CN111369718A - Method and system for marking and notifying intelligent door lock hijack function - Google Patents
Method and system for marking and notifying intelligent door lock hijack function Download PDFInfo
- Publication number
- CN111369718A CN111369718A CN202010182987.9A CN202010182987A CN111369718A CN 111369718 A CN111369718 A CN 111369718A CN 202010182987 A CN202010182987 A CN 202010182987A CN 111369718 A CN111369718 A CN 111369718A
- Authority
- CN
- China
- Prior art keywords
- data
- door opening
- door lock
- verification data
- sends
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 43
- 238000012795 verification Methods 0.000 claims abstract description 75
- 230000006870 function Effects 0.000 claims description 29
- 238000004590 computer program Methods 0.000 claims description 13
- 230000004048 modification Effects 0.000 claims description 8
- 238000012986 modification Methods 0.000 claims description 8
- 230000037430 deletion Effects 0.000 claims description 7
- 238000012217 deletion Methods 0.000 claims description 7
- 230000008569 process Effects 0.000 description 4
- 238000012545 processing Methods 0.000 description 3
- 230000009286 beneficial effect Effects 0.000 description 2
- 230000005540 biological transmission Effects 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 230000000007 visual effect Effects 0.000 description 2
- 230000006872 improvement Effects 0.000 description 1
- 230000001960 triggered effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00563—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys using personal physical data of the operator, e.g. finger prints, retinal images, voicepatterns
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00571—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00896—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/12—Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/55—Push-based network services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M1/00—Substation equipment, e.g. for use by subscribers
- H04M1/72—Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
- H04M1/724—User interfaces specially adapted for cordless or mobile telephones
- H04M1/72403—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
- H04M1/72406—User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality by software upgrading or downloading
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Human Computer Interaction (AREA)
- Health & Medical Sciences (AREA)
- Computing Systems (AREA)
- General Health & Medical Sciences (AREA)
- Medical Informatics (AREA)
- Lock And Its Accessories (AREA)
Abstract
The application discloses a method for marking and notifying a hijack function of an intelligent door lock, which comprises the following steps: the intelligent door lock acquires first door opening verification data; the intelligent door lock sends the first door opening verification data to a control end; the control end sets the data type of the first door opening verification data, and sends the first door opening data and the corresponding table of the first door opening data and the data type to a server end; the intelligent door lock acquires second door opening verification data and sends the second door opening verification data to the server side; the server compares the second verification data with the corresponding table and obtains a comparison result; and the server side sends a notification message to the control side according to the comparison result. According to the method and the system, the traditional way of hijacking by hardware marks is changed into the way of controlling by an intelligent door lock control panel, the hijacking marks are added or deleted, and the cloud end judges the hijacking marks and sends an alarm notice.
Description
Technical Field
The application relates to the field of Internet of things, in particular to a method for marking and notifying a hijack function of an intelligent door lock.
Background
The existing intelligent door lock is added in a common unlocking mode (such as fingerprint door opening, password door opening, door card door opening and the like), generally, the intelligent door lock is initiated at an equipment end (a password is taken as an example here), the identity of an administrator is verified, then, the ordinary password is set and input, if the intelligent door lock is a door lock with a hijacking function, the input process of the ordinary password is the same as the input process of the ordinary password, the password needs to be input at the equipment end and marked as the hijacking password, and when the hijacking password is used for door opening, a hijacking alarm notice is given.
In addition, the management of entering the mark at the device end is inconvenient, the mark can not be changed once the mark is successfully added by the user, the mark needs to be deleted or added again at the device end, the operation is complicated, the user experience is poor, and meanwhile, the user can not clearly know under which member the hijack password added currently is bound, and the method is not visual and clear.
Disclosure of Invention
The application mainly aims to provide a method for marking and notifying the hijack function of an intelligent door lock, which comprises the following steps:
the intelligent door lock acquires first door opening verification data;
the intelligent door lock sends the first door opening verification data to a control end;
the control end sets the data type of the first door opening verification data, and sends the first door opening data and the corresponding table of the first door opening data and the data type to a server end;
the intelligent door lock acquires second door opening verification data and sends the second door opening verification data to the server side;
the server compares the second verification data with the corresponding table and obtains a comparison result;
and the server side sends a notification message to the control side according to the comparison result.
Optionally, the data types include: a normal type and a hijacking type.
Optionally, the sending, by the server side, a notification message to the control side according to the comparison result includes:
when the second verification data is of a normal type, the notification message is not sent to the control end;
and when the second verification data is of a hijack type, sending a hijack message to the control terminal.
Optionally, the method for marking and notifying the hijack function of the intelligent door lock further includes:
the control terminal modifies or deletes the corresponding table and sends a modification or deletion result to the server terminal;
and the server side deletes the corresponding table according to the modification or deletion result.
Optionally, the first door opening verification data includes a verification data body and a data ID, and the method for marking and notifying the intelligent door lock hijacking function further includes:
the intelligent door lock sends the verification data body to the server side;
the intelligent door lock sends the data ID to a control end;
the control end sets the data type of the data ID, sends the first corresponding table of the data ID and the data type and sends the first corresponding table to a server end;
the server side generates a second corresponding table among the data body, the data ID and the data type;
the intelligent door lock acquires second door opening verification data and sends the second door opening verification data to the server side;
the server compares the second verification data with the second corresponding table and obtains a comparison result;
and the server side sends a notification message to the control side according to the comparison result.
Optionally, the control end is a mobile phone app.
According to another aspect of the present application, there is also provided a system for marking and notifying an intelligent door lock hijacking function, including:
the intelligent door lock comprises an acquisition module, a first door opening verification module and a second door opening verification module, wherein the acquisition module is used for acquiring first door opening verification data and second door opening verification data by the intelligent door lock;
the sending module is used for sending the first door opening verification data to a control end and sending the second door opening verification data to the server end by the intelligent door lock;
the setting module is used for setting the data type of the first door opening verification data by the control end, and sending the first door opening data and the corresponding table of the first door opening data and the data type to the server end;
the comparison module is used for comparing the second verification data with the corresponding table by the server side and acquiring a comparison result;
and the notification module is used for sending a notification message to the control terminal by the server terminal according to the comparison result.
The application also discloses a computer device, which comprises a memory, a processor and a computer program stored in the memory and capable of being executed by the processor, wherein the processor realizes the method of any one of the above items when executing the computer program.
The application also discloses a computer-readable storage medium, a non-volatile readable storage medium, having stored therein a computer program which, when executed by a processor, implements the method of any of the above.
The present application also discloses a computer program product comprising computer readable code which, when executed by a computer device, causes the computer device to perform the method of any of the above.
Compared with the prior art, the method has the following beneficial effects:
the traditional way of hijacking by a hardware mark is changed into the way of controlling by an intelligent door lock control panel, the hijacking mark is added or deleted, and the cloud judges the hijacking mark and sends an alarm notice. The operation of the equipment end is reduced, the user can add and remove hijack marks to existing door opening modes anytime and anywhere, so that the user operation is simpler, and the user experience is improved.
The judgment logic of the firmware is reduced, the hijack alarm notification is judged and initiated by the cloud, and the loss of the equipment is greatly reduced. The firmware processing logic is simpler. Only the ordinary fingerprint password needs to be input. The method means that the ordinary intelligent door lock which does not support the hijacking function originally can also directly and quickly support the hijacking alarm function by relying on the scheme.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this application, serve to provide a further understanding of the application and to enable other features, objects, and advantages of the application to be more apparent. The drawings and their description illustrate the embodiments of the invention and do not limit it. In the drawings:
fig. 1 is a schematic flowchart of a method for marking and notifying an intelligent door lock hijacking function according to an embodiment of the application;
fig. 2 is a flowchart illustrating a method for marking and notifying an intelligent door lock hijacking function according to an embodiment of the present application;
FIG. 3 is a schematic diagram of a computer device according to one embodiment of the present application; and
FIG. 4 is a schematic diagram of a computer-readable storage medium according to one embodiment of the present application.
Detailed Description
In order to make the technical solutions better understood by those skilled in the art, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only partial embodiments of the present application, but not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
It should be noted that the terms "first," "second," and the like in the description and claims of this application and in the drawings described above are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It should be understood that the data so used may be interchanged under appropriate circumstances such that embodiments of the application described herein may be used. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
It should be noted that the embodiments and features of the embodiments in the present application may be combined with each other without conflict. The present application will be described in detail below with reference to the embodiments with reference to the attached drawings.
Referring to fig. 1-2, an embodiment of the present application provides a method for marking and notifying an intelligent door lock hijacking function, including:
s1: the intelligent door lock acquires first door opening verification data;
s2: the intelligent door lock sends the first door opening verification data to a control end;
s3: the control end sets the data type of the first door opening verification data, and sends the first door opening data and the corresponding table of the first door opening data and the data type to a server end;
s4: the intelligent door lock acquires second door opening verification data and sends the second door opening verification data to the server side;
s5: the server compares the second verification data with the corresponding table, searches the second verification data in the corresponding table, and acquires a comparison result;
s6: and the server side sends or does not send a notification message to the control side according to the comparison result.
For example, the user entered the index and middle fingers, respectively, when initially entering a fingerprint. Then the door lock sends the index finger fingerprint and the middle finger fingerprint to the control end. The control end sets the index finger fingerprint to be in a normal type and sets the middle finger fingerprint to be in a hijacking type. And after the corresponding table is formed, the index finger fingerprint, the middle finger fingerprint and the corresponding table are sent to a server.
Then, when the user opens the door and uses the index finger to perform fingerprint verification, the door lock sends the index finger fingerprint to the server, and the server compares the index finger fingerprint with the fingerprint in the corresponding table. And if the index finger fingerprint is found to correspond to the normal type, sending a door opening instruction to the door lock, and unlocking the door lock according to the door opening instruction. When a user uses the middle finger to perform fingerprint verification, the door lock sends the middle finger fingerprint to the server, and the server compares the middle finger fingerprint with the fingerprint in the corresponding table. If the fingerprint of the middle finger corresponds to the hijack type, a door opening instruction is not sent to the door lock, and hijack information is sent to the control end; or the door lock sending the door opening command and sending the hijacking information to the control terminal.
For the firmware (equipment side), only the most basic creation of fingerprints, passwords and door cards is needed, and the local firmware does not need to write hijacking related logic.
For the control panel, when the fingerprint, the password and the door card are recorded, or the fingerprint, the password and the door card which are already recorded are marked, the method is specifically represented as follows: the hardware number of the currently created door opening mode can be taken through the equipment terminal after the door opening mode is successfully created, after hijacking is set in the panel, the corresponding hardware number is only required to be informed to the cloud server and stored, and in addition, when the message pushing of the cloud is received, corresponding alarm data display is carried out.
For the cloud server, when a specific hardware number is set to be hijacked by the control panel, the hardware number needs to be stored in the server, when the door is triggered to open, the numbers reported by the door opening actions of the firmware are compared one by one, if the hardware number of the door is consistent with the hardware number marked as hijacked, the hijacked door opening is indicated, meanwhile, the hijacked message is pushed to the APP through the MQTT message, the door opening mode is informed that the hijacked door opening firmware does not need to perform logic processing on the hijacked function specially, the common intelligent door lock can be enabled to be rapidly connected with the hijacked alarm function, and the firmware is not required to be repeatedly developed.
The panel can mark arbitrary fingerprint password door card as hijack to can see directly perceivedly that current hijack is under which family member, make this function show more clearly, visual. Is convenient to operate and easy to manage.
In an embodiment of the present application, the data types include: a normal type and a hijacking type.
In an embodiment of the present application, the sending, by the server side, a notification message to the control side according to the comparison result includes:
when the second verification data is of a normal type, the notification message is not sent to the control end;
and when the second verification data is of a hijack type, sending a hijack message to the control terminal.
In an embodiment of the present application, the method for marking and notifying the hijack function of the intelligent door lock further includes:
the control terminal modifies or deletes the corresponding table and sends a modification or deletion result to the server terminal;
and the server side deletes the corresponding table according to the modification or deletion result.
The same reason is also used for deletion, and when fingerprints, passwords and door cards of the marked hijacking function are removed, the corresponding numbers are only required to be informed to the cloud server through the interface.
In an embodiment of the present application, the first door opening verification data includes a verification data body and a data ID, and the method for marking and notifying the intelligent door lock hijacking function further includes:
the intelligent door lock sends the verification data body to the server side;
the intelligent door lock sends the data ID to a control end;
the control end sets the data type of the data ID, sends the first corresponding table of the data ID and the data type and sends the first corresponding table to a server end;
the server side generates a second corresponding table among the data body, the data ID and the data type;
the intelligent door lock acquires second door opening verification data and sends the second door opening verification data to the server side;
the server compares the second verification data with the second corresponding table and obtains a comparison result;
and the server side sends a notification message to the control side according to the comparison result.
For example, the data body refers to the fingerprint itself, and the data ID refers to a unique number corresponding to the fingerprint body. For example, the index finger fingerprint number is 1, and the middle finger fingerprint number is 2. Therefore, the door lock only needs to send the serial number to the control end, the control end corresponds to the serial number type, the information transmission of the fingerprint is not needed, and the information transmission quantity is reduced.
In an embodiment of the application, the control terminal is a mobile app.
An embodiment of the present application further provides a system for intelligent door lock hijacking function marking and notification, including:
the intelligent door lock comprises an acquisition module, a first door opening verification module and a second door opening verification module, wherein the acquisition module is used for acquiring first door opening verification data and second door opening verification data by the intelligent door lock;
the sending module is used for sending the first door opening verification data to a control end and sending the second door opening verification data to the server end by the intelligent door lock;
the setting module is used for setting the data type of the first door opening verification data by the control end, and sending the first door opening data and the corresponding table of the first door opening data and the data type to the server end;
the comparison module is used for comparing the second verification data with the corresponding table by the server side and acquiring a comparison result;
and the notification module is used for sending a notification message to the control terminal by the server terminal according to the comparison result.
Compared with the prior art, the method has the following beneficial effects:
the traditional way of hijacking by a hardware mark is changed into the way of controlling by an intelligent door lock control panel, the hijacking mark is added or deleted, and the cloud judges the hijacking mark and sends an alarm notice. The operation of the equipment end is reduced, the user can add and remove hijack marks to existing door opening modes anytime and anywhere, so that the user operation is simpler, and the user experience is improved.
The judgment logic of the firmware is reduced, the hijack alarm notification is judged and initiated by the cloud, and the loss of the equipment is greatly reduced. The firmware processing logic is simpler. Only the ordinary fingerprint password needs to be input. The method means that the ordinary intelligent door lock which does not support the hijacking function originally can also directly and quickly support the hijacking alarm function by relying on the scheme.
Referring to fig. 3, the present application further provides a computer device including a memory, a processor, and a computer program stored in the memory and executable by the processor, wherein the processor implements the method of any one of the above methods when executing the computer program.
Referring to fig. 4, a computer-readable storage medium, a non-volatile readable storage medium, having stored therein a computer program which, when executed by a processor, implements any of the methods described above.
A computer program product comprising computer readable code which, when executed by a computer device, causes the computer device to perform the method of any of the above.
It will be apparent to those skilled in the art that the modules or steps of the present invention described above may be implemented by a general purpose computing device, they may be centralized on a single computing device or distributed across a network of multiple computing devices, and they may alternatively be implemented by program code executable by a computing device, such that they may be stored in a storage device and executed by a computing device, or fabricated separately as individual integrated circuit modules, or fabricated as a single integrated circuit module from multiple modules or steps. Thus, the present invention is not limited to any specific combination of hardware and software.
The above description is only a preferred embodiment of the present application and is not intended to limit the present application, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, improvement and the like made within the spirit and principle of the present application shall be included in the protection scope of the present application.
Claims (10)
1. A method for marking and notifying the hijack function of an intelligent door lock is characterized by comprising the following steps:
the intelligent door lock acquires first door opening verification data;
the intelligent door lock sends the first door opening verification data to a control end;
the control end sets the data type of the first door opening verification data, and sends the first door opening data and the corresponding table of the first door opening data and the data type to a server end;
the intelligent door lock acquires second door opening verification data and sends the second door opening verification data to the server side;
the server compares the second verification data with the corresponding table and obtains a comparison result;
and the server side sends a notification message to the control side according to the comparison result.
2. The method of intelligent door lock hijack function marking and notifying as claimed in claim 1, wherein the data types include: a normal type and a hijacking type.
3. The method for marking and notifying the hijack function of the intelligent door lock according to the claim 2, wherein the step of sending the notification message to the control end by the server end according to the comparison result comprises the following steps:
when the second verification data is of a normal type, the notification message is not sent to the control end;
and when the second verification data is of a hijack type, sending a hijack message to the control terminal.
4. The method for marking and notifying the hijack function of the intelligent door lock as claimed in claim 3, wherein the method for marking and notifying the hijack function of the intelligent door lock further comprises:
the control terminal modifies or deletes the corresponding table and sends a modification or deletion result to the server terminal;
and the server side deletes the corresponding table according to the modification or deletion result.
5. The method of claim 4, wherein the first door-opening verification data comprises a verification data body and a data ID, and the method of intelligent door-lock hijack function marking and notification further comprises:
the intelligent door lock sends the verification data body to the server side;
the intelligent door lock sends the data ID to a control end;
the control end sets the data type of the data ID, sends the first corresponding table of the data ID and the data type and sends the first corresponding table to a server end;
the server side generates a second corresponding table among the data body, the data ID and the data type;
the intelligent door lock acquires second door opening verification data and sends the second door opening verification data to the server side;
the server compares the second verification data with the second corresponding table and obtains a comparison result;
and the server side sends a notification message to the control side according to the comparison result.
6. The method for marking and notifying the hijack function of the intelligent door lock as claimed in claim 5, wherein the control terminal is a mobile phone app.
7. A system for marking and notifying the hijack function of an intelligent door lock is characterized by comprising:
the intelligent door lock comprises an acquisition module, a first door opening verification module and a second door opening verification module, wherein the acquisition module is used for acquiring first door opening verification data and second door opening verification data by the intelligent door lock;
the sending module is used for sending the first door opening verification data to a control end and sending the second door opening verification data to the server end by the intelligent door lock;
the setting module is used for setting the data type of the first door opening verification data by the control end, and sending the first door opening data and the corresponding table of the first door opening data and the data type to the server end;
the comparison module is used for comparing the second verification data with the corresponding table by the server side and acquiring a comparison result;
and the notification module is used for sending a notification message to the control terminal by the server terminal according to the comparison result.
8. A computer device comprising a memory, a processor and a computer program stored in the memory and executable by the processor, wherein the processor implements the method of any one of claims 1-6 when executing the computer program.
9. A computer-readable storage medium, a non-transitory readable storage medium, having stored therein a computer program, characterized in that the computer program, when executed by a processor, implements the method according to any one of claims 1-6.
10. A computer program product comprising computer readable code that, when executed by a computer device, causes the computer device to perform the method of any of claims 1-6.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202010182987.9A CN111369718A (en) | 2020-03-16 | 2020-03-16 | Method and system for marking and notifying intelligent door lock hijack function |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202010182987.9A CN111369718A (en) | 2020-03-16 | 2020-03-16 | Method and system for marking and notifying intelligent door lock hijack function |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| CN111369718A true CN111369718A (en) | 2020-07-03 |
Family
ID=71211992
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN202010182987.9A Pending CN111369718A (en) | 2020-03-16 | 2020-03-16 | Method and system for marking and notifying intelligent door lock hijack function |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN111369718A (en) |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN112288929A (en) * | 2020-11-06 | 2021-01-29 | 熵基科技股份有限公司 | Entrance guard duress alarm control method and device, terminal and entrance guard security system |
Citations (9)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN105160742A (en) * | 2015-09-15 | 2015-12-16 | 劳海鹏 | Method and system for carrying out judgment, alarming and information shielding on forced unlocking |
| CN106683239A (en) * | 2016-11-29 | 2017-05-17 | 深圳智乐信息科技有限公司 | Mobile terminal response based method and system |
| CN106952445A (en) * | 2017-05-11 | 2017-07-14 | 广东汇泰龙科技有限公司 | A kind of anti-abduction alarm method of domestic intelligent cloud lock and its system |
| CN107195042A (en) * | 2017-05-17 | 2017-09-22 | 王力安防科技股份有限公司 | A kind of Fingerprint Lock adds the method and device of fingerprint |
| CN107492173A (en) * | 2017-08-15 | 2017-12-19 | 青岛易方德物联科技有限公司 | A kind of cloud password access control system and method |
| CN108257274A (en) * | 2018-02-01 | 2018-07-06 | 杭州登虹科技有限公司 | A kind of intelligent door lock and its communication means |
| CN108320752A (en) * | 2018-01-26 | 2018-07-24 | 青岛易方德物联科技有限公司 | Cloud Voiceprint Recognition System and its method applied to community gate inhibition |
| CN109326025A (en) * | 2018-09-07 | 2019-02-12 | 青岛海信智慧家居系统股份有限公司 | The method for unlocking and device of intelligent door lock |
| CN209912036U (en) * | 2019-07-16 | 2020-01-07 | 杭州骏鹏科技有限公司 | Face identification security entrance guard all-in-one |
-
2020
- 2020-03-16 CN CN202010182987.9A patent/CN111369718A/en active Pending
Patent Citations (9)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN105160742A (en) * | 2015-09-15 | 2015-12-16 | 劳海鹏 | Method and system for carrying out judgment, alarming and information shielding on forced unlocking |
| CN106683239A (en) * | 2016-11-29 | 2017-05-17 | 深圳智乐信息科技有限公司 | Mobile terminal response based method and system |
| CN106952445A (en) * | 2017-05-11 | 2017-07-14 | 广东汇泰龙科技有限公司 | A kind of anti-abduction alarm method of domestic intelligent cloud lock and its system |
| CN107195042A (en) * | 2017-05-17 | 2017-09-22 | 王力安防科技股份有限公司 | A kind of Fingerprint Lock adds the method and device of fingerprint |
| CN107492173A (en) * | 2017-08-15 | 2017-12-19 | 青岛易方德物联科技有限公司 | A kind of cloud password access control system and method |
| CN108320752A (en) * | 2018-01-26 | 2018-07-24 | 青岛易方德物联科技有限公司 | Cloud Voiceprint Recognition System and its method applied to community gate inhibition |
| CN108257274A (en) * | 2018-02-01 | 2018-07-06 | 杭州登虹科技有限公司 | A kind of intelligent door lock and its communication means |
| CN109326025A (en) * | 2018-09-07 | 2019-02-12 | 青岛海信智慧家居系统股份有限公司 | The method for unlocking and device of intelligent door lock |
| CN209912036U (en) * | 2019-07-16 | 2020-01-07 | 杭州骏鹏科技有限公司 | Face identification security entrance guard all-in-one |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN112288929A (en) * | 2020-11-06 | 2021-01-29 | 熵基科技股份有限公司 | Entrance guard duress alarm control method and device, terminal and entrance guard security system |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN109104412B (en) | Account authority management method, account authority management system and computer readable storage medium | |
| WO2005124554B1 (en) | Two-stage network device configuration process | |
| US20150169860A1 (en) | Security key using multi-otp, security service apparatus, security system | |
| CN109979047B (en) | Multi-network intelligent door lock control method, storage medium, controller and fingerprint lock | |
| TW201349133A (en) | Cloud control the access control management system and the authentication method | |
| CN109361642A (en) | A kind of method and system that remote authorization is unlocked | |
| CN107864144A (en) | Obtain method and device, computer installation and the storage medium of dynamic password | |
| CN113778537B (en) | System mode switching method and device | |
| CN105072608B (en) | A method and apparatus for managing authentication tokens | |
| JP2017106296A (en) | Key management program and key management device | |
| CN112468409A (en) | Access control method, device, computer equipment and storage medium | |
| CN106204843A (en) | A kind of door-control lock and gate control system | |
| CN110061997B (en) | Intelligent account and password management system for browser | |
| CN111369718A (en) | Method and system for marking and notifying intelligent door lock hijack function | |
| CN106161733B (en) | A system switching method, device and mobile terminal | |
| CN102801728A (en) | Management method and system for automatic login of client side | |
| EP2881896A1 (en) | Near field communication tag based data transfer | |
| CN111046356B (en) | A content access method, device and computer-readable storage medium | |
| CN110517372A (en) | A kind of biological information processing method and processing device | |
| CN117711095A (en) | Information management method and related device of intelligent lock | |
| CN114531679B (en) | A mobile terminal authority interaction system and method based on user identification card | |
| CN110942537A (en) | Intelligent door lock unlocking system, method, device and medium | |
| CN111627134B (en) | Task processing method, device, server, equipment and medium | |
| CN113470223A (en) | Intelligent lock user management method, device, storage medium and system | |
| CN112164157A (en) | Real-time supervision method and system for equipment with lock based on Internet of things |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| RJ01 | Rejection of invention patent application after publication |
Application publication date: 20200703 |
|
| RJ01 | Rejection of invention patent application after publication |