CN111147452A - Door lock instruction response method and device, door lock and storage medium - Google Patents

Door lock instruction response method and device, door lock and storage medium Download PDF

Info

Publication number
CN111147452A
CN111147452A CN201911257700.8A CN201911257700A CN111147452A CN 111147452 A CN111147452 A CN 111147452A CN 201911257700 A CN201911257700 A CN 201911257700A CN 111147452 A CN111147452 A CN 111147452A
Authority
CN
China
Prior art keywords
door lock
instruction data
data
lock instruction
response time
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201911257700.8A
Other languages
Chinese (zh)
Other versions
CN111147452B (en
Inventor
李绍斌
李昱
唐杰
陈道远
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Gree Electric Appliances Inc of Zhuhai
Zhuhai Lianyun Technology Co Ltd
Original Assignee
Gree Electric Appliances Inc of Zhuhai
Zhuhai Lianyun Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Gree Electric Appliances Inc of Zhuhai, Zhuhai Lianyun Technology Co Ltd filed Critical Gree Electric Appliances Inc of Zhuhai
Priority to CN201911257700.8A priority Critical patent/CN111147452B/en
Publication of CN111147452A publication Critical patent/CN111147452A/en
Application granted granted Critical
Publication of CN111147452B publication Critical patent/CN111147452B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks

Abstract

The invention discloses a door lock instruction response method and device, a door lock and a storage medium, which are used for improving the security of intelligent door lock remote communication in the prior art. The method comprises the following steps: receiving a first data packet; analyzing the first data packet to obtain first door lock instruction data and a first timestamp corresponding to the first door lock instruction data; judging the security level corresponding to the first door lock instruction data, and determining the set response time corresponding to the first door lock instruction data according to the security level, wherein the set response time is used for representing the response time of the door lock to the first door lock instruction data determined in real time; and if the first timestamp is determined to be larger than the set response time, responding to the first door lock instruction data.

Description

Door lock instruction response method and device, door lock and storage medium
Technical Field
The present invention relates to the field of communications technologies, and in particular, to a method and an apparatus for responding to a door lock instruction, a door lock, and a storage medium.
Background
At present, with the continuous development of science and technology, the intelligent door lock gradually enters the visual field of people, and the visible intelligent door lock on the market is basically equipped with the remote communication function, and convenience of customers is to the management of the authority of entering the door, for example, when having a guest visit, can directly start to unblank, and need not wait for the user to go home and open the door etc..
However, in the actual communication process, a data packet sent in the user telecommunication is likely to be intercepted by the third-party server, and the data packet is used for performing corresponding instruction control, so that the security of the intelligent door lock is low. Therefore, the technical problem of low safety during remote communication of the intelligent door lock exists in the prior art.
Disclosure of Invention
The invention discloses a door lock instruction response method and device, a door lock and a storage medium, which are used for improving the security of intelligent door lock remote communication in the prior art.
In a first aspect, a method for responding to a door lock instruction is provided, which is applied to a door lock, and the method includes:
receiving a first data packet;
analyzing the first data packet to obtain first door lock instruction data and a first timestamp corresponding to the first door lock instruction data;
judging the security level corresponding to the first door lock instruction data, and determining the set response time corresponding to the first door lock instruction data according to the security level, wherein the set response time is used for representing the response time of the door lock to the first door lock instruction data determined in real time;
and if the first timestamp is determined to be larger than the set response time, responding to the first door lock instruction data.
In a possible embodiment, determining the set response time corresponding to the first door lock instruction data according to the security level includes:
determining basic response time corresponding to the first door lock instruction data according to the safety level;
obtaining a second timestamp in response to the first door lock instruction data prior to receiving the first data packet;
and determining the set response time corresponding to the first door lock instruction data according to the basic response time and the second timestamp.
In one possible embodiment, the first timestamp is used to characterize the time at which the first door lock instruction data is determined.
In a possible implementation manner, parsing the first data packet to obtain first door lock instruction data and a first timestamp corresponding to the first door lock instruction data includes:
analyzing the first data packet to obtain first instruction data and a plurality of dispersed time information which are inserted among the first door lock instruction data;
and combining the plurality of data according to a preset rule to obtain a first time stamp corresponding to the first door lock instruction data.
In a possible implementation manner, the unlocking record is any one of inquiry data, password setting or access control card use authority data, unlocking data, password modification data, administrator modification data, door lock reset data and unlocking data.
In a second aspect, there is provided a door lock command response device, applied to a door lock, the device comprising:
a receiving unit, configured to receive a first data packet;
the first processing unit is used for analyzing the first data packet to obtain first door lock instruction data and a first timestamp corresponding to the first door lock instruction data;
the second processing unit is used for judging the security level corresponding to the first door lock instruction data and determining the set response time corresponding to the first door lock instruction data according to the security level, wherein the set response time is used for representing the response time of the door lock for determining the first door lock instruction data in real time;
and the response unit is used for responding to the first door lock instruction data if the first timestamp is determined to be larger than the set response time.
In a possible implementation manner, the second processing unit is specifically configured to:
determining basic response time corresponding to the first door lock instruction data according to the safety level;
obtaining a second timestamp in response to the first door lock instruction data prior to receiving the first data packet;
and determining the set response time corresponding to the first door lock instruction data according to the basic response time and the second timestamp.
In one possible embodiment, the first timestamp is used to characterize the time at which the first door lock instruction data is determined.
In a possible implementation, the first processing unit is configured to:
analyzing the first data packet to obtain first instruction data and a plurality of dispersed time information which are inserted among the first door lock instruction data;
and combining the plurality of data according to a preset rule to obtain a first time stamp corresponding to the first door lock instruction data.
In a possible implementation manner, the unlocking record is any one of inquiry data, password setting or access control card use authority data, unlocking data, password modification data, administrator modification data, door lock reset data and unlocking data.
In a third aspect, there is provided a door lock, comprising:
a memory for storing program instructions;
a processor for calling the program instructions stored in the memory and executing the steps included in any of the methods of the first aspect according to the obtained program instructions.
In a fourth aspect, there is provided a storage medium having stored thereon computer-executable instructions for causing a computer to perform the steps included in any one of the methods of the first aspect.
In a fifth aspect, a computer program product is provided, which, when run on a computer device, enables the computer device to perform the steps comprised in any of the methods of the first aspect.
The technical scheme provided by the embodiment of the invention at least has the following beneficial effects:
in the embodiment of the present invention, a first data packet may be received, and then the first data packet may be analyzed to obtain first door lock instruction data and a first timestamp corresponding to the first door lock instruction data, and a security level corresponding to the first door lock instruction data may also be determined, and a set response time corresponding to the first door lock instruction data is determined according to the security level, where the set response time is used to represent a response time of a corresponding adjustment of a door lock on the first door lock instruction data, and when it is determined that the first timestamp is greater than the set response time, the first door lock instruction data may be responded.
In the embodiment of the present invention, it may be determined whether a third party sends an intercepted data packet or a data packet sent by a server corresponding to a door lock according to a relation between a timestamp of certain door lock instruction data (for example, the first door lock instruction data) in the data packet and a set response time corresponding to the certain door lock instruction data, so that when the data packet sent by the server corresponding to the door lock is determined, the data packet can be responded to the door lock instruction, and when the data packet sent by the third party is determined, the data packet is not responded, so that security of remote communication between the door lock and the server is improved.
Additional features and advantages of the invention will be set forth in the description which follows, and in part will be obvious from the description, or may be learned by the practice of the invention. The objectives and other advantages of the invention will be realized and attained by the structure particularly pointed out in the written description and claims hereof as well as the appended drawings.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the invention, as claimed.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention.
FIG. 1 is a schematic view of an application scenario of a door lock according to an embodiment of the present invention;
FIG. 2 is a flow chart of a method of door lock command response in an embodiment of the present invention;
fig. 3 is a block diagram showing a structure of a door lock command response device according to an embodiment of the present invention;
fig. 4 is a schematic structural diagram of a door lock according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention. The embodiments and features of the embodiments of the present invention may be arbitrarily combined with each other without conflict. Also, while a logical order is shown in the flow diagrams, in some cases, the steps shown or described may be performed in an order different than here.
The terms "first" and "second" in the description and claims of the present invention and the above-described drawings are used for distinguishing between different objects and not for describing a particular order. Furthermore, the term "comprises" and any variations thereof, which are intended to cover non-exclusive protection. For example, a process, method, system, article, or apparatus that comprises a list of steps or elements is not limited to only those steps or elements listed, but may alternatively include other steps or elements not listed, or inherent to such process, method, article, or apparatus.
As described above, in the prior art, during the remote communication through the door lock, there may be a problem that the data packet is intercepted by a third party and the command response is performed using the data packet. That is to say, there is the lower technical problem of lock telecommunication security among the prior art.
In view of this, the present invention provides a method for responding to a door lock instruction, which can determine whether to respond to instruction data by determining a timestamp corresponding to the door lock instruction data in a received data packet and a response time corresponding to the door lock instruction data. In this way, the response to the instruction data sent by the third party can be avoided, and the safety of remote communication of the door lock can be improved.
After the design concept of the embodiment of the present invention is introduced, some simple descriptions are made below to application scenarios to which the technical solution of the door lock command response in the embodiment of the present invention is applicable, and it should be noted that the application scenarios described below are only used for illustrating the embodiment of the present invention and are not limited. In specific implementation, the technical scheme provided by the embodiment of the invention can be flexibly applied according to actual needs.
Referring to fig. 1, in a specific implementation process, a data packet received by a door lock may come from a server corresponding to the door lock, or may come from an interception server, which is only shown in fig. 1.
If the door lock directly responds according to the received data packet as described above, it may respond to the data packet sent by the interception server, that is, the security of the remote communication between the door lock and the server is low, thereby causing financial loss of the user and reducing the user experience.
In this embodiment of the application, the door lock may analyze the received data packet sent by the server, so as to determine the door lock instruction data that is the data of the function of the door lock executing the response and the timestamp corresponding to the door lock instruction data, and further determine whether to respond to the door lock instruction data. By the mode, the safety of remote communication between the door lock and the corresponding server can be improved, and the use experience of a user can be improved.
The door lock instruction method provided by the embodiment of the invention can be executed by a door lock or an intelligent door lock with a remote communication function, the door lock can automatically adjust the response time of different types of door lock instruction data, and compares the timestamp of certain door lock instruction data obtained from a data packet with the door lock instruction data, so as to respond or not respond to the current door lock instruction data, thereby improving the safety of remote communication of the door lock.
The technical scheme provided by the embodiment of the invention is described in the following with the accompanying drawings of the specification.
Referring to fig. 2, an embodiment of the present invention provides a method for responding to a door lock instruction, which may be implemented by the aforementioned door lock or smart door lock. The specific flow of the method is described below.
In the embodiment of the present invention, when the door lock uses the function related to the remote communication for the first time, the data packet including the instruction data corresponding to the function may be received and analyzed to obtain the first time timestamp, that is, the time information determined by the server that the generation of the instruction data in the data packet is completed may be obtained, and the instruction data corresponding to the function may be directly responded.
In a specific embodiment, when the function related to the remote communication is used, there may be a case where a data packet is intercepted by a third party, and the door lock may further use the data packet to perform a judgment on a corresponding instruction, thereby reducing the security of the remote communication of the door lock. The following description of the method of the present invention is made in terms of a command response process at any time after the second use of the door lock.
Step 201: a first data packet is received.
Step 202: and analyzing the first data packet to obtain first door lock instruction data and a first timestamp corresponding to the first door lock instruction data.
In this embodiment of the present invention, the door lock may receive the first data packet, specifically, the first data packet may be a data packet that is intercepted and retransmitted by a third party before, or may be a data packet that is transmitted by a server corresponding to the door lock.
In a specific implementation process, when the door lock receives the first data packet, the first data packet may be analyzed, so that a command frame (i.e., first door lock instruction data) in the data packet may be determined, and further, a door lock instruction corresponding to the first data packet may be determined by identifying the command frame. Further, a timestamp corresponding to the first instruction data may be determined, that is, time information when the generation of the instruction data in the data packet is completed, which is determined by the server, may be obtained.
In the embodiment of the present invention, the door lock may analyze the first data packet to obtain the first instruction data and the plurality of time information interspersed among the first door lock instruction data, and then combine the plurality of time information according to the preset rule, so as to obtain the first timestamp corresponding to the first door lock instruction data. That is, in the embodiment of the present invention, the server corresponding to the gate lock may divide the timestamp into a plurality of pieces of time information according to a preset rule, and then dispersedly insert the plurality of pieces of time information between the instruction data.
In a specific implementation process, a rule for placing timestamps, that is, the aforementioned preset rule, may be agreed in advance in a communication protocol between the door lock and the server, and the preset rule is known only by the door lock and the server. Specifically, the rule may be that the current time is converted into sixteen-byte data, then the server may split the sixteen-byte data into four-byte data, the data are dispersedly stored in the first, third, fifth, and seventh bytes of the communication data packet, and then when the door lock receives the data packet, the data packet may be analyzed according to the communication protocol, so that it may be known from which bytes the current timestamp needs to be read, and then the timestamp information may be determined. In such a way, the door lock and the corresponding server can determine the timestamp corresponding to the instruction data according to the preset rule agreed by both parties, so that the timestamp is prevented from being modified after a third party acquires the data packet, and the safety of remote communication can be improved.
In the embodiment of the present invention, the current time when the server completes generating the corresponding instruction data may be used as the timestamp of the instruction data, that is, the time information corresponding to the completion of generating the instruction data in the data packet determined by the server. That is, in the embodiment of the present invention, even if the instruction data (for example, the unlocking instruction) of the same type is used, the corresponding determined time stamps are completely different.
Step 203: and judging the safety level corresponding to the first door lock instruction data, and determining the set response time corresponding to the first door lock instruction data according to the safety level, wherein the set response time is used for representing the response time of the door lock for adjusting the first door lock instruction data in real time.
In the embodiment of the invention, the security level corresponding to the first door lock instruction data can be determined, and then the basic response time corresponding to the first door lock instruction data can be determined according to the security level.
In a specific implementation process, the first door lock instruction data may be any one of unlocking record query data, password setting or access card permission data, unlocking data, password modification data, administrator modification data, door lock reset data and unlocking data.
In the embodiment of the invention, the unlocking record inquiry data, the unlocking data, the setting password data or the service life data of the access control card can be determined as a second security level; the modification password data, the modification administrator data, and the door lock reset data may be determined to be a first security level. Further, the basic response time of the first security level and the second security level may also be determined, for example, the basic response time of the first security level may be set to 3 minutes and the basic response time of the second security level may be set to 1 minute. It should be noted that, in the present invention, the response times of the basic levels of the first security level and the second security level are different, and in the present invention, the example that the response time of the basic level of the first security level is longer than the response time of the basic level of the second security level is taken as an example for description.
In the embodiment of the present invention, a second timestamp of a response to the first door lock instruction data before receiving the first data packet may be further obtained, and then the set response time corresponding to the first door lock instruction data is determined according to the basic response time and the second timestamp. For example, if the base response time is 1 minute and the second timestamp is 3 points, it may be determined that the set response time is 3 points 01 minutes. That is to say, the second timestamp determined in the embodiment of the present invention may be understood as a timestamp corresponding to a previous successful response to the same instruction data, and in this way, the determined set response time may be changed in real time, that is, the door lock and the server are required to be correspondingly determined, so that the security of remote communication may be further improved.
Step 204: and judging whether the first timestamp is greater than the set response time, if so, executing the step 205, and if not, executing the step 206.
Step 205: and responding to the first door lock instruction data if the first timestamp is determined to be larger than the set response time.
Step 206: no response is made to the first door lock instruction data.
In the embodiment of the present invention, the first timestamp parsed for the first data packet may be compared with the set response time, and when it is determined that the first timestamp is greater than the set response time, the first door lock instruction data is responded.
In the embodiment of the present invention, when the data packet received by the door lock is the first data packet sent by the third-party server, for example, the interception server shown in fig. 1, because the first timestamp obtained by the third-party server is sent last by the server corresponding to the door lock, the first timestamp is less than the set response time, and then the first door lock instruction data is not responded to. When the first data packet is sent by the server, the first timestamp data is determined by the server at this time, and the first timestamp data can be determined to be greater than the set response time, so that the first door lock instruction data is responded. Namely, the safety of remote communication of the door lock can be improved in the mode.
Based on the same inventive concept, the embodiment of the invention provides a device for responding to a door lock instruction, and the device for responding to the door lock instruction can realize the corresponding function of the method for responding to the door lock instruction. The device for responding to the door lock instruction can be a hardware structure, a software module or a hardware structure and a software module. The device for responding the door lock instruction can be realized by a chip system, and the chip system can be formed by a chip and can also comprise the chip and other discrete devices. Referring to fig. 3, the apparatus for responding to a door lock command includes a receiving unit 301, a first processing unit 302, a second processing unit 303, and a responding unit 304. Wherein:
a receiving unit 301, configured to receive a first data packet;
the first processing unit 302 is configured to parse the first data packet to obtain first door lock instruction data and a first timestamp corresponding to the first door lock instruction data;
the second processing unit 303 is configured to determine a security level corresponding to the first door lock instruction data, and determine a set response time corresponding to the first door lock instruction data according to the security level, where the set response time is used to represent a response time determined by the door lock in real time for the first door lock instruction data;
a response unit 304, configured to respond to the first door lock instruction data if it is determined that the first timestamp is greater than the set response time.
In a possible implementation manner, the second processing unit 302 is specifically configured to:
determining basic response time corresponding to the first door lock instruction data according to the safety level;
obtaining a second timestamp in response to the first door lock instruction data prior to receiving the first data packet;
and determining the set response time corresponding to the first door lock instruction data according to the basic response time and the second timestamp.
In one possible embodiment, the first timestamp is used to characterize the time at which the first door lock instruction data is determined.
In a possible implementation, the first processing unit 301 is configured to:
analyzing the first data packet to obtain first instruction data and a plurality of dispersed time information which are inserted among the first door lock instruction data;
and combining the plurality of data according to a preset rule to obtain a first time stamp corresponding to the first door lock instruction data.
In a possible implementation manner, the unlocking record is any one of inquiry data, password setting or access control card use authority data, unlocking data, password modification data, administrator modification data, door lock reset data and unlocking data.
All relevant contents of each step related to the embodiment of the door lock instruction response method may be referred to the functional description of the functional module corresponding to the door lock instruction response device in the embodiment of the present invention, and are not described herein again.
The division of the modules in the embodiments of the present invention is schematic, and only one logical function division is provided, and in actual implementation, there may be another division manner, and in addition, each functional module in each embodiment of the present invention may be integrated in one processor, or may exist alone physically, or two or more modules are integrated in one module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode.
Based on the same inventive concept, an embodiment of the present invention provides a door lock, please refer to fig. 4, where the door lock includes at least one processor 401 and a memory 402 connected to the at least one processor, a specific connection medium between the processor 401 and the memory 402 is not limited in the embodiment of the present invention, fig. 4 illustrates an example where the processor 401 and the memory 402 are connected through a bus 400, the bus 400 is indicated by a thick line in fig. 4, and a connection manner between other components is only schematically illustrated and is not limited. The bus 400 may be divided into an address bus, a data bus, a control bus, etc., and is shown with only one thick line in fig. 4 for ease of illustration, but does not represent only one bus or type of bus.
In the embodiment of the present invention, the memory 402 stores instructions executable by the at least one processor 401, and the at least one processor 401 may execute the steps included in the method for responding to the door lock instruction by executing the instructions stored in the memory 402.
The processor 401 is a control center of the door lock, and may connect various portions of the entire door lock by using various interfaces and lines, and perform various functions and process data of the door lock by operating or executing instructions stored in the memory 402 and calling data stored in the memory 402, thereby performing overall monitoring of the door lock.
Optionally, the processor 401 may include one or more processing units, and the processor 401 may integrate an application processor and a modem processor, wherein the application processor mainly handles an operating system, a user interface, an application program, and the like, and the modem processor mainly handles wireless communication. It will be appreciated that the modem processor described above may not be integrated into the processor 401. In some embodiments, processor 401 and memory 402 may be implemented on the same chip, or in some embodiments, they may be implemented separately on separate chips.
The processor 401 may be a general-purpose processor, such as a Central Processing Unit (CPU), digital signal processor, application specific integrated circuit, field programmable gate array or other programmable logic device, discrete gate or transistor logic, discrete hardware components, or the like, that may implement or perform the methods, steps, and logic blocks disclosed in embodiments of the present invention. A general purpose processor may be a microprocessor or any conventional processor or the like. The steps of a method disclosed in connection with the embodiments of the present invention may be directly implemented by a hardware processor, or may be implemented by a combination of hardware and software modules in the processor.
Memory 402, which is a non-volatile computer-readable storage medium, may be used to store non-volatile software programs, non-volatile computer-executable programs, and modules. The Memory 402 may include at least one type of storage medium, and may include, for example, a flash Memory, a hard disk, a multimedia card, a card-type Memory, a Random Access Memory (RAM), a Static Random Access Memory (SRAM), a Programmable Read Only Memory (PROM), a Read Only Memory (ROM), a charge Erasable Programmable Read Only Memory (EEPROM), a magnetic Memory, a magnetic disk, an optical disk, and so on. The memory 402 is any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer, but is not limited to such. The memory 402 of embodiments of the present invention may also be circuitry or any other device capable of performing a storage function to store program instructions and/or data.
By programming the processor 401, the code corresponding to the method for responding to the door lock instruction described in the foregoing embodiment may be solidified into the chip, so that the chip can execute the steps of the method for responding to the door lock instruction when running.
Based on the same inventive concept, embodiments of the present invention further provide a storage medium storing computer instructions, which, when executed on a computer, cause the computer to perform the steps of the method for responding to a door lock instruction as described above.
In some possible embodiments, the various aspects of the method for responding to a door lock instruction provided by the present invention can also be implemented in the form of a program product, which includes program code for causing a device for responding to a door lock instruction to execute the steps of the method for responding to a door lock instruction according to various exemplary embodiments of the present invention described above in this specification when the program product is run on the device for responding to a door lock instruction.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, optical storage, and the like) having computer-usable program code embodied therein.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present invention without departing from the spirit and scope of the invention. Thus, if such modifications and variations of the present invention fall within the scope of the claims of the present invention and their equivalents, the present invention is also intended to include such modifications and variations.

Claims (10)

1. A method of responding to door lock instructions, applied to a door lock, the method comprising:
receiving a first data packet;
analyzing the first data packet to obtain first door lock instruction data and a first timestamp corresponding to the first door lock instruction data;
judging the security level corresponding to the first door lock instruction data, and determining the set response time corresponding to the first door lock instruction data according to the security level, wherein the set response time is used for representing the response time of the door lock to the first door lock instruction data determined in real time;
and if the first timestamp is determined to be larger than the set response time, responding to the first door lock instruction data.
2. The method of claim 1, wherein determining a setup response time corresponding to the first door lock instruction data based on the security level comprises:
determining basic response time corresponding to the first door lock instruction data according to the safety level;
obtaining a second timestamp in response to the first door lock instruction data prior to receiving the first data packet;
and determining the set response time corresponding to the first door lock instruction data according to the basic response time and the second timestamp.
3. The method of claim 1, wherein the first timestamp is used to characterize a time at which the first door lock instruction data is determined.
4. The method of claim 1, wherein parsing the first packet to obtain first door lock instruction data and a first timestamp corresponding to the first door lock instruction data comprises:
analyzing the first data packet to obtain first instruction data and a plurality of dispersed time information which are inserted among the first door lock instruction data;
and combining the plurality of data according to a preset rule to obtain a first time stamp corresponding to the first door lock instruction data.
5. The method of claim 1, wherein the unlocking record comprises any one of inquiry data, password setting or access card use authority data, unlocking data, password modification data, administrator modification data, door lock reset data and unlocking data.
6. A door lock command response device, for use with a door lock, said device comprising:
a receiving unit, configured to receive a first data packet;
the first processing unit is used for analyzing the first data packet to obtain first door lock instruction data and a first timestamp corresponding to the first door lock instruction data;
the second processing unit is used for judging the security level corresponding to the first door lock instruction data and determining the set response time corresponding to the first door lock instruction data according to the security level, wherein the set response time is used for representing the response time of the door lock for determining the first door lock instruction data in real time;
and the response unit is used for responding to the first door lock instruction data if the first timestamp is determined to be larger than the set response time.
7. The apparatus as claimed in claim 6, wherein said second processing unit is specifically configured to:
determining basic response time corresponding to the first door lock instruction data according to the safety level;
obtaining a second timestamp in response to the first door lock instruction data prior to receiving the first data packet;
and determining the set response time corresponding to the first door lock instruction data according to the basic response time and the second timestamp.
8. The apparatus as recited in claim 6, said first processing unit to:
analyzing the first data packet to obtain first instruction data and a plurality of dispersed time information which are inserted among the first door lock instruction data;
and combining the plurality of data according to a preset rule to obtain a first time stamp corresponding to the first door lock instruction data.
9. A door lock, characterized in that the door lock comprises:
a memory for storing program instructions;
a processor for calling program instructions stored in said memory and for executing the steps comprised in the method of any one of claims 1 to 5 in accordance with the obtained program instructions.
10. A storage medium storing computer-executable instructions for causing a computer to perform the steps comprising the method of any one of claims 1 to 5.
CN201911257700.8A 2019-12-10 2019-12-10 Door lock instruction response method and device, door lock and storage medium Active CN111147452B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911257700.8A CN111147452B (en) 2019-12-10 2019-12-10 Door lock instruction response method and device, door lock and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911257700.8A CN111147452B (en) 2019-12-10 2019-12-10 Door lock instruction response method and device, door lock and storage medium

Publications (2)

Publication Number Publication Date
CN111147452A true CN111147452A (en) 2020-05-12
CN111147452B CN111147452B (en) 2020-12-25

Family

ID=70517836

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911257700.8A Active CN111147452B (en) 2019-12-10 2019-12-10 Door lock instruction response method and device, door lock and storage medium

Country Status (1)

Country Link
CN (1) CN111147452B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050088279A1 (en) * 2001-12-27 2005-04-28 Micro Enhanced Technology, Inc. Vending machines with field-programmable electronic locks
CN106761052A (en) * 2017-02-15 2017-05-31 北京航空航天大学 A kind of automobile door control remote-control key radio frequency Replay Attack system of defense based on timestamp
CN106898065A (en) * 2017-01-21 2017-06-27 云丁网络技术(北京)有限公司 A kind of method for unlocking of intelligent door lock
CN107038777A (en) * 2017-03-29 2017-08-11 云丁网络技术(北京)有限公司 A kind of safety communicating method and its intelligent door lock system based on intelligent door lock system
CN110111450A (en) * 2018-02-01 2019-08-09 杭州海康威视数字技术股份有限公司 The control method and door lock of a kind of pair of door lock
CN110322600A (en) * 2019-06-05 2019-10-11 北京深思数盾科技股份有限公司 The control method and electronic lock of electronic lock

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050088279A1 (en) * 2001-12-27 2005-04-28 Micro Enhanced Technology, Inc. Vending machines with field-programmable electronic locks
CN106898065A (en) * 2017-01-21 2017-06-27 云丁网络技术(北京)有限公司 A kind of method for unlocking of intelligent door lock
CN106761052A (en) * 2017-02-15 2017-05-31 北京航空航天大学 A kind of automobile door control remote-control key radio frequency Replay Attack system of defense based on timestamp
CN107038777A (en) * 2017-03-29 2017-08-11 云丁网络技术(北京)有限公司 A kind of safety communicating method and its intelligent door lock system based on intelligent door lock system
CN110111450A (en) * 2018-02-01 2019-08-09 杭州海康威视数字技术股份有限公司 The control method and door lock of a kind of pair of door lock
CN110322600A (en) * 2019-06-05 2019-10-11 北京深思数盾科技股份有限公司 The control method and electronic lock of electronic lock

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
胡向东等: "智能家居门禁系统的安全控制方法", 《重庆邮电大学学报》 *

Also Published As

Publication number Publication date
CN111147452B (en) 2020-12-25

Similar Documents

Publication Publication Date Title
CN106339222B (en) A kind of service implementing method and device
CN109766253B (en) Performance data sending method and device, computer equipment and storage medium
RU2006114719A (en) METHOD FOR SECURITY MANAGEMENT OF APPLICATIONS USING THE SECURITY MODULE
CN103455349A (en) Method and device for accessing intelligent card by application program
CN109587142B (en) Data security access module and equipment for service flow
CN112651001A (en) Access request authentication method, device, equipment and readable storage medium
CN110597918A (en) Account management method and device and computer readable storage medium
WO2018010480A1 (en) Network locking method for esim card, terminal, and network locking authentication server
CN111177741A (en) Pre-authorization data access method and device based on enterprise browser
CN112468409A (en) Access control method, device, computer equipment and storage medium
CN111464351B (en) Network distribution method and device for intelligent household equipment, terminal equipment and storage medium
CN108833133B (en) Network configuration management method and device based on cloud computing network and storage medium
CN109977039A (en) HD encryption method for storing cipher key, device, equipment and readable storage medium storing program for executing
CN111191252A (en) Encryption and decryption method and device for smart card operating system and storage medium
CN108833500B (en) Service calling method, service providing method, data transmission method and server
CN111147452B (en) Door lock instruction response method and device, door lock and storage medium
CN111786995B (en) Account password management method, management middleware, system, equipment and storage medium
CN111090616B (en) File management method, corresponding device, equipment and storage medium
CN107277263A (en) terminal control method and device
CN108882230B (en) Call record management method, device and system
CN111211902A (en) Digital signature method and device based on enterprise browser
US20080263346A1 (en) Method and device for securely sending bootstrap message in device management
CN114170700A (en) Attendance checking method and device
CN110633057A (en) Method and device for storing setting parameters, computing equipment and storage medium
CN112422281A (en) Method and system for changing secret key in security module

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP03 Change of name, title or address
CP03 Change of name, title or address

Address after: 519015 Room 601, Lianshan Lane, Jida Jingshan Road, Zhuhai City, Guangdong Province

Patentee after: Zhuhai Lianyun Technology Co.,Ltd.

Patentee after: GREE ELECTRIC APPLIANCES Inc. OF ZHUHAI

Address before: 519070 No. 789 Jinji Road West, Zhuhai, Guangdong

Patentee before: GREE ELECTRIC APPLIANCES Inc. OF ZHUHAI

Patentee before: Zhuhai Lianyun Technology Co.,Ltd.