referring to fig. 2, fig. 2 is an interaction schematic diagram of an intelligent lock unlocking system according to an embodiment of the present application.
Step 001: the user terminal 110 monitors a pairing instruction input for the smart lock 1, and generates a pairing request corresponding to the pairing instruction.
The pairing instruction refers to a code for the computer to perform pairing operation, and in this embodiment, it can be understood that the code for the user terminal to perform pairing operation between the user terminal and the smart lock is executed. The pairing may be understood as establishing a mapping relationship between the user terminal 110 and the smart lock 1 based on a pairing connection protocol.
Specifically, the intelligent lock 1 has a pairing code, the pairing code may be in the form of a two-dimensional code, a small program code, a string of random numbers, a letter combination, and the like, when a user needs to pair the intelligent lock 1 with the user terminal 110, the camera function may be opened through the user terminal 110, the pairing code on the intelligent lock 1 is scanned, and the pairing code is subjected to identification processing to obtain the device identifier of the intelligent lock 1. The user terminal 100 generates a pairing request corresponding to the pairing instruction, where the pairing request carries the device identifier of the intelligent lock 1 and the user information of the user terminal.
In a possible implementation manner, the user terminal 110 may monitor a pairing instruction for at least one smart lock, and generate a pairing request corresponding to each pairing instruction of the at least one smart lock.
Step 002: the user terminal 110 sends the pairing request to the server 100, where the pairing request carries the device identifier of the smart lock and the user information of the user terminal.
The device identification can be information such as MAC address, IP address, digital certificate and ID of the intelligent lock.
The user information may be a user name, a user ID, a user identification code, and the like registered by the user, and the user information is used for identifying the identity of the user.
Specifically, after generating a pairing request corresponding to the pairing instruction, the user terminal 110 sends the pairing request to the server 100, where the pairing request carries the device identifier of the intelligent lock and the user information of the user terminal.
Step 003: the server 100 pairs the user terminal 110 and the smart lock 1 based on the pairing request.
In a specific pairing scenario, taking a user terminal 110 as a mobile phone as an example, the mobile phone may be loaded with an application program for smart lock management, a user may access the server 100 by clicking the application program on the mobile phone, perform user name registration while accessing the server 100, and after the registration is completed, the server 100 allocates a user ID to the user of the mobile phone.
It should be noted that when the registered user names are different, the user IDs assigned by the server 100 based on the user names are also different.
At this time, the user may scan the pairing code on the smart lock 1 by turning on the camera function through the mobile phone and recognize the pairing code to obtain the device information of the smart lock 1, the user inputs a pairing instruction through the mobile phone, and the mobile phone sends a pairing request including the device identifier of the smart lock and the user ID on the mobile phone to the server 100 after detecting the pairing instruction input by the user.
After receiving the pairing request, the server 100 obtains the device identifier and the user ID of the smart lock carried in the pairing request. The server 100 searches for a target device identifier matching the device identifier of the smart lock in a local identifier combination according to the device identifier of the smart lock, where the local identifier set stores the device identifiers of all paired smart locks.
When the server 100 does not find the target device identifier matched with the device identifier of the intelligent lock in the local identifier set, the device identifier of the intelligent lock and the user ID are associated to establish a mapping relation between the intelligent lock and the user information-user ID, so that the pairing process is completed.
It should be noted that after the pairing is completed, when the user information-user ID logs in the user terminal 110, the user terminal 110 and the smart lock 1 may complete information interaction. For example: the user can check the state information of the intelligent lock 1 through an application program on the user terminal 110-mobile phone, wherein the state information comprises information such as the electric quantity and the current position of the intelligent lock.
Step 004: the server 100 feeds back a pairing success prompt message to the user terminal 110.
Step 005: the user terminal 110 configures preset unlocking information of the intelligent lock 1, wherein the preset unlocking information comprises a preset unlocking password, preset unlocking time and a preset unlocking position.
Specifically, the user terminal 110 sends a status query request of the smart lock 1 to the server 100.
The server 100 obtains the device status of the intelligent lock 1 based on the status query request, and returns the device status to the user terminal 110, where the device status includes an online status or an offline status.
Specifically, when the server 100 receives the state query request, a heartbeat packet is sent to the intelligent lock 1, and when response information fed back by the intelligent lock 1 for the heartbeat packet is not timed out, it is determined that the device state of the intelligent lock 1 is in an online state, and when response information fed back by the intelligent lock 1 is timed out, it is determined that the device state of the intelligent lock 1 is in an offline state.
The heartbeat packet refers to detection data for notifying the state of the device of the other party between the user terminal 110 and the server 100, where the detection data may be a self-defined structural body (a code, a character string, a command word, or the like), and sending the heartbeat packet may determine whether the current state of the smart lock 1 device is normal, where the heartbeat packet is usually a small detection data packet, and is usually implemented by sending an empty packet only including a header in a logic layer.
Optionally, the intelligent lock 1 may send the heartbeat packet at a certain time interval, and the server 100 receiving the heartbeat packet detects whether the heartbeat packet is received on time, and determines whether the connection is normal.
The user terminal 110 receives the device state, when the device state is in an online state, the user terminal 110 obtains an unlocking center point and an effective distance which are set for the intelligent lock 1, determines a circular area which takes the unlocking center point as a circle center and the effective distance as a radius, and takes the circular area as a preset unlocking position of the intelligent lock 1.
The user terminal 110 obtains the unlocking time set for the smart lock 1, and the unlocking time is used as preset unlocking time.
The user terminal 110 obtains an unlocking password set for the smart lock 1, and the unlocking password is used as a preset unlocking password.
In a possible implementation manner, the user terminal may configure at least one preset unlocking position for the smart lock 1, and the preset unlocking time and the preset unlocking password corresponding to each preset unlocking position in the at least one preset unlocking position.
Step 006: the user terminal 110 sends the preset unlocking information to the server 100, and the server 100 sends the preset unlocking information to the intelligent lock 1.
Step 007: the intelligent lock 1 receives preset unlocking information sent by the server 100, and stores the preset unlocking information.
Step 008: the intelligent lock 1 monitors an unlocking instruction input aiming at the intelligent lock 1, and target unlocking information corresponding to the unlocking instruction is obtained.
The target unlocking information comprises a target unlocking password, target unlocking time and a target unlocking position.
The target unlocking password is a password which is currently input for unlocking the intelligent lock, and the target unlocking password can be in the forms of numbers, patterns, biological characteristics, gestures and the like.
The target unlocking time refers to the current time for unlocking the intelligent lock, and the intelligent lock has a timing function and can record the current time. When the intelligent lock monitors an unlocking instruction, recording the current unlocking time, wherein the current unlocking time is the target unlocking time.
The target unlocking position refers to the geographic position of the intelligent lock when a current unlocking instruction is input, the intelligent lock has a positioning function, and the positioning function can be realized based on the existing satellite positioning system, can also be realized based on signal distance attenuation model calculation, and the like. When the intelligent lock monitors an unlocking instruction, a positioning function is triggered, and the current unlocking geographic position, namely the target unlocking position, is obtained.
Step 009: the intelligent lock 1 judges whether the target unlocking password is matched with a preset unlocking password, whether the target unlocking time is matched with the preset unlocking time, and whether the target unlocking position is matched with the preset unlocking position.
Specifically, after monitoring the input of the unlocking instruction and acquiring the target unlocking information corresponding to the unlocking instruction, the intelligent lock 1 starts a target unlocking information matching function, and acquires the preset unlocking password, the preset unlocking range and the preset unlocking time which are stored in advance from a local storage space. And respectively judging whether the target unlocking password is matched with the preset unlocking password, whether the target unlocking time is matched with the preset unlocking time, and whether the target unlocking position is matched with the preset unlocking position.
Step 010: when the target unlocking password is matched with the preset unlocking password, the target unlocking time is matched with the preset unlocking time, and the target unlocking position is matched with the preset unlocking position, the intelligent lock 1 controls unlocking.
Step 011: when the target unlocking password is not matched with the preset unlocking password, and/or the target unlocking time is not matched with the preset unlocking time, and/or the target unlocking position is not matched with the preset unlocking position, the intelligent lock 1 sends early warning information to the server 100.
And the server sends the early warning information to the user terminal.
Step 012: the user terminal 110 displays the warning information.
Step 013: the user terminal 110 sends a location acquisition request to the server 100, and the server 100 sends the location acquisition request to the smart lock 1.
The location obtaining request is used to obtain location information of the smart lock at a certain time point and/or a certain time period, where the location information is used to represent a location and a position of the smart lock, where the smart lock is located may be in the form of an absolute location, such as coordinates, longitude and latitude, and the like, may be in the form of a relative location, that is, a certain location is used as a reference point to represent the location of the smart lock, and the like.
Step 014: the intelligent lock 1 acquires first time information carried by the position acquisition request, inquires a position set corresponding to the first time information, and generates a motion track corresponding to the position set.
The first time information is used to obtain a geographic location of the smart lock, and the first time information may be used to obtain real-time location information of the current smart lock, may be used to obtain location information of a certain time point of the smart lock, and may be used to obtain location information of a certain time period of the smart lock.
For example: the intelligent lock 1 inquires a position set containing at least one geographic position of the intelligent lock 1 in a time period of 10:00-11:00 in a local storage space based on the position acquisition request, positions the intelligent lock to the geographic positions of 60 intelligent locks after inquiring the time period of 10:00-11:00, connects the geographic positions corresponding to adjacent time points in pairs, and generates a motion track corresponding to the position set containing the geographic positions of 60 intelligent locks.
Step 015: the intelligent lock 1 sends the motion trail to the server 100, and the server 100 sends the motion trail to the user terminal 110.
Step 016: the user terminal 110 displays the movement trace on the electronic map.
Specifically, the user terminal 110 receives the motion trajectory, and loads the motion trajectory on the electronic map, as shown in fig. 3, fig. 3 is the motion trajectory of the intelligent lock 1 on the current display interface of the user terminal 110, and a black dotted line in the figure is that the intelligent lock 1 performs different movements from a point a along the black dotted line in a time period of 10:00 to 11:00, and reaches a position where a triangle symbol in the figure is located.
Step 017: the user terminal 110 sends an unlocking record obtaining request to the server 100, and the server 100 sends the unlocking record obtaining request to the intelligent lock 1.
Step 018: and the intelligent lock 1 acquires second time information carried by the unlocking record acquisition request and acquires unlocking record information corresponding to the second time information.
The unlocking record acquisition request is used for acquiring unlocking record information of the intelligent lock at a certain time point and/or time period, and the unlocking record information comprises unlocking time, unlocking position, unlocking password and the like. And the second time information is used for acquiring unlocking record information of the intelligent lock. In this embodiment, the unlocking record obtaining request is used to obtain unlocking record information corresponding to the second time information.
Step 019: the intelligent lock 1 sends the unlocking record information to the server 100, and the server 100 sends the unlocking record information to the user terminal 110.
In a feasible implementation manner, the intelligent lock 1 has an unlocking information recording function, when a user unlocks the intelligent lock 1, the intelligent lock 1 can record unlocking information such as unlocking time, unlocking position, unlocking password and the like corresponding to the current unlocking, and send the current unlocking record information to the server 100, the server 100 stores the current unlocking record information, and it needs to be described that the current unlocking record information contains unlocking record information corresponding to the successful unlocking and unlocking record information corresponding to the failed unlocking.
When the server 100 receives an unlocking record obtaining request sent by the user terminal 110, based on second time information carried by the unlocking record obtaining request, unlocking record information corresponding to the second time information is obtained in a local storage space. The unlocking record information comprises at least one unlocking record corresponding to the second time information.
The server 100 transmits the unlock record information to the user terminal 110.
Step 020: the user terminal 110 displays the unlock record information.
Specifically, after the user terminal 110 receives the unlocking record information, the user terminal 110 may display the unlocking record information in the form of a table, a picture, a character, and the like on the current display interface.
Step 021: the intelligent lock 1 detects the current electric quantity, and when the current electric quantity is smaller than an electric quantity threshold value, sends low-electric-quantity prompt information to the server 100.
The electric quantity threshold value is an electric quantity value preset by a user or an intelligent lock manufacturer, and the real-time electric quantity of the intelligent lock can be monitored by setting the electric quantity threshold value.
Specifically, the intelligent lock 1 can monitor and acquire the current electric quantity of the intelligent lock in real time, when the current electric quantity is smaller than a preset electric quantity threshold value, the intelligent lock 1 gives an early warning to the current electric quantity, and sends the low-electric-quantity prompt message to the user terminal 110 through the server 100.
Step 022: the server 100 sends the low power prompt message to the user terminal 110.
Step 023: the user terminal 110 outputs the low power prompt message.
Specifically, the user terminal 110 receives the low power prompt message sent by the server 100, the user terminal 110 may output the low power prompt message on the current display interface based on a preset prompt rule, the preset prompt rule may pop up and output the low power prompt message on the current display interface in a manner of pictures, characters, audio, and the like, or may output the low power prompt message in a manner of a short message or a voice call based on a preset user contact manner.
For example: after the user terminal 110 receives the low power prompt message sent by the server 100, a corresponding text prompt notification pops up on a current display interface of the user terminal 110, as shown in fig. 4, a low power prompt message "please notice, the power of the intelligent lock 1 is low" is displayed in fig. 4.
Optionally, the manner in which the user terminal 110 outputs the low power prompt message may be that a corresponding text prompt notification is loaded on a display interface of the user terminal 110, as shown in fig. 5, the user terminal 110 pushes a prompt message of "please notice, currently locate the lock" on a notification bar in a screen display area, the user terminal 110 may further provide a relevant operation based on the low power prompt message to the user on the notification bar, and the relevant operation may be understood as that the user may select a low power consumption mode of ignoring the low power prompt message or opening the smart lock, and the like by clicking an "operation" button shown in fig. 5.
Optionally, the manner in which the user terminal 110 outputs the low power prompt message may also be in a form of voice, for example: the user terminal can broadcast the current intelligent lock 1 with low electric quantity in a voice broadcast mode; may be in the form of vibrations of the user terminal 110, such as: the user terminal can call an internal vibration motor to prompt at a specific vibration frequency; or may be in the form of invoking a breathing light, a flash light, a fill light, etc. on the user terminal 110.
It should be noted that there are various ways for the user terminal 110 to output the low power prompt message, which may be one or more of the above, and this is not limited in detail here.
In this application embodiment, when the intelligent lock monitors that the unlocking instruction is input, acquire the target unlocking information that the unlocking instruction corresponds, the target unlocking information includes target unlocking password, target unlocking time and target unlocking position, judges whether target unlocking password matches with preset unlocking password, just whether target unlocking time matches with preset unlocking time, just whether target unlocking position matches with preset unlocking position, works as target unlocking password with preset unlocking password matches, just target unlocking time with preset unlocking time matches, just when target unlocking position matches with preset unlocking position, the control unblock. Through right the target unblock information that the unblock instruction corresponds matches, when target unblock information matches with preset unblock information, just unblock the intelligence lock, can avoid the potential safety hazard that the intelligence lock key lost or the password reveals and bring, reduced article and lost the risk.
In one embodiment, as shown in fig. 6, a smart lock unlocking method is proposed, which can be implemented by relying on a computer program and can run on a von neumann-based smart lock unlocking device. The computer program may be integrated into the application or may run as a separate tool-like application. For convenience of description, the smart lock side is taken as an example and described in detail below.
Specifically, this intelligence lock unblock includes:
step 101: monitoring an unlocking instruction input by the intelligent lock, and acquiring target unlocking information corresponding to the unlocking instruction, wherein the target unlocking information comprises a target unlocking password, target unlocking time and a target unlocking position.
The instructions are instructions and commands directing the operation of the smart lock, and may be understood as code specifying certain operations to be performed or certain controls to be implemented by functions. The unlocking instruction may be understood as an instruction or a command for instructing the smart lock to execute an unlocking function, and the smart lock unlocks the smart lock by executing a code corresponding to a program logic control instruction corresponding to the unlocking function.
In practical applications, different unlocking modes correspond to different unlocking instructions, and the unlocking modes include, but are not limited to, a character password mode, a pattern unlocking mode, a key unlocking mode (physical key, smart key, remote control key, etc.), a biometric password or a gesture password mode, and the like, where the biometric password includes a fingerprint password, a voice password, an iris password, and the like.
The target unlocking information refers to information currently used for unlocking the intelligent lock, the unlocking instruction input each time corresponds to different target unlocking information, and in this embodiment, the target unlocking information includes a target unlocking password, target unlocking time and a target unlocking position.
The target unlocking password is a password which is currently input for unlocking the intelligent lock, and the target unlocking password can be in the forms of numbers, patterns, biological characteristics, gestures and the like.
The target unlocking time refers to the current time for unlocking the intelligent lock, and the intelligent lock has a timing function and can record the current time. When the intelligent lock monitors an unlocking instruction, recording the current unlocking time, wherein the current unlocking time is the target unlocking time.
The target unlocking position refers to the geographic position of the intelligent lock when a current unlocking instruction is input, the intelligent lock has a positioning function, and the positioning function can be realized based on the existing satellite positioning system, can also be realized based on signal distance attenuation model calculation, and the like. When the intelligent lock monitors an unlocking instruction, a positioning function is triggered, and the current unlocking geographic position, namely the target unlocking position, is obtained.
Specifically, the smart lock may have a password input function, the password input function may be implemented based on physical keys on the smart lock, the user may input a password of the smart lock by pressing character keys (number keys, letter keys, symbol keys, etc.) with fingers in a physical key area on the smart lock, the smart lock monitors whether an unlocking instruction is input through a change of the physical keys on the smart lock, and when the user inputs the password, the smart lock detects a change of the physical keys. At this time, the intelligent lock monitors an unlocking instruction input by the user for the intelligent lock.
Optionally, the password input function of the smart lock may be implemented based on a touch screen on the smart lock, based on a key hole feature on the smart lock, based on a camera on the smart lock, based on a microphone on the smart lock, and the like.
Optionally, the smart lock may have a touch screen, and the touch screen may be a touch screen capable of implementing a single-touch unlocking function, for example: capacitive touch screen, electromagnetic touch screen, can also be the touch-sensitive screen that can realize capacitive sensing, electromagnetic induction and infrared induction simultaneously. When a user touches the touch screen on the intelligent lock through a finger, the capacitance parameter of the touch position changes, and the touch frame determines the touch position of the finger on the touch screen of the intelligent lock according to the change of the capacitance; or when the finger contacts the touch frame, the infrared receiving end is blocked from receiving the infrared signal, the touch frame determines the touch position of the finger according to the blocked infrared signal, and the unlocking instruction input by the user for the intelligent lock is monitored by identifying the code corresponding to the logic control instruction corresponding to the touch position.
Optionally, the smart lock may have a key position hole, and a user may input an unlocking instruction to the smart lock through a key (a mechanical key, a smart key, or the like), and when the smart lock detects a physical change of the smart lock, the user is monitored for the unlocking instruction input by the smart lock, and the physical change may be understood as that after the key of the user is inserted into the key hole of the smart lock, the lock cylinder of the smart lock is twisted to generate a physical change. And so on.
It should be noted that there are various ways for the smart lock to listen to the input unlocking command, and the smart lock may include one or more of the above fits, which is not limited herein.
Specifically, when an unlocking instruction input by a user is monitored, the intelligent lock acquires target unlocking information corresponding to the unlocking instruction, specifically acquires current unlocking time corresponding to the unlocking instruction, and takes the current unlocking time as target unlocking time; acquiring a current unlocking password (characters, patterns, key information, biological characteristics and the like) corresponding to a current unlocking instruction, and taking the current unlocking password as a target unlocking password; and acquiring a current geographic position corresponding to the current unlocking instruction, and taking the current geographic position as a target unlocking position.
Step 102: and judging whether the target unlocking password is matched with a preset unlocking password, whether the target unlocking time is matched with the preset unlocking time, and whether the target unlocking position is matched with the preset unlocking position.
The preset unlocking password can be a preset pattern unlocking password, a preset character unlocking password, a preset biological characteristic unlocking password, a preset key unlocking password, a preset gesture unlocking password and the like, different unlocking modes correspond to different types of preset unlocking passwords in practical application, for example, the character unlocking mode corresponds to the preset character unlocking password, the key unlocking mode (a physical key, an intelligent key, a remote control key and the like) corresponds to the preset key unlocking password and the like, the preset unlocking password is configured by a user, the preset unlocking password can be changed in a later period, and for example, the user can change the preset unlocking password through a user terminal (a mobile phone, a tablet and the like) connected with the intelligent lock.
The preset unlocking position refers to a preset geographic coordinate or geographic range of unlocking of the intelligent lock, the preset unlocking position can be a plurality of preset unlocking positions, in this embodiment, it can be understood that a user aims at the geographic range of unlocking of the intelligent lock, that is, the preset unlocking position is only required to be unlocked by inputting an unlocking instruction in the preset unlocking position, and the user can also set the intelligent lock to be a plurality of preset unlocking positions.
The preset unlocking time refers to preset unlocking time points, unlocking time periods, unlocking dates and the like of the intelligent lock, and in practical application, the preset unlocking time and the preset unlocking range may have a mapping relationship, and the mapping relationship may be understood that the preset unlocking time may correspond to one or more unlocking ranges. In this embodiment, the preset unlocking time may be configured by a user through a user terminal (a mobile phone, a tablet, etc.) connected to the smart lock.
Specifically, after monitoring the input of the unlocking instruction and acquiring the target unlocking information corresponding to the unlocking instruction, the intelligent lock starts a target unlocking information matching function, and acquires the preset unlocking password, the preset unlocking range and the preset unlocking time which are stored in advance from a local storage space. And respectively judging whether the target unlocking password is matched with the preset unlocking password, whether the target unlocking time is matched with the preset unlocking time, and whether the target unlocking position is matched with the preset unlocking position.
Optionally, when the unlocking mode corresponding to the target unlocking password is a character password mode, judging whether the target unlocking password is matched with the preset unlocking password, wherein the judgment can be made whether the target character unlocking password is consistent with the preset character unlocking password; when the unlocking mode corresponding to the target unlocking password is a pattern unlocking mode, judging whether the target unlocking password is matched with the preset unlocking password, wherein the target pattern unlocking password is consistent with the pattern character unlocking password; when the unlocking mode corresponding to the target unlocking password is a biological characteristic unlocking mode, judging whether the target unlocking password is matched with the preset unlocking password or not, wherein the judgment can be realized by setting a similarity threshold value of biological characteristics for the intelligent lock, judging whether the similarity between the target biological characteristic unlocking password and the preset biological characteristic unlocking password reaches the similarity threshold value or not, and the like.
Specifically, whether the target unlocking position is matched with a preset unlocking position or not may be whether a geographic coordinate corresponding to the target unlocking position is consistent with a preset geographic coordinate corresponding to the preset unlocking position or whether a geographic coordinate corresponding to the target unlocking position is within an unlocking geographic range corresponding to the preset unlocking position or not; and when the preset unlocking positions are multiple, judging whether the target unlocking position is in a geographic range corresponding to the multiple preset unlocking positions, and the like.
Optionally, when the preset unlocking time is a preset certain time period (e.g., 14:00-15:00), whether the target unlocking time is matched with the preset unlocking time may be understood as whether a time point corresponding to the target unlocking time is within the preset certain time period corresponding to the preset unlocking time; when the preset unlocking time is a preset certain time point (for example, 14:00), whether the target unlocking time is matched with the preset unlocking time may be understood as whether the time point corresponding to the target unlocking time is consistent with the preset certain time point corresponding to the preset unlocking time, and the like.
In a possible implementation manner, when the preset unlocking positions are multiple, the different preset unlocking ranges correspond to the corresponding preset unlocking time and the preset unlocking password.
For example: the preset unlocking positions are a preset position a, a preset position b and a preset position c respectively. The preset position a corresponds to preset unlocking time a and a preset unlocking password a, the preset position b corresponds to preset unlocking time b and a preset unlocking password b, and the preset position c corresponds to preset unlocking time c and a preset unlocking password c.
When the target unlocking position corresponds to a preset unlocking position a, whether the target unlocking password is matched with a preset unlocking password or not is judged, whether the target unlocking time is matched with the preset unlocking time or not is judged, and whether the target unlocking position is matched with the preset unlocking position or not is judged. The target unlocking position is judged to be in a geographic range corresponding to a preset unlocking position a, the target unlocking time is matched with the preset unlocking time a corresponding to the preset unlocking position a, and the target unlocking password is matched with the preset unlocking password a corresponding to the preset unlocking position a.
Step 103: and when the target unlocking password is matched with the preset unlocking password, the target unlocking time is matched with the preset unlocking time, and the target unlocking position is matched with the preset unlocking position, controlling unlocking.
Specifically, when the target unlocking password is matched with the preset unlocking password, the target unlocking time is matched with the preset unlocking time, and the target unlocking position is matched with the preset unlocking position, the unlocking condition of the intelligent lock is achieved, a program logic control instruction corresponding to the unlocking function of the intelligent lock is triggered, and the intelligent lock unlocks the intelligent lock by executing a program code corresponding to the program logic control instruction.
In a feasible implementation manner, when the unlocking mode corresponding to the target unlocking password is a character password mode, the target unlocking password is matched with the preset unlocking password, the target unlocking time is matched with the preset unlocking time, and the target unlocking position is matched with the preset unlocking position, it can be understood that the target character unlocking password is consistent with the preset character unlocking password, and a time point corresponding to the target unlocking time is in a time range corresponding to the preset unlocking time or a time point corresponding to the target unlocking time is consistent with the preset unlocking time, and when a geographic coordinate of the target unlocking position is in a geographic range corresponding to the preset unlocking position, the unlocking condition of the intelligent lock is achieved, and intelligent unlocking is performed.
In this application embodiment, when the intelligent lock monitors that the unlocking instruction is input, acquire the target unlocking information that the unlocking instruction corresponds, the target unlocking information includes target unlocking password, target unlocking time and target unlocking position, judges whether target unlocking password matches with preset unlocking password, just whether target unlocking time matches with preset unlocking time, just whether target unlocking position matches with preset unlocking position, works as target unlocking password with preset unlocking password matches, just target unlocking time with preset unlocking time matches, just when target unlocking position matches with preset unlocking position, the control unblock. Through right the target unblock information that the unblock instruction corresponds matches, when target unblock information matches with preset unblock information, just unblock the intelligence lock, can avoid the potential safety hazard that the intelligence lock key lost or the password reveals and bring, reduced article and lost the risk.
Please refer to fig. 7, which is a flowchart illustrating an unlocking method of an intelligent lock according to an embodiment of the present application. The present embodiment takes the smart lock side as an example for illustration. The intelligent lock unlocking method can comprise the following steps:
step 201: and receiving preset unlocking information sent by a user terminal through a server, wherein the preset unlocking information comprises a preset unlocking password, preset unlocking time and a preset unlocking position.
Specifically, the user can set up through the user terminal who pairs with the intelligent lock and preset the unblock information, specifically sets up the preset unblock password, the preset unblock time and the preset unblock position of intelligent lock, after setting up the completion, will preset the unblock information and send to through the server the intelligent lock, the intelligent lock receives the user terminal warp the preset unblock information that the server sent, and will preset the unblock information and preserve.
Specifically, the preset unlocking information may be set by a user through an intelligent lock application corresponding to an intelligent lock on a user terminal, the intelligent lock application has a function of managing the intelligent lock, and the user may set the preset unlocking information of the intelligent lock, such as the preset unlocking time, the preset unlocking position, the preset unlocking password, and the like, in detail through the intelligent lock application.
For example: as shown in fig. 8, fig. 8 is an application display interface diagram of a user terminal, where a user may touch an "intelligent lock" application on a display interface of the user terminal in a manner of touch with a stylus or a finger, and select to set intelligent lock unlocking information in the "intelligent lock" application, as shown in fig. 9, fig. 9 is a schematic diagram of a display interface of the user terminal, where the user may set the intelligent lock unlocking information, and fig. 9 includes a point a, a point B, a point C, a point D, a point E, and a point F. The user selects a point A in the current display interface to specifically set the unlocking information of the intelligent lock, the user can click the point A, the user terminal displays the intelligent lock setting interface shown in figure 10, the user can set the unlocking information of the intelligent lock, such as preset unlocking time, preset unlocking position, preset unlocking password and the like, in the interface shown in figure c, and after the setting is completed, the user can click the 'confirm' option shown in figure 10 to complete the setting of the preset unlocking information of the intelligent lock.
The user terminal sends preset unlocking information including preset unlocking time, preset unlocking positions, preset unlocking passwords and the like to the intelligent lock through the server, and the intelligent lock receives the preset unlocking information sent by the user terminal through the server and stores the preset unlocking information in a local storage space.
Optionally, the preset unlocking information can be an unlocking information connection code based on the intelligent lock, the unlocking information connection code can be a two-dimensional code, a small program code, a string of random numbers, a letter combination and the like, a user can scan the unlocking information connection code (such as the two-dimensional code) on the intelligent lock through a camera of the user terminal, and the unlocking information connection code is subjected to identification processing and jumps to an unlocking information setting interface of the intelligent lock.
Step 202: monitoring an unlocking instruction input by the intelligent lock, and acquiring target unlocking information corresponding to the unlocking instruction, wherein the target unlocking information comprises a target unlocking password, target unlocking time and a target unlocking position.
Specifically, refer to step 101, which is not described herein again.
Step 203: and judging whether the target unlocking password is matched with a preset unlocking password, whether the target unlocking time is matched with the preset unlocking time, and whether the target unlocking position is matched with the preset unlocking position.
Refer to step 102 specifically, and will not be described herein.
Step 204: and when the target unlocking password is matched with the preset unlocking password, the target unlocking time is matched with the preset unlocking time, and the target unlocking position is matched with the preset unlocking position, controlling unlocking.
Specifically, refer to step 103, which is not described herein.
Step 205: when the target unlocking password is not matched with the preset unlocking password, and/or the target unlocking time is not matched with the preset unlocking time, and/or the target unlocking position is not matched with the preset unlocking position, early warning information is sent to the server, so that the server sends the early warning information to a user terminal matched with the intelligent lock to display.
The early warning information can be the early warning information which prompts the user terminal that the current target unlocking information is unmatched in the modes of pictures, characters, audio and the like.
Specifically, after monitoring the input of the unlocking instruction and acquiring the target unlocking information corresponding to the unlocking instruction, the intelligent lock starts a target unlocking information matching function, and acquires the preset unlocking password, the preset unlocking range and the preset unlocking time which are stored in advance from a local storage space. And respectively judging whether the target unlocking password is matched with the preset unlocking password, whether the target unlocking time is matched with the preset unlocking time, and whether the target unlocking position is matched with the preset unlocking position.
When the target unlocking password is not matched with the preset unlocking password, and/or the target unlocking time is not matched with the preset unlocking time, and/or the target unlocking position is not matched with the preset unlocking position, a user who inputs an unlocking instruction at present may be an illegal user, and/or the intelligent lock has a safety risk, and at the moment, the intelligent lock sends early warning information to the server, so that the server sends the early warning information to a user terminal matched with the intelligent lock for displaying.
For example: when the unlocking mode corresponding to the target unlocking password is a character password mode, the target unlocking password is not matched with the preset unlocking password, and/or the target unlocking time is not matched with the preset unlocking time, and/or the target unlocking position is not matched with the preset unlocking position, it can be understood that the target character unlocking password is not consistent with the preset character unlocking password, and/or a time point corresponding to the target unlocking time is in a time range corresponding to the preset unlocking time or a time point corresponding to the target unlocking time is not consistent with the preset unlocking time, and/or when a geographic coordinate of the target unlocking position is out of a geographic range corresponding to the preset unlocking position, namely the unlocking condition of the intelligent lock is not reached, and a user inputting an unlocking instruction at present may be an illegal user, and/or the intelligent lock has a safety risk, at the moment, the intelligent lock sends early warning information to the server, the server sends the early warning information to the user terminal, and the user terminal displays the early warning information in a prompt box mode.
Step 206: and receiving a position acquisition request sent by the user terminal through the server, and acquiring first time information carried by the position acquisition request.
The location obtaining request is used to obtain location information of the smart lock at a certain time point and/or a certain time period, where the location information is used to represent a location and a position of the smart lock, where the smart lock is located may be in the form of an absolute location, such as coordinates, longitude and latitude, and the like, may be in the form of a relative location, that is, a certain location is used as a reference point to represent the location of the smart lock, and the like.
The first time information is used to obtain a geographic location of the smart lock, and the first time information may be used to obtain real-time location information of the current smart lock, may be used to obtain location information of a certain time point of the smart lock, and may be used to obtain location information of a certain time period of the smart lock.
Specifically, when a user checks the position information of the intelligent lock through a user terminal, the user terminal sends a position acquisition request to the intelligent lock through a server, the intelligent lock receives the position acquisition request, and the position acquisition request is analyzed to obtain first time information carried by the position acquisition request after the analysis.
Step 207: inquiring a position set corresponding to the first time information, generating a motion track corresponding to the position set, and sending the motion track to the server so that the server sends the motion track to the user terminal for displaying.
The position set refers to a set of all position information of the intelligent lock in the first time information.
The intelligent lock has a positioning function, and the positioning function can be realized based on an existing satellite positioning system, can also be realized based on signal distance attenuation model calculation, and the like. The intelligent lock may obtain a current geographic location at a specific time period (e.g., 2 minutes), record a location time of the current geographic location, and store the current geographic location and the corresponding location time in a local storage space, so that the intelligent lock queries the geographic location corresponding to the first time information.
Specifically, after acquiring the first time information carried by the position acquisition request, the intelligent lock searches a position set containing at least one piece of position information corresponding to the first time information in a local storage space based on the first time information.
For example: the intelligent lock acquires first time information carried by a position information acquisition request sent by the user terminal, the first time information indicates that the intelligent lock acquires all the located geographical positions of the intelligent lock of 14:00-16:00, and the intelligent lock inquires a position set containing all the located geographical positions of the intelligent lock of 14:00-16:00 in a local storage space based on the first time information.
After the intelligent lock acquires the position set, the intelligent lock connects every two geographic positions corresponding to adjacent time points in the position set to generate a motion track corresponding to the position set, and after the intelligent lock generates the motion track, the intelligent lock sends the motion track to the server so that the server sends the motion track to the user terminal for displaying.
Optionally, after the user terminal queries a position set corresponding to the first time information in a local storage space based on the first time information carried by the position information, the position set is sent to the server, so that the server generates the motion track corresponding to the position set, and sends the motion track to the user terminal for displaying.
Optionally, after the user terminal queries a location set corresponding to the first time information in a local storage space based on the first time information carried by the location information, the location set is sent to the user terminal through the server, so that the user terminal generates a motion trajectory corresponding to the location set and displays the motion trajectory.
Step 208: and receiving an unlocking record acquisition request sent by the user terminal through the server, and acquiring second time information carried by the unlocking record acquisition request.
The unlocking record acquisition request is used for acquiring unlocking record information of the intelligent lock at a certain time point and/or time period, and the unlocking record information comprises unlocking time, unlocking position, unlocking password and the like. And the second time information is used for acquiring unlocking record information of the intelligent lock. In this embodiment, the unlocking record obtaining request is used to obtain unlocking record information corresponding to the second time information.
Specifically, the intelligent lock has an unlocking information recording function, and when a user unlocks the intelligent lock, the intelligent lock can record unlocking information such as unlocking time, unlocking position and unlocking password corresponding to the unlocking, and the unlocking information is stored in the local storage space in an unlocking record information mode.
When a user checks the unlocking record of the intelligent lock through a user terminal, the user terminal sends an unlocking record acquisition request to the intelligent lock through a server, the intelligent lock receives the unlocking record acquisition request, and the unlocking record acquisition request is analyzed to obtain second time information carried by the unlocking record acquisition request after analysis.
In a feasible implementation manner, when the user unlocks the smart lock, the smart lock may record biometric information of the user who unlocks this time, for example, the smart lock may call a camera on the smart lock to record a facial image of the user who unlocks this time, the smart lock may call a microphone on the smart lock to collect voice information of the user who unlocks this time, and the like. When the intelligent lock receives an unlocking record acquisition request sent by the user terminal through the server, the intelligent lock can send unlocking record information containing the user biological characteristic information to the user terminal.
Step 209: and acquiring unlocking record information corresponding to the second time information, and sending the unlocking record information to the server so that the server sends the unlocking record information to the user terminal for displaying.
Specifically, after the second time information carried by the unlocking record acquisition request is acquired, the intelligent lock acquires unlocking record information corresponding to the second time information in a local storage space, where the unlocking record information may be unlocking information such as unlocking time, unlocking position, and unlocking password corresponding to user unlocking failure, or unlocking information such as unlocking time, unlocking position, and unlocking password corresponding to user unlocking success. For example: the second time information is a time period from 14:00 to 16:00, and the intelligent lock searches all unlocking record information corresponding to the time period from 14:00 to 16:00 in the local storage space based on the second time information. And when the unlocking record information is found, sending the unlocking record information to the server so that the server sends the unlocking record information to the user terminal for displaying.
Step 210: and detecting the current electric quantity of the intelligent lock, and when the current electric quantity is smaller than an electric quantity threshold value, sending the low-electric-quantity prompt message to the user terminal through the server for outputting.
The electric quantity threshold value is a fixed electric quantity value preset by a user or an intelligent lock manufacturer, and the real-time electric quantity of the intelligent lock can be monitored by setting the electric quantity threshold value.
Specifically, the intelligent lock can real-time supervision and acquire the current electric quantity of intelligent lock, works as when current electric quantity is less than preset electric quantity threshold value, the intelligent lock carries out the early warning to current electric quantity, will low-power prompt message send to user terminal, user terminal can be based on predetermineeing the suggestion rule and export at current display interface low-power prompt message, predetermine the suggestion rule and can be generally with modes such as picture, characters, audio frequency export at current display interface low-power prompt message can also be based on predetermined user contact mode, with SMS, voice call's form output low-power prompt message.
Optionally, when the intelligent lock detects that the current electric quantity is smaller than the electric quantity threshold value, the intelligent lock starts a positioning function, positions the current geographical position of the intelligent lock, sends the current geographical position and the low-electric-quantity prompt message to the user terminal through the server, and the user terminal outputs the current geographical position of the intelligent lock and the low-electric-quantity prompt message.
Optionally, when the smart lock detects that the current electric quantity is smaller than the electric quantity threshold value, the smart lock opens a low power consumption mode, the smart lock operates in the low power consumption mode, and the low power consumption mode may be to close a positioning function with higher electric quantity consumption, and the like.
In this application embodiment, when the intelligent lock monitors that the unlocking instruction is input, acquire the target unlocking information that the unlocking instruction corresponds, the target unlocking information includes target unlocking password, target unlocking time and target unlocking position, judges whether target unlocking password matches with preset unlocking password, just whether target unlocking time matches with preset unlocking time, just whether target unlocking position matches with preset unlocking position, works as target unlocking password with preset unlocking password matches, just target unlocking time with preset unlocking time matches, just when target unlocking position matches with preset unlocking position, the control unblock. Through right the target unblock information that the unblock instruction corresponds matches, when target unblock information matches with preset unblock information, just unblock the intelligence lock, can avoid the potential safety hazard that the intelligence lock key lost or the password reveals and bring, reduced article and lost the risk.
The following are embodiments of the apparatus of the present application that may be used to perform embodiments of the method of the present application. For details which are not disclosed in the embodiments of the apparatus of the present application, reference is made to the embodiments of the method of the present application.
Referring to fig. 11, a schematic structural diagram of an intelligent lock unlocking device according to an exemplary embodiment of the present application is shown. The intelligent lock unlocking device can be realized by software, hardware or a combination of the software and the hardware to form all or part of the terminal. The device 1 comprises a text acquisition module 11, an information acquisition module 12 and an unlocking control module 13.
The information acquisition module 11 is configured to monitor an unlocking instruction input for the smart lock, and acquire target unlocking information corresponding to the unlocking instruction, where the target unlocking information includes a target unlocking password, target unlocking time, and a target unlocking position;
the unlocking matching module 12 is used for judging whether the target unlocking password is matched with a preset unlocking password, whether the target unlocking time is matched with the preset unlocking time, and whether the target unlocking position is matched with the preset unlocking position;
and the unlocking control module 13 is used for controlling unlocking when the target unlocking password is matched with the preset unlocking password, the target unlocking time is matched with the preset unlocking time, and the target unlocking position is matched with the preset unlocking position.
Optionally, as shown in fig. 12, the apparatus 1 further includes:
the unlocking information receiving module 14 is configured to receive preset unlocking information sent by the user terminal through the server, where the preset unlocking information includes a preset unlocking password, preset unlocking time, and a preset unlocking position.
Optionally, as shown in fig. 12, the apparatus 1 further includes:
and the early warning information sending module 15 is used for sending early warning information to the server when the target unlocking password is not matched with the preset unlocking password, and/or the target unlocking time is not matched with the preset unlocking time, and/or the target unlocking position is not matched with the preset unlocking position, so that the server sends the early warning information to the user terminal matched with the intelligent lock for displaying.
Optionally, as shown in fig. 12, the apparatus 1 further includes:
the motion trail sending module 16 is configured to receive a position obtaining request sent by the user terminal through the server, obtain first time information carried by the position obtaining request, query a position set corresponding to the first time information, generate a motion trail corresponding to the position set, and send the motion trail to the server, so that the server sends the motion trail to the user terminal for display.
Optionally, as shown in fig. 12, the apparatus 1 further includes:
the unlocking record sending module 17 is configured to receive an unlocking record obtaining request sent by the user terminal through the server, obtain second time information carried by the unlocking record obtaining request, obtain unlocking record information corresponding to the second time information, and send the unlocking record information to the server, so that the server sends the unlocking record information to the user terminal for displaying.
Optionally, as shown in fig. 12, the apparatus 1 further includes:
and the electric quantity prompting module 18 is used for detecting the current electric quantity of the intelligent lock, and when the current electric quantity is smaller than the electric quantity threshold value, sending the low-electric-quantity prompting information to the user terminal through the server for outputting.
It should be noted that, when the intelligent lock unlocking device provided in the foregoing embodiment executes the intelligent lock unlocking method, only the division of the functional modules is taken as an example, and in practical applications, the functions may be distributed to different functional modules according to needs, that is, the internal structure of the device may be divided into different functional modules to complete all or part of the functions described above. In addition, the intelligent lock unlocking device and the intelligent lock unlocking method provided by the above embodiment belong to the same concept, and the detailed implementation process is shown in the method embodiment, which is not described herein again.
The above-mentioned serial numbers of the embodiments of the present application are merely for description and do not represent the merits of the embodiments.
In this application embodiment, when the intelligent lock monitors that the unlocking instruction is input, acquire the target unlocking information that the unlocking instruction corresponds, the target unlocking information includes target unlocking password, target unlocking time and target unlocking position, judges whether target unlocking password matches with preset unlocking password, just whether target unlocking time matches with preset unlocking time, just whether target unlocking position matches with preset unlocking position, works as target unlocking password with preset unlocking password matches, just target unlocking time with preset unlocking time matches, just when target unlocking position matches with preset unlocking position, the control unblock. Through right the target unblock information that the unblock instruction corresponds matches, when target unblock information matches with preset unblock information, just unblock the intelligence lock, can avoid the potential safety hazard that the intelligence lock key lost or the password reveals and bring, reduced article and lost the risk.
Based on the schematic architecture diagram of the intelligent lock unlocking system shown in fig. 1, the embodiment of the present application provides an intelligent lock unlocking system, which is used for executing the intelligent lock unlocking method disclosed in the embodiment of the present application. The intelligent lock unlocking system can comprise a user terminal, an intelligent lock and a server.
Specifically, this intelligence lock unblock system includes:
the intelligent lock is used for monitoring an unlocking instruction input aiming at the intelligent lock and acquiring target unlocking information corresponding to the unlocking instruction, wherein the target unlocking information comprises a target unlocking password, target unlocking time and a target unlocking position;
the intelligent lock is also used for judging whether the target unlocking password is matched with a preset unlocking password, whether the target unlocking time is matched with the preset unlocking time, and whether the target unlocking position is matched with the preset unlocking position;
the intelligent lock is further used for controlling unlocking when the target unlocking password is matched with the preset unlocking password, the target unlocking time is matched with the preset unlocking time, and the target unlocking position is matched with the preset unlocking position.
Optionally, before monitoring an unlocking instruction input to the intelligent lock, the intelligent lock further includes:
the user terminal is used for monitoring a pairing instruction input by the intelligent lock, generating a pairing request corresponding to the pairing instruction, and sending the pairing request to the server, wherein the pairing request carries the equipment identifier of the intelligent lock and the user information of the user terminal;
and the server is used for pairing the user terminal and the intelligent lock based on the pairing request and feeding back pairing success prompt information to the user terminal.
Optionally, the server, configured to pair the user terminal and the smart lock based on the pairing instruction, includes:
the server is further configured to obtain the device identifier and the user information carried by the pairing instruction;
and when the target equipment identification matched with the equipment identification of the intelligent lock is not found in the local identification set, the server matches the equipment identification with the user information.
Optionally, the user terminal is further configured to configure preset unlocking information of the intelligent lock, and send the preset unlocking information to the server, where the preset unlocking information includes a preset unlocking password, preset unlocking time, and a preset unlocking position;
the server is further used for sending the preset unlocking information to the intelligent lock;
the intelligent lock is further used for receiving the preset unlocking information sent by the server and storing the preset unlocking information.
Optionally, the user terminal is configured to configure preset unlocking information of the intelligent lock, and specifically configured to:
acquiring an unlocking central point and an effective distance which are set for the intelligent lock, determining a circular area which takes the unlocking central point as a circle center and the effective distance as a radius, and taking the circular area as a preset unlocking position of the intelligent lock;
acquiring unlocking time set for the intelligent lock, and taking the unlocking time as preset unlocking time;
and acquiring an unlocking password set for the intelligent lock, and taking the unlocking password as a preset unlocking password.
Optionally, the user terminal is configured to configure preset unlocking information of the intelligent lock, and the preset unlocking information includes:
the user terminal is further used for configuring at least one preset unlocking position, and the preset unlocking time and the preset unlocking password corresponding to each preset unlocking position in the at least one preset unlocking position.
Optionally, before configuring the preset unlocking information of the intelligent lock, the user terminal further includes:
the user terminal is further used for sending a state query request of the intelligent lock to the server;
the server is further used for acquiring the equipment state of the intelligent lock based on the state query request and returning the equipment state to the user terminal, wherein the equipment state comprises an online state or an offline state;
and the user terminal is further used for receiving the equipment state, and when the equipment state of the intelligent lock is in an online state, the user terminal executes the step of configuring the preset unlocking information of the intelligent lock.
Optionally, the user terminal is further configured to send a location obtaining request to the server;
the server is further used for sending the position acquisition request to the intelligent lock;
the intelligent lock is further configured to acquire first time information carried by the position acquisition request, and query a position set corresponding to the first time information;
the intelligent lock is further used for generating a motion track corresponding to the position set and sending the motion track to the server;
the server is further used for sending the motion trail to the user terminal;
and the user terminal is also used for displaying the motion trail on the electronic map.
Optionally, the user terminal is further configured to send an unlocking record obtaining request to the server;
the server is further used for sending the unlocking record acquisition request to the intelligent lock;
the intelligent lock is further used for acquiring second time information carried by the unlocking record acquisition request and acquiring unlocking record information corresponding to the second time information;
the intelligent lock is also used for sending the unlocking record information to the server;
the server is also used for transmitting the unlocking record information to the user terminal;
and the user terminal is used for displaying the unlocking record information.
Optionally, the smart lock is further configured to detect a current electric quantity, and send a low-electric-quantity prompt message to the server when the current electric quantity is smaller than an electric-quantity threshold;
the server is also used for sending the low power prompt message to the user terminal;
and the user terminal is also used for outputting the low power prompt message.
In this application embodiment, when the intelligent lock monitors that the unlocking instruction is input, acquire the target unlocking information that the unlocking instruction corresponds, the target unlocking information includes target unlocking password, target unlocking time and target unlocking position, judges whether target unlocking password matches with preset unlocking password, just whether target unlocking time matches with preset unlocking time, just whether target unlocking position matches with preset unlocking position, works as target unlocking password with preset unlocking password matches, just target unlocking time with preset unlocking time matches, just when target unlocking position matches with preset unlocking position, the control unblock. Through right the target unblock information that the unblock instruction corresponds matches, when target unblock information matches with preset unblock information, just unblock the intelligence lock, can avoid the potential safety hazard that the intelligence lock key lost or the password reveals and bring, reduced article and lost the risk.
An embodiment of the present application further provides a computer storage medium, where the computer storage medium may store a plurality of instructions, where the instructions are suitable for being loaded by a processor and executing the method steps in the embodiments shown in fig. 1 to 10, and a specific execution process may refer to specific descriptions of the embodiments shown in fig. 1 to 10, which are not described herein again.
The present application further provides a computer program product, which stores at least one instruction, and the at least one instruction is loaded and executed by the processor to implement the intelligent lock unlocking method according to the above embodiments.
Please refer to fig. 13, which provides a schematic structural diagram of an electronic device according to an embodiment of the present application. As shown in fig. 13, the electronic device 1000 may include: at least one processor 1001, at least one network interface 1004, a user interface 1003, memory 1005, at least one communication bus 1002.
Wherein a communication bus 1002 is used to enable connective communication between these components.
The user interface 1003 may include a Display screen (Display) and a Camera (Camera), and the optional user interface 1003 may also include a standard wired interface and a wireless interface.
The network interface 1004 may optionally include a standard wired interface, a wireless interface (e.g., WI-FI interface), among others.
Processor 1001 may include one or more processing cores, among other things. The processor 1001 connects various parts throughout the server 1000 using various interfaces and lines, and performs various functions of the server 1000 and processes data by executing or executing instructions, programs, code sets, or instruction sets stored in the memory 1005, and calling data stored in the memory 1005. Alternatively, the processor 1001 may be implemented in at least one hardware form of Digital Signal Processing (DSP), Field-Programmable Gate Array (FPGA), and Programmable Logic Array (PLA). The processor 1001 may integrate one or more of a Central Processing Unit (CPU), a Graphics Processing Unit (GPU), a modem, and the like. Wherein, the CPU mainly processes an operating system, a user interface, an application program and the like; the GPU is used for rendering and drawing the content required to be displayed by the display screen; the modem is used to handle wireless communications. It is understood that the modem may not be integrated into the processor 1001, but may be implemented by a single chip.
The Memory 1005 may include a Random Access Memory (RAM) or a Read-Only Memory (Read-Only Memory). Optionally, the memory 1005 includes a non-transitory computer-readable medium. The memory 1005 may be used to store an instruction, a program, code, a set of codes, or a set of instructions. The memory 1005 may include a stored program area and a stored data area, wherein the stored program area may store instructions for implementing an operating system, instructions for at least one function (such as a touch function, a sound playing function, an image playing function, etc.), instructions for implementing the various method embodiments described above, and the like; the storage data area may store data and the like referred to in the above respective method embodiments. The memory 1005 may optionally be at least one memory device located remotely from the processor 1001. As shown in fig. 13, a memory 1005, which is a kind of computer storage medium, may include therein an operating system, a network communication module, a user interface module, and a smart lock unlocking application program.
In the electronic device 1000 shown in fig. 13, the user interface 1003 is mainly used as an interface for providing input for a user, and acquiring data input by the user; and the processor 1001 may be configured to call the smart lock unlocking application stored in the memory 1005, and specifically perform the following operations:
monitoring an unlocking instruction input aiming at the intelligent lock, and acquiring target unlocking information corresponding to the unlocking instruction, wherein the target unlocking information comprises a target unlocking password, target unlocking time and a target unlocking position;
judging whether the target unlocking password is matched with a preset unlocking password, whether the target unlocking time is matched with the preset unlocking time, and whether the target unlocking position is matched with the preset unlocking position;
and when the target unlocking password is matched with the preset unlocking password, the target unlocking time is matched with the preset unlocking time, and the target unlocking position is matched with the preset unlocking position, controlling unlocking.
In one embodiment, the processor 1001, when executing the unlocking instruction of the listening for the smart lock input, further performs the following operations:
and receiving preset unlocking information sent by a user terminal through a server, wherein the preset unlocking information comprises a preset unlocking password, preset unlocking time and a preset unlocking position.
In one embodiment, the processor 1001, when executing the smart lock unlocking method, further performs the following operations:
when the target unlocking password is not matched with the preset unlocking password, and/or the target unlocking time is not matched with the preset unlocking time, and/or the target unlocking position is not matched with the preset unlocking position, early warning information is sent to the server, so that the server sends the early warning information to a user terminal matched with the intelligent lock to display.
In one embodiment, the processor 1001, when executing the smart lock unlocking method, further performs the following operations:
receiving a position acquisition request sent by the user terminal through the server, and acquiring first time information carried by the position acquisition request;
inquiring a position set corresponding to the first time information, and generating a motion track corresponding to the position set;
and sending the motion trail to the server so that the server sends the motion trail to the user terminal for display.
In one embodiment, the processor 1001, when executing the smart lock unlocking method, further performs the following operations:
receiving an unlocking record acquisition request sent by the user terminal through the server, and acquiring second time information carried by the unlocking record acquisition request;
acquiring unlocking record information corresponding to the second time information;
and sending the unlocking record information to the server so that the server sends the unlocking record information to the user terminal for displaying.
In one embodiment, the processor 1001, when executing the smart lock unlocking method, further performs the following operations:
detecting the current electric quantity of the intelligent lock;
and when the current electric quantity is smaller than the electric quantity threshold value, sending the low-electric-quantity prompt message to the user terminal through the server for outputting.
In this application embodiment, when the intelligent lock monitors that the unlocking instruction is input, acquire the target unlocking information that the unlocking instruction corresponds, the target unlocking information includes target unlocking password, target unlocking time and target unlocking position, judges whether target unlocking password matches with preset unlocking password, just whether target unlocking time matches with preset unlocking time, just whether target unlocking position matches with preset unlocking position, works as target unlocking password with preset unlocking password matches, just target unlocking time with preset unlocking time matches, just when target unlocking position matches with preset unlocking position, the control unblock. Through right the target unblock information that the unblock instruction corresponds matches, when target unblock information matches with preset unblock information, just unblock the intelligence lock, can avoid the potential safety hazard that the intelligence lock key lost or the password reveals and bring, reduced article and lost the risk.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by a computer program, which can be stored in a computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. The storage medium may be a magnetic disk, an optical disk, a read-only memory or a random access memory.
The above disclosure is only for the purpose of illustrating the preferred embodiments of the present application and is not to be construed as limiting the scope of the present application, so that the present application is not limited thereto, and all equivalent variations and modifications can be made to the present application.

Claims (19)

1. An intelligent lock unlocking method is applied to an intelligent lock, and is characterized by comprising the following steps:
monitoring an unlocking instruction input aiming at the intelligent lock, and acquiring target unlocking information corresponding to the unlocking instruction, wherein the target unlocking information comprises a target unlocking password, target unlocking time and a target unlocking position;
judging whether the target unlocking password is matched with a preset unlocking password, whether the target unlocking time is matched with the preset unlocking time, and whether the target unlocking position is matched with the preset unlocking position;
and when the target unlocking password is matched with the preset unlocking password, the target unlocking time is matched with the preset unlocking time, and the target unlocking position is matched with the preset unlocking position, controlling unlocking.
2. The method of claim 1, wherein prior to listening for an unlock instruction entered for a smart lock, further comprising:
and receiving preset unlocking information sent by a user terminal through a server, wherein the preset unlocking information comprises a preset unlocking password, preset unlocking time and a preset unlocking position.
3. The method of claim 1, further comprising:
when the target unlocking password is not matched with the preset unlocking password, and/or the target unlocking time is not matched with the preset unlocking time, and/or the target unlocking position is not matched with the preset unlocking position, early warning information is sent to the server, so that the server sends the early warning information to a user terminal matched with the intelligent lock to display.
4. The method of claim 1, further comprising:
receiving a position acquisition request sent by the user terminal through the server, and acquiring first time information carried by the position acquisition request;
inquiring a position set corresponding to the first time information, and generating a motion track corresponding to the position set;
and sending the motion trail to the server so that the server sends the motion trail to the user terminal for display.
5. The method of claim 1, further comprising:
receiving an unlocking record acquisition request sent by the user terminal through the server, and acquiring second time information carried by the unlocking record acquisition request;
acquiring unlocking record information corresponding to the second time information;
and sending the unlocking record information to the server so that the server sends the unlocking record information to the user terminal for displaying.
6. The method of claim 1, further comprising:
detecting the current electric quantity of the intelligent lock;
and when the current electric quantity is smaller than the electric quantity threshold value, sending the low-electric-quantity prompt message to the user terminal through the server for outputting.
7. An intelligent lock unlocking method is applied to an intelligent lock, a server and a user terminal, and is characterized by comprising the following steps:
the intelligent lock monitors an unlocking instruction input aiming at the intelligent lock, and target unlocking information corresponding to the unlocking instruction is obtained, wherein the target unlocking information comprises a target unlocking password, target unlocking time and a target unlocking position;
the intelligent lock judges whether the target unlocking password is matched with a preset unlocking password, whether the target unlocking time is matched with the preset unlocking time, and whether the target unlocking position is matched with the preset unlocking position;
and when the target unlocking password is matched with the preset unlocking password, the target unlocking time is matched with the preset unlocking time, and the target unlocking position is matched with the preset unlocking position, the intelligent lock controls unlocking.
8. The method of claim 7, wherein prior to the smart lock listening for an unlock instruction input to the smart lock, further comprising:
the user terminal monitors a pairing instruction input aiming at the intelligent lock, generates a pairing request corresponding to the pairing instruction, and sends the pairing request to the server, wherein the pairing request carries the equipment identification of the intelligent lock and the user information of the user terminal;
and the server pairs the user terminal and the intelligent lock based on the pairing request and feeds back pairing success prompt information to the user terminal.
9. The method according to claim 8, wherein the server pairs the user terminal and the smart lock based on the pairing instruction, comprising:
and the server acquires the equipment identification and the user information carried by the pairing instruction.
And when the server does not find the target equipment identification matched with the equipment identification of the intelligent lock in the local identification set, pairing the equipment identification with the user information.
10. The method of claim 8, further comprising:
the user terminal configures preset unlocking information of the intelligent lock and sends the preset unlocking information to the server, wherein the preset unlocking information comprises a preset unlocking password, preset unlocking time and a preset unlocking position;
the server sends the preset unlocking information to the intelligent lock;
and the intelligent lock receives the preset unlocking information sent by the server and stores the preset unlocking information.
11. The method according to claim 10, wherein the user terminal configures preset unlocking information of the smart lock, including:
the user terminal acquires an unlocking central point and an effective distance which are set for the intelligent lock, determines a circular area which takes the unlocking central point as a circle center and the effective distance as a radius, and takes the circular area as a preset unlocking position of the intelligent lock;
the user terminal acquires unlocking time set for the intelligent lock, and the unlocking time is used as preset unlocking time;
and the user terminal acquires an unlocking password set for the intelligent lock and takes the unlocking password as a preset unlocking password.
12. The method according to claim 10, wherein the user terminal configures preset unlocking information of the smart lock, including:
the user terminal is configured with at least one preset unlocking position, and the preset unlocking time and the preset unlocking password corresponding to each preset unlocking position in the at least one preset unlocking position.
13. The method according to claim 10, wherein before the user terminal configures the preset unlocking information of the smart lock, the method further comprises:
the user terminal sends a state query request of the intelligent lock to the server;
the server acquires the equipment state of the intelligent lock based on the state query request, and returns the equipment state to the user terminal, wherein the equipment state comprises an online state or an offline state;
and the user terminal receives the equipment state, and executes the step of configuring the preset unlocking information of the intelligent lock when the equipment state is in an online state.
14. The method of claim 7, further comprising:
when the target unlocking password is not matched with the preset unlocking password, and/or the target unlocking time is not matched with the preset unlocking time, and/or the target unlocking position is not matched with the preset unlocking position, the intelligent lock sends early warning information to the server;
the server sends the early warning information to a user terminal matched with the intelligent lock;
and the user terminal displays the early warning information.
15. The method of claim 7, further comprising:
the user terminal sends a position acquisition request to the server;
the server sends the position acquisition request to the intelligent lock;
the intelligent lock acquires first time information carried by the position acquisition request, and inquires a position set corresponding to the first time information;
the intelligent lock generates a motion track corresponding to the position set and sends the motion track to the server;
the server sends the motion trail to the user terminal;
and the user terminal displays the motion trail on an electronic map.
16. The method of claim 7, further comprising:
the user terminal sends an unlocking record acquisition request to the server;
the server sends the unlocking record acquisition request to the intelligent lock;
the intelligent lock acquires second time information carried by the unlocking record acquisition request and acquires unlocking record information corresponding to the second time information;
the intelligent lock sends the unlocking record information to the server;
the server sends the unlocking record information to the user terminal;
and the user terminal displays the unlocking record information.
17. The method of claim 7, further comprising:
the intelligent lock detects the current electric quantity, and when the current electric quantity is smaller than an electric quantity threshold value, low-electric-quantity prompt information is sent to the server;
the server sends the low power prompt message to the user terminal;
and the user terminal outputs the low power prompt message.
18. A computer storage medium, characterized in that it stores a plurality of instructions adapted to be loaded by a processor and to perform the method steps according to any of claims 1 to 5 or 6 to 17.
19. An electronic device, comprising: a processor and a memory; wherein the memory stores a computer program adapted to be loaded by the processor and to perform the method steps according to any of claims 1-5 or 6-17.
CN201910833113.2A 2019-09-04 2019-09-04 Intelligent lock unlocking method, device and system, storage medium and electronic equipment Pending CN110728774A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910833113.2A CN110728774A (en) 2019-09-04 2019-09-04 Intelligent lock unlocking method, device and system, storage medium and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910833113.2A CN110728774A (en) 2019-09-04 2019-09-04 Intelligent lock unlocking method, device and system, storage medium and electronic equipment

Publications (1)

Publication Number Publication Date
CN110728774A true CN110728774A (en) 2020-01-24

Family

ID=69217899

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910833113.2A Pending CN110728774A (en) 2019-09-04 2019-09-04 Intelligent lock unlocking method, device and system, storage medium and electronic equipment

Country Status (1)

Country Link
CN (1) CN110728774A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111369716A (en) * 2020-02-28 2020-07-03 歌尔科技有限公司 Unlocking method, door lock and computer readable storage medium
CN111383366A (en) * 2020-02-20 2020-07-07 湖南寓住寓美网络科技有限公司 Security method, device, system and server based on networked intelligent lock
CN114187685A (en) * 2021-12-08 2022-03-15 广东好太太智能家居有限公司 Method, system, equipment and medium for optimizing power consumption of intelligent lock
CN114248662A (en) * 2020-09-11 2022-03-29 蓝谷智慧(北京)能源科技有限公司 Unlocking method and unlocking control device based on RGV (reduced graphics volume) trolley
CN115147974A (en) * 2022-07-04 2022-10-04 广东电网有限责任公司 Unlocking method, device, equipment and medium of cable distribution box
CN115188108A (en) * 2022-07-19 2022-10-14 中国银行股份有限公司 Cashbox control method, cashbox and computer readable storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104778769A (en) * 2015-04-03 2015-07-15 北斗导航位置服务(北京)有限公司 Intelligent lock for monitoring logistics information, monitoring logistics system and method
KR20150123587A (en) * 2014-04-25 2015-11-04 아바드(주) A security system linked a pass
CN105608359A (en) * 2015-10-30 2016-05-25 东莞酷派软件技术有限公司 Unlocking verification method, unlocking verification apparatus and terminal
CN105809392A (en) * 2016-02-29 2016-07-27 陆勃屹 Remotely monitoring method and system for express delivery packages
CN107369234A (en) * 2017-07-24 2017-11-21 深圳市创维群欣安防科技股份有限公司 A kind of method for unlocking and system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20150123587A (en) * 2014-04-25 2015-11-04 아바드(주) A security system linked a pass
CN104778769A (en) * 2015-04-03 2015-07-15 北斗导航位置服务(北京)有限公司 Intelligent lock for monitoring logistics information, monitoring logistics system and method
CN105608359A (en) * 2015-10-30 2016-05-25 东莞酷派软件技术有限公司 Unlocking verification method, unlocking verification apparatus and terminal
CN105809392A (en) * 2016-02-29 2016-07-27 陆勃屹 Remotely monitoring method and system for express delivery packages
CN107369234A (en) * 2017-07-24 2017-11-21 深圳市创维群欣安防科技股份有限公司 A kind of method for unlocking and system

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111383366A (en) * 2020-02-20 2020-07-07 湖南寓住寓美网络科技有限公司 Security method, device, system and server based on networked intelligent lock
CN111369716A (en) * 2020-02-28 2020-07-03 歌尔科技有限公司 Unlocking method, door lock and computer readable storage medium
CN111369716B (en) * 2020-02-28 2022-01-11 歌尔科技有限公司 Unlocking method, door lock and computer readable storage medium
CN114248662A (en) * 2020-09-11 2022-03-29 蓝谷智慧(北京)能源科技有限公司 Unlocking method and unlocking control device based on RGV (reduced graphics volume) trolley
CN114187685A (en) * 2021-12-08 2022-03-15 广东好太太智能家居有限公司 Method, system, equipment and medium for optimizing power consumption of intelligent lock
CN115147974A (en) * 2022-07-04 2022-10-04 广东电网有限责任公司 Unlocking method, device, equipment and medium of cable distribution box
CN115147974B (en) * 2022-07-04 2023-08-11 广东电网有限责任公司 Unlocking method, device, equipment and medium of cable tapping box
CN115188108A (en) * 2022-07-19 2022-10-14 中国银行股份有限公司 Cashbox control method, cashbox and computer readable storage medium

Similar Documents

Publication Publication Date Title
CN110728774A (en) Intelligent lock unlocking method, device and system, storage medium and electronic equipment
US11269981B2 (en) Information displaying method for terminal device and terminal device
CN107743086B (en) Message processing method and system, and message sending and receiving device
WO2017084288A1 (en) Method and device for verifying identity
CN106778175B (en) Interface locking method and device and terminal equipment
WO2017185711A1 (en) Method, apparatus and system for controlling smart device, and storage medium
CN107071775B (en) Mobile terminal and method and device for redirecting access to base station
CN108551521B (en) Login information prompting method and mobile terminal
CN107040540B (en) Cloud privacy data display method and device, server and mobile terminal
CN108881103B (en) Network access method and device
EP3699789A1 (en) Method and device for security verification and mobile terminal
CN206522020U (en) A kind of intelligent door lock and system
CN108156537B (en) Remote operation method of mobile terminal and mobile terminal
CN106255102B (en) Terminal equipment identification method and related equipment
CN108475304A (en) A kind of method, apparatus and mobile terminal of affiliate application and biological characteristic
CN108022349A (en) Information input method, equipment, smart lock and storage medium
CN108491713B (en) Safety reminding method and electronic equipment
CN110855833A (en) Terminal retrieving method and device, terminal and storage medium
CN107580132B (en) Information sending method, information sending device, storage medium and electronic equipment
CN107908939A (en) Terminal alarms method, apparatus and mobile terminal
CN108446574A (en) data query method, terminal and computer readable storage medium
CN108012270A (en) A kind of method of information processing, equipment and computer-readable recording medium
CN107577933B (en) Application login method and device, computer equipment and computer readable storage medium
CN106874795B (en) Mobile terminal and machine disassembly prevention method and device thereof
CN106791171B (en) Card locking method and device of mobile terminal and mobile terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20200124

RJ01 Rejection of invention patent application after publication