CN111784883B - Intelligent lock configuration method and system - Google Patents

Intelligent lock configuration method and system Download PDF

Info

Publication number
CN111784883B
CN111784883B CN202010701018.XA CN202010701018A CN111784883B CN 111784883 B CN111784883 B CN 111784883B CN 202010701018 A CN202010701018 A CN 202010701018A CN 111784883 B CN111784883 B CN 111784883B
Authority
CN
China
Prior art keywords
lock
virtual
physical
electronic
instruction
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010701018.XA
Other languages
Chinese (zh)
Other versions
CN111784883A (en
Inventor
刘建军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Trustworthy Science And Technology Co ltd
Original Assignee
Shenzhen Trustworthy Science And Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Trustworthy Science And Technology Co ltd filed Critical Shenzhen Trustworthy Science And Technology Co ltd
Priority to CN202010701018.XA priority Critical patent/CN111784883B/en
Publication of CN111784883A publication Critical patent/CN111784883A/en
Application granted granted Critical
Publication of CN111784883B publication Critical patent/CN111784883B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00817Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed

Abstract

An intelligent lock configuration method and system, the method comprises a process of creating a virtual lock, and the process of creating the virtual lock comprises the following steps: a service module sends a first request for creating a virtual lock to a lock control module, wherein the first request comprises physical lock information and virtual lock information which need to be configured, and the virtual lock comprises a plurality of electronic lock cylinders; and the lock control module analyzes the first request and constructs and installs the virtual lock in the physical lock. The embodiment provided by the application comprises the steps of establishing a virtual lock, wherein the virtual lock can correspond to a plurality of electronic lock cylinders, so that the work of installing the plurality of electronic lock cylinders is more convenient, and the complexity and the error probability of a system are reduced; the installation of a plurality of electronic lock cylinders can be carried out synchronously, thereby ensuring the atomic affairs of the service; network communication overhead necessary for installing a plurality of lock cylinders is reduced, so that power consumption is reduced and communication cost is saved.

Description

Intelligent lock configuration method and system
Technical Field
The present application relates to the field of electronic locks, and in particular, to a method and a system for configuring an intelligent lock.
Background
With the development of the technology, the application occasions of the intelligent lock become more abundant and diversified, and the intelligent lock can be applied to different occasions from home houses, long-rent apartments to commercial buildings, hotels, short-rent residents and the like.
The intelligent lock has two characteristics: 1. the operation of the lock is driven using electronic identity certificates or biometric techniques (passwords, IC cards, fingerprints, etc.) instead of using a traditional physical key. The new mode of the key in the modern technology is called as an electronic key. 2. And networking online at any time. The purpose of networking is mainly to enable people to remotely set various lock management rules and lock using permissions on line at any time through intelligent equipment such as computers, mobile phones and the like. The most important function is to manage the electronic lock cylinder of the corresponding electronic key on the intelligent lock.
The intelligent lock adopts an electronic key to replace a traditional physical key, and in order to enable the intelligent lock to identify a certain specific electronic key, a corresponding electronic lock cylinder needs to be preset on the intelligent lock. For example: to enable a new employee of a company to open a company's door using a fingerprint, the employee's fingerprint information needs to be entered into the fingerprint lock in advance, and the process is generally called installing an electronic lock cylinder. If the employee leaves the office and needs to cancel the entrance authority of the employee, the fingerprint lock needs to be informed to delete the fingerprint information of the employee, and the process can be called as the process of removing the electronic lock cylinder.
In most applications, the smart lock requires an electronic key capable of recognizing a plurality of different identities, which requires the smart lock to manage a plurality of electronic lock cylinders. The work of managing (installing/removing/modifying) the electronic lock cylinder is generally initiated by an application system according to the needs of a business and is specifically executed by an intelligent lock control system. And the lock control system packages the capacity of managing the electronic lock cylinder into service in an API mode and provides the service for the application system to call.
The application scene of intelligence lock has complicated changeable intelligence and uses the lock demand. For example:
in short-lease application, the change of the residents is frequent, and different electronic identity certificates need to be issued and cancelled frequently;
rules can be specified, and the specified electronic identity certificate is allowed to have unlocking authority within a specific time range;
roles of a landlord, a palm cabinet (when the landlord is not in the house, the landlord has the right to act on the landlord), a cleaner and the like also need to have the functions of setting a lock management rule and using a lock;
some more complex management rules need to be supported, such as: the cleaner can only operate at 12 noon: 00-14: in the period of 00, when the guest is not in the room, the guest has the door opening authority.
In some complex applications, the mode of directly managing and controlling the electronic lock cylinder of the intelligent lock by the application system has some disadvantages. For example, the operation is complicated, a guest enters the system, a plurality of electronic lock cylinders are required to be installed, and the arrangement of each electronic lock cylinder involves separate logic operation and communication processes, so that the complexity of the system and the error probability are increased.
Disclosure of Invention
The application provides an intelligent lock configuration method and system.
According to a first aspect of the present application, there is provided an intelligent lock configuration method, including a process of creating a virtual lock, the process of creating a virtual lock including:
a service module sends a first request for creating a virtual lock to a lock control module, wherein the first request comprises physical lock information and virtual lock information which need to be configured, and the virtual lock comprises a plurality of electronic lock cylinders;
and the lock control module analyzes the first request and constructs and installs the virtual lock in the physical lock.
Further, the physical lock information includes a physical lock ID, and the virtual lock information includes the virtual lock ID, a plurality of electronic lock cylinders, an electronic lock cylinder type, an electronic lock cylinder ID, and an electronic lock cylinder key;
the lock control module analyzes the first request, constructs and installs the virtual lock, and comprises the following steps:
the lock control module analyzes the first request and sends a first instruction for installing the virtual lock to an intelligent gateway, wherein the first instruction comprises the electronic lock cylinder type, the electronic lock cylinders, the electronic lock cylinder ID, an electronic lock cylinder key, the virtual lock ID and the physical lock ID;
The intelligent gateway analyzes the first instruction, and sends a second instruction for installing the virtual lock to a corresponding physical lock according to the ID of the physical lock, wherein the second instruction comprises the type of the electronic lock cylinder, a plurality of electronic lock cylinders, the ID of the electronic lock cylinder, the key of the electronic lock cylinder, the ID of the virtual lock and the ID of the physical lock;
and the physical lock installs the virtual lock according to the second instruction, and the electronic lock cylinder is installed in the virtual lock.
Further, the method also comprises a process of removing the virtual lock, wherein the process of removing the virtual lock comprises the following steps:
the service module sends a second request for removing the virtual lock to the lock control module, wherein the second request comprises the physical lock ID and the virtual lock ID;
and the lock control module analyzes the second request and unloads the virtual lock according to the physical lock ID and the virtual lock ID.
Further, the lock control module parsing the second request to unload the virtual lock according to the physical lock ID and the virtual lock ID includes:
the lock control module analyzes the second request and sends a third instruction for unloading the virtual lock to the intelligent gateway, wherein the third instruction comprises the ID of the physical lock and the ID of the virtual lock;
The intelligent gateway analyzes the third instruction and sends a fourth instruction for unloading the virtual lock to the corresponding physical lock according to the physical lock ID and the virtual lock ID;
the physical lock unloads the virtual lock and the plurality of electronic lock cylinders installed in the virtual lock according to the fourth instruction.
Furthermore, the electronic lock cylinder comprises a password lock cylinder, a control token lock cylinder, an identity card lock cylinder, a face recognition lock cylinder, a fingerprint lock cylinder and/or a mobile phone remote control lock cylinder.
According to a second aspect of the present application, there is provided a smart lock configuration device comprising:
the system comprises a business module, a lock control module and a lock management module, wherein the business module is used for sending a first request for creating a virtual lock to the lock control module, the first request comprises physical lock information and virtual lock information which need to be configured, and the virtual lock comprises a plurality of electronic lock cylinders;
and the lock control module is used for analyzing the first request and constructing and installing the virtual lock in the physical lock.
Further, the physical lock information comprises a physical lock ID, and the virtual lock information comprises the virtual lock ID, the number of electronic lock cylinder groups, the type of electronic lock cylinders, the ID of electronic lock cylinders and an electronic lock cylinder key;
the lock control module is used for analyzing the first request and sending a first instruction for installing the virtual lock to an intelligent gateway, wherein the first instruction comprises the electronic lock cylinder type, the electronic lock cylinders, the electronic lock cylinder ID, an electronic lock cylinder key, the virtual lock ID and the physical lock ID;
The intelligent gateway is used for analyzing the first instruction and sending a second instruction for installing the virtual lock to a corresponding physical lock according to the ID of the physical lock, wherein the second instruction comprises the type of the electronic lock cylinder, a plurality of electronic lock cylinders, the ID of the electronic lock cylinder, the key of the electronic lock cylinder, the ID of the virtual lock and the ID of the physical lock;
the physical lock comprises an installation unit, and is used for installing the virtual lock according to the second instruction and installing the electronic lock cylinder in the virtual lock.
Further, the service module is further configured to send a second request for removing the virtual lock to the lock control module, where the second request includes the physical lock ID and the virtual lock ID;
and the lock control module is further used for analyzing the second request and unloading the virtual lock according to the physical lock ID and the virtual lock ID.
Further, the lock control module is further configured to parse the second request, and send a third instruction for unloading the virtual lock to the intelligent gateway, where the third instruction includes the physical lock ID and the virtual lock ID;
the intelligent gateway is further configured to analyze the third instruction, and send a fourth instruction for unloading the virtual lock to the corresponding physical lock according to the physical lock ID and the virtual lock ID;
The physical lock further comprises an unloading unit used for unloading the virtual lock and the electronic lock cylinders installed in the virtual lock according to the fourth instruction.
According to a third aspect of the present application, there is provided a computer readable storage medium comprising a program executable by a processor to implement the above method.
The beneficial effect of this application is: the method comprises the steps of establishing a virtual lock, wherein the virtual lock can correspond to a plurality of electronic lock cylinders, so that the work of installing the plurality of electronic lock cylinders is more convenient, and the complexity and the error probability of the system are reduced; the installation of a plurality of electronic lock cylinders can be carried out synchronously, thereby ensuring the atomic affairs of the service; network communication overhead necessary for installing a plurality of lock cylinders is reduced, so that power consumption is reduced and communication cost is saved.
Drawings
FIG. 1 is a flow chart of a prior art method of creating a combination lock cylinder;
FIG. 2 is a flow chart of a prior art for creating a remote-controlled electronic lock cylinder for a mobile phone;
FIG. 3 is a flow chart of a prior art removal of a combination lock cylinder;
FIG. 4 is a flow chart of the prior art for removing a remote control electronic lock cylinder of a mobile phone;
FIG. 5 is a flow diagram of a method according to an embodiment of the present application in creating a virtual lock in one implementation;
FIG. 6 is a flow diagram illustrating a method according to an embodiment of the present application for removing a virtual lock in one embodiment;
FIG. 7 is a flow chart of an embodiment of a creation method according to the present application;
FIG. 8 is a flow chart of a teardown method according to an embodiment of the present application in one embodiment;
FIG. 9 is a schematic diagram of program modules of a configuration system according to a second embodiment of the present application in one implementation;
fig. 10 is a schematic diagram of program modules of a configuration system according to a second embodiment of the present application.
Detailed Description
The present invention will be described in further detail with reference to the following detailed description and accompanying drawings. The present application may be embodied in many different forms and is not limited to the embodiments described in the present embodiment. The following detailed description is provided to facilitate a more thorough understanding of the present disclosure, and the words used to indicate orientation, top, bottom, left, right, etc. are used solely to describe the illustrated structure in connection with the accompanying figures.
One skilled in the relevant art will recognize, however, that one or more of the specific details can be omitted, or other methods, components, or materials can be used. In some instances, some embodiments are not described or not described in detail.
The numbering of the components as such, e.g., "first", "second", etc., is used herein only to distinguish the objects as described, and does not have any sequential or technical meaning.
Furthermore, the technical features, aspects or characteristics described herein may be combined in any suitable manner in one or more embodiments. It will be readily appreciated by those of skill in the art that the order of the steps or operations of the methods associated with the embodiments provided herein may be varied. Thus, any sequence in the figures and examples is for illustrative purposes only and does not imply a requirement in a certain order unless explicitly stated to require a certain order.
In some complex applications in the prior art, the way of directly managing and controlling the electronic lock cylinder of the intelligent lock by the application system has some disadvantages. We take a residential short rental application scenario as an example. A brief description of this scenario follows:
guests lived in 2019, 9, month 2.
The landlord decides to authorize the guest to open the door with two electronic vouchers. (1) The guest can open the door through the remote control of the WeChat small program. This operation requires the guest to provide their own wechat identity, which the system will record and allow the user to log in to the wechat applet using the wechat identity and perform the door opening operation through the wechat applet. (2) The guest can open the door through the password, and the system can set a door opening password for the guest and send the door opening password to the guest through the short message.
Guest departed No. 9 month 5 in 2019.
Fig. 1 shows a flowchart for creating a combination lock cylinder for (2) above, including:
step 102: and the service system sends an instruction for creating the coded lock cylinder to the lock control system.
Step 104: and the lock control system receives an instruction for creating the password electronic lock cylinder and issues the instruction to the intelligent gateway.
Step 106: and the intelligent gateway sends the creation instruction to the intelligent lock.
Step 108: and after the intelligent lock receives the password electronic lock cylinder establishing instruction, establishing a password electronic lock cylinder.
Step 110: and the intelligent lock reports the success result to the intelligent gateway.
Step 112: and after receiving the result, the intelligent gateway reports the result to the lock control system.
Step 114: and the lock control system reports the result to the service system.
Fig. 1 shows a flow chart for creating a remote control electronic lock cylinder of a mobile phone for (1) above, which includes:
step 202: and the business system sends an instruction for creating the remote control electronic lock cylinder of the mobile phone to the lock control system.
Step 204: and the lock control system receives an instruction for creating the mobile phone remote control electronic lock cylinder and issues the instruction to the intelligent gateway.
Step 206: after receiving the electronic lock cylinder creating instruction remotely controlled by the mobile phone, the intelligent gateway creates an electronic lock cylinder in an internal system.
Step 208: and the intelligent gateway reports the success result to the lock control system.
Step 210: and the lock control system reports the result to the service system.
When a guest leaves the store in 9 months and 5 days, the password lock cylinder and the mobile phone remote control electronic lock cylinder need to be dismantled.
Fig. 3 shows a flow chart for removing a combination lock cylinder, including:
step 302: the business system sends an instruction for removing the coded electronic lock cylinder to the lock control system.
Step 304: and the lock control system receives an instruction for removing the coded electronic lock cylinder and issues the instruction to the intelligent gateway.
Step 306: and the intelligent gateway issues an instruction for removing the coded electronic lock cylinder to the intelligent lock.
Step 308: and after the intelligent lock receives the command of removing the password electronic lock cylinder, removing one password electronic lock cylinder.
Step 310: and the intelligent lock reports the success result to the intelligent gateway.
Step 312: and after receiving the result, the intelligent gateway reports the result to the lock control system.
Step 314: and the lock control system reports the result to the service system.
Fig. 4 shows a flow chart for removing the remote control electronic lock cylinder of the mobile phone, which comprises the following steps:
step 402: and the service system sends an instruction for removing the remote control electronic lock cylinder of the mobile phone to the lock control system.
Step 404: and the lock control system receives an instruction for removing the remote control electronic lock cylinder of the mobile phone and issues the instruction to the intelligent gateway.
Step 406: and after the intelligent gateway receives the remote control electronic lock cylinder removing instruction, removing one mobile phone remote control electronic lock cylinder in the internal system.
Step 408: and reporting the success result to the lock control system.
Step 410: and the lock control system reports the result to the service system.
Some drawbacks of the prior art solutions can be seen by an analysis of the prior art shown in fig. 1, 2, 3 and 4:
1. the operation is complicated. The guest's presence/absence requires the installation/removal of multiple electronic lock cylinders, the provision of each involving separate logic and communication processes, which increases system complexity and the probability of error.
2. It is difficult to guarantee atomic transactional nature of the business. Atomic transactional means that all steps in a business operation need to be guaranteed, if all steps are successful, if all steps are failed, and if part of the steps are successful and part of the steps are failed, the situations of partial success and partial failure are not generated. Atomic affairs are very important in business systems, and it can be assumed that if, without atomic affairs support, two electronic lock cylinders are installed, wherein a lock cylinder is installed successfully, and B lock cylinder is installed unsuccessfully, how the subsequent business should process the situation becomes complicated, for example, different options can be provided: (1) and the B lock cylinder is redone to be installed, so that the two lock cylinders can be successfully installed. (2) And removing the lock core A, and then reworking the whole service. Because the installation of the lock cylinder is an independent operation, the communication between an application system and an intelligent lock system and the communication between the intelligent lock system and an intelligent lock terminal are involved. If we want to implement atomic transaction in operation of installing lock cylinders across multiple lock cylinders, Two-Phase Commit Protocol needs to be implemented, so that the technical cost of implementation becomes very high.
3. Power consumption and network communication costs are high. The intelligent lock belongs to one of the applications of the Internet of things, and an adopted communication protocol usually has the characteristics of low power consumption and low transmission rate. Since each time the lock cylinder is installed, power consumption and network transmission are involved, which causes a problem of high power consumption and network communication costs.
Carefully analyzing the defects existing in the prior art, it is found that the intelligent lock management function provided by the intelligent lock control system is based on the electronic lock cylinder, and in some complex business systems, the business granularity for directly managing the electronic lock cylinder is too fine, which is not matched with the real requirement of the business.
The prior art lacks batch electronic lock cylinder management operation, and in some complex businesses, a plurality of electronic lock cylinders are frequently required to be installed/removed in batches. For example, in the case of the above-mentioned lodging of a person, the guest is allowed to open the door by using two different electronic keys, which requires two different electronic lock cylinders to be installed on the smart lock. The prior art does not provide such a batch operation function, but only calls two single-lock-cylinder installation operations to implement the function.
In a real business scenario, many times, multiple electronic lock cylinders share the same management rules. For example, in the case of the people staying in the house, the removal time of the two electronic lock cylinders is 9 months and 5 times when the guest leaves the store. This means that we should have a coarser grained container to accommodate multiple electronic lock cylinders, and the governing rules on this container will apply to all electronic lock cylinders in the container.
It can be further considered that if there is an intelligent lock which is very convenient to install/remove, the intelligent lock is pre-installed with an electronic lock core that a guest wants to use an electronic key, when the guest enters, the intelligent lock is installed on the door, so that the guest can use the intelligent lock to open the door. When the guest leaves, the intelligent lock is removed, and the electronic key of the guest cannot be used.
The advantage of this solution is that (1) we can support multiple electronic lock cylinders with a single mounting/dismounting operation. This simplifies the complexity of the system and various losses associated with the multiple installation operations of the lock cylinder. (2) The same management rule can be applied to a plurality of electronic lock cylinders by the operation of installing/removing the lock. Through the installation intelligence lock, let a plurality of electron lock cores take effect simultaneously, through demolising the operation, let a plurality of electron lock cores simultaneously inefficacy. The management is carried out on a service concept which is more integral and coarser than the electronic lock core, so that the service management operation is simpler, more visual and easier to understand.
However, in the real world, the installation/removal of a physical lock is very expensive, and not only does it require a special lockmaker, but the installation/removal work also causes damage to the door.
In order to circumvent some inherent limitations of physical entity resources, virtualization technology can be adopted, and on a physical entity intelligent lock, a virtual lock called a virtual lock is created, and besides the defects brought by directly managing an electronic lock cylinder are solved, the following advantages are brought by using the virtualization technology:
the physical property limit of a physical entity lock is broken through, and a plurality of virtual logic locks can be created on one physical entity intelligent lock. One or more electronic lock cylinders can be installed on each logical lock, and other management rules can be bound. Opening any one of the logical locks using the electronic key results in the physical lock being opened. This allows for different locking services to be encapsulated in different virtual logical locks, which provides great flexibility.
Due to the adoption of the virtualization technology, the actual installation/removal work of the physical lock is avoided. The virtual logic lock can be quickly installed/removed only through network and electronic instructions, and the cost is very low. The entire operation of installing/removing the virtual lock is completed within a few seconds. This technique can be used in large quantities in the system without considering cost penalties.
The first embodiment is as follows:
fig. 5 shows a flowchart of a flow configuration method according to an embodiment of the present invention. As shown in fig. 5, the present embodiment includes a process of creating a virtual lock, which includes the following steps:
step 502: the business module sends a first request to create a virtual lock to the lock control module. The first request includes physical lock information and virtual lock information to be configured, and the virtual lock may include a plurality of electronic lock cylinders.
The physical lock information includes a physical lock ID, and the virtual lock information includes a virtual lock ID, a plurality of electronic lock cylinders, an electronic lock cylinder type, an electronic lock cylinder ID, an electronic lock cylinder key, and the like. The electronic lock cylinder comprises a password lock cylinder, a control token lock cylinder, an identity card lock cylinder, a face recognition lock cylinder, a fingerprint lock cylinder and/or a mobile phone remote control lock cylinder.
Step 504: the lock control module parses the first request to build an installation virtual lock in the physical lock.
In one embodiment, step 504 may further include the steps of:
the lock control module analyzes the first request, and sends a first instruction for installing the virtual lock to the intelligent gateway, wherein the first instruction comprises the type of the electronic lock cylinder, the plurality of electronic lock cylinders, the ID of the electronic lock cylinder, the key of the electronic lock cylinder, the ID of the virtual lock and the ID of the physical lock.
The intelligent gateway analyzes the first instruction and sends a second instruction for installing the virtual lock to the corresponding physical lock according to the ID of the physical lock, wherein the second instruction comprises the type of the electronic lock cylinder, a plurality of electronic lock cylinders, the ID of the electronic lock cylinder, the key of the electronic lock cylinder, the ID of the virtual lock and the ID of the physical lock;
the physical lock installs the virtual lock according to the second instruction, and a plurality of electronic lock cylinders are installed in the virtual lock.
The method comprises the steps of establishing a virtual lock, wherein the virtual lock corresponds to a plurality of electronic lock cylinders, so that the work of installing the plurality of electronic lock cylinders is more convenient, and the complexity and the error probability of the system are reduced; the virtual lock and the electronic lock cylinders are installed synchronously, so that the atomic affairs of the service are guaranteed; network communication overhead necessary for installing a plurality of lock cylinders is reduced, so that power consumption is reduced and communication cost is saved.
Fig. 6 is a flowchart of a flow configuration method according to another embodiment of the present invention. As shown in fig. 6, the present embodiment includes a process of removing a virtual lock, where the process of removing a virtual lock includes the following steps:
step 602: the service module sends a second request for removing the virtual lock to the lock control module, wherein the second request comprises the physical lock ID and the virtual lock ID.
Step 604: the lock control module parses the second request, unloads the virtual lock according to the physical lock ID and the virtual lock ID.
In one embodiment, step 604 may further comprise the steps of:
the lock control module analyzes the second request and sends a third instruction for unloading the virtual lock to the intelligent gateway, wherein the third instruction comprises a physical lock ID and a virtual lock ID;
the intelligent gateway analyzes the third instruction and sends a fourth instruction for unloading the virtual lock to the corresponding physical lock according to the physical lock ID and the virtual lock ID;
the physical lock unloads the virtual lock and the plurality of electronic lock cylinders installed in the virtual lock according to a fourth instruction.
In the embodiment, the residence of people is still used as an application scene, specifically, a password lock cylinder and a mobile phone remote control electronic lock cylinder are built for the residence of a customer and are detached when the customer leaves a shop.
Fig. 7 is a flowchart of creating a virtual lock according to the present embodiment, where the virtual lock is provided with a combination lock cylinder and a mobile phone remote control lock cylinder, and the method includes the following steps:
step 702: the service system issues a virtual lock request containing a coded lock cylinder and a mobile phone remote control lock cylinder to the lock control system according to the self requirement.
Step 704: and the lock control system analyzes the request, constructs a virtual lock installation instruction and sends the instruction to the intelligent gateway.
Step 706: and the intelligent gateway analyzes the virtual lock installation instruction and issues the coded lock cylinder installation instruction to the physical lock.
Step 708: and returning a result to the intelligent gateway after the coded lock cylinder is successfully installed on the physical lock.
And if the password lock cylinder is failed to be installed, finishing creating the virtual lock.
Step 710: the intelligent gateway creates a mobile phone remote control electronic lock cylinder in a self virtual lock management system.
Step 712: and the intelligent gateway returns the operation result to the lock control system.
Step 714: and after the lock control system analyzes the result, transmitting the result to the service system.
In the embodiment, the coded lock cylinder is installed first, and then the mobile phone remote control lock cylinder is continuously installed after the coded lock cylinder is successfully installed. In one embodiment, the coded lock cylinder and the mobile phone remote control lock cylinder can be installed at the same time.
Fig. 8 is a flowchart of removing a virtual lock according to this embodiment, and in an implementation, the removing of the virtual lock may include the following steps:
step 802: the service system sends a request for unloading the virtual lock to the lock control system according to the self requirement, wherein the virtual lock comprises a coded lock cylinder and a mobile phone remote control lock cylinder.
Step 804: the lock control system analyzes the request, constructs an unloading virtual lock instruction and sends the instruction to the intelligent gateway.
Step 806: and the intelligent gateway analyzes the unloading virtual lock instruction and issues the instruction to the physical lock.
Step 808: and the physical lock unloads the virtual lock, simultaneously unloads the coded lock cylinder and the mobile phone remote control lock cylinder which are installed under the virtual lock, and returns a result to the intelligent gateway after success.
Step 810: and the intelligent gateway returns the operation result to the lock control system.
Step 812: and after the lock control system analyzes the result, transmitting the result to the service system.
Further, an internet of things communication protocol, such as a Lora communication protocol, Zigbee or bluetooth, may be used between the intelligent gateway and the physical lock.
Compared with the prior art, the intelligent lock configuration method provided by the embodiment obviously reduces operation steps, so that the intelligent lock is more intuitive and simpler to manage. The technical effect of reducing the difficulty in realizing atomic affairs is achieved through the technical scheme of the virtual lock. Under the solution of realizing the virtual lock technology, a plurality of electronic lock core operations are encapsulated into one virtual lock operation, and only one operation instruction is needed between a service system- > lock control system service- > lock terminal control system, so that the plurality of electronic lock cores can be installed, and the service atomic affairs can be realized more directly and more simply on the virtual lock installation level. Returning a response of successful operation of the virtual lock only under the condition that all the electronic lock cylinders are successfully installed; when any one electronic lock core fails to be installed, a virtual lock installation failure response is returned, so that the problem of affairs is solved. The virtual lock technology is adopted to reduce the network communication times, so that the power consumption and the network communication cost of the lock terminal system are reduced.
The second embodiment:
fig. 9 is a schematic diagram of program modules of an intelligent lock configuration system according to the second embodiment of the present application in an implementation test, where the configuration system 900 may include a service module 910 and a lock control module 920.
The service module 910 is configured to send a first request for creating a virtual lock to the lock control module 920, where the first request includes physical lock information and virtual lock information that need to be configured, and the virtual lock includes a plurality of electronic lock cylinders. The physical lock information includes a physical lock ID, and the virtual lock information includes a virtual lock ID, a plurality of electronic lock cylinders, an electronic lock cylinder type, an electronic lock cylinder ID, and an electronic lock cylinder key.
And the lock control module 920 is configured to parse the first request to construct an installation virtual lock.
In the system related by the application, the service module and the lock control module create the virtual lock, and the intelligent lock can correspond to a plurality of electronic lock cylinders, so that the work of installing the plurality of electronic lock cylinders is more convenient, and the complexity and the error probability of the system are reduced; the installation of a plurality of electronic lock cylinders can be carried out simultaneously, thereby ensuring the atomic affairs of the service; network communication overhead necessary for installing a plurality of lock cylinders is reduced, so that power consumption is reduced and communication cost is saved.
Fig. 10 is a schematic diagram of program modules of another implementation test of an intelligent lock configuration system according to the second embodiment of the present application, where the configuration system 900 includes a service module 910, a lock control module 920, an intelligent gateway 930, and a physical lock 940.
In one embodiment, the service module 910 is configured to send a first request for creating a virtual lock to the lock control module 920, where the first request includes physical lock information and virtual lock information to be configured, and the virtual lock includes a plurality of electronic lock cylinders. The physical lock information includes a physical lock ID, and the virtual lock information includes a virtual lock ID, a plurality of electronic lock cylinders, an electronic lock cylinder type, an electronic lock cylinder ID, and an electronic lock cylinder key.
And the lock control module 920 is configured to parse the first request to construct an installation virtual lock. The specific implementation is that the lock control module 920 is configured to parse the first request, and send a first instruction for installing the virtual lock to the intelligent gateway 930, where the first instruction includes an electronic lock cylinder type, a plurality of electronic lock cylinders, an electronic lock cylinder ID, an electronic lock cylinder key, a virtual lock ID, and a physical lock ID;
and the intelligent gateway 930 is configured to parse the first instruction, and send a second instruction for installing a virtual lock to the corresponding physical lock according to the physical lock ID, where the second instruction includes an electronic lock cylinder type, a plurality of electronic lock cylinders, an electronic lock cylinder ID, an electronic lock cylinder key, a virtual lock ID, and a physical lock ID.
The physical lock 940 includes a mounting unit 941 configured to mount the virtual lock according to the second instruction and mount an electronic lock cylinder in the virtual lock, where the electronic lock cylinder may be multiple.
And the results are returned step by step from the physical lock 940, the intelligent gateway 930, the lock control module 920 to the service module 910.
In another embodiment, the service module 910 is further configured to send a second request to the lock control module 920 for removing the virtual lock, where the second request includes the physical lock ID and the virtual lock ID.
Lock control module 920 is further configured to parse the second request, and send a third instruction to unload the virtual lock to intelligent gateway 930, where the third instruction includes the physical lock ID and the virtual lock ID; the intelligent gateway 930 is further configured to parse the third instruction, and send a fourth instruction to unload the virtual lock to the corresponding physical lock according to the physical lock ID and the virtual lock ID; the physical lock 940 further includes an uninstalling unit 942 for uninstalling the virtual lock and the plurality of electronic lock cylinders installed in the virtual lock according to a fourth instruction.
And returning the removal result step by step from the physical lock 940, the intelligent gateway 930, the lock control module 920 to the service module 910.
To construct a virtual lock, the present embodiment needs to virtualize an intelligent lock, which solves two main design problems:
1. And designing a virtual lock management instruction to replace the traditional electronic lock cylinder management instruction.
Those skilled in the art will appreciate that internet of things systems typically employ protocol instructions in binary format, and for simplicity of conceptual illustration herein, protocol instructions in text format are employed for ease of reading and understanding.
Conventional electronic cylinder management instructions (taking a coded cylinder with installation code 183706 as an example).
Figure BDA0002593041560000111
Figure BDA0002593041560000121
Virtual lock management instruction (installation password 183472 coded lock core and WeChat remote control for example)
Figure BDA0002593041560000122
Figure BDA0002593041560000131
2. And realizing the intelligent lock virtualization function in the lock terminal system.
In the original intelligent gateway 930, a virtual lock control subsystem 933 is added for implementing an intelligent lock virtualization function.
The main control subsystem 931, which is an instruction processing main module, is configured to:
and the traditional lock cylinder control instruction is forwarded to the physical lock control subsystem 932 for processing.
And forwarding the virtual lock related control instruction to a virtual lock control subsystem 933 for system processing.
In virtual lock control subsystem 933, the following units are implemented:
(1) a virtual lock management unit. This is the core unit of the virtual lock control subsystem 933, which manages the association between the virtual lock and the electronic lock cylinder, and applies the virtual lock management rules to all the associated electronic lock cylinders.
(2) A virtual lock event unit. The physical lock event is converted into a virtual lock event to facilitate management of the lock event at the conceptual level of the virtual lock.
(3) A timing planner. According to the management rule of the virtual lock, a timing task plan is formulated, which comprises the following steps: automatically installing a virtual lock; virtual locking is effective; and dismantling and other automatic tasks during virtual locking.
In one embodiment, intelligent gateway 930 may be integrated with physical lock 940.
Example three:
a computer-readable storage medium comprising a program executable by a processor to perform the method of the first embodiment.
Those skilled in the art will appreciate that all or part of the functions of the various methods in the above embodiments may be implemented by hardware, or may be implemented by computer programs. When all or part of the functions of the above embodiments are implemented by a computer program, the program may be stored in a computer-readable storage medium, and the storage medium may include: a read only memory, a random access memory, a magnetic disk, an optical disk, a hard disk, etc., and the program is executed by a computer to realize the above functions. For example, the program may be stored in a memory of the device, and when the program in the memory is executed by the processor, all or part of the functions described above may be implemented. In addition, when all or part of the functions in the above embodiments are implemented by a computer program, the program may be stored in a storage medium such as a server, another computer, a magnetic disk, an optical disk, a flash disk, or a removable hard disk, and may be downloaded or copied to a memory of a local device, or may be version-updated in a system of the local device, and when the program in the memory is executed by a processor, all or part of the functions in the above embodiments may be implemented.
The present invention has been described in terms of specific examples, which are provided to aid understanding of the invention and are not intended to be limiting. For a person skilled in the art to which the invention pertains, several simple deductions, modifications or substitutions may be made according to the idea of the invention.

Claims (6)

1. An intelligent lock configuration method is characterized by comprising a process of creating a virtual lock, wherein the process of creating the virtual lock comprises the following steps:
a service module sends a first request for creating a virtual lock to a lock control module, wherein the first request comprises physical lock information and virtual lock information which need to be configured, and the virtual lock comprises a plurality of electronic lock cylinders;
the lock control module analyzes the first request and constructs and installs the virtual lock in the physical lock;
the physical lock information comprises a physical lock ID, and the virtual lock information comprises the virtual lock ID, a plurality of electronic lock cylinders, an electronic lock cylinder type, an electronic lock cylinder ID and an electronic lock cylinder key;
the lock control module analyzes the first request, constructs and installs the virtual lock, and comprises the following steps:
the lock control module analyzes the first request and sends a first instruction for installing the virtual lock to an intelligent gateway, wherein the first instruction comprises the electronic lock cylinder type, the electronic lock cylinders, the electronic lock cylinder ID, an electronic lock cylinder key, the virtual lock ID and the physical lock ID;
The intelligent gateway analyzes the first instruction, and sends a second instruction for installing the virtual lock to a corresponding physical lock according to the ID of the physical lock, wherein the second instruction comprises the type of the electronic lock cylinder, a plurality of electronic lock cylinders, the ID of the electronic lock cylinder, the key of the electronic lock cylinder, the ID of the virtual lock and the ID of the physical lock;
the physical lock installs the virtual lock according to the second instruction, and a plurality of electronic lock cylinders are installed in the virtual lock;
the intelligent lock configuration method further comprises a process of removing the virtual lock, wherein the process of removing the virtual lock comprises the following steps:
the service module sends a second request for removing the virtual lock to the lock control module, wherein the second request comprises the physical lock ID and the virtual lock ID;
and the lock control module analyzes the second request and unloads the virtual lock according to the physical lock ID and the virtual lock ID.
2. The method of claim 1, wherein the lock control module resolving the second request to offload the virtual lock based on the physical lock ID and the virtual lock ID comprises:
the lock control module analyzes the second request and sends a third instruction for unloading the virtual lock to the intelligent gateway, wherein the third instruction comprises the ID of the physical lock and the ID of the virtual lock;
The intelligent gateway analyzes the third instruction and sends a fourth instruction for unloading the virtual lock to the corresponding physical lock according to the physical lock ID and the virtual lock ID;
the physical lock unloads the virtual lock and the plurality of electronic lock cylinders installed in the virtual lock according to the fourth instruction.
3. The method of any one of claims 1 and 2, wherein the electronic lock cylinders comprise a combination lock cylinder, a control token lock cylinder and an identification card lock cylinder, a face recognition lock cylinder, a fingerprint lock cylinder, and/or a cell phone remote control lock cylinder.
4. An intelligent lock configuration system, comprising:
the system comprises a business module, a lock control module and a lock management module, wherein the business module is used for sending a first request for creating a virtual lock to the lock control module, the first request comprises physical lock information and virtual lock information which need to be configured, and the virtual lock comprises a plurality of electronic lock cylinders;
the lock control module is used for analyzing the first request and constructing and installing the virtual lock in the physical lock;
the physical lock information comprises a physical lock ID, and the virtual lock information comprises the virtual lock ID, a plurality of electronic lock cylinders, an electronic lock cylinder type, an electronic lock cylinder ID and an electronic lock cylinder key;
the lock control module is further configured to parse the first request, and send a first instruction for installing the virtual lock to an intelligent gateway, where the first instruction includes the electronic lock cylinder type, the plurality of electronic lock cylinders, the electronic lock cylinder ID, the electronic lock cylinder key, the virtual lock ID, and the physical lock ID;
The intelligent gateway is used for analyzing the first instruction and sending a second instruction for installing the virtual lock to a corresponding physical lock according to the ID of the physical lock, wherein the second instruction comprises the type of the electronic lock cylinder, a plurality of electronic lock cylinders, the ID of the electronic lock cylinder, the key of the electronic lock cylinder, the ID of the virtual lock and the ID of the physical lock;
the physical lock comprises an installation unit, and is used for installing the virtual lock according to the second instruction and installing the electronic lock cylinder in the virtual lock;
the service module is further configured to send a second request for removing the virtual lock to the lock control module, where the second request includes the physical lock ID and the virtual lock ID;
and the lock control module is further used for analyzing the second request and unloading the virtual lock according to the physical lock ID and the virtual lock ID.
5. The system of claim 4, wherein the lock control module is further configured to parse the second request, and send a third instruction to the intelligent gateway to unload the virtual lock, the third instruction including the physical lock ID and the virtual lock ID;
the intelligent gateway is further configured to analyze the third instruction, and send a fourth instruction for unloading the virtual lock to the corresponding physical lock according to the physical lock ID and the virtual lock ID;
The physical lock further comprises an unloading unit used for unloading the virtual lock and the electronic lock cylinders installed in the virtual lock according to the fourth instruction.
6. A computer-readable storage medium, characterized by comprising a program executable by a processor to implement the method of any one of claims 1 to 3.
CN202010701018.XA 2020-07-20 2020-07-20 Intelligent lock configuration method and system Active CN111784883B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010701018.XA CN111784883B (en) 2020-07-20 2020-07-20 Intelligent lock configuration method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010701018.XA CN111784883B (en) 2020-07-20 2020-07-20 Intelligent lock configuration method and system

Publications (2)

Publication Number Publication Date
CN111784883A CN111784883A (en) 2020-10-16
CN111784883B true CN111784883B (en) 2022-05-24

Family

ID=72764304

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010701018.XA Active CN111784883B (en) 2020-07-20 2020-07-20 Intelligent lock configuration method and system

Country Status (1)

Country Link
CN (1) CN111784883B (en)

Family Cites Families (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4283710A (en) * 1978-10-25 1981-08-11 J.S. Lock Company Security system
FI20002255A (en) * 2000-10-13 2002-04-14 Nokia Corp A method for controlling and controlling locks
GB2391987A (en) * 2002-04-30 2004-02-18 Sutton Goldsmith Associates Lt Electronic access control system with reprogrammable lock memory
JP4043507B1 (en) * 2007-05-14 2008-02-06 テンプランズ株式会社 Wireless lock system using biometrics authentication
JP2010275778A (en) * 2009-05-29 2010-12-09 Hitachi Omron Terminal Solutions Corp Key management device and key management system using biometric authentication
SE534135C2 (en) * 2009-09-17 2011-05-10 Phoniro Ab Distribution of lock access data for electromechanical locks in an access control system
FI20145650A (en) * 2014-07-04 2016-01-05 Rollock Oy Locking system and creation of electronic keys in a locking system
WO2016089832A1 (en) * 2014-12-02 2016-06-09 Carrier Corporation Access control system with virtual card data
CN104751545B (en) * 2015-02-16 2018-05-25 北京果加智能科技有限公司 Door lock authorization process system and method and device
CN105809796B (en) * 2016-03-30 2018-05-18 嘉兴职业技术学院 A kind of hotel self-service moves in control system and method
CN106097515A (en) * 2016-06-23 2016-11-09 武汉市国扬科技有限公司 A kind of smart lock virtual lock core replacing options
CN111464556B (en) * 2016-10-25 2022-12-30 武汉大数据产业发展有限公司 Portable user terminal
KR20190132046A (en) * 2018-05-18 2019-11-27 박정석 Door rock system using the virtual reality or augmented reality
US11098500B2 (en) * 2018-06-02 2021-08-24 Noke, Inc. Lockout management systems and methods with multi-keyholder electronic locking devices
CN110136312A (en) * 2019-05-22 2019-08-16 广东科徕尼智能科技有限公司 A kind of method that mobile terminal interacts the virtual key of realization addition with intelligent door lock
CN111210551A (en) * 2020-01-13 2020-05-29 中国建设银行股份有限公司 Access control system, access control information issuing method, device, server and storage medium

Also Published As

Publication number Publication date
CN111784883A (en) 2020-10-16

Similar Documents

Publication Publication Date Title
US9280365B2 (en) Systems and methods for managing configuration data at disconnected remote devices
US8881252B2 (en) System and method for physical access control
US9626816B2 (en) Physical access request authorization
US11948412B2 (en) Intelligent lock credential validation
CN106534080B (en) Object access right management method, corresponding background system, device and user terminal
CN110580760A (en) intelligent hotel check-in and door lock control system and control method thereof
US11695544B2 (en) Method and system to execute and record transactions for a key in a blockchain
CN107633168A (en) Automate Password Management
CN110110874A (en) A kind of meeting room sharing method
CN108346202A (en) A kind of access control system with attendance checking function
CN109584110A (en) A kind of intelligent hotel managing device and method based on block chain
CN111784883B (en) Intelligent lock configuration method and system
CN103186408A (en) Management method of operated virtual machine, system and device thereof
CN111310151A (en) Distributed permission set-based permission management method, device and storage medium
CN110163617A (en) A kind of TV shopping method of payment supported based on vocal print
CN113112662B (en) Method for realizing access control electronic key and access control authority management in mobile phone chat software group
US10181229B2 (en) Method and system for implementing a universal key card
CN114024730B (en) Enterprise portal management system
WO2020162550A1 (en) Electronic unlocking management system and program
JP2007304785A (en) Building security system, user information generation apparatus and access control method
CN110473314B (en) Regional lock and intelligent lock system
CN112785757A (en) Intelligent lock authorization authentication method and intelligent lock
CN108520578A (en) A kind of intelligent access control system
AU2021101231A4 (en) A block-chain enabled service provider system
AU2021101316A4 (en) A system for service providing using block-chain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant