CN111882704A - Control method of intelligent door lock system and intelligent door lock management system - Google Patents
Control method of intelligent door lock system and intelligent door lock management system Download PDFInfo
- Publication number
- CN111882704A CN111882704A CN202010662731.8A CN202010662731A CN111882704A CN 111882704 A CN111882704 A CN 111882704A CN 202010662731 A CN202010662731 A CN 202010662731A CN 111882704 A CN111882704 A CN 111882704A
- Authority
- CN
- China
- Prior art keywords
- door lock
- intelligent door
- information
- control instruction
- gateway
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00571—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00896—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/20—Individual registration on entry or exit involving the use of a pass
- G07C9/27—Individual registration on entry or exit involving the use of a pass with central registration
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/02—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/02—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
- H04L67/025—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP] for remote control or remote monitoring of applications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
- G07C2009/00412—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks the transmitted data signal being encrypted
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Lock And Its Accessories (AREA)
Abstract
The invention discloses a control method of an intelligent door lock system and the intelligent door lock management system, wherein the method is applied to the intelligent door lock management system, and the intelligent door lock management system comprises an application end, an application server, an equipment server, a gateway and an intelligent door lock; the application end sends control instruction information to an application server; the application server analyzes the control instruction information and sends the analyzed control instruction information to the equipment server; the equipment server transmits the control instruction information to the intelligent door lock through the gateway; the intelligent door lock executes the control instruction information and feeds back the execution state information to the application end through the gateway, the equipment management server and the application server. Through the scheme, a manager can give the user the right to use the intelligent door lock through the application end, and centralized visual system management of the door lock is realized; the door opening record and the electric quantity information are uploaded to the system, the door lock state can be set through the application end, and great convenience is brought to ordered centralized management of large-batch intelligent door locks.
Description
Technical Field
The invention relates to the field of Internet of things, in particular to a control method of an intelligent door lock system and an intelligent door lock management system.
Background
With the continuous development of information technology, along with the progress of the sensor technology and the automation control technology, people no longer satisfy the wired information transmission mode, pursue a wireless, high-speed and safer information transmission mode, and the internet of things arose.
At present, the common door lock mainly comprises a mechanical lock and an intelligent electronic door lock. Mechanical locks require people to carry mechanical keys with them, which are very inconvenient and easy to lose, and like managers in schools, apartments, hotels, offices, dormitories and the like, it is increasingly difficult to manage the keys of rooms and door locks and the distribution of keys is troublesome. Common intelligent electronic door lock has intelligent door lock such as password, fingerprint identification, the card of punching, unblanks at input password, the card of punching or discernment fingerprint on the lock, has brought very big facility, but can not manage personnel's permission and lock long-rangely.
For scenes such as schools, apartments, hotels and offices, information such as personnel, house cards and rooms and personnel authority management need to be fused, and the existing intelligent electronic door lock obviously cannot meet the requirements.
Disclosure of Invention
The invention mainly aims to provide a control method of an intelligent door lock system, and aims to solve the technical problem that the traditional intelligent door lock system cannot realize the fine management of mass door locks and personnel.
A control method of an intelligent door lock system is applied to the intelligent door lock management system, and the intelligent door lock management system comprises an application end, an application server, an equipment server, a gateway and an intelligent door lock;
the application end sends control instruction information to an application server;
the application server analyzes the control instruction information and sends the analyzed control instruction information to the equipment server;
the equipment server transmits the control instruction information to the intelligent door lock through the gateway;
the intelligent door lock executes the control instruction information and feeds back the execution condition information to the application end through the gateway, the equipment server and the application server.
Preferably, the step of executing the control command information by the intelligent door lock includes:
judging whether the data of the control instruction information is effective
If so, analyzing the data of the control instruction information, and judging whether the analyzed data of the control instruction information is effective again;
if so, reading a transmission serial number corresponding to the current control instruction information, and judging whether the value of the transmission serial number is greater than the value of the previous transmission serial number, wherein the transmission serial number is contained in the control instruction information, and the previous transmission serial number is stored in the intelligent door lock;
if yes, judging that the current control instruction information is an executable command, and executing the control instruction information.
Preferably, the step of the intelligent door lock executing the control instruction information and feeding back the execution information to the application terminal through the gateway, the device server and the application server includes:
the intelligent door lock generates a feedback message after executing the control instruction information, wherein the feedback message comprises information such as execution state information, the communication transmission sequence number at this time and the like;
the intelligent door lock encrypts the feedback message according to the predefined encryption seed to generate an encrypted data packet, and enters a sending mode;
and the intelligent door lock sends the encrypted data packet to the equipment server.
Preferably, the intelligent door lock system is installed and debugged through the intelligent control card, and the step that the application end sends the control instruction information to the application server includes afterwards:
whether the intelligent door lock reads the intelligent control card or not;
if so, the intelligent door lock acquires the intelligent control card physical Identity (ID) and generates first door lock identity information, wherein the first door lock identity information is a temporary identity (MAC);
the intelligent door lock generates a registration packet according to the intelligent control card physical identity ID and the first door lock identity information;
the intelligent door lock sends the registration packet to the equipment server through the gateway;
the equipment server checks the registration packet information and judges whether the registration packet information is valid or not;
if so, the equipment server acquires second door lock identity information generated by the database, generates a debugging feedback data packet according to the registration packet information, the second door lock identity information and the current time, and sends the debugging feedback data packet to the intelligent door lock through the gateway, wherein the debugging feedback data packet comprises the second door lock identity information, third door lock identity information, gateway identity information and system current time information, the third door lock identity information has the same content as the first door lock identity information, and the second door lock identity information is a real identity mark MAC of the intelligent door lock;
the intelligent door lock analyzes the debugging feedback data packet, and whether the local first door lock identity information of the intelligent door lock is consistent with the third door lock identity information in the debugging feedback data packet or not is compared;
if yes, the intelligent door lock reads second door lock identity information from the debugging feedback data packet, local temporary first door lock identity information of the intelligent door lock is replaced by the second door lock identity information, corresponding gateway identity unique identification information is stored, local time is corrected, and debugging is completed, wherein the gateway identity unique identification information is used for preliminarily judging the legality of data.
Preferably, after the step of the device server transmitting the control instruction information to the intelligent door lock via the gateway, the method includes:
the time when the equipment server sends the control instruction information to the gateway is taken as a first starting point time, and whether execution condition information fed back by the gateway is received or not is judged within a first preset time period;
if not, the equipment server puts the control instruction information into a retransmission data queue to wait for retransmission to the gateway.
Preferably, if not, the step of placing the control instruction information into a retransmission data queue by the device server to wait for retransmission to the gateway includes:
the time when the equipment server sends the control instruction information to the gateway again is taken as a second starting time, and whether execution state information fed back by the gateway is received or not within a second preset time period is judged;
if not, judging that the intelligent door lock is abnormal, and executing abnormal information pushing by the door lock control instruction.
Preferably, the step of transmitting the control instruction information to the intelligent door lock by the equipment server through the gateway includes:
the gateway adopts a dual-frequency dual-channel transceiving mechanism, uses a frequency band with the frequency of 434MHz when sending data, and uses a frequency band with the frequency of 471MHz when receiving data.
Preferably, the step of the application server analyzing the control instruction information and sending the analyzed control instruction information to the device server includes:
the device server judges whether the application server is authorized;
and if so, the equipment server allows the access of the application server and executes the control instruction information transmitted by the application terminal.
Preferably, before the step of transmitting the control instruction information to the intelligent door lock through the gateway, the equipment server includes:
the intelligent door lock is initialized after being awakened, and enters a CAD mode after being initialized;
the intelligent door lock sniffs in a CAD mode and judges whether lead code data of a preset frequency band are received or not;
if not, the intelligent door lock enters a dormant state.
The invention also provides an intelligent door lock management system, which is applied to the control method of the intelligent door lock system and comprises the following steps:
the application terminal is used for sending control instruction information and checking state information of the intelligent door lock management system by a user;
the application server is used for sending and receiving the application terminal information;
the equipment server is used for managing the intelligent door lock and the gateway and encrypting, decrypting, verifying and controlling access to the transmission data;
the intelligent door lock is used for opening and closing the door and feeding back the execution condition of the control instruction information to the application end;
and the gateway is used for binding the identity of the intelligent door lock and transmitting data.
The invention has the beneficial effects that: through the scheme, the administrator can give the user the authority to use the intelligent door lock in a remote authorization mode through the equipment server, and the field handover in the traditional mode is avoided; in addition, the records of the use of the intelligent door locks by the users are stored in the system, so that managers can conveniently check the conditions of the users, and the ordered centralized management of the intelligent door locks in large batches is realized. The manager can give the user the right to use the intelligent door lock through the application end, and centralized visual system management of the door lock is realized; in addition, the door opening record and the electric quantity information are uploaded to the system, the door lock state can be set through the application end, and great convenience is brought to ordered centralized management of large-batch intelligent door locks.
Drawings
Fig. 1 is a schematic flowchart of a first embodiment of a control method of an intelligent door lock system according to the present invention;
FIG. 2 is a schematic structural diagram of an intelligent door lock management system according to the present invention;
fig. 3 is a schematic diagram of a debugging process of the control method of the intelligent door lock system according to the present invention.
Description of reference numerals:
1. an application end; 2. An application server; 3. An equipment server; 4. A gateway; 5. Intelligent lock.
The implementation, functional features and advantages of the objects of the present invention will be further explained with reference to the accompanying drawings.
Detailed Description
It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
Referring to fig. 1 and 2, the present invention provides a control method of an intelligent door lock system, where the method is applied to an intelligent door lock management system, and the intelligent door lock management system includes an application terminal 1, an application server 2, an equipment server 3, a gateway 4, and an intelligent door lock 5;
s1: the application end 1 sends control instruction information to the application server 2;
s2: the application server 2 analyzes the control instruction information and sends the analyzed control instruction information to the equipment server 3;
s3: the equipment server 3 transmits the control instruction information to the intelligent door lock 5 through the gateway 4;
s4: the intelligent door lock 5 executes the control instruction information and feeds back the execution condition information to the application terminal 1 through the gateway 4, the equipment server 3 and the application server 2.
In the embodiment of the present invention, the application end 1 includes a computer end and a mobile terminal (such as a smart phone, a tablet computer, etc.), and one gateway 4 may interface with a plurality of smart door locks 5. For example, take "remote door open" as an example. The user sends a remote door opening instruction to the application server 2 through the application end 1, the application server 2 analyzes the instruction and transmits the instruction to the equipment server 3, wherein the door opening instruction information comprises a room number, an equipment type, a control command, a token of access authority, control information and the like. The device server 3 performs data source verification, analysis and other actions on the control command, encrypts the command after judging that the control command is valid, transmits the encrypted command to the gateway 4, and transmits the control command to the intelligent door lock 5 through the SPI3 communication interface. After judging that the control instruction is valid, the intelligent door lock 5 executes the control instruction, completes unlocking, and feeds back the unlocking condition (such as successful unlocking or failure) to the application terminal 1. In addition, the intelligent door lock management system can remotely open the door in real time, clear door opening information of a user, acquire logs, bind, unbind, locally authorize, synchronize time and the like, and realize remote control and centralized management of the networked door locks. Through the arrangement, the administrator can give the user the authority to use the intelligent door lock 5 in a remote authorization mode through the equipment server 3, and the field handover in the traditional mode is avoided; in addition, the records of the use of the intelligent door lock 5 by the user are stored in the system, so that the manager can conveniently check the conditions of each user, and the ordered centralized management of the intelligent door locks 5 in large batches is realized. In conclusion, the method can also realize the functions of real-time remote door opening, remote password authorization, remote IC card authorization, long-distance door lock opening and closing setting, user door opening information clearing, log acquisition, installation and debugging, unbinding, local authorization, time synchronization, signal testing and the like, and realize the remote control and centralized management of the networked door locks; the intelligent door lock 5 integrates management of information such as personnel, rooms, house cards, rent, water and electricity fees and the like, fine management of the intelligent door lock 5 is achieved, management efficiency is improved, and operation cost is reduced. Through the scheme, the manager can give the user the right to use the intelligent door lock 5 through the application end 1, and centralized visual system management of the door lock is realized; in addition, the door opening record and the electric quantity information are uploaded to the system, the door lock state can be set through the application end, and great convenience is brought to ordered centralized management of large-batch intelligent door locks.
Further, the step S4 of the intelligent door lock 5 executing the control instruction information includes:
s41: judging whether the data of the control instruction information is valid or not;
s42: if so, analyzing the data of the control instruction information, and judging whether the analyzed data of the control instruction information is effective again;
s43: if yes, reading a transmission serial number corresponding to the current control instruction information, and judging whether the value of the transmission serial number is larger than the value of the previous transmission serial number or not, wherein the transmission serial number is contained in the control instruction information, and the previous transmission serial number is stored in the intelligent door lock 5;
s44: if yes, judging that the current control instruction information is an executable command, and executing the control instruction information.
In the embodiment of the present invention, after the control instruction information is sent to the intelligent door lock 5, the intelligent door lock 5 determines whether the data of the control instruction information is valid according to the gateway identity unique identification information and the door lock identity unique identification information. If yes, the processor of the intelligent door lock 5 judges whether the header, the verification and the end bit information of the data of the control instruction information are equal to each other. If so, preliminarily judging that the data of the control instruction information is valid, analyzing the data layer by layer, and judging whether the header, the check and the end bit information of the data are equivalent or not again. If so, the control instruction information is determined to be valid again. The intelligent door lock 5 reads the transmission serial number in the control instruction information, and in addition, the transmission serial number stored in the past control instruction information, namely, a serial number record, is stored in the intelligent door lock 5, wherein the transmission serial number corresponding to the intelligent door lock 5 is updated every time the gateway 4 transmits the control instruction information. The intelligent door lock 5 judges whether the value of the current serial number is larger than the value of the previous transmission serial number. If yes, the control instruction information is proved to be an executable command, the transmission serial number corresponding to the control instruction information transmitted to the intelligent door lock 5 by the gateway 4 is updated to the local memory, and the intelligent door lock 5 executes the control instruction information. Through the arrangement, the intelligent door lock 5 can judge whether the data are valid when receiving the data, particularly, through a mechanism for judging the transmission serial number, other people are prevented from monitoring intercepted data in the air, even if the other people intercept the control instruction information in the air, after the intelligent door lock 5 executes the current control instruction information, the other people send the intercepted control instruction information to the intelligent door lock 5, and the intelligent door lock 5 judges that the transmission serial number in the control instruction information is a historical value, so that the intercepted control instruction information cannot be executed, and the safety of the system is improved.
In other embodiments of the present invention, the intelligent door lock 5 may parse the control instruction information to obtain the encrypted ID of the data packet. Then, a true decryption key is obtained through the encryption ID, and decrypted data are obtained through the processing of a decryption function. And analyzing layer by layer through a private protocol to obtain specific data, comparing the identity ID with the validity of the transmission serial number, and executing a related control instruction, such as opening a door. For example, the data packet (i.e., the control command) received by the smart door lock 5 is "7C 0C D2D 666156D BA 20 CC CD C3 CB CC D64C 896872 EC C9 EC D4F 9 EE 3627 FF". After the analysis, the obtained encryption ID is 8. And acquiring a true decryption key through the encryption ID, and processing the decryption function to obtain decrypted data, wherein the decrypted data is described as 'C0 EE 1E 11 AA 092106 EC 00010F 07000000108045A 40E 200520183522 FA 27 FF', and concrete data is finally obtained. Through the setting, acquire encryption ID, acquire the decryption key through encrypting ID through analytic data packet, again through the decryption function, just can decrypt the data packet, this link sets up layer upon layer, and the one deck is not conform to, then data packet decryption failure, and intelligent lock 5 can not carry out control command, increases the degree of difficulty that other people cracked the system, very big improvement the security of system.
Further, step S4, in which the intelligent door lock 5 executes the control instruction information and feeds back the execution information to the application terminal 1 via the gateway 4, the device server 3, and the application server 2, includes:
s4 a: the intelligent door lock 5 generates a feedback message after executing the control instruction information, wherein the feedback message comprises execution state information;
s4 b: the intelligent door lock 5 encrypts the feedback message according to the predefined encryption seed to generate an encrypted data packet, and enters a sending mode;
s4 c: the intelligent door lock 5 transmits the encrypted data packet to the device server 3.
In the embodiment of the present invention, the intelligent door lock 5 generates the feedback message after executing the control command information, for example, the feedback message is hexadecimal data, specifically, "E0 a 01F BA AA 7F DF 014D 850C 011060209273200520184014963C FF", which is original data and cannot be exposed, and therefore, further encryption is required. The intelligent door lock 5 encrypts the feedback message according to the predefined encryption seed to generate an encrypted data packet. After the encryption seeds are encrypted, the obtained data is 'A3D 30909B 96C CC 125E 961F 1203131311603316330B 5307852F FF'. The intelligent door lock 5 transmits the encrypted data packet to the device server 3. The encryption method has the advantages that the encryption seeds are strictly screened by combining the self protocol and the intelligent door lock resource design, so that the decryption difficulty is greatly increased; the data length cannot be changed after encryption and decryption, and the reliability of data transmission is improved; the encryption and decryption occupy less resources, the speed is high, and the energy consumption of the intelligent door lock is greatly reduced. In addition, through the above arrangement, after others steal data, the private protocol is cracked, the intelligent door lock 5 is controlled at will, others are prevented from monitoring, and the data is acquired for secondary use to achieve the purpose of controlling the intelligent door lock 5. Specifically, the encryption method of the scheme comprises the following steps: the encryption seeds with high decryption difficulty are strictly screened in advance and are respectively stored in the intelligent door lock 5 and the service program, and are not stored in the server or the memory of the intelligent door lock 5, so that the encryption seeds in the memory are prevented from being directly cracked and obtained; the server and the intelligent door lock 5 have the same encryption and decryption algorithms, and when a program receives or sends data, the program encrypts and decrypts the data to obtain correct data; in order to further enhance the difficulty of cracking, a special seed is defined in the encryption processing function, Unix time is used as the seed, a random function obtains the ID of the seed, and the uncertainty of encrypted data is increased; the seed ID, the data to be encrypted and the special seed are required to be encrypted, the encrypted data is obtained through a specific algorithm, the data decryption and the data encryption are reversible processes, and the original data can be obtained through the same processing of a decryption function.
Referring to fig. 3, the intelligent door lock system performs installation and debugging through the intelligent control card, and after step S1 in which the application terminal 1 sends control instruction information to the application server 3, the method includes:
s1 a: whether the intelligent door lock 5 reads the intelligent control card or not;
s1 b: if yes, the intelligent door lock 5 acquires the intelligent control card physical identity ID and generates first door lock identity information, wherein the first door lock identity information is a temporary identity MAC;
s1 c: the intelligent door lock 5 generates a registration packet according to the intelligent control card physical identity ID and the first door lock identity information;
s1 d: the intelligent door lock 5 sends the registration packet to the equipment server 3 through the gateway 4;
s1 f: the device server 3 checks the registration packet information and judges whether the registration packet information is valid;
s1 g: if yes, the equipment server 3 acquires second door lock identity information generated by the database, generates a debugging feedback data packet according to the registration packet information, the second door lock identity information and the current time, and sends the debugging feedback data packet to the intelligent door lock 5 through the gateway 4, wherein the debugging feedback data packet comprises the second door lock identity information, third door lock identity information, the gateway 4 identity information and system current time information, the third door lock identity information has the same content as the first door lock identity information, and the second door lock identity information is a real identity mark MAC of the intelligent door lock 5;
s1h, the intelligent door lock 5 analyzes the debugging feedback data packet and compares whether the local first door lock identity information of the intelligent door lock 5 is consistent with the third door lock identity information in the debugging feedback data packet;
s1i, if yes, the intelligent door lock 5 reads second door lock identity information from the debugging feedback data packet, replaces the local temporary first door lock identity information of the intelligent door lock 5 with the second door lock identity information, stores corresponding gateway 4 identity unique identification information, corrects local time, and completes debugging, wherein the gateway 4 identity unique identification information is used for preliminarily judging the legality of data.
In the embodiment of the invention, a manager clicks an 'installation and debugging' button on the application terminal 1, and the application server 2 sends the room number and the request parameters to the equipment server 3. The manager swipes the intelligent control card through the intelligent door lock 5, starts registration debugging, and triggers the intelligent door lock 5 to initiate a registration request. If the administrator swipes the smart card, the smart door lock 5 acquires the ID information of the smart card, and generates first door lock identity information, i.e., a first temporary MAC address. After the device server 3 receives the debugging instruction information, second door lock identity information, namely a database MAC address, is generated in a database (MySQL library) of the device server 3. And the intelligent door lock generates a registration packet according to the ID information of the intelligent control card and the first temporary MAC address, wherein the registration packet is a data packet. The intelligent door lock 5 sends a registration packet to all surrounding gateways 4 in a broadcast mode, and all gateways 4 receiving the registration packet send the registration packet to the equipment server 3. The equipment server 3 receives the data, analyzes the related parameters, checks and judges the related parameters to enter corresponding processing programs, inquires identity information of the intelligent door lock 5 in a MySQL database through the analyzed related parameters, namely, an MAC address of the database, and when the equipment server 3 receives the state in the registration packet fed back by the intelligent door lock 5 successfully, the room information, the intelligent door lock 5 and the gateway 4 are bound, and the binding result is pushed to the application server 2 or a third party. After the registration packet data is successfully verified by the device server 3, a debugging feedback data packet is generated and sent to the intelligent door lock 5 in a point-to-point mode through the gateway 4, wherein the debugging feedback data packet comprises second door lock identity information (database MAC address), third door lock identity information (second temporary MAC address), gateway identity information (gateway MAC address) and a time correction packet. The intelligent door lock 5 analyzes the debugging feedback data packet, and judges the local first door lock identity information (namely, the first temporary MAC address) of the intelligent door lock 5 and the third door lock identity information (namely, the second temporary MAC address) in the debugging feedback data packet. If the two are consistent, the intelligent door lock 5 is proved to be the intelligent door lock 5 which is being installed and debugged. The first door lock identity information (first temporary MAC address) of the intelligent door lock 5 is replaced with the second door lock identity information (i.e., database MAC address), completing the registration of the intelligent door lock 5. In other embodiments of the present invention, the intelligent door lock 5 adjusts the working time of the intelligent door lock 5 through the time correction packet, so as to ensure the normal operation of the intelligent door lock 5. In other embodiments of the present invention, from the moment when the "installation and debugging" button is triggered as a starting point, the smart door lock 5 needs to contact the smart card within a preset time period (e.g., 30 seconds), and after the debugging is successful, the smart door lock 5 sounds four tones to remind the manager to complete the installation and debugging. And if the preset time period is exceeded, the user needs to click the 'install and debug' button on the application end 1 again. Through the setting, the intelligent door lock 5 is prevented from being in a state to be registered for a long time, and the account is prevented from being installed and debugged any more. In addition, in other embodiments of the present invention, the smart door lock 5 is triggered to register by inputting a password instead of swiping a smart card. Through this setting, realize intelligent lock 5 pluralism and register. Compared with the traditional door lock system installation and debugging process, the method needs to use a plurality of cards, such as a function card, a calibration card and a data card, to complete each link of installation and debugging, and the debugging process is quite complex. According to the scheme, the installation and debugging of the door lock system can be completed only by one intelligent control card, the complex and complicated operation in the installation and debugging process is greatly reduced, and the work efficiency of the installation and debugging of the intelligent door lock system is improved.
Further, after the step S3 in which the device server 3 transmits the control instruction information to the intelligent door lock 5 via the gateway 4, the method includes:
s31: the time when the device server 3 sends the control instruction information to the gateway 4 is taken as a first starting point time, and whether the execution condition information fed back by the gateway 4 is received or not is judged within a first preset time period;
s32: if not, the device server 3 puts the control instruction information into a retransmission data queue to wait for retransmission to the gateway 4.
In the embodiment of the invention, a user sends control instruction information through the application end 1, the equipment server 3 adds the encapsulated data into a data queue through analysis and encapsulation after receiving the control instruction information, and informs the corresponding gateway 4 of sending the control instruction information to the intelligent door lock 5 through gateway identity information contained in the data. Because the wireless communication is greatly influenced by the environment, in order to ensure the reliability of the system, the time when the device server 3 sends the control instruction information to the gateway 4 is taken as the first starting point time, and whether the execution condition information fed back by the gateway 4 is received or not within the first preset time period is judged. If not, the equipment server 3 resends the control instruction information to the retransmission data queue to wait for retransmission to the gateway 4, so that the influence of environmental factors on the system reliability is reduced.
Further, after step S32, the method for the device server 3 placing the control instruction information into the retransmission data queue to wait for retransmission to the gateway 4 includes:
s33: the moment when the equipment server 3 retransmits the control instruction information to the gateway 4 is taken as a second starting moment, and whether execution condition information fed back by the gateway 4 is received or not within a second preset time period is judged;
s34: if not, the intelligent door lock 5 is judged to be abnormal, and abnormal information pushing is executed.
In the embodiment of the present invention, the time when the device server 3 retransmits the control instruction information to the gateway 4 is taken as the second starting time, and whether the execution condition information fed back by the gateway 4 is received within the second preset time period is determined. If the device server 3 does not receive the feedback information of the gateway 4 again within the predetermined time, the device server 3 determines that the smart door lock 5 is abnormal and cannot receive the data packet. The equipment server 3 pushes the abnormal information of the intelligent door lock 5 to the application terminal 1. Through the setting, when the system is abnormal, the user and the manager are reminded of timely maintenance.
In other embodiments of the present invention, after the device server 3 receives the information fed back by the gateway 4 within a specified time. The device server 3 obtains the command serial number in the feedback information, searches corresponding original data in the data queue and the cache queue through the command serial number, deletes the original data in the data queue and the cache queue, and pushes a result of successful command execution to the application terminal 1. By deleting the original data in the data queue and the cache queue, the situation that the intelligent door lock 5 executes the same control instruction for multiple times and occupies system resources due to the fact that the same command is repeatedly sent by the equipment server 3 is avoided. In another embodiment of the present invention, when the device server 3 cannot find the command sequence number, it is verified that the packet is an illegal packet, and the packet is discarded. The device server 3 will not perform data push, continue to issue the next data packet, and clear the overtime data packet.
Further, the step S3, in which the device server 3 transmits the control instruction information to the intelligent door lock 5 via the gateway 4, includes:
S3A: the gateway 4 uses a dual-frequency dual-channel transceiving mechanism, and uses a frequency band with a frequency of 434MHz when sending data and a frequency band with a frequency of 471MHz when receiving data.
In the embodiment of the present invention, the gateway 4 uses a dual-frequency single-channel transceiver mechanism, and uses a frequency band with a frequency of 434MHz when sending data, and uses a frequency band with a frequency of 471MHz when receiving data. Therefore, data sending collision can be effectively avoided, the success rate of data sending is improved, and the reliability and the stability of a communication link are ensured.
Further, before the step S2 in which the application server 2 parses the control instruction information and sends the parsed control instruction information to the device server 3, the method includes:
s21: the device server 3 judges whether the application server 2 is authorized;
s22: if yes, the device server 3 allows the application server 2 to access and execute the control instruction information transmitted by the application terminal 1.
In the embodiment of the present invention, the application terminal 1 obtains the access credential token of the device server 3 according to the account api and the password secret. The device server 3 determines whether the application 1 is authorized, that is, the device server 3 determines whether the token exists in the redis. If the control command information exists, the device server 3 allows the application terminal 1 to access and executes the control command information transmitted by the application terminal 1. Through the setting, only the application terminal 1 obtaining the access certificate is allowed to access the equipment server 3, so that the safety of the system is ensured.
In other embodiments of the present invention, the installation and debugging are taken as an example. If the request for "install and debug" is legitimate, the device server 3 further determines the correctness of the incoming data. And (4) comparing the room number, the appid and the equipment type by inquiring the database, feeding back the detected error to a caller, for example, if the room number does not exist, and returning a prompt that the room number does not exist to a manager.
Further, before the step S3, in which the device server 3 transmits the control instruction information to the intelligent door lock 5 via the gateway 4, the method includes:
S3A 1: the intelligent door lock 5 is initialized after being awakened, and enters a CAD mode after being initialized;
S3A 2: the intelligent door lock 5 sniffs in a CAD mode and judges whether lead code data of a preset frequency band are received or not;
S3A 3: if not, the intelligent door lock 5 enters a dormant state.
In the embodiment of the invention, the intelligent door lock 5 is initialized after awakening, and the control chip in the radio frequency module of the intelligent door lock 5 carries out CAD initialization. And entering a CAD mode after initialization. The intelligent door lock 5 sniffs in a CAD mode and judges whether preamble data of a preset frequency band is received, wherein the preset frequency band is 471 MHz. If the intelligent door lock 5 does not receive the front preamble data after sniffing, the intelligent door lock 5 enters a dormant state, so that the intelligent door lock 5 does not need to be in a working state in real time, and the power consumption of the intelligent door lock is reduced. In addition, the scheme combines the characteristic that the communication distance is limited, and the stability and the continuous cruising ability of the intelligent door lock signal are improved by adjusting and optimizing the main technical parameters of LORA communication. The method specifically comprises the following steps: the proportional relation between the transmitting power and the power consumption is adjusted, so that the power consumption is just suitable for the communication distance characteristic requirement of the intelligent door lock, the power consumption is greatly reduced, and the cruising ability of the intelligent door lock 5 is prolonged; the signal bandwidth is increased, the effective data rate can be improved to shorten the transmission time, the optimal value of the signal bandwidth of the intelligent door lock is optimized through the real application environment and various distance tests, the power consumption of the intelligent door lock 5 is reduced and the experience of a user is improved when communication is shortened; in addition, in order to further reduce the power consumption of the intelligent door lock 5, according to an actual application scene and past experience, the length of the lead code of the LORA is set, so that the intelligent door lock is suitable for the specific application environment of the intelligent door lock, the awakening times of the LORA module are reduced, the sleep time of the intelligent door lock is prolonged, and the normal operation time of the intelligent door lock is prolonged; since the intelligent door lock can be installed in a complex and variable environment, it is necessary to improve the anti-interference performance of LORA communication, and by adjusting two design variables, namely, Spreading Factor (SF) and error Correction Rate (CR), a better balance between bandwidth occupation, data rate, link budget improvement and anti-interference performance is achieved,
in other embodiments of the present invention, if the smart door lock 5 receives the preamble data, the smart door lock 5 enters a working state to process a task.
Referring to fig. 2, the present invention provides an intelligent door lock management system, which is applied to the control method of the intelligent door lock system, and includes:
the application end 1 is used for sending control instruction information and checking state information of the intelligent door lock management system by a user;
the application server 2 is used for sending and receiving the information of the application terminal 1;
the equipment server 3 is used for managing the intelligent door lock and the gateway and encrypting, decrypting, verifying and controlling access to the transmission data;
the intelligent door lock 5 is used for opening and closing a door and feeding back the execution condition of the control instruction information to the application end 1;
and the gateway 4 is used for binding the identity of the intelligent door lock 5 and transmitting data.
In the embodiment of the invention, the application end 1 mainly comprises a java background, a web page and a WeChat public number, can meet the requirements of clients at a mobile end and a pc end, does not need a complex installation process, and can be used by opening the page.
The application end 1 is the daily management tool of administrator to networking lock, for the convenience of administrator's administrative work, combines user's user demand, provides the integration remote management function of information such as building personnel, room card, record details, lock state for the customer, is respectively: the system comprises a business handling module, a query report, basic information setting, access control management and system setting modules. The business handling module is mainly used for personnel information registration, personnel information verification, house card information, door opening permission setting, data clearing, door lock log obtaining, remote door opening, historical user record and other functions. The inquiry report has the functions of door opening log inquiry and operation log inquiry, and can inquire and track all door opening records and system operation records according to specific time.
Basic information setting is used for setting some basic information of an account; the gateway setting is used for the gateway 4 to perform related operations including functions of adding, deleting, modifying, viewing specific information, instructing and controlling card change and the like of equipment; the room setting is used for the distribution of buildings and rooms, and the installation and debugging, the unbinding, the signal testing, the electric quantity condition and other functions of the networking lock; the administrator card management means that a specific card can set the door opening authority of the networking lock managed by the specific gateway 4, and the authority can be set arbitrarily according to the requirement; the card writer management is to add the serial number of the card writer to be used, and the card writer software synchronizes data with the server when in use and displays related user information in a corresponding room; the house card setting is mainly used for adding a card to be used to the server, so that an administrator can conveniently provide selection in registering personnel information or setting door opening permission;
the entrance guard setting management is used for entrance guard equipment to perform related operations, including equipment addition, deletion, modification, specific information checking, entrance guard state setting, entrance guard remote opening and log query; the user details refer to specific people of the access control; the door control log query and door control operation log query functions can query and track all door opening records and system operation records according to specific time
The administrator account management is that a sub account can be allocated to the account.
The equipment server 3 is the core of the intelligent door lock management system, and in order to ensure the functional stability of the server, the remote server is developed based on the golang language, the language supports high concurrency from the bottom layer, a third-party library and a thread are not needed, the problem of using CPU resources can be easily solved, and convenience is provided for accessing more equipment. The device server 3 adopts a beego framework design to provide an HTTP request for the application terminal 1, and adopts a TCP/IP communication protocol to establish connection with the gateway 4 to realize mutual communication. In order to maintain the connection of the application end 1, a heartbeat mechanism is established with the gateway 4, so that the disconnection between the gateway 4 and the equipment server 3 under abnormal conditions is prevented, the server end cannot detect and push the online state of the gateway 4 to inform the user, and real-time monitoring data is provided for normal communication.
The device server 3 provides services for main devices, and the functions include adding, deleting, modifying, binding, unbinding of the devices, random generation of MAC addresses when the control center communicates with the intelligent door lock 5, and provision of HTTP protocol interfaces for third parties to control the intelligent door lock 5 and to control whether door opening records and control commands are successfully pushed. The HTTP protocol interface comprises interfaces such as remote door opening, card sending/password sending, equipment resetting, long-open long-close setting, signal testing, electric quantity state obtaining, log adding, deleting and equipment changing, installation and debugging, unbinding and room synchronizing and the like, and the door lock management function can be implanted into the system of the third party conveniently.
The data of the intelligent door lock 5 managed by the gateway 4 is a bridge for the device server 3 to communicate with the intelligent door lock 5. The connection established between the gateway 4 and the device server 3 is based on the transmission control protocol (TCP/IP), two different programs in the network realize data exchange by establishing a bidirectional communication connection, one end of the bidirectional link is called Socket, one end of the bidirectional link is called application end, and the other end of the bidirectional link is called service end.
Because the gateway 4 and the device server 3 are always connected, normal receiving and sending of the door lock instruction can be guaranteed, connection disconnection caused by some special conditions or other factors in the actual environment, such as network abnormality, program runaway and the like, needs an abnormality processing mechanism, and when the network condition is abnormal, the gateway 4 tries to connect the device server 3 until the network returns to normal. The program run-off can also be detected by a watchdog, and the restart program is recovered to be normal. These abnormal conditions can be known through the gateway indicator light.
The gateway 4 can enter a route management interface, and set the ip address and port of the device server corresponding to the gateway, and obtain the ip address dynamically and statically. When the IP address and the port of the equipment server are accessed to the IP address and the port of the public network of the target equipment server by the gateway 4; when the ip address is acquired dynamically and statically, the ip address is randomly distributed to the control center by a local route or assigned to be used by the control center.
Each gateway 4 has a unique product serial number that is used by the gateway 4 access device server to use the identity credential.
The premise condition that the equipment server 3 can be normally used is that an administrator adds the gateway 4 at the corresponding account application end, inputs and submits the product serial number and the name of the gateway 4, the application end 1 sends a request for adding the relevant parameters of the gateway 4 to the equipment server 3, the equipment server 3 carries out authentication identification and product serial number uniqueness judgment on the identity authority of a requester, and after a series of verification of the equipment server 3 is correct, the equipment server responds to the request of the application end 1, and a successful state is returned to indicate that the request is correctly executed.
And then the equipment server 3 continues to execute the task added by the gateway 4, generates an LORA communication unique identification MAC for the newly added control gateway 4, and inserts the product serial number and the identification MAC of the control center into the MySQL database.
After each gateway 4 is powered on and tcp connection is established with the equipment server 3, the primary task organizes data messages, encrypts and verifies data, and packages to initiate a registration request, and after receiving the data packet of the control center, the equipment server 3 analyzes, decrypts, verifies and executes related processing programs.
The related processing program tasks comprise searching MAC of the LORA communication unique identification of the control center, establishing a control center Socket management structure body initialization, storing the corresponding relation between the control center and an equipment server ip in Redis, pushing the online state of the gateway 4 to an application end 1 and a third party user, obtaining the current time, organizing data messages, encrypting and verifying data, packaging and sending the information of a book of interest to the gateway 4, using the decrypted data for the initialization of the gateway 4, and after the initialization is successful, an indicator lamp above the front face of the gateway 4 is in a breathing state and can be normally used.
On the contrary, when the gateway 4 is registered, the device server 3 cannot search the corresponding product serial number in the database, and the device server 3 neither responds to the request of the gateway 4 nor pushes the online status to the application 1 and the third party user. The gateway 4 is always in an unregistered state, so that the gateway 4 cannot be normally used.
The gateway 4 is a communication converter between the equipment server 3 and the intelligent door lock, and is converted into a wireless mode from a wired connection, the connection between the gateway 4 and the equipment server 3 establishes a communication link through tcp, and the communication between the gateway 4 and the intelligent door lock 5 carries out data exchange through an LORA wireless spread spectrum technology. In order to avoid the problem of signal collision in the prior art, the gateway 4 carries two LORA modules during design, adopts a dual-frequency dual-channel transceiving mechanism, reduces signal collision as much as possible, and improves the reliability and success rate of data transmission.
The above description is only a preferred embodiment of the present invention, and not intended to limit the scope of the present invention, and all modifications of equivalent structures and equivalent processes, which are made by using the contents of the present specification and the accompanying drawings, or directly or indirectly applied to other related technical fields, are included in the scope of the present invention.
Claims (10)
1. The control method of the intelligent door lock system is characterized in that the method is applied to an intelligent door lock management system, and the intelligent door lock management system comprises an application end, an application server, an equipment server, a gateway and an intelligent door lock;
the application end sends control instruction information to the application server;
the application server analyzes the control instruction information and sends the analyzed control instruction information to the equipment server;
the equipment server transmits control instruction information to the intelligent door lock through the gateway;
the intelligent door lock executes the control instruction information and feeds back execution state information to the application end through the gateway, the equipment server and the application server.
2. The method for controlling an intelligent door lock system according to claim 1, wherein the step of executing the control command information by the intelligent door lock comprises:
judging whether the data of the control instruction information is valid or not
If so, analyzing the data of the control instruction information, and judging whether the analyzed data of the control instruction information is effective again;
if so, reading a transmission serial number corresponding to the current control instruction information, and judging whether the value of the transmission serial number is greater than the value of the previous transmission serial number, wherein the transmission serial number is contained in the control instruction information, and the previous transmission serial number is stored in the intelligent door lock;
if yes, judging that the current control instruction information is an executable command, and executing the control instruction information.
3. The method for controlling an intelligent door lock system according to claim 2, wherein the step of executing the control command information and feeding back the execution status information to the application terminal via the gateway, the device server and the application server includes:
the intelligent door lock executes the control instruction information and then generates a feedback message, wherein the feedback message comprises the execution state information;
the intelligent door lock encrypts the feedback message according to a predefined encryption seed to generate an encrypted data packet, and enters a sending mode;
and the intelligent door lock sends the encrypted data packet to the equipment server.
4. The method for controlling an intelligent door lock system according to claim 1, wherein the intelligent door lock system is installed and debugged through an intelligent control card, and the step of sending the control instruction information to the application server by the application terminal comprises the following steps:
whether the intelligent door lock reads the intelligent control card or not is judged;
if so, the intelligent door lock acquires the intelligent control card physical Identity (ID) and generates first door lock identity information, wherein the first door lock identity information is a temporary identity (MAC);
the intelligent door lock generates a registration packet according to the intelligent control card physical Identity (ID) and the first door lock identity information;
the intelligent door lock sends the registration packet to the equipment server through the gateway;
the equipment server checks the registration packet information and judges whether the registration packet information is valid or not;
if so, the equipment server acquires second door lock identity information generated by a database, generates a debugging feedback data packet according to the registration packet information, the second door lock identity information and the current system time, and sends the debugging feedback data packet to the intelligent door lock through the gateway, wherein the debugging feedback data packet comprises the second door lock identity information, third door lock identity information, gateway identity information and system current time information, the third door lock identity information has the same content as the first door lock identity information, and the second door lock identity information is a real identity mark MAC of the intelligent door lock;
the intelligent door lock analyzes the debugging feedback data packet, and compares whether the local first door lock identity information of the intelligent door lock is consistent with the third door lock identity information in the debugging feedback data packet or not;
if yes, the intelligent door lock reads the second door lock identity information from the debugging feedback data packet, replaces the first door lock identity information which is local and temporary in the intelligent door lock with the second door lock identity information, stores corresponding gateway identity unique identification information, corrects local time, corrects the local time, and completes debugging, wherein the gateway identity unique identification information is used for preliminarily judging the legality of data.
5. The method for controlling an intelligent door lock system according to claim 1, wherein the step of the device server transmitting the control instruction information to the intelligent door lock via the gateway comprises:
the time when the equipment server sends control instruction information to the gateway is taken as a first starting point time, and whether the execution state information fed back by the gateway is received or not is judged within a first preset time period;
if not, the equipment server puts the control instruction information into a retransmission data queue to wait for retransmission to the gateway.
6. The method for controlling an intelligent door lock system according to claim 5, wherein if not, the device server puts the control instruction information into a retransmission data queue to wait for retransmission to the gateway, and the method comprises:
the time when the equipment server retransmits the control instruction information to the gateway is taken as a second starting time, and whether the execution state information fed back by the gateway is received within a second preset time period is judged;
if not, judging that the intelligent door lock is abnormal, and executing abnormal information pushing by the door lock control instruction.
7. The method for controlling an intelligent door lock system according to any one of claims 1 to 6, wherein the step of the device server transmitting control instruction information to the intelligent door lock via the gateway includes:
the gateway adopts a dual-frequency dual-channel transceiving mechanism, uses a frequency band with the frequency of 434MHz when sending data, and uses a frequency band with the frequency of 471MHz when receiving data.
8. The method for controlling an intelligent door lock system according to claim 1, wherein the step of the application server analyzing the control instruction information and sending the analyzed control instruction information to the device server includes:
the equipment server judges whether the application server is authorized;
and if so, the equipment server allows the access of the application server and executes the control instruction information transmitted by the application terminal.
9. The method for controlling an intelligent door lock system according to claim 1, wherein the step of the device server transmitting the control instruction information to the intelligent door lock via the gateway is preceded by:
the intelligent door lock is initialized after being awakened, and enters a CAD mode after being initialized;
the intelligent door lock sniffs in a CAD mode and judges whether lead code data of a preset frequency band are received or not;
if not, the intelligent door lock enters a dormant state.
10. An intelligent door lock management system applied to the control method of the intelligent door lock system according to any one of claims 1 to 9, comprising:
the application terminal is used for sending control instruction information and checking state information of the intelligent door lock management system by a user;
the application server is used for sending and receiving the application terminal information;
the equipment server is used for managing the intelligent door lock and the gateway and encrypting, decrypting, verifying and controlling access to the transmission data;
the intelligent door lock is used for opening and closing the door and feeding back the execution state of the control instruction information to the application end;
and the gateway is used for binding the identity of the intelligent door lock and transmitting data.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010662731.8A CN111882704B (en) | 2020-07-10 | 2020-07-10 | Control method of intelligent door lock system and intelligent door lock management system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010662731.8A CN111882704B (en) | 2020-07-10 | 2020-07-10 | Control method of intelligent door lock system and intelligent door lock management system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111882704A true CN111882704A (en) | 2020-11-03 |
CN111882704B CN111882704B (en) | 2021-02-12 |
Family
ID=73150277
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010662731.8A Active CN111882704B (en) | 2020-07-10 | 2020-07-10 | Control method of intelligent door lock system and intelligent door lock management system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111882704B (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112365640A (en) * | 2020-11-27 | 2021-02-12 | 深圳市欧瑞博科技股份有限公司 | Method, system and device for replacing user information of intelligent door lock |
CN112466018A (en) * | 2020-12-08 | 2021-03-09 | 广东省安心加科技有限公司 | Access control abnormity query method, terminal and storage medium |
CN112785757A (en) * | 2020-12-31 | 2021-05-11 | 九牧厨卫股份有限公司 | Intelligent lock authorization authentication method and intelligent lock |
CN113192251A (en) * | 2021-04-29 | 2021-07-30 | 常熟理工学院 | Method for realizing identity recognition of multiple biological characteristics capable of being configured on line |
CN114882620A (en) * | 2022-04-08 | 2022-08-09 | 深圳海智创科技有限公司 | Identity authentication method and system of intelligent door lock |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101765995A (en) * | 2007-05-28 | 2010-06-30 | 霍尼韦尔国际公司 | The system and method that is used for commissioning access control devices |
JP4600096B2 (en) * | 2005-03-11 | 2010-12-15 | 富士通株式会社 | Entrance management program, entrance management method, and entrance management apparatus |
CN201993826U (en) * | 2011-04-15 | 2011-09-28 | 江苏怡和科技股份有限公司 | Entrance guard device |
CN202650103U (en) * | 2012-05-24 | 2013-01-02 | 杭州华韵天略电子科技有限公司 | Remote induction access control system |
CN104952128A (en) * | 2015-05-20 | 2015-09-30 | 范浪波 | Intelligent handheld terminal based electronic unlocking system and unlocking method thereof |
CN207115538U (en) * | 2017-09-07 | 2018-03-16 | 北京洛克家智能科技有限责任公司 | Door-lock controller and system based on bluetooth interaction |
CN109191630A (en) * | 2018-08-04 | 2019-01-11 | 南京理工大学 | A kind of Intelligent door lock in hotel of NFC compatible bluetooth |
CN110572843A (en) * | 2019-09-29 | 2019-12-13 | 陈小艺 | Sniffing method and system based on LoRa wireless module CAD mode |
-
2020
- 2020-07-10 CN CN202010662731.8A patent/CN111882704B/en active Active
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP4600096B2 (en) * | 2005-03-11 | 2010-12-15 | 富士通株式会社 | Entrance management program, entrance management method, and entrance management apparatus |
CN101765995A (en) * | 2007-05-28 | 2010-06-30 | 霍尼韦尔国际公司 | The system and method that is used for commissioning access control devices |
CN201993826U (en) * | 2011-04-15 | 2011-09-28 | 江苏怡和科技股份有限公司 | Entrance guard device |
CN202650103U (en) * | 2012-05-24 | 2013-01-02 | 杭州华韵天略电子科技有限公司 | Remote induction access control system |
CN104952128A (en) * | 2015-05-20 | 2015-09-30 | 范浪波 | Intelligent handheld terminal based electronic unlocking system and unlocking method thereof |
CN207115538U (en) * | 2017-09-07 | 2018-03-16 | 北京洛克家智能科技有限责任公司 | Door-lock controller and system based on bluetooth interaction |
CN109191630A (en) * | 2018-08-04 | 2019-01-11 | 南京理工大学 | A kind of Intelligent door lock in hotel of NFC compatible bluetooth |
CN110572843A (en) * | 2019-09-29 | 2019-12-13 | 陈小艺 | Sniffing method and system based on LoRa wireless module CAD mode |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112365640A (en) * | 2020-11-27 | 2021-02-12 | 深圳市欧瑞博科技股份有限公司 | Method, system and device for replacing user information of intelligent door lock |
CN112466018A (en) * | 2020-12-08 | 2021-03-09 | 广东省安心加科技有限公司 | Access control abnormity query method, terminal and storage medium |
CN112785757A (en) * | 2020-12-31 | 2021-05-11 | 九牧厨卫股份有限公司 | Intelligent lock authorization authentication method and intelligent lock |
CN113192251A (en) * | 2021-04-29 | 2021-07-30 | 常熟理工学院 | Method for realizing identity recognition of multiple biological characteristics capable of being configured on line |
CN114882620A (en) * | 2022-04-08 | 2022-08-09 | 深圳海智创科技有限公司 | Identity authentication method and system of intelligent door lock |
Also Published As
Publication number | Publication date |
---|---|
CN111882704B (en) | 2021-02-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111882704B (en) | Control method of intelligent door lock system and intelligent door lock management system | |
CN107734502B (en) | Micro base station communication management method, system and equipment based on block chain | |
CN105554098B (en) | A kind of equipment configuration method, server and system | |
CN109903433B (en) | Access control system and access control method based on face recognition | |
CN104966336B (en) | Intelligent lock and authorization management method and device of intelligent lock | |
US5944794A (en) | User identification data management scheme for networking computer systems using wide area network | |
CN101379762B (en) | System and method for processing authentication and authorization for simple network management protocol (SNMP) | |
CN107122674B (en) | Access method of oracle database applied to operation and maintenance auditing system | |
CN102448061B (en) | Method and system for preventing phishing attack on basis of mobile terminal | |
CN109922160A (en) | A kind of terminal security cut-in method, apparatus and system based on electric power Internet of Things | |
CN103489233A (en) | Electronic door control system with dynamic password | |
CN103354550A (en) | Authorization control method and device based on terminal information | |
US11245523B2 (en) | Method for implementing client side credential control to authorize access to a protected device | |
US20080150753A1 (en) | Secure Data Transfer In A Communication System Including Portable Meters | |
CN108966216B (en) | Mobile communication method and system applied to power distribution network | |
CN110768973A (en) | Signaling safety evaluation system and method based on GB35114 standard | |
CN110635894B (en) | Quantum key output method and system based on frame protocol format | |
CN112260275B (en) | Non-invasive load decomposition method and system based on blockchain technology | |
CN102984045A (en) | Access method of Virtual Private Network and Virtual Private Network client | |
CN105141580A (en) | Resource access control method based on AD domain | |
CN110474921A (en) | A kind of perception layer data fidelity method towards local Internet of Things | |
CN108734812A (en) | Remote unlocking method, apparatus based on ZigBee and system | |
CN113569213A (en) | Industrial park application safety support system and method based on 5G technology | |
CN111917706A (en) | Method for identifying NAT equipment and determining number of terminals behind NAT | |
CN110415419A (en) | Electron key share system in access control system based on mobile terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |