CN111275852A - Lock terminal management method, system, shared object and storage medium - Google Patents

Lock terminal management method, system, shared object and storage medium Download PDF

Info

Publication number
CN111275852A
CN111275852A CN201811472866.7A CN201811472866A CN111275852A CN 111275852 A CN111275852 A CN 111275852A CN 201811472866 A CN201811472866 A CN 201811472866A CN 111275852 A CN111275852 A CN 111275852A
Authority
CN
China
Prior art keywords
key
terminal
lock terminal
information
lock
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811472866.7A
Other languages
Chinese (zh)
Inventor
李舒云
Original Assignee
李舒云
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 李舒云 filed Critical 李舒云
Priority to CN201811472866.7A priority Critical patent/CN111275852A/en
Publication of CN111275852A publication Critical patent/CN111275852A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00817Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00817Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed
    • G07C2009/00825Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed remotely by lines or wireless communication

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Lock And Its Accessories (AREA)

Abstract

According to the lock terminal management method, the system, the shared object and the storage medium, the user terminal reads the graphic identifier corresponding to the lock terminal, so that the service terminal is accessed according to the network link, the second key fragment carrying the restriction information corresponding to the use requirement information can be obtained from the service terminal by inputting the requirement and paying the corresponding fee to be combined with the first key fragment into the key, the key can be communicated with the lock terminal in a near-field Bluetooth communication mode to transmit the key to the lock terminal for verification, and the unlocking of the lock terminal can be controlled on site under the restriction of the restriction information through the Bluetooth connection between the user terminal and the lock terminal after the verification is passed. The scheme of the invention can greatly prolong the working time of the lock terminal, simultaneously save the flow cost for accessing the mobile communication network, realize good user experience and solve the problems in the prior art.

Description

Lock terminal management method, system, shared object and storage medium
Technical Field
The invention relates to the technical field of Internet of things, in particular to a lock terminal management method, a lock terminal management system, a shared object and a storage medium.
Background
The shared rental industry develops fiercely, and corresponding shared objects come out endlessly, such as shared bicycle, shared charger, shared umbrella, and even shared house.
The sharing leasing principle is simply explained, namely, shared objects are modified through intelligent communication equipment so as to be controlled by instructions, and the electronic control lock locks the shared objects, so that the electronic control lock is unlocked according to external instructions under the condition that unlocking conditions such as user payment are achieved, and the shared objects can be used by users.
However, in the above scheme, the intelligent communication devices are all powered by batteries, and because the intelligent communication devices are generally mobile communication networks accessed to mobile operators such as telecom, Unicom, Mobile, etc., and need to continuously search for external signals, the power consumption of the batteries is very large, and the charging is needed in a short time, which is very troublesome; meanwhile, since the mobile communication networks such as telecom, Unicom, Mobile, etc. need to be accessed, identity cards (such as Sim cards, UIM cards, etc.) need to be provided, and network fees need to be paid to the mobile operators, so as to share a single vehicle, for example, the number of the shared vehicle is huge, and correspondingly, the network fees to be paid are also huge, thereby greatly increasing the operation cost of the sharing leasers.
Disclosure of Invention
In view of the above drawbacks of the prior art, the present invention provides a lock terminal management method, system, shared object and storage medium, which improves the structure of an intelligent lock on a shared object and the control manner of locking/unlocking the intelligent lock, implements a shared rental scheme based on an innovative "mobile internet of things", and solves the problems of the prior art.
In order to achieve the above objects and other related objects, the present invention provides a method for controlling a lock terminal, which is applied to a user terminal having bluetooth communication capability; the method comprises the following steps: extracting the network link and the first key fragment contained in the acquired graphic identifier from the acquired graphic identifier, and accessing an interactive page correspondingly provided by the service terminal according to the network link; receiving input using requirement information of a lock terminal at the interactive page, and calling a payment tool for paying the cost corresponding to the using requirement information; receiving a second key fragment provided under the condition that the fee is paid and provided with the restriction information corresponding to the demand information from the service terminal, and synthesizing the first key fragment and the second key fragment into a key with the restriction information; and connecting the lock terminal through Bluetooth, and sending the secret key to the lock terminal for verification so as to unlock the lock terminal under the condition of conforming to the limit information when the verification is legal.
In an embodiment of the present invention, the lock terminal control method includes: receiving a timing request sent by the lock terminal through the Bluetooth connection; forwarding the timing request to the outside to acquire reference clock information; and sending the reference clock information to the lock terminal for timing.
In an embodiment of the present invention, the restriction information includes: and time limit information and/or authority information for unlocking the lock terminal.
In an embodiment of the present invention, the key is divided into: a general key type that can be forwarded, and a temporary key type that cannot be forwarded.
In order to achieve the above and other related objects, the present invention provides a lock terminal communication method, which is applied to a lock terminal with bluetooth communication capability, where the lock terminal stores at least one second key, and the second key has a matched first key; the method comprises the following steps: when Bluetooth connection is established with external equipment and a key to be verified is received, verifying whether the key to be verified contains the first key; and judging that the verification is legal under the condition that the key to be verified contains the first key, and allowing the external equipment to control the unlocking of the lock terminal under the condition that the external equipment conforms to the limitation information contained in the key to be verified.
In an embodiment of the present invention, the lock terminal communication method includes: sending a timing request to the external device through the Bluetooth connection; receiving reference clock information acquired from a service terminal by the external equipment according to the timing request; and calibrating the clock of the lock terminal according to the reference clock information.
In an embodiment of the present invention, the restriction information includes: and time limit information and/or authority information for unlocking the lock terminal.
In an embodiment of the present invention, the restriction information includes: time limit information for unlocking the lock terminal; the method comprises the following steps: and if the limiting information comprises time limit information, timing by a calibrated clock to judge whether the time limit information is exceeded.
In an embodiment of the present invention, the lock terminal communication method includes: and after the unlocking action of the lock terminal is completed every time, the Bluetooth connection with the external equipment is disconnected.
In order to achieve the above and other related objects, the present invention provides a key providing method, which is applied to a service terminal, where the service terminal stores at least one second key fragment, and the second key fragment is associated with a lock terminal; the method comprises the following steps: providing a corresponding interactive page when an access request of external equipment is received; receiving the use requirement information of the lock terminal input in the interactive page, calculating the cost corresponding to the use requirement information and informing the external equipment to be paid; providing a second key fragment carrying restriction information to the external device when acquiring the information that the fee has been paid, wherein the restriction information corresponds to the use requirement information; the second key fragment is used for being synthesized with the first key fragment into a key with the limitation information, so that the key can be used for verification at a lock terminal, and the lock terminal can be unlocked under the condition that the key accords with the limitation information when the verification is legal.
In an embodiment of the present invention, the key providing method includes: when receiving a timing instruction from the lock terminal from an external device connected with the lock terminal through Bluetooth, sending reference clock information to the lock terminal through the external device for timing.
In an embodiment of the present invention, the second key fragment carrying the restriction information is made by the service terminal, or is obtained by the service terminal from the outside.
To achieve the above and other related objects, the present invention provides a user terminal, including: a communicator for communicating with a service terminal; the Bluetooth module is used for communicating with the lock terminal; a memory for storing a computer program; and the processor is connected with the communicator, the Bluetooth module and the memory and is used for running the computer program to execute any lock terminal control method.
To achieve the above and other related objects, the present invention provides a lock terminal including: a Bluetooth module; a memory for storing a computer program; and the processor is connected with the Bluetooth module and the memory and is used for running the computer program to execute any one of the lock terminal communication methods.
In order to achieve the above and other related objects, the present invention provides a shard, which is provided with the lock terminal, and a graphic identifier is provided on a surface or a peripheral area of the shard, wherein the graphic identifier includes a network link associated with the lock terminal.
To achieve the above and other related objects, the present invention provides a service terminal, including: a communicator for communicating with an external device; a memory for storing a computer program; a processor, connected to the communicator and the memory, for executing the computer program to perform any one of the key providing methods.
In order to achieve the above and other related objects, the present invention provides a computer storage medium storing a first computer program for executing any one of the lock terminal control methods when running; or a second computer program is stored, and when running, the lock terminal communication method is executed according to any item; alternatively, a third computer program is stored, which when executed performs any of the key providing methods described above.
As described above, according to the lock terminal management method, system, shared object, and storage medium of the present invention, the user terminal reads the graphic identifier corresponding to the lock terminal, thereby accessing the service terminal according to the network link therein, and can obtain the second key fragment carrying the restriction information corresponding to the information of the usage requirement from the service terminal by inputting the requirement and paying the corresponding fee to combine with the first key fragment into the key, and can communicate with the lock terminal by using the near field bluetooth communication method to transmit the key to the lock terminal for verification, and after the verification is passed, the unlocking of the lock terminal can be controlled on site under the restriction of the restriction information through the bluetooth connection between the user terminal and the lock terminal.
The scheme of the invention has the advantages that:
1) and (3) prolonging the working time: because the current Bluetooth 4.0 communication protocol enables the Bluetooth module to be in a dormant state outside the communication, the locking and unlocking of the lock terminal can realize the operation of extremely low power consumption of the lock terminal by utilizing the Bluetooth communication scheme, thereby greatly prolonging the working time without charging;
2) the operation cost is reduced: the lock terminal does not need to be provided with a wireless network communication module and needs to be accessed to the wireless network as in the prior art, acquires the secret key and verifies the legality of the user terminal through the near-field Bluetooth communication, and can be controlled by the legal user terminal to lock/unlock, so that the power consumption is reduced, the network cost needing to be paid when the mobile communication network is accessed is saved, and the operation cost is greatly reduced;
3) the user experience is good: the shared leasing scheme realized by the invention can be used for scanning by a user through graphic identifiers (such as two-dimensional codes and bar codes) and the like arranged on the surface or the periphery of a shared object to log in a corresponding network page to obtain key fragments, then a key is synthesized and is unlocked accordingly, the key is added with limited information to meet different leasing requirements, compared with the existing shared leasing scheme, the whole scheme has little difference in user experience, the operation is very convenient, and the shared leasing scheme with good user experience is realized.
Drawings
Fig. 1 is a schematic structural diagram of a shared rental system according to an embodiment of the invention.
Fig. 2 is a flowchart illustrating a method for managing a lock terminal applied to the shared rental system shown in fig. 1.
FIG. 3 is a schematic diagram of a shared rental system according to another embodiment of the invention.
Fig. 4 is a flowchart illustrating a method for managing a lock terminal applied to the shared rental system shown in fig. 3.
Fig. 5 is a schematic diagram illustrating the logical relationship and verification between keys in the lock terminal according to an embodiment of the present invention.
Fig. 6 is a schematic structural diagram of a user terminal according to an embodiment of the present invention.
Fig. 7 is a schematic structural diagram of a lock terminal according to an embodiment of the present invention.
Fig. 8 is a schematic structural diagram of a service terminal in an embodiment of the present invention.
Detailed Description
The embodiments of the present invention are described below with reference to specific embodiments, and other advantages and effects of the present invention will be easily understood by those skilled in the art from the disclosure of the present specification. The invention is capable of other and different embodiments and of being practiced or of being carried out in various ways, and its several details are capable of modification in various respects, all without departing from the spirit and scope of the present invention. It should be noted that the embodiments and features of the embodiments in the present application may be combined with each other without conflict.
The sharing economy realizes that the objects can be shared by the public, such as a bicycle, a car, a charging treasure, a logistics cabinet and even a house, and the daily life of the public is facilitated. In the existing scheme, after a user pays the cost of using the corresponding shared object by accessing the cloud end, the cloud end unlocks the intelligent lock on the shared object, the user can use the shared object, and a renter of the shared object charges according to the user time limit information.
However, existing shared rental schemes have a number of drawbacks. Various defects in existing shared rental schemes are analyzed, at the root, in that the requirements for intelligent locks are given too many tasks, a large part of which are useless but resource-consuming. For example, the smart lock continuously accesses the network to wait for the signal from the cloud, and actually only needs to acquire the signal within a short time of opening/closing the lock, and most of the waiting time consumes the battery power of the smart lock and the communication time in the mobile communication network; meanwhile, the cost of the resources used in the sharing scheme is high, for example, the sharing bicycle needs to be recovered before charging, and the communication uses a charging network of a communication operator, and the cost needs to be borne by the shared leasing operator completely.
The scheme of the invention is generated based on the idea of eliminating the various pain points, for example, how to make resources be consumed only in necessary time so as to prolong the time limit information; in addition, how to avoid expensive resources and use cheap resources reduces the cost.
Specifically, in a sharing scene, the invention uses a bluetooth unlocking mode to replace a mode of unlocking through a mobile communication network, so that bluetooth belongs to a near field protocol, and 4.0 bluetooth has a mechanism design with low power consumption, thereby realizing that some power consumption is only generated when user equipment performs bluetooth connection nearby (for example, when a user needs to use a shared object), and a mobile communication module does not need to be arranged in the lock, thereby saving the power consumption, and greatly prolonging the working time of a battery in the lock; and because the intelligent lock does not need to use a mobile communication network as a control instruction transmission channel, a large amount of network charge is saved.
In this situation, the smart lock will be in an off-line state, and we need to design an entire scheme for the smart lock to identify the legitimate user who has paid for the lock, so as to correspond to the controlled unlocking/locking.
Fig. 1 is a schematic structural diagram of a shared rental system according to an embodiment of the invention.
In this system, a lock terminal 101, a graphical identifier 102, a user terminal 103, and a service terminal 104 are included.
In the technical scheme of the invention, the intelligent lock is improved to be provided with a processing system for controlling unlocking/locking, so that the intelligent lock is called a lock terminal 101.
The lock terminal 101 may be provided to various shared objects, such as a shared bicycle, a shared automobile, a shared charger, a shared logistics cabinet, and even a shared house, to lock/unlock the shared objects. In some embodiments of the present invention, the lock terminal 101 may perform an unlocking/locking operation by driving a lock already provided on the shared object; in an embodiment, an electrically controlled lock is provided on the sharing bicycle, and the lock terminal 101 may be coupled to the electrically controlled lock and control the opening and closing of the electrically controlled lock by sending a control command; in another embodiment, a mechanical lock is provided on the shared bicycle, the lock terminal 101 may integrate a driving motor and a driving mechanism driven by the driving motor and in transmission connection with the mechanical lock, and a processing system in the lock terminal 101 controls the driving motor to drive the mechanical lock to unlock; similarly, in the shared house, the lock terminal 101 may be disposed on a door of the house, and the lock is unlocked by driving the door to mechanically lock or electrically lock.
In some embodiments of the present invention, the graphic identifier 102 may be, for example, a two-dimensional code, a bar code, an RFID, etc., and includes a network link corresponding to the lock terminal 101, and an access object of the network link is an interactive page provided by the service terminal 104.
In some embodiments of the present invention, the graphical identifier 102 may be attached to the vicinity or surface of the shared object for the user terminal 103 to scan to obtain the content therein. In some embodiments, such as a shared bicycle, the graphical identifier 102 may be affixed to a faucet or lock terminal 101 of the shared bicycle; in yet another embodiment, such as a shared house, the graphical indicia 102 may be affixed to a door of the house or to a wall surface near the door.
In some embodiments of the invention, the interaction page is a Web page (Web).
In some embodiments of the present invention, the user terminal 103 has a bluetooth function, for example, a common mobile terminal such as a smart phone, a tablet computer or a notebook computer. Of course, the user terminal 103 is not limited to such devices, and in one embodiment, the user terminal 103 can be further simplified to be a simplified device having only a bluetooth module, a communication module accessing an external network, and the ability to generate and send on/off-hook electrical signals; in some embodiments where it is not required, the communication module may be omitted and the user terminal 103 may be further simplified to a simplified device having only a bluetooth module, the ability to generate and transmit on/off electrical signals.
The user terminal 103 can be connected to the lock terminal 101 via bluetooth, and can access a network to access the service terminal 104, where the network may be a wired or wireless internet. The user terminal 103 has a camera, a code reader, an RFID card reader, or the like, and can read the identifier of the lock terminal 101 and the corresponding network link from the graphic identifier 102 and access the service terminal 104 through the network link.
In some embodiments of the present invention, the service terminal 104 may be a server in a centralized network architecture, or may be implemented by a plurality of terminals with processing capability in a distributed network environment.
The user terminal 103 and the service terminal 104 may implement a B/S architecture, that is, the user terminal 103 may be loaded with a web browser for browsing an interactive page provided by the service terminal 104.
Fig. 2 shows a specific flowchart of implementing sharing based on the system architecture shown in fig. 1 according to an embodiment of the present invention.
Step S201: when the user needs to use the shared object, the user terminal 103 scans the graphic identifier 102 to read the content.
The graphic identifier 102 may be a two-dimensional code (also may be a bar code, etc.), and the contained content includes a network link and a first key fragment, where the network link is used for linking to a corresponding interactive page provided by the service terminal 104. In an embodiment, the user may request access to the interactive page from the service terminal 104 by scanning the graphical identifier 102 through the client APP corresponding to the service terminal 104.
Step S202: the user terminal 103 accesses the service terminal 104 according to the network link request.
Step S203: the service terminal 104 provides an interactive page corresponding to the network link request.
Step S204: the user terminal 103 displays the interactive page, receives the use requirement information input by the user and sends the use requirement information to the service terminal 104.
In some embodiments of the present invention, the interactive page is displayed in a browser of the user terminal 103, and the interactive page is used for a user to input information on the use requirement of the shared object, where the input information may be in various forms such as text, voice, and image. For example, the interactive page may provide a plurality of information input fields, such as "lease time", etc., for the user to fill out, and the user terminal 103 transmits the received user input usage requirement information to the service terminal 104.
Step S205: the service terminal 104 receives the usage demand information, calculates a corresponding fee, and notifies the user terminal 103.
In some embodiments of the present invention, the service terminal 104 pre-stores a charging rule, for example, if the charging mode of the shared premise is 500 yuan/day, and if the usage requirement information includes "2 days needed to be used", the charging rule calculates the cost that the user terminal 103 needs to pay to be 1000; in one embodiment, if the service terminal 104 finds that the usage requirement information does not conform to the charging rule, it may ignore or perform an error notification. For example, for a shared house, if the usage requirement information of the user is "2 hours of usage are needed", the service terminal 104 may ignore or send a notification to the user to inform the user that the usage requirement information is wrong.
Step S206: after receiving the payment notification from the service terminal 104, the user terminal 103 calls a payment means to pay the user.
In some embodiments of the invention, the payment instrument may be an electronic payment instrument, such as a web page or client of unions, payees, WeChat, and the like.
Step S207: after the payment is completed, the user terminal 103 notifies the service terminal 104 of this information.
Step S208: after the confirmation, the service terminal 104 provides the second key fragment carrying the restriction information to the user terminal 103.
In an embodiment, the service terminal 104 may generate the restriction information according to the usage requirement information, and make the second key fragment carry the restriction information, and then actively send the restriction information to the user terminal 103, while in another embodiment, the service terminal 104 may also notify the user terminal 103 to retrieve the second key fragment with the restriction information, and the user performs a key retrieving operation to obtain the key. The second key fragment may carry the restriction information, for example, by connecting two corresponding codes into one through a recognizable character, or by placing the two codes into the same packet for transmission.
The second key fragment may be uniquely associated with the interactive interface, that is, the interactive interface may be a pickup interface of the second key fragment, through which the second key fragment can be picked up when the payment is completed.
The second key fragment with the restriction information obtained by the retrieving may be synthesized with the first key information to be synthesized into the key with the restriction information, where the synthesis may be performed according to a preset synthesis method, and information of the preset synthesis method may be included in the graphical identifier 102 and read, may also be prestored in the user terminal 103, and may also be obtained by the user terminal 103 from the outside.
In some embodiments of the invention, the restriction information comprises: the time limit information and/or the authority information, and the process of making the second key fragment carry the limit information may be referred to as time service and/or authorization.
In one example, the time limit information indicates a time limit that can be set for opening/closing the shards, for example, "2 hours", and also for example, "wednesday to friday", "3/month/2/2018/3/month/5/2018", and the like; the rights information may include: and information such as the limitation of the opening/closing times of the shared objects, the types of keys, the attribution of authority and the like.
For example, the key type is used to indicate keys/key shards with different permission levels, such as a common key type with a higher permission and a temporary key type with a lower permission, the key/key shard of the common key type may perform authorization/time service to generate the key/key shard of the temporary key type, and may further include the key/key shard of the temporary key type according to an object and/or a generator user ID, and the like, and forward through the two-dimensional code, while the key/key shard of the temporary key type may not perform copy generation and two-dimensional code forwarding.
Although the restrictions can be realized by setting the service terminal 104, for example, the server limits the number of times and the period of time for the user terminal 103 to retrieve the use key, since the lock terminal 101 is not connected to the service terminal 104, the lock terminal 101 cannot know that the use key is expired or exceeds the number of uses, and the use key that has been invalidated actually can still be controlled to the lock terminal 101, and the scheme of the present application can reduce the burden of the service terminal 104.
Step S209: the user terminal 103 establishes a bluetooth connection with the lock terminal 101, and verifies the synthesized key to the lock terminal 101.
In order to discriminate the identity of the user who has paid, the user needs to be authenticated by using the key.
In an embodiment of the present invention, due to the limitation of the time limit information, especially for dates that need to be referred to, for example, "3/month 2/2018-3/month 5/2018", the lock terminal 101 needs to know the current time as the reference time to determine "3/month 2/2018-3/month 5/2018"; therefore, in some situations, the lock terminal 101 needs to perform timing and time-tick operations before accurately determining whether the key expires.
Therefore, the following timing steps can be further included:
step S210: the lock terminal 101 sends a timing request to the user terminal 103 through a Bluetooth connection with the user terminal 103;
step S211: with the interaction page as a router, the user terminal 103 further accesses a network device (e.g., the service terminal 104) accessed by the user terminal to obtain reference clock information;
step S212: the user terminal 103 sends the obtained reference clock information to the lock terminal 101.
Step S213: the lock terminal 101 uses the reference clock information to complete timing.
That is, the lock terminal 101 may utilize the bluetooth connection and the network communication capability of the user terminal 103 to access the network for a brief period of time during which the bluetooth connection is not broken to complete the timing. In some embodiments of the present invention, the time may also be used to complete other tasks that need to depend on the network, for example, the lock terminal 101 may record each unlocking/locking condition and upload the unlocking/locking condition when networking is performed, so as to achieve the monitoring purpose.
Alternatively, in one embodiment, when the local clock is stopped due to reasons such as dead battery, unplugged battery, malfunction, etc., the lock terminal may deny verification of any keys containing time limit information restrictions until the next time it can resume timing with the external device.
Step S214: if the verification is passed, the user terminal 103 may control the lock terminal 101 to open/close under the restriction of the restriction information.
After the authentication is legal, an input interface (e.g., "unlock" or "lock" of a button pattern) is preferably provided in a human-machine interactive graphic interface of the user terminal 103 for generating a control instruction according to a user operation, which is transmitted to the lock terminal 101 through a bluetooth connection to control the unlocking/locking.
In an embodiment of the present invention, each time the unlocking/locking action occurs, the user terminal may be further connected to a cloud (e.g., the service terminal), so as to form a record of the action at the cloud.
Preferably, the lock terminal disconnects the bluetooth connection after each execution of the open/close operation to save power consumption.
Fig. 3 is a schematic diagram of a shared rental system according to another embodiment of the present invention.
In this embodiment, the system includes: lock terminal 301, graphical identification 302, user terminal 303, third party platform 304, and service terminal 305.
Different from the previous embodiments, the third party platform 304 and the user terminal interface are introduced in the present embodiment, such as WeChat, Paibao, and so on; the interactive page in the present application can also be implemented by a small program installed on a third-party platform 304, such as Tencent WeChat platform, to connect to a remote service terminal 305.
In this embodiment, the user may scan the graphical identifier 302 through the APP of the third-party platform 304 loaded by the user terminal 303, and access the page of the service terminal through the applet, and if the third-party platform 304 itself has a third-party payment tool, such as a payment instrument, an update message, and the like, the payment may be directly performed on the third-party platform 304; the service terminal 305 in this embodiment is dedicated to authorization/time service and providing for the second key fragment, the third party platform 304 confirms payment, and serves as a bridge between the user terminal 303 and the service terminal 305 to inform the paid information, and transmits the second key fragment with the restriction information, which is received from the service terminal 305 by the user.
Fig. 4 is a detailed flow chart of the system architecture of fig. 3 according to the embodiment of the present invention. Since the specific implementation manner of some steps in the process is the same as that in the embodiment of fig. 2, repeated description is omitted.
The process specifically comprises the following steps:
step S401: when the user needs to use the shared object, the user terminal 303 scans the graphic identifier 302 through the third-party platform 304APP to read the content of the graphic identifier 302, and a network link and a first key fragment are obtained.
Step S402: the user terminal 303 requests to access an interactive page of the service terminal 305 through the third party platform 304 according to the network link;
step S403: the third party platform 304 interacts with the service terminal 305 to provide a corresponding interaction page to the user terminal 303;
the interaction page may correspond to a second key fragment.
Step S404: the user terminal 303 receives the use requirement information input by the user through the interactive page and sends the use requirement information to the third-party platform 304;
step S405: the third party platform 304 receives the information of the use requirement, calculates the corresponding cost and informs the user terminal 303 of paying;
step S406: after receiving the payment notification from the service terminal 305, the user terminal 303 calls a payment tool to allow the user to pay the fee;
step S407: after completing the payment, the user terminal 303 notifies the third party platform 304 of the completion of the payment information;
step S408: the third party platform 304 receives the message of payment completion, informs the service terminal 305 that payment is completed and sends the usage requirement information to the service terminal 305; or, if the service terminal 305 is configured to time/authorize the second key fragment corresponding to the interactive page to add the restriction information as long as receiving the usage requirement information sent by the third party platform 304, if the service terminal 305 defaults to use the received usage requirement information as a sufficient condition for the user to pay the corresponding fee, the third party platform 304 only needs to send the usage requirement information to the service terminal 305.
Step S409: the service terminal 305 performs time service/authorization on the corresponding second key fragment according to the received use requirement information to add limitation information;
step S410: the service terminal 305 provides the second key fragment with the restriction information to the user terminal 303 through the third party platform 304;
step S411: the user terminal 303 retrieves the second key fragment with the restriction information and the first key fragment to synthesize a key for sending to the lock terminal 301 for verification and unlocking in a legal situation.
The operation process of the user terminal 303 performing verification, timing and unlocking on the lock terminal 301 by using the key may refer to the embodiment of fig. 2, and will not be repeated herein.
After the lock is unlocked in step S411, the user may connect to the lock terminal 301 through bluetooth again, and perform locking after verification is legal; in order to prevent the user from not locking after using the shared object, the unlocking state of the shared object can be continuously charged, and the user is prompted to lock at a proper time; and if the unlocking state duration time exceeds the corresponding period of the paid amount of the user, the time can be continuously counted to calculate the arrearage, and the corresponding user ID can be informed to pay the arrearage through short messages, WeChat and the like.
It should be noted that the above method flow is only an example, and in practical cases, the method flow can be changed, for example, the sequence of the steps can be adjusted, and the steps can be added or deleted, all of which are within the spirit of the present invention, and not limited to the above embodiment.
The principle of the verification by the lock terminal is illustrated by the following embodiments:
in an embodiment, at least one set of matching first key and second key may be pre-established, the second key may be stored in the lock terminal, and the first key is provided outside the lock terminal.
In some embodiments, the first key and the second key may be the same key, for example, both are a, and it is sufficient to compare whether they are identical or not in the verification; the first key and the second key may also be different keys, such as a pair of public key, private key, etc. Of course, these examples are merely illustrative and not exhaustive, and those skilled in the art may expand the art based on the present disclosure without limitation to the above.
In some embodiments, the first key and the second key may also be understood as two fragments of a key, for example, the first key and the second key may also be two fragments obtained by converting any one plaintext into a complete key and then cutting, and the algorithm for converting may be some common encryption algorithms, such as RSA, AES, DSA, etc., but is not limited thereto, and may also be implemented by some digest algorithms, such as MD5, etc.; in the sharing scenario of the present invention, the requirement for the security level of such encryption algorithm is not high, so that the shares may be a large number and distributed dispersedly, and even if the first key is obtained, the corresponding share is not known and cannot be used.
Further to enhance security, the first key may be, as described in the foregoing embodiments, composed of a first key fragment and a second key fragment, where the first key fragment is issued through a graphical identifier, and the second key fragment is placed in the service terminal for being retrieved.
Only in the case of acquiring the first key fragment (and the preset key synthesis method) and the second key fragment (with the restriction information), the first key can be synthesized until the lock terminal is matched with the second key.
For example, the second key a is set at the lock terminal, the corresponding first key a + is located outside, and the first key fragment a thereof1And A for obtaining the second key fragment2+ the network link bearer is displayed in the two-dimensional code; the user terminal extracts A from the two-dimensional code1And c, network link, accessing the interactive page through the network link, inputting the use requirement information and paying, and the user terminal can get the band after payingWith restricted information A2And then synthesizing A by a preset key synthesis method1+ and A with constraint information2And + is A + with the limitation information and is input into the lock terminal as a key to be verified for verification, and the lock terminal reads A + from the key to be verified and is successfully matched with A to verify the validity.
The method has the advantages that the first key is split into the first key fragment and the second key fragment, the two key fragments are distributed to different terminals, namely the service terminal and the user terminal, the service terminal can be ensured not to obtain the complete first key, and stealing behaviors of service terminal workers can be effectively avoided; meanwhile, the first key is not in a complete transmission state before being transmitted to the user terminal, and the stealing of people except legal user ID can be effectively prevented.
Alternatively, as shown in fig. 5, multiple sets of matched first and second keys, such as a and a +, B and B +, C and C +, may be preset, which has an advantage that the three sets of keys may correspond to three different users, and each user may unlock through its own key without being affected by other users, that is, separation of authority information of the lock terminal is achieved.
For example, let the second key be A, B, C, the first key be a +, B +, C +; the user 1, the user 2 and the user 3 respectively hold three keys of A +, B + and C +, all can unlock the lock, if A in the lock terminal is deleted and B is also deleted on a certain day, the user 1 and the user 2 cannot control the opening and closing of the lock terminal, and the user 3 can still normally use the lock terminal without being influenced.
In an embodiment of the present invention, a relationship between the secret key and the user ID may be stored in the lock terminal, and the association relationship between the user IDs may be realized through the association relationship between the secret keys, so that the user IDs may subscribe to the operation information of the other party operating the lock terminal.
The association relationship between the keys may be a key-to-key association relationship established by, for example, a key management interface of the login lock terminal.
For example, the lock terminal stores information of the key 2 associated with the user ID1 and the key 1 associated with the user ID2, if the key 1 is associated with the key 2, the user ID1 corresponding to the key 1 concerns operation information of the lock terminal by the user ID2 corresponding to the key 2, and operation information generated when the user ID2 operates the lock terminal (such as unlocking, locking, performing key editing on a login key management interface, and the like), such as "user ID2 unlocking", is attached to the user ID1, and the lock terminal accesses a network accessed by the user terminal through a bluetooth connection established between the lock terminal and the user terminal located by the user ID2 and transmits the operation information to the service terminal, and the service terminal transmits the operation information to the user terminal located by the user ID1, so that the user ID1 can monitor operation behavior of the user ID2 on the lock terminal. If there are more than one lock terminal, the lock terminal can be distinguished by adding lock terminal identification into the information.
In an embodiment of the present invention, the user ID1 corresponding to the key fragment 1 of the common key type may also concern the operation information of the lock terminal corresponding to the user ID2 corresponding to the key fragment 2 of the temporary key type generated according to the key fragment 1, and since the common key and the temporary key thereof are actually based on the same key core, for example, a +, the user ID2 inevitably uses the key fragment a thereof if it is legal to verify that the common key and the temporary key thereof are based on the same key core, for example, a +1+ and A1If the association relationship between the user ID1 and A is stored in the lock terminal, the lock terminal can access the network through the terminal where the user ID2 is located to inform the service terminal of sending the operation information of the user ID2 to the user ID 1; preferably, in order to distinguish between the operation performed by the key 1 of the normal key type and the operation performed by the key 2 of the temporary key type (that is, in order to distinguish the key owner), information that the key is the temporary key shared by the user ID1 may be written in the authority information of the key 2 when the key 2 is generated.
However, if the two embodiments are combined, the user ID3 corresponding to the key B associated with the key a at the lock terminal can also receive the operation information of the user ID2, which is advantageous in that a plurality of users sharing the control right of the lock terminal also have the right to know the information that the other party authorizes the lock terminal operation of the other party.
Fig. 6 shows a schematic structural diagram of a user terminal 600 in the embodiment of the present invention.
The user terminal 600 in this embodiment includes a processing system, which includes:
a communicator 601 for communicating with a service terminal. Specifically, the communicator 601 may be a communication circuit supporting an internet communication protocol (e.g., TCP/IP, UDP, 2G/3G/4G/5G, etc.) so as to communicate with the service terminal by accessing the internet.
And a bluetooth module 602, configured to communicate with the lock terminal. Preferably, the bluetooth module 602 may be a circuit based on bluetooth version 4.0 or more, which saves more power.
A memory 603 for storing a computer program;
the processor 604 is connected to the communicator 601, the bluetooth module 602, and the memory 603, and is configured to run the computer program to implement the functions of the user terminal 600 in fig. 1 to 4.
Referring to fig. 7, a schematic structural diagram of a lock terminal 700 according to an embodiment of the present invention is shown.
Lock terminal 700 in this embodiment comprises a processing system that includes:
a bluetooth module 701 for communicating with a user terminal;
a memory 702 for storing a computer program;
the processor 703 is connected to the bluetooth module 701 and the memory 702, and is configured to run the computer program to implement the functions of the lock terminal 700 in fig. 1 to 4.
Of course, the lock terminal 700 further includes the driving motor, the mechanical structure, and the like mentioned in the foregoing embodiments, and only the processing system will be described herein, and the content of this portion will not be expanded.
Fig. 8 is a schematic structural diagram of a service terminal 800 according to an embodiment of the present invention.
The service terminal 800 in this embodiment includes a processing system that includes:
a communicator 801 for communicating with an external device;
a memory 802 for storing a computer program;
the processor 803 is connected to the communicator 801 and the memory 802, and is configured to run the computer program to implement the functions of the service terminal 800, the third party platform, or the service terminal in fig. 1 to 4.
In the embodiments of FIGS. 6-8, the memory may include, but is not limited to, a high speed random access memory, a non-volatile memory. Such as one or more magnetic disk storage devices, flash memory devices, or other non-volatile solid-state storage devices.
The Processor may be a general-purpose Processor, and includes a Central Processing Unit (CPU), a Network Processor (NP), and the like; the device can also be a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other Programmable logic device, a discrete Gate or transistor logic device, or a discrete hardware component.
The various computer programs involved in the embodiments of fig. 6-8 may be loaded onto a computer-readable storage medium, which may include, but is not limited to, floppy diskettes, optical disks, CD-ROMs (compact disc-read only memory), magneto-optical disks, ROMs (read-only memory), RAMs (random access memory), EPROMs (erasable programmable read only memory), EEPROMs (electrically erasable programmable read only memory), magnetic or optical cards, flash memory, or other type of media/machine-readable medium suitable for storing machine-executable instructions. The computer readable storage medium may be a product that is not accessed by the computer device or may be a component that is used by an accessed computer device.
In particular implementations, the computer programs are routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types.
The application is operational with numerous general purpose or special purpose computing system environments or configurations. For example: personal computers, server computers, hand-held or portable devices, tablet-type devices, multiprocessor systems, microprocessor-based systems, set top boxes, programmable consumer electronics, network PCs, minicomputers, mainframe computers, distributed computing environments that include any of the above systems or devices, and the like.
The application may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, computer programs may be located in both local and remote computer storage media including memory storage devices.
In summary, according to the lock terminal management method, system, shared object and storage medium of the present invention, the user terminal reads the graphic identifier corresponding to the lock terminal, so as to access the service terminal according to the network link therein, and can obtain the second key fragment carrying the restriction information corresponding to the information of the usage requirement from the service terminal by inputting the requirement and paying the corresponding fee to combine with the first key fragment into the key, and can communicate with the lock terminal by using the near-field bluetooth communication method to transmit the key to the lock terminal for verification, and after the verification is passed, the unlocking of the lock terminal can be controlled on site under the restriction of the restriction information through the bluetooth connection between the user terminal and the lock terminal.
The scheme of the invention has the advantages that:
1) and (3) prolonging the working time: because the current Bluetooth 4.0 communication protocol enables the Bluetooth module to be in a dormant state outside the communication, the locking and unlocking of the lock terminal can realize the operation of extremely low power consumption of the lock terminal by utilizing the Bluetooth communication scheme, thereby greatly prolonging the working time without charging;
2) the operation cost is reduced: the lock terminal does not need to be provided with a wireless network communication module and needs to be accessed to the wireless network as in the prior art, acquires the secret key and verifies the legality of the user terminal through the near-field Bluetooth communication, and can be controlled by the legal user terminal to lock/unlock, so that the power consumption is reduced, the network cost needing to be paid when the mobile communication network is accessed is saved, and the operation cost is greatly reduced;
3) the user experience is good: the shared leasing scheme realized by the invention can be used for scanning by a user through graphic identifiers (such as two-dimensional codes and bar codes) and the like arranged on the surface or the periphery of a shared object to log in a corresponding network page to obtain key fragments, then a key is synthesized and is unlocked accordingly, the key is added with limited information to meet different leasing requirements, compared with the existing shared leasing scheme, the whole scheme has little difference in user experience, the operation is very convenient, and the shared leasing scheme with good user experience is realized.
The foregoing embodiments are merely illustrative of the principles and utilities of the present invention and are not intended to limit the invention. Any person skilled in the art can modify or change the above-mentioned embodiments without departing from the spirit and scope of the present invention. Accordingly, it is intended that all equivalent modifications or changes which can be made by those skilled in the art without departing from the spirit and technical spirit of the present invention be covered by the claims of the present invention.

Claims (17)

1. A lock terminal control method is characterized in that the method is applied to a user terminal with Bluetooth communication capability; the method comprises the following steps:
extracting the network link and the first key fragment contained in the acquired graphic identifier from the acquired graphic identifier, and accessing an interactive page correspondingly provided by the service terminal according to the network link;
receiving input using requirement information of a lock terminal at the interactive page, and calling a payment tool for paying the cost corresponding to the using requirement information;
receiving a second key fragment provided under the condition that the fee is paid and provided with the restriction information corresponding to the demand information from the service terminal, and synthesizing the first key fragment and the second key fragment into a key with the restriction information;
and connecting the lock terminal through Bluetooth, and sending the secret key to the lock terminal for verification so as to unlock the lock terminal under the condition of conforming to the limit information when the verification is legal.
2. The lock terminal control method according to claim 1, characterized by comprising:
receiving a timing request sent by the lock terminal through the Bluetooth connection;
forwarding the timing request to the outside to acquire reference clock information;
and sending the reference clock information to the lock terminal for timing.
3. The lock terminal control method according to claim 1, wherein the restriction information includes: and time limit information and/or authority information for unlocking the lock terminal.
4. The lock terminal control method according to claim 3, wherein the key is divided into: a general key type that can be forwarded, and a temporary key type that cannot be forwarded.
5. A lock terminal communication method is characterized in that the method is applied to a lock terminal with Bluetooth communication capability, wherein at least one second secret key is stored in the lock terminal, and the second secret key has a matched first secret key; the method comprises the following steps:
when Bluetooth connection is established with external equipment and a key to be verified is received, verifying whether the key to be verified contains the first key;
and judging that the verification is legal under the condition that the key to be verified contains the first key, and allowing the external equipment to control the unlocking of the lock terminal under the condition that the external equipment conforms to the limitation information contained in the key to be verified.
6. The lock terminal communication method according to claim 5, comprising:
sending a timing request to the external device through the Bluetooth connection;
receiving reference clock information acquired from a service terminal by the external equipment according to the timing request;
and calibrating the clock of the lock terminal according to the reference clock information.
7. The lock terminal communication method according to claim 5, wherein the restriction information includes: and time limit information and/or authority information for unlocking the lock terminal.
8. The lock terminal communication method according to claim 6, wherein the restriction information includes: time limit information for unlocking the lock terminal; the method comprises the following steps: and if the limiting information comprises time limit information, timing by a calibrated clock to judge whether the time limit information is exceeded.
9. The lock terminal communication method according to claim 5, comprising: and after the unlocking action of the lock terminal is completed every time, the Bluetooth connection with the external equipment is disconnected.
10. A key providing method is applied to a service terminal, wherein the service terminal stores at least one second key fragment, and the second key fragment is associated with a lock terminal; the method comprises the following steps:
providing a corresponding interactive page when an access request of external equipment is received;
receiving the use requirement information of the lock terminal input in the interactive page, calculating the cost corresponding to the use requirement information and informing the external equipment to be paid;
providing a second key fragment carrying restriction information to the external device when acquiring the information that the fee has been paid, wherein the restriction information corresponds to the use requirement information;
the second key fragment is used for being synthesized with the first key fragment into a key with the limitation information, so that the key can be used for verification at a lock terminal, and the lock terminal can be unlocked under the condition that the key accords with the limitation information when the verification is legal.
11. The key providing method according to claim 10, comprising: when receiving a timing instruction from the lock terminal from an external device connected with the lock terminal through Bluetooth, sending reference clock information to the lock terminal through the external device for timing.
12. The key providing method according to claim 10, wherein the second key fragment carrying the restriction information is made by the service terminal or is obtained by the service terminal from outside.
13. A user terminal, comprising:
a communicator for communicating with a service terminal;
the Bluetooth module is used for communicating with the lock terminal;
a memory for storing a computer program;
a processor connected to the communicator, the bluetooth module, and the memory, for running the computer program to perform the lock terminal control method according to any one of claims 1 to 4.
14. A lock terminal, comprising:
a Bluetooth module;
a memory for storing a computer program;
a processor connected to the bluetooth module and the memory for executing the computer program to perform the lock terminal communication method according to any one of claims 5 to 9.
15. A shard provided with a lock terminal according to claim 14 and a graphical logo on a surface or peripheral area of said shard, said graphical logo comprising a network link associated with said lock terminal.
16. A service terminal, comprising:
a communicator for communicating with an external device;
a memory for storing a computer program;
a processor, connected to the communicator and the memory, for running the computer program to perform the key providing method of any one of claims 10 to 12.
17. A computer storage medium, in which a first computer program is stored, which when executed performs the lock terminal control method according to any one of claims 1 to 4; or, a second computer program stored and operable to perform the lock terminal communication method according to any one of claims 5 to 9; alternatively, a third computer program is stored which, when running, executes the key providing method according to any one of claims 10 to 12.
CN201811472866.7A 2018-12-04 2018-12-04 Lock terminal management method, system, shared object and storage medium Pending CN111275852A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811472866.7A CN111275852A (en) 2018-12-04 2018-12-04 Lock terminal management method, system, shared object and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811472866.7A CN111275852A (en) 2018-12-04 2018-12-04 Lock terminal management method, system, shared object and storage medium

Publications (1)

Publication Number Publication Date
CN111275852A true CN111275852A (en) 2020-06-12

Family

ID=71002917

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811472866.7A Pending CN111275852A (en) 2018-12-04 2018-12-04 Lock terminal management method, system, shared object and storage medium

Country Status (1)

Country Link
CN (1) CN111275852A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112124247A (en) * 2020-09-18 2020-12-25 上海钧正网络科技有限公司 Vehicle lock control method and device and computer readable storage medium
CN112765655A (en) * 2021-01-07 2021-05-07 支付宝(杭州)信息技术有限公司 Control method and device based on private data outgoing
CN112849076A (en) * 2021-02-22 2021-05-28 北海集磁电机开发有限责任公司 Automobile lock opening/closing device and control method thereof

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104103111A (en) * 2014-07-19 2014-10-15 张明 Automatic access control system based on mobile phone Bluetooth communication and implementation method thereof
CN107256598A (en) * 2017-07-03 2017-10-17 深圳市皇沙建筑科技有限公司 Article hires out management method
CN107633576A (en) * 2017-08-29 2018-01-26 深圳市新科聚合网络技术有限公司 Shared equipment method for unlocking and system
CN107833334A (en) * 2017-11-29 2018-03-23 南华大学 Shared place door lock key management system and method based on bluetooth and mobile network
CN108055235A (en) * 2017-11-01 2018-05-18 华中科技大学 A kind of control method of smart lock, relevant device and system
CN108308924A (en) * 2018-03-30 2018-07-24 马文杰 A kind of shared bed with drawers and its system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104103111A (en) * 2014-07-19 2014-10-15 张明 Automatic access control system based on mobile phone Bluetooth communication and implementation method thereof
CN107256598A (en) * 2017-07-03 2017-10-17 深圳市皇沙建筑科技有限公司 Article hires out management method
CN107633576A (en) * 2017-08-29 2018-01-26 深圳市新科聚合网络技术有限公司 Shared equipment method for unlocking and system
CN108055235A (en) * 2017-11-01 2018-05-18 华中科技大学 A kind of control method of smart lock, relevant device and system
CN107833334A (en) * 2017-11-29 2018-03-23 南华大学 Shared place door lock key management system and method based on bluetooth and mobile network
CN108308924A (en) * 2018-03-30 2018-07-24 马文杰 A kind of shared bed with drawers and its system

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112124247A (en) * 2020-09-18 2020-12-25 上海钧正网络科技有限公司 Vehicle lock control method and device and computer readable storage medium
CN112765655A (en) * 2021-01-07 2021-05-07 支付宝(杭州)信息技术有限公司 Control method and device based on private data outgoing
CN112849076A (en) * 2021-02-22 2021-05-28 北海集磁电机开发有限责任公司 Automobile lock opening/closing device and control method thereof

Similar Documents

Publication Publication Date Title
US11968525B2 (en) Vehicle digital key sharing service method and system
US8789161B2 (en) Device and method for authenticating a transaction with a data processing apparatus
EP1671198B1 (en) Facilitating and authenticating transactions
CN102521548B (en) Method for managing using rights of function and mobile terminal
CN106330442B (en) Identity authentication method, device and system
CN108307674A (en) A kind of method and apparatus ensureing terminal security
CN107493561B (en) Shared device unlocking method, device and system and storage medium
CN104637131A (en) Authorization method and authorization device for access control system and access control system
CN107925567A (en) For optimizing the systems, devices and methods of symmetric key cache using the ticket that service provider's issue is checked by certificate status
KR100834270B1 (en) Method and system for providing virtual private network services based on mobile communication and mobile terminal for the same
CN103813314A (en) Soft SIM card enabling method and network access method, terminal, and network access device
CN103916844A (en) Subscriber identity module card opening method and virtual subscriber identity module card server
CN105719374A (en) Door access control method
CN104952128A (en) Intelligent handheld terminal based electronic unlocking system and unlocking method thereof
CN111275852A (en) Lock terminal management method, system, shared object and storage medium
CN106127906A (en) The unlocking method of a kind of door-control lock, Apparatus and system
EP4026737A1 (en) Method and device for storing and transmitting data by means of vehicle key
CN113132091A (en) Method for sharing equipment and electronic equipment
CN109685946A (en) Open method, device, equipment and the storage medium of lockset
CN104853354A (en) Bluetooth authentication method and system thereof
CN109413648A (en) Access control method, terminal, smart card, background server and storage medium
CN110349316A (en) A kind of visitor's access control system and control method
CN102202291B (en) Card-free terminal, service access method and system thereof, terminal with card and bootstrapping server function (BSF)
KR101008834B1 (en) Mobile Communication Service System that SIM is Produced and Controlled by Remoteness And Service Method thereof
CN112751803A (en) Method, apparatus, and computer-readable storage medium for managing objects

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20200612