CN111325881A - Lockset and two-dimension code control method thereof - Google Patents

Lockset and two-dimension code control method thereof Download PDF

Info

Publication number
CN111325881A
CN111325881A CN202010118360.7A CN202010118360A CN111325881A CN 111325881 A CN111325881 A CN 111325881A CN 202010118360 A CN202010118360 A CN 202010118360A CN 111325881 A CN111325881 A CN 111325881A
Authority
CN
China
Prior art keywords
dimensional code
lock
door opening
time
control method
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010118360.7A
Other languages
Chinese (zh)
Other versions
CN111325881B (en
Inventor
郭萌
李鹏
赵光
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Hardrock Technology Co ltd
Original Assignee
Beijing Hardrock Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Hardrock Technology Co ltd filed Critical Beijing Hardrock Technology Co ltd
Priority to CN202010118360.7A priority Critical patent/CN111325881B/en
Publication of CN111325881A publication Critical patent/CN111325881A/en
Application granted granted Critical
Publication of CN111325881B publication Critical patent/CN111325881B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit

Abstract

The invention discloses a lockset and a two-dimension code control method thereof, wherein the two-dimension code control method comprises an authorization step, a door opening step and a management step; the authorization step includes: after the lockset is installed, starting the two-dimension code function; inputting a management password into the lockset to obtain a registration two-dimensional code, and registering with the identity of an administrator by scanning the registration two-dimensional code; selecting starting and ending time of authorized door opening and an authorized target user, and sharing the door opening authority to the authorized target user; the step of opening the door comprises: generating a door opening two-dimensional code according to the door opening authority; performing door opening operation within the valid period of the door opening two-dimensional code; the management step comprises: and closing the two-dimension code function. By adopting the lockset and the two-dimension code control method thereof, the lockset is controlled by the two-dimension code, a complete feasible scheme with implementation significance is provided, and the lockset can be controlled by the two-dimension code and has the functions of authorization, unlocking, sharing unlocking, unlocking or closing the two-dimension code and the like.

Description

Lockset and two-dimension code control method thereof
Technical Field
The invention relates to a lock control technology, in particular to a lock and a two-dimensional code control method thereof.
Background
The intelligent lock has been widely used, but there is not a proper solution to control the lock by using the two-dimension code, and there are problems of registration and authorization control, energy saving and the like.
Disclosure of Invention
The invention provides a novel lockset and a two-dimensional code control method thereof, and aims to solve the technical problems that: how to realize the adoption of two-dimensional code to control tool to lock etc..
The technical scheme of the invention is as follows:
a two-dimensional code control method of a lockset comprises an authorization step, a door opening step and a management step;
the step of authorizing comprises:
after the lockset is installed, starting the two-dimension code function;
inputting a management password into a lockset to obtain a registration two-dimensional code, and registering with the identity of an administrator by scanning the registration two-dimensional code;
selecting starting and ending time of authorized door opening and an authorized target user, and sharing the door opening authority to the authorized target user;
the step of opening the door comprises:
generating a door opening two-dimensional code according to the door opening permission;
performing door opening operation within the valid period of the door opening two-dimensional code;
the managing step includes:
and closing the two-dimension code function.
Preferably, the two-dimensional code is scanned in the authorization step, and the door opening operation in the door opening step is executed in an APP or an applet.
Preferably, the applet comprises a WeChat applet.
Preferably, the managing step further comprises: and generating a time correction two-dimensional code according to the current system time, and setting the current system time as the current time of the lock by scanning the time correction two-dimensional code at the lock.
Preferably, when the time-correcting two-dimensional code is generated according to the current system time, the current system time delay is set.
Preferably, the managing step further comprises: and generating a reset two-dimensional code, and resetting the management password to the default management password of the lock by scanning the reset two-dimensional code at the lock.
Preferably, in the step of opening the door, before the step of opening the door, the method further includes: and selecting a target lock.
Preferably, the number of the authorized target users is determined according to the starting and ending time of authorized door opening, and the number of the authorized target users is less than or equal to 5 in the same time period.
Preferably, in the managing step, before the two-dimensional code function is turned off, the method further includes: and inputting a management password into the lock.
Preferably, in the authorization step, when the two-dimensional code function is started, the master clear button of the lock is disabled; in the management step, when the two-dimension code function is closed, a master clear button of the lock is enabled.
A lock is realized by adopting the two-dimension code control method in any item.
By adopting the lockset and the two-dimension code control method thereof, the lockset is controlled by the two-dimension code, a complete feasible scheme with implementation significance is provided, and the lockset can be controlled by the two-dimension code and has the functions of authorization, unlocking, sharing unlocking, unlocking or closing the two-dimension code and the like.
Drawings
Fig. 1 is a flowchart illustrating a two-dimensional code control method according to an embodiment of the present invention.
Detailed Description
In order to facilitate an understanding of the invention, the invention is described in more detail below with reference to the accompanying drawings and specific examples. This invention may, however, be embodied in many different forms and should not be construed as limited to the embodiments set forth herein. It will be understood that when an element is referred to as being "secured to" another element, it can be directly on the other element or intervening elements may also be present. When an element is referred to as being "connected" to another element, it can be directly connected to the other element or intervening elements may also be present.
Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs. The terminology used in the description of the invention herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used herein, the term "and/or" includes any and all combinations of one or more of the associated listed items.
As shown in fig. 1, an embodiment of the present invention is a two-dimensional code control method for a lock, which includes an authorization step, a door opening step, and a management step; the step of authorizing comprises: after the lockset is installed, starting the two-dimension code function; inputting a management password into a lockset to obtain a registration two-dimensional code, and registering with the identity of an administrator by scanning the registration two-dimensional code; selecting starting and ending time of authorized door opening and an authorized target user, and sharing the door opening authority to the authorized target user; the step of opening the door comprises: generating a door opening two-dimensional code according to the door opening permission; performing door opening operation within the valid period of the door opening two-dimensional code; the managing step includes: and closing the two-dimension code function. By adopting the two-dimension code control method of the lockset, the lockset is controlled by the two-dimension code, a complete feasible scheme with implementation significance is provided, and the lockset can be controlled by the two-dimension code and has the functions of authorization, unlocking, sharing unlocking, unlocking or closing the two-dimension code and the like.
Preferably, the two-dimensional code control method of the lockset comprises an authorization step, a door opening step and a management step; preferably, the lockset and the two-dimensional code control method thereof comprise part or all of the following steps. Preferably, the APP or the applet is matched with the lock to execute the authorization step, the door opening step and the management step. Preferably, the step of authorizing, the step of opening the door and the step of managing are executed by matching the lock in the WeChat or the payment treasure. Or, the step of authorization, the step of opening the door and the step of management are executed by matching the lock in the small program of the WeChat or the Payment treasure. Therefore, the method can flexibly execute the authorization step, the door opening step and the management step in the APP or the small program, is suitable for the development trend of the era technology, and meets the requirements of people.
Preferably, the authorizing step includes: after the lockset is installed, starting the two-dimension code function; inputting a management password into a lockset to obtain a registration two-dimensional code, and registering with the identity of an administrator by scanning the registration two-dimensional code; selecting starting and ending time of authorized door opening and an authorized target user, and sharing the door opening authority to the authorized target user; preferably, the two-dimensional code function is started and executed in the lock, for example, the execution is controlled in a function panel of the lock. Preferably, the registration is carried out by using the identity of an administrator within the preset time; preferably, the method for sharing the door opening permission to the authorized target user includes: and sharing the door opening authority to the authorized target user by adopting time-efficiency authorization or one-time authorization. The time-effect authorization comprises that the door can be opened for a plurality of times within the effective time, and the one-time authorization comprises that the door can be opened once within the effective time. The one-time authorization is disabled after the door is opened. Preferably, the number of authorized target users is set to be limited in the same time period. For example, the number of authorized target users is less than or equal to 5 in the same time period. In order to control the two-dimension code function conveniently and avoid error closing, preferably, after the lock is installed, the two-dimension code function is opened by adopting a toggle switch which is mutually exclusive and linked with a master clear button; preferably, the function of closing the two-dimensional code specifically comprises: and a toggle switch which is mutually exclusive and linked with the total clear button is adopted to close the two-dimension code function. Toggle switch and the total clear button mutually exclusive linkage of button, toggle switch are used for when opening the two-dimensional code function the total clear button of the lock that can't enable to when closing the two-dimensional code function, the total clear button of the lock that enables. Preferably, toggle switch has the pressure spring and the card post that links to each other with the pressure spring, blocks the post and supports total clear button so that avoid total clear button to be pressed down under the pressure spring is in the state of pressing down, blocks the post and is in the state of bounceing and unclamp total clear button so that total clear button is in the state that can be pressed down. Preferably, the catch posts extend a length greater than the width of the overall clear button. Therefore, the function of avoiding the two-dimension code from being closed by mistake or mistake can be realized. That is, only when the two-dimensional code function is in a closed state, the total clear button can take effect; as long as the two-dimensional code function is in an opened state, the total clear button cannot take effect; therefore, the function of avoiding the two-dimension code from being closed by mistake or mistake can be realized. Preferably, after the two-dimension code function is closed, the lock can only be used for unlocking again, namely the two-dimension code function is unlocked again through the lock. Or after the two-dimension code function is closed, the two-dimension code function can be remotely opened through a network. The specific choice of which design needs to be looked at here is the market demand.
In order to avoid control confusion, it is preferable that the number of authorized target users is determined according to the starting and ending time of authorized door opening, and the number of authorized target users is less than or equal to 5 in the same time period. Preferably, when the number of the authorized target users is equal to 5 in the same time period, when an authorized target user is newly added, the former authorized target user is deleted in a first-in first-out manner, and the administrator or the deleted authorized target user is notified. Preferably, the administrator or the deleted authorized target user is notified in the form of a WeChat or short message. Therefore, the number of management personnel can be controlled, management disorder is avoided, responsibility distinction in case of problems is ensured, and the number of control personnel of one lock is limited.
Preferably, the door opening step includes: generating a door opening two-dimensional code according to the door opening permission; performing door opening operation within the valid period of the door opening two-dimensional code; preferably, the two-dimensional code is scanned in the authorization step, and the door opening operation in the door opening step is executed in an APP or an applet. Preferably, the applet comprises a WeChat applet. For example, the two-dimensional code is scanned and executed in a WeChat applet; for example, the door opening operation is performed in the WeChat applet, and so on in other embodiments, which will not be described in detail below. Therefore, the effect of controlling the lockset through the WeChat small program can be realized.
In order to reduce power consumption and save electric energy, especially prolong the service life of the lockset, preferably, the step of opening the door further comprises: enabling the door opening operation when the door opening two-dimensional code is judged to exist; for example, the door opening step includes: generating a door opening two-dimensional code according to the door opening permission; enabling the door opening operation when the door opening two-dimensional code is judged to exist; performing door opening operation within the valid period of the door opening two-dimensional code; other embodiments are analogized and will not be described in detail below. Preferably, an automatic wake-up device is adopted to judge whether the two-dimensional code for opening the door exists. Preferably, the automatic wake-up device is used for judging whether the two-dimensional code for opening the door exists within a preset range. Preferably, the predetermined range is within 30 centimeters. Preferably, the predetermined range is within 20 centimeters. Preferably, the automatic wake-up device comprises an infrared sensing device, a capacitance proximity sensing device, an ultrasonic proximity sensing device, a microwave proximity sensing device and the like. Preferably, the automatic awakening device comprises an infrared proximity sensing chip, or an infrared transmitting tube, a receiving tube and an ultra-low power consumption single chip microcomputer. Preferably, the standby power consumption of the automatic wake-up device is less than 120 muA. Preferably, the standby power consumption of the automatic wake-up device is less than 60 muA. In specific application scene, need open two-dimensional code identification module when the intelligence lock discernment two-dimensional code that opens the door with the two-dimensional code, two-dimensional code identification module power consumption is great, can't support to open for a long time when the dry battery power supply is used to the intelligence lock, and awaken up the work of two-dimensional code module with button or other modes and operate inconveniently to the user. Therefore, when the automatic wake-up device is added on the intelligent lock, and a user approaches the two-dimensional code camera on the intelligent lock by using a mobile phone or other two-dimensional code carriers, the automatic wake-up device is necessary to automatically wake up the two-dimensional code module of the intelligent lock. Especially, since the battery is used for power supply, the automatic wake-up device needs to be continuously operated, and the automatic wake-up device needs low power consumption. After the automatic wake-up device is added, the overall average power consumption of the intelligent lock is required to be at a low level, and at least, the operation of 4-section No. 5 batteries in a normal working state is required to be ensured for more than 6 months. Typically, the standby current of a smart lock that meets this requirement should be less than 120 μ Α. In a specific adopted scheme, the infrared proximity sensing chip si11143 with low power consumption is used, and the lowest power consumption of the chip can reach 9 muA when the chip works. The chip automatically transmits infrared signals at regular intervals and receives infrared signals reflected by nearby objects. And adjusting chip parameters, scanning once in 0.5 second, and generating a trigger signal by the chip when an object is 10-20cm away from the chip. Such parameter is fit for the application of intelligent lock sweep two-dimensional code. The trigger signal can be used for awakening the intelligent lock main control chip and the two-dimension code module to work and starting to scan the two-dimension code. If the two-dimensional code is not scanned within a given time, for example, 10 seconds, the intelligent lock closes the two-dimensional code module, and the main control module enters a sleep state to reduce power consumption. If the two-dimension code module is scanned, the intelligent lock judges the validity of the two-dimension code, unlocking or lock configuration and other work are executed according to the judgment result, after the work is completed, the intelligent lock closes the two-dimension code module, and the main control module enters a dormant state. Other infrared sensing chips with low power consumption can also be selected, as long as the power consumption and the scanning distance can meet the requirements. The infrared induction chip can also be automatically realized by an infrared transmitting tube, an infrared receiving tube and an ultra-low power consumption singlechip. If the intelligent lock is installed outdoors, the infrared sensing module needs to adjust parameters to avoid direct sunlight so that the module cannot work effectively. Except for the infrared sensing technology, capacitance proximity sensing, ultrasonic proximity sensing and microwave proximity sensing can be selected. Likewise, power consumption and scan distance must be sufficient for smart locks. The approach awakening method can be used for controlling the two-dimension code to identify a certain block, and can also be used for controlling other parts of the intelligent lock, such as a key module, a card swiping module and network communication modules such as WiFi, NB-IOT and the like. So that the smart lock with the corresponding modules can also reduce the power consumption of these modules.
In order to facilitate a manager or a management center to manage a plurality of locks respectively, it is preferable that, in the step of opening the door, before the step of opening the door, the method further includes: and selecting a target lock. Preferably, the target lock is selected remotely. For example, the target lock is remotely selected through a 4G, 5G or WIFI network. Therefore, the remote unified management function of a plurality of locks and even a large number of locks can be realized, the lock management system is particularly suitable for being used in rental houses, apartments, hotels or campuses, a large number of complex works are not needed, effective lock distribution can be realized only by remote application, and remote room distribution or remote door opening for relatives and friends is correspondingly realized.
Preferably, the managing step includes: and closing the two-dimension code function. Preferably, the two-dimensional code function is closed and executed in the lock, for example, the execution is controlled in a function panel of the lock. Therefore, the opening and closing of the two-dimension code function can be manually controlled. Preferably, in the managing step, before the two-dimensional code function is turned off, the method further includes: and inputting a management password into the lock, namely inputting the management password into the lock, and closing the two-dimension code function.
In order to accurately control the lock, preferably, the managing step further includes: and generating a time correction two-dimensional code according to the current system time, and setting the current system time as the current time of the lock by scanning the time correction two-dimensional code at the lock. Preferably, when the time-correcting two-dimensional code is generated according to the current system time, the current system time delay is set. Preferably, the time correcting two-dimensional code is generated in the APP or the applet. Preferably, the APP or the applet generates a time correction two-dimensional code, and the time correction two-dimensional code is scanned by the lock, so that the current system time is set as the current time of the lock. Preferably, the time correction two-dimensional code is generated in the APP or the small program, and the target terminal is adopted to display the time correction two-dimensional code. Preferably, the time correction two-dimensional code is generated according to the current system time, and the current system time is set as the current time of the lock by scanning the time correction two-dimensional code displayed on the target terminal at the lock. Preferably, the time correction two-dimensional code is generated at the target terminal according to the standard current system time acquired through networking, and the current system time is set as the current time of the lock by scanning the time correction two-dimensional code displayed at the target terminal at the lock. Or, remotely generating a time correction two-dimensional code according to standard current system time acquired through networking by adopting an authorized password, sending the time correction two-dimensional code to a target terminal, and setting the current system time as the current time of the lockset by scanning the time correction two-dimensional code displayed by the target terminal at the lockset. Therefore, the accuracy of the lockset time can be realized, and the problem of authorization or malicious utilization due to loopholes caused by different lockset times can be avoided.
Preferably, the managing step further comprises: and generating a reset two-dimensional code, and resetting the management password to the default management password of the lock by scanning the reset two-dimensional code at the lock. Better, generate the reset two-dimensional code in APP or applet, adopt the target terminal to show reset two-dimensional code, through scanning at the tool to lock reset two-dimensional code will the management password resets to the acquiescence management password of tool to lock. Preferably, a reset two-dimensional code is generated, and the management password is reset to the default management password of the lock through the reset two-dimensional code at the lock scanning target terminal. Preferably, a reset two-dimensional code is generated at the target terminal, and the management password is reset to the default management password of the lock by scanning the reset two-dimensional code at the lock at the target terminal. Preferably, the authorized password is adopted to remotely generate the reset two-dimensional code, the reset two-dimensional code is sent to the target terminal, and the management password is reset to the default management password of the lock through the reset two-dimensional code displayed on the lock scanning target terminal. Therefore, the intelligent remote management can be realized to reset the two-dimensional code, so that the reset of the management password is controlled.
Preferably, the two-dimensional code control method of the lockset comprises an authorization step, a door opening step and a management step; the step of authorizing comprises: after the lockset is installed, starting the two-dimension code function; inputting a management password into a lockset to obtain a registration two-dimensional code, and registering with the identity of an administrator by scanning the registration two-dimensional code; selecting starting and ending time of authorized door opening and an authorized target user, and sharing the door opening authority to the authorized target user; the step of opening the door comprises: generating a door opening two-dimensional code according to the door opening permission; selecting a target lockset, and performing door opening operation within the valid time limit of the door opening two-dimensional code; the managing step includes: and inputting a management password to the lockset, and closing the two-dimension code function. And generating a time correction two-dimensional code according to the current system time, and setting the current system time as the current time of the lock by scanning the time correction two-dimensional code at the lock. And generating a reset two-dimensional code, and resetting the management password to the default management password of the lock by scanning the reset two-dimensional code at the lock. Other embodiments are analogized and will not be described in detail below.
In order to avoid the out-of-control of the two-dimension code function, preferably, in the authorization step, when the two-dimension code function is started, the master clear button of the lock is disabled; in the management step, when the two-dimension code function is closed, a master clear button of the lock is enabled. That is, only when the two-dimensional code function is in a closed state, the total clear button can take effect; as long as the two-dimensional code function is in an opened state, the total clear button cannot take effect; therefore, the function of avoiding the two-dimension code from being closed by mistake or mistake can be realized. The specific implementation is as described in the foregoing embodiments, and is not described herein again.
In a specific application scene, a two-dimensional code unlocking function can be added on the basis of realizing a home lock function, the lock design supports versions with screens and without screens, namely, the technical scheme of the invention can be used for the lock with the screens or without the screens.
In a specific application scenario, in an authorization step, firstly, a lock is initialized and then the lock is installed on a main door, or firstly, the lock is installed on the main door and then the lock is initialized, then, a password of an administrator is modified, and a two-dimension code function is opened in a management menu. The owner opens the WeChat applet, selects to add a lock, names the lock, and inputs the administrator's password. And then generating a two-dimension code, wherein the user needs to scan the two-dimension code on the lock in one minute, the lock voice prompts the operation to be successful, and the lock registration is completed. And (4) opening the WeChat applet by the owner, and selecting the start-stop time of authorized door opening and other users to be shared. And then choose to share. The sharing authorization has two types, namely time-efficiency authorization and one-time authorization. And (3) time efficiency authorization: the starting and stopping time can be defined at will, and the door can be opened for a plurality of times within the effective time. One-time authorization: the initial time is a whole hour, for example, the effective period is one hour, and the door is out of service after being opened. Only 5 one-time authorizations are allowed for the same time period.
In the step of opening the door, other users open the WeChat applet, and if the current time is within the authorization range, the two-dimensional code can be automatically popped up. The user needs to scan the code for opening the door in one minute. The lock automatically opens the door after recognizing the correct two-dimensional code. If the user has a plurality of locks, the lock to be unlocked needs to be selected firstly; the owner can also open the WeChat applet and select the lock to be opened to open the door. Preferably, the user opens the applet and selects the target lock within a certain time to open the door. For example, pressing a virtual button may open the door. Therefore, the remote authorization can be conveniently and quickly realized, the operation of quick unlocking can be realized, and the application is very convenient.
The managing step further comprises: the lock is deleted. For example, delete lock on lock operations. And the lock can be deleted by closing the two-dimension code function in the management menu, and all information of the two-dimension code is cleared. And the lock can be added by opening the two-dimension code function. The management step also comprises other two-dimension code management operations; for example, other two-dimensional code management operations include timing; for example, the owner selects a lock in the WeChat applet and then selects timing, generating a two-dimensional code. The lock time can be calibrated by scanning the code on the lock. For example, other two-dimensional code management operations include resetting a management password; for example, the owner selects a lock in the WeChat applet and then selects a reset, generating a two-dimensional code. The code is scanned on the lock, i.e., the administrator password is reset to 123456. Other locally added passwords or fingerprints are not changed. The management menu cancels the total clear function of the local total clear button when opening the two-dimension code and starts the two-dimension code when closing the two-dimension code.
In each embodiment, the two-dimensional code in the two-dimensional code function comprises a registered two-dimensional code, a door-opening two-dimensional code and the like, wherein the two-dimensional code data structure of the two-dimensional code is realized in the following manner. Preferably, the two-dimensional code adopts a character format. In view of compatibility with other two-dimensional code systems, the actual two-dimensional code format is as follows:
xxxxxxxxxxx|yyyyyyyy
the total two-dimensional code string length is 256 characters at maximum. Exceeding the maximum length is not dealt with. The yyyyyy behind the "|" is in other two-dimensional code formats, the length can be 0, and the lock is not considered. The former xxxxxxxxxxx is a two-dimensional code used by the lock, and the specific format thereof is as follows:
Head:4B
2B: software version numbers, e.g. 0201
2B: version numbers, e.g. 0100
Body: 32B. Wherein the lower level is forward.
4B:ROCK,
2B: functional definitions, for example:
the lock is added at 0x01 to the lock,
the time is calibrated at 0x03 time,
0x04 resets the management password,
the password is aged at 0x20 times,
a one-time password of 0x21,
4B: the ID of the lock is set to be,
4B: the two-dimensional code generation time Unix timestamp, which is updated each time a two-dimensional code is generated,
16B: the specific data is stored in a memory of the computer,
2B: all bytes are checked byte by byte for a sum.
Wherein Body is encrypted with AES-256. Adding head 4B, converting into 16-system character strings with 72 characters in total, and generating the two-dimensional code.
aes-key:key,32B。
For example, acbb029f15dda6efecd595bf71738075acbb029f15dda6efecd595bf71738075 is key2, key1 last 4B exclusive OR with lock ID.
It is to be noted that the two-dimensional code data structure is not limited to the above-mentioned two-dimensional code data structure, and other data structures may be adopted, and the above-mentioned two-dimensional code data structure should be regarded as an example and not as a specific, particular limitation. For example, with the two-dimensional code data structure, a specific operation flow is given below.
And the WeChat small program generates the two-dimensional code according to the function, and the two-dimensional code is automatically regenerated by using new current time when the two-dimensional code is displayed for more than one minute.
The lock then proceeds as follows:
after the two-dimensional code is read, the software number and the version number in the head are checked. If the serial numbers are consistent, processing according to different version numbers, otherwise, exiting.
The 32-bit body is read and retired if not 32-bit.
AES decodes 32-bit bodies. The head 2B and tail checksums are verified. And exiting in case of error.
The following operations are performed according to the function definition.
Adding a lock:
data:
4B: managing the SN. The value is 1. The management SN can be used for entrusting other people to perform management operation, and can only be operated once, such as time correction.
4B: and (4) seeds. Reserved for later use for enhanced adjustability.
8B: the administrator password 0x 010 x 020 x 030 x 040 x 050 x06 denotes 123456.
The number of the bits is 6 in the embodiment, and random bytes can be used for filling the bits later; more bits are also available; this can improve compatibility.
1B: the password length is, for example, 9.
And 7B, encrypting the content, compressing BCD codes and filling 0 in the code.
E.g., 0x 120 x 340 x 560 x 780 x 900 x 000 x00, representing 123456789.
Applets, such as WeChat applets: and (4) randomly generating a lock ID and a seed and recording the lock ID and the seed in a database. The two-dimensional code is generated by encryption with key 1.
Locking ends:
decrypting two-dimensional code with key1
The lock own ID is judged. And exits if not 0 xffffffffff. Wherein an added lock cannot be added any more.
And judging whether the administrator password is in the lock. And exit is not.
And recording the ID and the seed of the two-dimensional code lock. The management SN is recorded.
And the two-dimension code issuing time is taken as the current time to check the lock and the time, and the voice prompt operation is successful.
The applet will only complete the job if it confirms that the lock operation was successful. Otherwise the above steps need to be repeated.
The timing is explained as follows:
data:
4B: managing the SN. For example using the current unix timestamp.
4B: and (4) seeds.
8B: is padded with random bytes.
The small program: seeds are randomly generated. The two-dimensional code is generated by encryption with key 2.
Locking ends:
decrypting the two-dimensional code by using key 2;
judging whether the lock IDs are the same or not, and quitting if not
And judging whether the management SN is larger than the SN recorded by the local computer or not, if not, quitting, and if so, updating the SN.
And performing time correction operation. And (4) checking and correcting the lock by taking the two-dimension code issuing time as the current time, updating the seed and prompting the operation success by voice.
The user can only complete the work after confirming that the operation of the locking end is successful. Otherwise the above steps need to be repeated.
The reset management password is illustrated as follows:
data:
4B: managing the SN. For example using the current unix timestamp.
12B: is padded with random bytes.
The small program: generating two-dimensional code by using key2 for encryption
Locking ends:
the two-dimensional code is decrypted with key 2.
And judging whether the lock IDs are the same or not, and if not, exiting.
And judging whether the management SN is larger than the SN recorded by the local computer or not, if not, quitting, and if so, updating the SN.
All other administrative passwords are cleared, and one is reset to 123456 if any. And voice prompt operation is successful.
The user can only complete the work after confirming that the operation of the locking end is successful. Otherwise the above steps need to be repeated.
The setting of the aging password is explained as follows:
data:
4B: start time, Unix timestamp is used.
4B: end time, Unix timestamp is used.
8B: null, random byte padding.
The small program: generating two-dimensional code by using key2 for encryption
Locking ends:
the two-dimensional code is decrypted with key 2.
And judging whether the lock IDs are the same or not, and if not, exiting.
And judging the difference between the two-dimensional code generation time and the current lock time, and quitting if the difference exceeds 10 minutes.
And judging whether the current time of the lock is within the range from the starting time to the ending time, and if so, opening the door. The start time was judged to be 10 minutes earlier and the end time 10 minutes later.
The one-time password is set as follows:
data:
4B: start time, using Unix time stamp
4B: end time, using Unix time stamp
4B: the one-time password SN, for example, uses a unix timestamp that generates the password.
4B: null, random byte padding.
The small program:
the two-dimensional code is generated by encryption with key 2.
The starting time of the one-time password is accurate to one hour, and the effective time is one hour. A maximum of 5 sets of passwords are generated within one hour.
Locking ends:
the two-dimensional code is decrypted with key 2.
And judging whether the lock IDs are the same or not, and if not, exiting.
And judging the difference between the two-dimensional code generation time and the current lock time, and quitting if the difference exceeds 10 minutes.
And judging whether the current time of the lock is within the range from the starting time to the ending time, and if not, exiting. The start time was judged to be 10 minutes earlier and the end time 10 minutes later.
And judging the one-time password SN, if the one-time password SN is recorded, indicating that the one-time password SN opens the door and cannot open the door again. And (6) exiting.
And (6) opening the door. And updating and recording the one-time password SN.
The one-time password lock end only records 5 one-time passwords SN, and if the number of the SNs exceeds the preset number, the smallest SN is deleted.
The data for locking flash add-on is for example as follows:
4B Lock ID.
4B seed.
4B manages SNs.
4B one-time password SN 1.
4B one-time password SN 2.
4B one-time password SN 3.
4B one-time password SN 4.
4B one-time password SN 5.
For a total of 32B. When the two-dimensional code is closed and the total clear is cleared, the data is cleared.
Preferably, in the authorization step or before the authorization step, the lock management menu is additionally provided with an option for opening and closing the two-dimensional code function, so as to open or close the two-dimensional code function. When the two-dimensional code function is opened, the reset key is locked, namely the clear button is not effective, and when the two-dimensional code function is closed, the reset key is effective. A battery is arranged in the lockset to supply power to the real-time clock, so that the accuracy of time is ensured.
Preferably, the lock is realized by the two-dimensional code control method in any embodiment. Namely, the lockset is provided with a specific structure adopting the two-dimensional code control method of the lockset in any embodiment. Such as a toggle switch and a master clear button, etc., which are not described herein in detail. By adopting the lock, the two-dimension code is adopted to control the lock, a complete feasible scheme with implementation significance is provided, and the lock can be controlled through the two-dimension code, including functions of authorization, unlocking, sharing unlocking, opening or closing the two-dimension code and the like.
Further, the embodiment of the invention further comprises the technical features of the above embodiments, a lock formed by combining the technical features of the above embodiments, and a two-dimensional code control method thereof.
The technical features mentioned above are combined with each other to form various embodiments which are not listed above, and all of them are regarded as the scope of the present invention described in the specification; also, modifications and variations may be suggested to those skilled in the art in light of the above teachings, and it is intended to cover all such modifications and variations as fall within the true spirit and scope of the invention as defined by the appended claims.

Claims (10)

1. A two-dimensional code control method of a lockset is characterized by comprising an authorization step, a door opening step and a management step;
the step of authorizing comprises:
after the lockset is installed, starting the two-dimension code function;
inputting a management password into a lockset to obtain a registration two-dimensional code, and registering with the identity of an administrator by scanning the registration two-dimensional code;
selecting starting and ending time of authorized door opening and an authorized target user, and sharing the door opening authority to the authorized target user;
the step of opening the door comprises:
generating a door opening two-dimensional code according to the door opening permission;
performing door opening operation within the valid period of the door opening two-dimensional code;
the managing step includes:
and closing the two-dimension code function.
2. The two-dimensional code control method according to claim 1, wherein the two-dimensional code is scanned in the authorization step, and the door opening operation in the door opening step is performed in an APP or an applet.
3. The two-dimensional code control method according to claim 2, wherein the applet comprises a wechat applet.
4. The two-dimensional code control method according to claim 1, wherein the managing step further comprises: and generating a time correction two-dimensional code according to the current system time, and setting the current system time as the current time of the lock by scanning the time correction two-dimensional code at the lock.
5. The two-dimensional code control method according to claim 1, wherein the managing step further comprises: and generating a reset two-dimensional code, and resetting the management password to the default management password of the lock by scanning the reset two-dimensional code at the lock.
6. The two-dimensional code control method according to claim 1, wherein in the step of opening the door, before the step of opening the door, the method further comprises: and selecting a target lock.
7. The two-dimension code control method according to claim 1, wherein the number of authorized target users is determined according to the starting and ending time of authorized door opening, and the number of authorized target users is less than or equal to 5 in the same time period.
8. The two-dimensional code control method according to claim 1, wherein in the step of managing, before the two-dimensional code function is turned off, the method further comprises: and inputting a management password into the lock.
9. The two-dimension code control method according to any one of claims 1 to 8, wherein in the authorization step, when the two-dimension code function is started, a master clear button of the lock is disabled; in the management step, when the two-dimension code function is closed, a master clear button of the lock is enabled.
10. A lock, characterized by being implemented by the two-dimensional code control method as recited in any one of claims 1 to 9.
CN202010118360.7A 2020-02-26 2020-02-26 Lockset and two-dimension code control method thereof Active CN111325881B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010118360.7A CN111325881B (en) 2020-02-26 2020-02-26 Lockset and two-dimension code control method thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010118360.7A CN111325881B (en) 2020-02-26 2020-02-26 Lockset and two-dimension code control method thereof

Publications (2)

Publication Number Publication Date
CN111325881A true CN111325881A (en) 2020-06-23
CN111325881B CN111325881B (en) 2022-02-01

Family

ID=71173025

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010118360.7A Active CN111325881B (en) 2020-02-26 2020-02-26 Lockset and two-dimension code control method thereof

Country Status (1)

Country Link
CN (1) CN111325881B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112330865A (en) * 2020-07-31 2021-02-05 深圳Tcl新技术有限公司 Doorbell sharing method, system and computer readable storage medium
CN112802233A (en) * 2020-12-28 2021-05-14 徐永贵 Generation and unlocking method, device, equipment and storage medium of laboratory electronic door lock
CN112330865B (en) * 2020-07-31 2024-04-30 深圳Tcl新技术有限公司 Doorbell sharing method, doorbell sharing system and computer readable storage medium

Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE3544689A1 (en) * 1985-12-18 1987-07-02 Angewandte Digital Elektronik DEVICE FOR INITIALIZING A CIRCUIT ACCORDING TO THE PRINCIPLE OF THE SYNCHRONOUS SWITCH
JP2000149080A (en) * 1998-11-13 2000-05-30 Toshiba Corp Device and system for managing entering and leaving
US20120271723A1 (en) * 2011-04-22 2012-10-25 Penilla Angel A Electric vehicle (ev) range extending charge systems, distributed networks of charge kiosks, and charge locating mobile apps
CN104347130A (en) * 2013-07-26 2015-02-11 中广核工程有限公司 Nuclear power station radiation alarm inhibition method, device and system
CN104599417A (en) * 2015-01-15 2015-05-06 贵州大学 Security and protection management system for room
DE102014225061A1 (en) * 2014-07-17 2016-01-21 Hyundai Motor Company Sharing a key for a vehicle
CN106327637A (en) * 2016-08-25 2017-01-11 青岛亿联信息科技股份有限公司 Bluetooth door opening system based on community management and method
CN106780924A (en) * 2017-01-23 2017-05-31 无锡东源工业自动化有限公司 A kind of intelligent key management box
CN107305816A (en) * 2016-04-18 2017-10-31 致伸科技股份有限公司 Press-key structure
CN108647763A (en) * 2018-04-17 2018-10-12 新大陆(福建)公共服务有限公司 Quick Response Code life cycle management method based on memory database and computer equipment
CN108737251A (en) * 2018-05-14 2018-11-02 吴东辉 Control method for door lock, device, system, guest room application based on instant messaging
CN108986267A (en) * 2018-06-29 2018-12-11 江苏恒宝智能系统技术有限公司 A kind of user registering method and system applied to electronic password lock control
CN109064603A (en) * 2018-08-02 2018-12-21 广州大白互联网科技有限公司 A kind of method and access control system for opening gate inhibition
CN109785473A (en) * 2017-11-13 2019-05-21 丰田自动车株式会社 Key information shared system, transmission device and user terminal
CN109871923A (en) * 2019-02-19 2019-06-11 深圳市西克智能技术有限公司 Time-correcting method, terminal device and storage medium based on two dimensional code

Patent Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE3544689A1 (en) * 1985-12-18 1987-07-02 Angewandte Digital Elektronik DEVICE FOR INITIALIZING A CIRCUIT ACCORDING TO THE PRINCIPLE OF THE SYNCHRONOUS SWITCH
JP2000149080A (en) * 1998-11-13 2000-05-30 Toshiba Corp Device and system for managing entering and leaving
US20120271723A1 (en) * 2011-04-22 2012-10-25 Penilla Angel A Electric vehicle (ev) range extending charge systems, distributed networks of charge kiosks, and charge locating mobile apps
CN104347130A (en) * 2013-07-26 2015-02-11 中广核工程有限公司 Nuclear power station radiation alarm inhibition method, device and system
DE102014225061A1 (en) * 2014-07-17 2016-01-21 Hyundai Motor Company Sharing a key for a vehicle
CN104599417A (en) * 2015-01-15 2015-05-06 贵州大学 Security and protection management system for room
CN107305816A (en) * 2016-04-18 2017-10-31 致伸科技股份有限公司 Press-key structure
CN106327637A (en) * 2016-08-25 2017-01-11 青岛亿联信息科技股份有限公司 Bluetooth door opening system based on community management and method
CN106780924A (en) * 2017-01-23 2017-05-31 无锡东源工业自动化有限公司 A kind of intelligent key management box
CN109785473A (en) * 2017-11-13 2019-05-21 丰田自动车株式会社 Key information shared system, transmission device and user terminal
CN108647763A (en) * 2018-04-17 2018-10-12 新大陆(福建)公共服务有限公司 Quick Response Code life cycle management method based on memory database and computer equipment
CN108737251A (en) * 2018-05-14 2018-11-02 吴东辉 Control method for door lock, device, system, guest room application based on instant messaging
CN108986267A (en) * 2018-06-29 2018-12-11 江苏恒宝智能系统技术有限公司 A kind of user registering method and system applied to electronic password lock control
CN109064603A (en) * 2018-08-02 2018-12-21 广州大白互联网科技有限公司 A kind of method and access control system for opening gate inhibition
CN109871923A (en) * 2019-02-19 2019-06-11 深圳市西克智能技术有限公司 Time-correcting method, terminal device and storage medium based on two dimensional code

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112330865A (en) * 2020-07-31 2021-02-05 深圳Tcl新技术有限公司 Doorbell sharing method, system and computer readable storage medium
CN112330865B (en) * 2020-07-31 2024-04-30 深圳Tcl新技术有限公司 Doorbell sharing method, doorbell sharing system and computer readable storage medium
CN112802233A (en) * 2020-12-28 2021-05-14 徐永贵 Generation and unlocking method, device, equipment and storage medium of laboratory electronic door lock

Also Published As

Publication number Publication date
CN111325881B (en) 2022-02-01

Similar Documents

Publication Publication Date Title
US10991240B2 (en) Electronic access control based on optical codes
CN104966336B (en) Intelligent lock and authorization management method and device of intelligent lock
US11657365B2 (en) Secured parcel locker system with improved security
CN109272606B (en) Intelligent lock supervision equipment and method based on block chain and storage medium
US9779569B2 (en) Method for controlling door lock of home network system
US10529160B2 (en) Method for controlling door lock of home network system
US20120213362A1 (en) Distribution Of Lock Access Data For Electromechanical Locks In An Access Control System
CN106600757A (en) Wireless lock control system based on intelligent terminal and method
CN104952135A (en) Intelligent terminal light-operated door lock system and application method
CN205899637U (en) Wireless tool to lock control system based on intelligent terminal
KR101165325B1 (en) System and Method for Processing Opening and Shutting Door-Lock using One-Time Bar Code, Door-Lock Device
CN108712389A (en) A kind of intelligent lock system
CN101702248A (en) Fingerprint gate lock monitored by portable mobile phone and management system thereof
CN106097490B (en) A kind of intelligent lock, the door-locking system and method for unlocking being made of lockset
CN109982308A (en) It is a kind of to communicate the method and its system for carrying out door lock firmware upgrade by NFC
CN111325881B (en) Lockset and two-dimension code control method thereof
CN106780190B (en) Apartment management system
CN109472909A (en) Blue-tooth intelligence lock, system and application method
CN109754507A (en) Control method for door lock, device and its system
KR100597482B1 (en) Method for authenticate in/out using wireless telecommunication terminal
CN110895840A (en) Wireless-based remote door opening method and door lock device thereof
CN113450482B (en) Electronic lock control method and device, server and electronic lock
CN214202481U (en) Dynamic coded lock circuit
CN113920619B (en) Renting house management system
CN116403317A (en) Method and system for managing temporary passwords of networking door locks

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant