CN111383366A - Security method, device, system and server based on networked intelligent lock - Google Patents

Security method, device, system and server based on networked intelligent lock Download PDF

Info

Publication number
CN111383366A
CN111383366A CN202010105794.3A CN202010105794A CN111383366A CN 111383366 A CN111383366 A CN 111383366A CN 202010105794 A CN202010105794 A CN 202010105794A CN 111383366 A CN111383366 A CN 111383366A
Authority
CN
China
Prior art keywords
unlocking
information
person
client
authorizer
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010105794.3A
Other languages
Chinese (zh)
Inventor
李子祥
周勇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiangsu Panchi Information Technology Co ltd
Hunan Yuzhu Yumei Network Technology Co ltd
Original Assignee
Jiangsu Panchi Information Technology Co ltd
Hunan Yuzhu Yumei Network Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jiangsu Panchi Information Technology Co ltd, Hunan Yuzhu Yumei Network Technology Co ltd filed Critical Jiangsu Panchi Information Technology Co ltd
Priority to CN202010105794.3A priority Critical patent/CN111383366A/en
Publication of CN111383366A publication Critical patent/CN111383366A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00563Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys using personal physical data of the operator, e.g. finger prints, retinal images, voicepatterns
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00817Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00896Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/55Push-based network services
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C2009/00968Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys shape of the data carrier
    • G07C2009/00976Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys shape of the data carrier card

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Alarm Systems (AREA)

Abstract

The invention discloses a security method, a security device, a security system and a server based on a networked intelligent lock, wherein an unlocking instruction sent by an unlocking person client is sent to the server through a network and is sent to an intelligent lock end; and simultaneously, the unlocking information of the intelligent lock end is sent to the server end through the network. The server side sends unlocking information to the client side (such as a smart phone, a telephone or a third-party server) of the authorized person by using the modes of message pushing, short message calling, telephone message leaving and the like. Therefore, the user can master the unlocking information of the intelligent lock in real time. Meanwhile, the door opening data is analyzed, whether unlocking information does not exist at a specific lock end of a certain person in a specified time period or whether unlocking information does not exist in a certain lock in a certain time period is judged, and the analysis results of the unlocking information are notified to the user in the modes of message pushing, short message telephone or message telephone and the like. The monitoring of the track of the appointed unlocking person is realized, so that the safety monitoring of related personnel is ensured, and if students do not go home in time after leaving school.

Description

Security method, device, system and server based on networked intelligent lock
Technical Field
The invention relates to the technical field of security, in particular to a security method, a security device, a security system and a server based on an intelligent lock.
Background
At present, although the intelligent lock can be connected with a server, and can be unlocked after the server is successfully verified by sending various information such as fingerprints, passwords, identity cards and IC cards to the server, the unlocking function can be completed if the information such as the fingerprints, the passwords, the identity cards and the IC cards is stolen once, and therefore the existing intelligent lock is locked in a large potential safety hazard.
In addition, current intelligence lock can't monitor its in-service behavior in the use to can't make the user carry out the full aspect to the degree of safety and control, thereby reduced user's use and experienced.
Disclosure of Invention
The invention provides a security method based on an intelligent network lock, which is applied to a server and comprises the following steps:
receiving an unlocking instruction sent by an unlocking person client and unlocking information sent by an intelligent lock end;
matching the unlocking instruction with the unlocking information, and if the unlocking instruction and the unlocking information are matched to be consistent, sending an unlocking execution instruction to the intelligent lock end and sending the unlocking information, the unlocking instruction, the unlocking person information and the authorizer information to an authorizer client; otherwise, generating first alarm information and sending the first alarm information to the authorizer client;
and regularly checking all the unlocking information of each intelligent lock end, judging whether the appointed unlocking person information exists at a set time point or in a set time period, if not, generating second warning information, and sending the second warning information to the authorizer client.
Preferably, the security method further comprises: and carrying out various forms of visual display on the various information sent to the client of the authorizer.
Preferably, the unlocking instruction includes: the id of the client of the person who unlocks, the fingerprint of the person who unlocks, the ID card or the IC card of the person who unlocks, the unlocking password or the shared unlocking temporary password, and the equipment information used by the information are sent to the client of the person who authorizes the unlocks; the unlocking information includes: unlocking starting time, unlocking stopping time, unlocking person fingerprint or unlocking person identification card or IC card or unlocking password or shared unlocking temporary password.
Preferably, the device information used for sending information to the authorizer client includes a device number and a time when the device is allowed to receive information.
Preferably, the information is sent to the authorizer client in a way of real-time push of a telephone message, a telephone voice or an app, and the way of real-time push of the telephone message, the telephone voice or the app is set by the authorizer client.
Preferably, the sending information to the authorizer client includes:
locking the information of the unlocking person and the information of the authorized person according to the unlocking instruction and the unlocking information;
according to the method for sending information to the authorizer client side set by the authorizer client side obtained by the authorizer;
and calling a corresponding interface according to the mode of sending the information to the authorizer client, and sending the information to the equipment with the specified number within the time that the equipment allows to receive the information.
Preferably, the locking the unlocking person and the authorized person according to the unlocking instruction and the unlocking information includes:
and matching the stored fingerprint of the unlocking person, the identity card of the unlocking person, the IC card, the unlocking password or the shared unlocking temporary password according to the fingerprint of the unlocking person, the identity card of the unlocking person, the IC card, the unlocking password or the shared unlocking temporary password, and locking corresponding information of the unlocking person and the information of the authorized person according to the matched information.
The invention also provides a security device based on the networked intelligent lock, which is used for realizing the security method, and the security device comprises:
the unlocking person client information transceiving module is used for receiving an unlocking instruction sent by the unlocking person client;
the authorizer client information transceiver module is used for sending the unlocking information, the unlocking instruction, the information of the unlocking person and the information of the authorizer to the authorizer client when the unlocking instruction is matched with the unlocking information in a consistent manner, and is also used for sending first warning information and second warning information to the authorizer client;
the intelligent lock end information receiving and sending module is used for receiving unlocking information sent by the intelligent lock end and sending an unlocking execution instruction to the intelligent lock end when the unlocking instruction is matched with the unlocking information;
the matching module is used for matching the unlocking instruction with the unlocking information and obtaining a result of whether the matching is consistent;
the first warning information generating module is used for generating first warning information when the unlocking instruction is not matched with the unlocking information;
the second warning information generating module is used for generating second warning information when the specified information of the unlocking person does not exist in the set time point or time period;
and the unlocking information checking and judging module is used for checking all the unlocking information of each intelligent lock terminal at regular time, judging whether the specified unlocking person information exists at a set time point or in a set time period, and obtaining a judgment result.
The invention provides a security system based on a networked intelligent lock, which comprises a server, an unlocking person client, an intelligent lock end and an authorized person client, wherein the server is used for receiving an unlocking instruction sent by the unlocking person client and unlocking information sent by the intelligent lock end;
the server is also used for matching the unlocking instruction with the unlocking information, and if the unlocking instruction is matched with the unlocking information, the server sends an unlocking execution instruction to the intelligent lock end and sends the unlocking information, the unlocking instruction, the unlocking person information and the authorizer information to the authorizer client; otherwise, generating first alarm information and sending the first alarm information to the authorizer client;
the server is further used for regularly checking all the unlocking information of each intelligent lock end, judging whether the appointed unlocking person information exists at a set time point or in a set time period, if not, generating second warning information and sending the second warning information to the authorizer client.
A fourth aspect of the present invention provides a server, including a processor and a memory connected to the processor, where the memory stores a plurality of instructions, and the instructions are loaded and executed by the processor, so that the processor can execute the security method according to the first aspect.
Drawings
FIG. 1 is a schematic flow chart of a security method based on an intelligent lock according to the present invention;
fig. 2 is a schematic structural diagram of the security device based on the intelligent lock according to the present invention.
Detailed description of the preferred embodiments
In order to better understand the technical solution, the technical solution will be described in detail with reference to the drawings and the specific embodiments.
Example one
As shown in FIG. 1, the invention provides a security method based on a networked intelligent lock, which is applied to a server and comprises the following steps:
receiving an unlocking instruction sent by an unlocking person client and unlocking information sent by an intelligent lock end;
matching the unlocking instruction with the unlocking information, and if the unlocking instruction and the unlocking information are matched to be consistent, sending an unlocking execution instruction to the intelligent lock end and sending the unlocking information, the unlocking instruction, the unlocking person information and the authorizer information to an authorizer client; otherwise, generating first alarm information and sending the first alarm information to the authorizer client;
and regularly checking all the unlocking information of each intelligent lock end, judging whether the appointed unlocking person information exists at a set time point or in a set time period, if not, generating second warning information, and sending the second warning information to the authorizer client.
In the method, the client of the unlocking person, the client of the intelligent lock and the client of the authorized person are in data connection with the server, wherein the client of the unlocking person and the client of the authorized person can be devices such as a mobile phone, a computer, an IPAD and the like, and can also be a third-party server.
In the practical application process, an unlocking person can send an unlocking instruction comprising the unlocking mode to a server through a client before using the unlocking mode comprising fingerprints, identity cards, IC cards, unlocking passwords or shared unlocking temporary passwords and the like, inputting the unlocking mode into an intelligent lock and triggering the intelligent lock to be unlocked; then the unlocking person inputs unlocking mode information included in the unlocking instruction sent to the server into the intelligent lock, and after the intelligent lock receives the information of a certain unlocking mode input by the unlocking person, the unlocking information including the unlocking mode is sent to the server; the server receives an unlocking instruction sent by the client of an unlocking person and unlocking information sent by the intelligent lock terminal, the unlocking instruction and the unlocking information are compared and matched, if the information contained in the unlocking instruction and the information contained in the unlocking information are matched, for example, the unlocking mode can be matched consistently, the unlocking instruction and the unlocking information are considered to be matched consistently, the unlocking behavior has safety, the server generates an unlocking execution instruction after confirming the unlocking safety and sends the unlocking execution instruction to the intelligent lock terminal, and the intelligent lock terminal receives and executes the unlocking execution instruction, so that the intelligent lock is unlocked. The server sends the unlocking execution instruction to the intelligent lock end, and simultaneously sends the unlocking instruction sent by the unlocking person client and the unlocking information sent by the intelligent lock end to the authorizer client, so that the authorizer can know the unlocking instruction and the unlocking information and master the related information of the intelligent lock when the intelligent lock is opened.
According to the method, before unlocking is executed, the information acquired through different ways is compared and matched, and only under the condition that the matching is consistent, the unlocking execution instruction is sent and executed to open the intelligent lock. Once the information acquired through different ways is compared and matched with each other, an unlocking execution instruction cannot be sent, the intelligent lock cannot be opened, and when the information is matched with each other, first warning information can be generated and sent to the client of the authorizer, so that the safety of the intelligent lock being opened is guaranteed.
Simultaneously, when can unblank, the server still can all send the unlocking instruction that the person's of unblanking client sent and the information of unblanking that the intelligence lock end sent to the authorizer client, when can not unblank, the server still can send first warning message to the authorizer client, make the authorizer no matter under any kind of circumstances, can both in time comprehensive understanding the instruction of unblanking and the information of unblanking, thereby grasp actual operation information of unblanking and the condition of unblanking, and then can be in time when taking corresponding measure when taking unsafe factor, further guarantee the security.
According to the method, after the unlocking instruction is sent to the server, the server can also send the unlocking instruction to the intelligent lock end through the network, and after the intelligent lock end receives unlocking information input by an unlocking person, the unlocking instruction and the unlocking information can be directly compared at the intelligent lock end, whether the unlocking instruction and the unlocking information are matched or not is judged, and the matching result is sent to the server through the network.
In the practical application process, for the household intelligent lock, the matching process of the unlocking instruction and the unlocking information can be carried out at the intelligent lock end, and for the intelligent lock for the large-size door for the property, the matching process of the unlocking instruction and the unlocking information can be carried out at the server end because the unlocking instructions of all users cannot be stored possibly.
The method provided by the invention can greatly improve the unlocking safety, and also can be used for carrying out timing check on the unlocking information sent by each intelligent lock connected with the server, judging whether the appointed unlocking person information exists in the set time point or time period according to the checking result, grasping the whereabouts, the physical health condition, the safety condition and the like of the unlocking person according to the judging result, so that the monitoring of the authorized person on all aspects of the unlocking person is indirectly realized, and further, the measures are taken in time under the condition that the appointed unlocking person does not have the unlocking behavior in the set unlocking time.
The purpose of the checking and judging is to indirectly monitor the safety condition, the physical health condition, the whereabouts and the like of the designated unlocking person in order that the authorized person performs the unlocking action on the designated unlocking person at the designated unlocking time, so that the set time point, the set time period and the designated unlocking person can be set by the authorized person through the authorized person client and stored in the server.
In the application process of the method, after receiving the unlocking information sent by the intelligent lock terminal and the unlocking instruction sent by the unlocking person client, the server can lock the unlocking person and the authorized person according to the unlocking information and the information contained in the unlocking instruction, further lock the specified unlocking person set by the authorized person and the set time point or time period, and realize the corresponding relationship among the intelligent lock, the unlocking person and the authorized person, wherein the authorized person can specify a plurality of unlocking persons, can also set a plurality of time points or time periods, can set one unlocking time point or time period for one unlocking person, and can also set a plurality of unlocking times or time periods for one unlocking person, the server can check whether the unlocking information of the intelligent lock corresponding to the unlocking person in the set time point or time period exists or not on the basis of the specified unlocking person, and can also be on the basis of the set time point or time period, all unlocking information of the intelligent lock corresponding to the authorized person in the set time point or time period is checked, whether the unlocking information of the specified unlocking person exists is checked from all unlocking information, and specifically, which checking and judging program is adopted can be selected and set according to actual conditions.
If the specified information of the unlocking person does not exist in the set time point or the set time period after the examination and the judgment, the specified information of the unlocking person does not have the unlocking behavior in the set time point or the set time period, second warning information is generated and sent to the client of the authorized person, and the authorized person can timely master the abnormal condition of unlocking according to the warning information, so that the safety condition, the physical health condition or the whereabouts and the like of the specified unlocking person are indirectly monitored.
As an embodiment, for example, the smart lock is a smart lock of a home door, the designated unlocking person is a child, and the authorized person is dad or mom, if the child goes home alone after school, the parent pays more attention to whether the child directly goes home after school, and the child safely goes home, so the parent can presume a time point or a time period when the child directly goes home after school according to the fixed school time of the child, and uses the time point or the time period as a set time point or a set time period when the child performs unlocking behavior, if the child performs unlocking behavior within the set time point or the set time period, the server receives related unlocking information of the child, and then the server indicates that the child directly and safely goes home after school, and otherwise, the child does not directly and safely go home after school. Therefore, by adopting the method provided by the invention, parents can indirectly know and monitor the whereabouts and safety conditions of the children.
As another example, the smart lock is a home smart lock, the designated unlocking person is an old person, the authorized person is a child, if the old person lives alone, the child is more concerned about the physical health condition and the safety condition of the old person, so the child can presume the door opening time point or the time period fixed every day by the old person according to the fixed living habits of the old person, such as buying vegetables out, walking out and the like, and use the time point or the time period as the set time point or the time period for designating the unlocking behavior of the unlocking person-the old person, if the old person takes the unlocking behavior in the set time point or the time period, the server receives the related unlocking information of the old person, and the old person is explained to maintain the normal living habits, such as buying vegetables out, walking out and the like, and the physical health condition and the safety condition are normal without abnormality; on the contrary, the old people do not maintain normal living habits, such as buying vegetables and walking outside, and the health condition and the safety condition may be abnormal. Therefore, the method provided by the invention can enable the children to indirectly know and monitor the physical condition and the safety condition of the old. In this embodiment, the child may need to monitor the time of going out of the old and also the time of coming home of the old, so that the unlocking time point or time period may need to be set for the time of going out and the time of coming home, respectively, the unlocking time point or time period may need to be set for the time of going out and the time of coming home for buying dishes, and the unlocking time point or time period may need to be set for the time of going out and the time of coming home for walking away, that is, multiple unlocking time points or time periods need to be set for one designated unlocking person.
As can be understood by those skilled in the art, the method provided by the invention can also be applied to other scenes, so that the indirect monitoring of the relevant conditions of the appointed unlocking person is realized, and corresponding measures are taken in time according to the monitoring conditions.
In an embodiment of the present invention, various types of information sent to the authorizer client, such as unlocking information, an unlocking instruction, information of an unlocking person and information of an authorizer, first warning information, second warning information, and the like, may be visually displayed to the user in various forms at the authorizer client, such as in a web form, a data list of a mobile phone or various diagrams, or a third-party server.
In one embodiment of the present invention, the unlocking instruction includes: the id of the client of the person who unlocks, the fingerprint of the person who unlocks, the ID card or the IC card of the person who unlocks, the unlocking password or the shared unlocking temporary password, and the equipment information used by the information are sent to the client of the person who authorizes the unlocks; the unlocking information includes: unlocking starting time, unlocking stopping time, unlocking person fingerprint or unlocking person identification card or IC card or unlocking password or shared unlocking temporary password.
In the embodiment, the unlocking instruction and the information of the unlocking person form a one-to-one correspondence relationship, the information of the unlocking person is stored in the server in advance, after the unlocking person sends the unlocking instruction to the server through the client of the unlocking person, the server can compare the received unlocking instruction with the stored information of the unlocking person, the unlocking instruction is verified through the stored information of the unlocking person, and if the verification is passed, the subsequent steps are carried out. Thereby further ensuring the safety of unlocking.
When the unlocking instruction is matched with the unlocking information consistently and needs to be sent to the client of the authorizer, all information contained in the unlocking instruction can be sent to the client of the authorizer, the result of the matching consistency can also be directly sent, and meanwhile, information which is concerned by the authorizer, such as unlocking starting time, unlocking ending time, the name of the authorizer and the like, is sent, so that the authorizer can master the unlocking information rapidly and accurately.
The device information used for sending the information to the authorizer client comprises a device number and the time of allowing the device to receive the information.
In the embodiment, the equipment information used for sending the information to the authorizer client is sent to the server through the authorizer client, and the equipment information can be sent from the authorizer client through the authorizer only under the condition that the authorizer discloses or authorizes the authorizer, so that the safety of subsequently triggering the intelligent lock to be opened is further ensured, and the situations of embezzlement and the like are avoided.
The device information comprises a number and time allowing information receiving, so that an authorizer can receive information at the set or selected time conveniently, and the use experience of the authorizer is improved. The time for receiving the information is set or selected by the authorizer, so that the time is only required to be approved by the authorizer, and the time can be unlimited, a certain time period or a plurality of time periods.
In an embodiment of the present invention, the sending of the information to the authorizer client is performed by using a telephone message, a telephone voice, or an app real-time push manner.
One or more of the above-described information transmission methods may be selected.
As will be appreciated by those skilled in the art, in addition to the above-described manner of sending information, other manners of sending information are possible, such as mail or WeChat. However, in these methods, the system automatically calls the relevant program according to the method set by the user to automatically complete the information transmission.
In an embodiment of the present invention, the manner of telephone message leaving, telephone voice or app real-time pushing is set by the authorizer client.
In the actual operation process, the specific mode of sending information to the authorizer client is provided by the system, and then the authorizer sets or selects the information at the authorizer client according to the self condition.
In another embodiment of the present invention, the sending information to the authorizer client includes:
locking the information of the unlocking person and the information of the authorized person according to the unlocking instruction and the unlocking information;
according to the method for sending information to the authorizer client side set by the authorizer client side obtained by the authorizer;
and calling a corresponding interface according to the mode of sending the information to the authorizer client, and sending the information to the equipment with the specified number within the time that the equipment allows to receive the information.
In the method, if an authorizer selects or sets a message sending mode of a telephone message through an authorizer client, after a server receives an unlocking instruction and unlocking information, an api corresponding to the message sending mode is called according to equipment information, such as an equipment number and time for allowing information to be received, included in the unlocking instruction, for sending the information to the authorizer client, and a telephone short message is sent within the time for allowing information to be received to inform the authorizer of relevant information, wherein the relevant information for informing the authorizer specifically comprises: the first warning information, the second warning information, unlocking instructions, unlocking information at a set time point or time period, and the like. Therefore, the method can be used for sending corresponding different information to the client of the authorizer according to specific conditions.
If the authorizer selects or sets a telephone voice information sending mode through the authorizer client, after the server receives an unlocking instruction and unlocking information, according to equipment information, such as an equipment number and time for allowing to receive the information, included in the unlocking instruction, used for sending the information to the authorizer client, calling an api corresponding to the telephone voice sending mode, and notifying the authorizer of relevant information in the time for allowing to receive through telephone voice, wherein the relevant information for notifying the authorizer specifically comprises: the first warning information, the second warning information, unlocking instructions, unlocking information at a set time point or time period, and the like. Therefore, the method can be used for sending corresponding different information to the client of the authorizer according to specific conditions.
If the authorizer selects or sets an information sending mode of app real-time pushing through the authorizer client, after the server receives an unlocking instruction and unlocking information, according to equipment information, such as an equipment number and time allowing information receiving, included in the unlocking instruction and used for sending information to the authorizer client, an api corresponding to the app real-time pushing mode is called, app real-time pushing is carried out within the time allowing receiving to inform the authorizer of relevant information, wherein the relevant information informing the authorizer specifically comprises: the first warning information, the second warning information, unlocking instructions, unlocking information at a set time point or time period, and the like. Therefore, the method can be used for sending corresponding different information to the client of the authorizer according to specific conditions.
Compared with the traditional lock or the intelligent lock on the market, the method provided by the invention can inform the authorized person of the door opening information including the information of the unlocking person, the unlocking time, the unlocking mode (password, identity card, fingerprint and the like) and the like through the modes of telephone message leaving, telephone voice, app real-time pushing and the like, and the information informing process can be automatically realized, so that the authorized person can accurately monitor the related information.
In an embodiment of the present invention, the locking the unlocking person and the authorized person according to the unlocking instruction and the unlocking information includes:
and matching the stored fingerprint of the unlocking person, the identity card of the unlocking person, the IC card, the unlocking password or the shared unlocking temporary password according to the fingerprint of the unlocking person, the identity card of the unlocking person, the IC card, the unlocking password or the shared unlocking temporary password, and locking corresponding information of the unlocking person and the information of the authorized person according to the matched information.
Example two
As shown in fig. 2, the present invention provides a security device based on an intelligent networked lock, which is used to implement the security method according to the first embodiment, and the security device includes:
the unlocking person client information transceiving module is used for receiving an unlocking instruction sent by the unlocking person client;
the authorizer client information transceiver module is used for sending the unlocking information, the unlocking instruction, the information of the unlocking person and the information of the authorizer to the authorizer client when the unlocking instruction is matched with the unlocking information in a consistent manner, and is also used for sending first warning information and second warning information to the authorizer client;
the intelligent lock end information receiving and sending module is used for receiving unlocking information sent by the intelligent lock end and sending an unlocking execution instruction to the intelligent lock end when the unlocking instruction is matched with the unlocking information;
the matching module is used for matching the unlocking instruction with the unlocking information and obtaining a result of whether the matching is consistent;
the first warning information generating module is used for generating first warning information when the unlocking instruction is not matched with the unlocking information;
the second warning information generating module is used for generating second warning information when the specified information of the unlocking person does not exist in the set time point or time period;
and the unlocking information checking and judging module is used for checking all the unlocking information of each intelligent lock terminal at regular time, judging whether the specified unlocking person information exists at a set time point or in a set time period, and obtaining a judgment result.
Wherein the unlocking instruction comprises: the id of the client of the person who unlocks, the fingerprint of the person who unlocks, the ID card or the IC card of the person who unlocks, the unlocking password or the shared unlocking temporary password, and the equipment information used by the information are sent to the client of the person who authorizes the unlocks; the unlocking information includes: unlocking starting time, unlocking stopping time, unlocking person fingerprint or unlocking person identification card or IC card or unlocking password or shared unlocking temporary password.
The various information sent to the client of the authorizer can be visually displayed in various forms.
Further, the device information used for sending information to the authorizer client includes a device number and a time when the device is allowed to receive information.
And sending information to the authorizer client in a mode of telephone message leaving, telephone voice or app real-time pushing.
And the real-time push mode of the telephone messages, the telephone voice or the apps is set by the authorizer client.
Further, the sending information to the authorizer client includes:
locking the information of the unlocking person and the information of the authorized person according to the unlocking instruction and the unlocking information;
according to the method for sending information to the authorizer client side set by the authorizer client side obtained by the authorizer;
and calling a corresponding interface according to the mode of sending the information to the authorizer client, and sending the information to the equipment with the specified number within the time that the equipment allows to receive the information.
Wherein, according to unblank instruction with the unlocking information locking person of unblanking and authorized person includes:
and matching the stored fingerprint of the unlocking person, the identity card of the unlocking person, the IC card, the unlocking password or the shared unlocking temporary password according to the fingerprint of the unlocking person, the identity card of the unlocking person, the IC card, the unlocking password or the shared unlocking temporary password, and locking corresponding information of the unlocking person and the information of the authorized person according to the matched information.
The working principle and the implementation effect of the security device provided in the embodiment can be described in the first embodiment, and are not described herein again.
EXAMPLE III
The embodiment of the invention provides a security system (see figure 1) based on a networked intelligent lock, which comprises a server, an unlocking person client, an intelligent lock end and an authorized person client, wherein the server is used for receiving an unlocking instruction sent by the unlocking person client and unlocking information sent by the intelligent lock end;
the server is also used for matching the unlocking instruction with the unlocking information, and if the unlocking instruction is matched with the unlocking information, the server sends an unlocking execution instruction to the intelligent lock end and sends the unlocking information, the unlocking instruction, the unlocking person information and the authorizer information to the authorizer client; otherwise, generating first alarm information and sending the first alarm information to the authorizer client;
the server is further used for regularly checking all the unlocking information of each intelligent lock end, judging whether the appointed unlocking person information exists at a set time point or in a set time period, if not, generating second warning information and sending the second warning information to the authorizer client.
The working principle and the implementation effect of the security system provided in this embodiment can be referred to the description of the first embodiment, which is not described herein again.
Example four
The invention also provides a server comprising a processor and a memory connected to the processor, wherein the memory stores a plurality of instructions, and the instructions can be loaded and executed by the processor to enable the processor to execute the method according to the first embodiment.
The processor may include one or more processing cores, among others. The processor connects various parts within the entire server using various interfaces and lines, performs various functions of the terminal and processes data by executing or executing instructions, programs, code sets, or instruction sets stored in the memory, and calling data stored in the memory.
The Memory may include a Random Access Memory (RAM) or a Read-Only Memory (Read-Only Memory). The memory may be used to store instructions, programs, code sets, or instructions.
In addition, a display screen may be included for displaying user interfaces of the respective applications.
Those skilled in the art will appreciate that the above-described server may also include more or fewer components, or combine certain components, or a different arrangement of components. For example, the server further includes components such as a radio frequency circuit, an input unit, a sensor, an audio circuit, and a power supply, which are not described herein again.
While preferred embodiments of the present invention have been described, additional variations and modifications in those embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims be interpreted as including preferred embodiments and all such alterations and modifications as fall within the scope of the invention. It will be apparent to those skilled in the art that various changes and modifications may be made in the present invention without departing from the spirit and scope of the invention. Thus, if such modifications and variations of the present invention fall within the scope of the claims of the present invention and their equivalents, the present invention is also intended to include such modifications and variations.

Claims (10)

1. A security method based on a networked intelligent lock is characterized by being applied to a server and comprising the following steps:
receiving an unlocking instruction sent by an unlocking person client and unlocking information sent by an intelligent lock end;
matching the unlocking instruction with the unlocking information, and if the unlocking instruction and the unlocking information are matched to be consistent, sending an unlocking execution instruction to the intelligent lock end and sending the unlocking information, the unlocking instruction, the unlocking person information and the authorizer information to an authorizer client; otherwise, generating first alarm information and sending the first alarm information to the authorizer client;
and regularly checking all the unlocking information of each intelligent lock end, judging whether the appointed unlocking person information exists at a set time point or in a set time period, if not, generating second warning information, and sending the second warning information to the authorizer client.
2. The security method based on the networked intelligent lock according to claim 1, wherein the security method further comprises: and carrying out various forms of visual display on the various information sent to the client of the authorizer.
3. The security method based on the networked intelligent lock according to claim 1, wherein the unlocking instruction comprises: the id of the client of the person who unlocks, the fingerprint of the person who unlocks, the ID card or the IC card of the person who unlocks, the unlocking password or the shared unlocking temporary password, and the equipment information used by the information are sent to the client of the person who authorizes the unlocks; the unlocking information includes: unlocking starting time, unlocking stopping time, unlocking person fingerprint or unlocking person identification card or IC card or unlocking password or shared unlocking temporary password.
4. The networked intelligent lock-based security method according to claim 3, wherein the device information for sending information to the authorizer client includes a device number and a time when the device is allowed to receive information.
5. The security method based on the networked intelligent lock according to claim 4, wherein the information is sent to the authorizer client in a way of telephone message leaving, telephone voice or app real-time pushing, and the way of telephone message leaving, telephone voice or app real-time pushing is set through the authorizer client.
6. The security method based on the networked intelligent lock according to claim 5, wherein the sending information to the authorizer client comprises:
locking the information of the unlocking person and the information of the authorized person according to the unlocking instruction and the unlocking information;
according to the method for sending information to the authorizer client side set by the authorizer client side obtained by the authorizer;
and calling a corresponding interface according to the mode of sending the information to the authorizer client, and sending the information to the equipment with the specified number within the time that the equipment allows to receive the information.
7. The security method based on the networked intelligent lock according to claim 6, wherein the locking of the unlocking person and the authorized person according to the unlocking instruction and the unlocking information comprises the following steps:
and matching the stored fingerprint of the unlocking person, the identity card of the unlocking person, the IC card, the unlocking password or the shared unlocking temporary password according to the fingerprint of the unlocking person, the identity card of the unlocking person, the IC card, the unlocking password or the shared unlocking temporary password, and locking corresponding information of the unlocking person and the information of the authorized person according to the matched information.
8. A security device based on a networked intelligent lock, which is used for realizing the security method of any one of claims 1 to 7, and comprises:
the unlocking person client information transceiving module is used for receiving an unlocking instruction sent by the unlocking person client;
the authorizer client information transceiver module is used for sending the unlocking information, the unlocking instruction, the information of the unlocking person and the information of the authorizer to the authorizer client when the unlocking instruction is matched with the unlocking information in a consistent manner, and is also used for sending first warning information and second warning information to the authorizer client;
the intelligent lock end information receiving and sending module is used for receiving unlocking information sent by the intelligent lock end and sending an unlocking execution instruction to the intelligent lock end when the unlocking instruction is matched with the unlocking information;
the matching module is used for matching the unlocking instruction with the unlocking information and obtaining a result of whether the matching is consistent;
the first warning information generating module is used for generating first warning information when the unlocking instruction is not matched with the unlocking information;
the second warning information generating module is used for generating second warning information when the specified information of the unlocking person does not exist in the set time point or time period;
and the unlocking information checking and judging module is used for checking all the unlocking information of each intelligent lock terminal at regular time, judging whether the specified unlocking person information exists at a set time point or in a set time period, and obtaining a judgment result.
9. A security system based on a networked intelligent lock is characterized by comprising a server, an unlocking person client, an intelligent lock end and an authorized person client, wherein the server is used for receiving an unlocking instruction sent by the unlocking person client and unlocking information sent by the intelligent lock end;
the server is also used for matching the unlocking instruction with the unlocking information, and if the unlocking instruction is matched with the unlocking information, the server sends an unlocking execution instruction to the intelligent lock end and sends the unlocking information, the unlocking instruction, the unlocking person information and the authorizer information to the authorizer client; otherwise, generating first alarm information and sending the first alarm information to the authorizer client;
the server is further used for regularly checking all the unlocking information of each intelligent lock end, judging whether the appointed unlocking person information exists at a set time point or in a set time period, if not, generating second warning information and sending the second warning information to the authorizer client.
10. A server comprising a processor and a memory coupled to the processor, the memory storing a plurality of instructions that are loadable and executable by the processor to enable the processor to perform the method according to any of claims 1-7.
CN202010105794.3A 2020-02-20 2020-02-20 Security method, device, system and server based on networked intelligent lock Pending CN111383366A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010105794.3A CN111383366A (en) 2020-02-20 2020-02-20 Security method, device, system and server based on networked intelligent lock

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010105794.3A CN111383366A (en) 2020-02-20 2020-02-20 Security method, device, system and server based on networked intelligent lock

Publications (1)

Publication Number Publication Date
CN111383366A true CN111383366A (en) 2020-07-07

Family

ID=71215204

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010105794.3A Pending CN111383366A (en) 2020-02-20 2020-02-20 Security method, device, system and server based on networked intelligent lock

Country Status (1)

Country Link
CN (1) CN111383366A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113380014A (en) * 2021-06-01 2021-09-10 广东好太太智能家居有限公司 Intelligent lock alarm system, method and storage medium based on cloud platform

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2012167500A (en) * 2011-02-16 2012-09-06 King Tsushin Kogyo Kk Storage system for home security
CN105427413A (en) * 2015-11-02 2016-03-23 北京奇虎科技有限公司 Intelligent unlocking method and intelligent lock
CN105913513A (en) * 2016-04-05 2016-08-31 深圳市汇海威视科技有限公司 Control method and system for door lock system
KR20180068691A (en) * 2016-12-14 2018-06-22 주식회사 에스원 Good-Morning Alam Service Method by Using Unlocking data of Smart Phone and Apparatue thereof
CN108205871A (en) * 2017-12-21 2018-06-26 广东汇泰龙科技有限公司 A kind of child custody method based on cloud lock, system
CN108804165A (en) * 2018-05-25 2018-11-13 李昭强 A kind of information processing method, device and storage medium based on user's unlocking behavioural analysis
CN109272613A (en) * 2018-08-27 2019-01-25 深圳市便易通科技有限公司 A kind of Internet of Things safe electronic access control system of sensor and video interlink
CN109961546A (en) * 2019-05-10 2019-07-02 长春鸿达光电子与生物统计识别技术有限公司 Intelligent networking locking device based on wireless communication technique
CN110189437A (en) * 2019-04-28 2019-08-30 国网安徽省电力有限公司淮南供电公司 The smart lock control method and device of substation's bin
CN110728774A (en) * 2019-09-04 2020-01-24 深圳酷派技术有限公司 Intelligent lock unlocking method, device and system, storage medium and electronic equipment

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2012167500A (en) * 2011-02-16 2012-09-06 King Tsushin Kogyo Kk Storage system for home security
CN105427413A (en) * 2015-11-02 2016-03-23 北京奇虎科技有限公司 Intelligent unlocking method and intelligent lock
CN105913513A (en) * 2016-04-05 2016-08-31 深圳市汇海威视科技有限公司 Control method and system for door lock system
KR20180068691A (en) * 2016-12-14 2018-06-22 주식회사 에스원 Good-Morning Alam Service Method by Using Unlocking data of Smart Phone and Apparatue thereof
CN108205871A (en) * 2017-12-21 2018-06-26 广东汇泰龙科技有限公司 A kind of child custody method based on cloud lock, system
CN108804165A (en) * 2018-05-25 2018-11-13 李昭强 A kind of information processing method, device and storage medium based on user's unlocking behavioural analysis
CN109272613A (en) * 2018-08-27 2019-01-25 深圳市便易通科技有限公司 A kind of Internet of Things safe electronic access control system of sensor and video interlink
CN110189437A (en) * 2019-04-28 2019-08-30 国网安徽省电力有限公司淮南供电公司 The smart lock control method and device of substation's bin
CN109961546A (en) * 2019-05-10 2019-07-02 长春鸿达光电子与生物统计识别技术有限公司 Intelligent networking locking device based on wireless communication technique
CN110728774A (en) * 2019-09-04 2020-01-24 深圳酷派技术有限公司 Intelligent lock unlocking method, device and system, storage medium and electronic equipment

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113380014A (en) * 2021-06-01 2021-09-10 广东好太太智能家居有限公司 Intelligent lock alarm system, method and storage medium based on cloud platform

Similar Documents

Publication Publication Date Title
US9667613B1 (en) Detecting mobile device emulation
CN106031084B (en) Utilize the self acknowledging and anti-theft system and method for disposable random key
CN105933190A (en) Communication method and apparatus applied to intelligent household platform
CN105228149A (en) Access point method of attachment, device and access point
CN105827406A (en) Identity verification method, identity verification device, and identity verification system
US20180082553A1 (en) Systems and methods for alerting unauthorized access into a container
CN107038784A (en) Safe verification method and device
CN105894634B (en) A kind of identification system and method
CN111383366A (en) Security method, device, system and server based on networked intelligent lock
CN106815137A (en) Ui testing method and apparatus
CN113689070B (en) Food safety on-line supervision method and device, storage medium and computer equipment
CN112134946B (en) Elevator Internet of things testing method, device, storage medium, terminal and system
CN1637760B (en) Processing device
CN106446588A (en) Medical surveillance terminal, system and method
CN112002075B (en) Information processing method and device for improving safety of storage cabinet
CN107231358B (en) Questionnaire data acquisition method, server and mobile terminal
CN110535809A (en) A kind of identification code pulls method, storage medium and terminal device and server
CN111915785A (en) Access control method, access control device, storage medium, program product, and electronic device
CA2933212A1 (en) System and method of smart incident analysis in control system using floor maps
CN110807498A (en) Miniature fire station and management system
CN115190045B (en) Monitoring method and device for express cabinet system service, electronic equipment and storage medium
CN110197719A (en) A kind of monitoring data processing system
CN114239952A (en) Method, device, equipment and medium for detecting abnormity of key performance index
Bento et al. An Experiment with 3 Layers Development for IoT with NodeMCU12e+ Nextion
CN113380014A (en) Intelligent lock alarm system, method and storage medium based on cloud platform

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination