CN112105003B - Data synchronization system, method and device of intelligent door lock and readable storage medium - Google Patents

Data synchronization system, method and device of intelligent door lock and readable storage medium Download PDF

Info

Publication number
CN112105003B
CN112105003B CN202010967806.3A CN202010967806A CN112105003B CN 112105003 B CN112105003 B CN 112105003B CN 202010967806 A CN202010967806 A CN 202010967806A CN 112105003 B CN112105003 B CN 112105003B
Authority
CN
China
Prior art keywords
door lock
client
data
intelligent door
sub
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010967806.3A
Other languages
Chinese (zh)
Other versions
CN112105003A (en
Inventor
钱宗进
李爽
曾令威
王琪辉
李瑞明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ningbo Bull Intelligent Technology Co ltd
Original Assignee
Ningbo Bull Intelligent Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ningbo Bull Intelligent Technology Co ltd filed Critical Ningbo Bull Intelligent Technology Co ltd
Priority to CN202010967806.3A priority Critical patent/CN112105003B/en
Publication of CN112105003A publication Critical patent/CN112105003A/en
Application granted granted Critical
Publication of CN112105003B publication Critical patent/CN112105003B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/70Services for machine-to-machine communication [M2M] or machine type communication [MTC]
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1095Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0631Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • H04L9/3213Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/14Direct-mode setup
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • G07C2009/0042Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks the transmitted data signal containing a code which is changed
    • G07C2009/00476Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks the transmitted data signal containing a code which is changed dynamically
    • G07C2009/005Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks the transmitted data signal containing a code which is changed dynamically whereby the code is a random code

Abstract

The application relates to a data synchronization system, a method, a device and a readable storage medium of an intelligent door lock, which relate to the field of intelligent home, and the system comprises: the system comprises a server, an intelligent door lock and a client; the intelligent door lock is used for receiving the data acquisition instruction; sending door lock binding data; the client is used for receiving door lock binding data sent by the intelligent door lock through the first communication network connection; updating the client binding data according to the door lock binding data; forwarding door lock binding data; and the server is also used for receiving the door lock binding data. The intelligent door lock is connected with the intelligent door lock through a communication network, receives door lock binding data, correspondingly stores and updates the door lock binding data, and is connected with different communication networks, and the client side carries out transparent transmission on data between the intelligent door lock and the client side, so that the intelligent door lock is not directly connected with a server when the data are transmitted, and the use safety of the intelligent door lock is ensured.

Description

Data synchronization system, method and device of intelligent door lock and readable storage medium
Technical Field
The application relates to the field of intelligent home furnishing, in particular to a data synchronization system, a method and a device of an intelligent door lock and a readable storage medium.
Background
The intelligent home technology is the embodiment of the Internet of things under the influence of the Internet. The intelligent door lock is embodied as an intelligent home technology, and is increasingly widely used due to better safety and convenience in use.
In the related art, a communication connection is established between the server and the intelligent door lock. The server can acquire a list of the client sides which are established with the control binding information from the intelligent door lock, and send the list to the client sides so that the client sides can know the unlocking authority of the client sides.
However, data transmitted between the intelligent door lock and the server is easy to intercept or crack, so that the intelligent door lock is subjected to malicious attack, and the use safety of the working door lock is reduced.
Disclosure of Invention
The application relates to a data synchronization system, a method and a device for an intelligent door lock and a readable storage medium, which can improve the use safety of the intelligent door lock. The technical scheme is as follows:
In one aspect, a data synchronization system of an intelligent door lock is provided, the system comprises a server, the intelligent door lock and a client;
The intelligent door lock is used for receiving a data acquisition instruction, wherein the data acquisition instruction is used for acquiring door lock binding data of the intelligent door lock, and the door lock binding data comprises data of a client side which establishes a control binding relation with the intelligent door lock; according to the data acquisition instruction, door lock binding data are sent to the client through a first communication network connection, wherein the first communication network connection is based on a short-distance wireless network communication technology;
the client is also used for receiving door lock binding data sent by the intelligent door lock through the first communication network connection; updating the client binding data according to the door lock binding data; forwarding door lock binding data to a server through a second communication network connection;
The server is further used for receiving the door lock binding data sent by the client through the second communication network connection and updating the server binding data according to the door lock binding data.
On the other hand, a data synchronization method of an intelligent door lock is provided, the method is applied to a client, and the method comprises the following steps:
Receiving door lock binding data sent by an intelligent door lock through a first communication network connection, wherein the door lock binding data comprises data of a client establishing a control binding relation with the intelligent door lock, and the first communication network connection is based on a short-distance wireless network communication technology;
updating the client binding data according to the door lock binding data;
And forwarding the door lock binding data to the server through a second communication network connection.
On the other hand, a data synchronization method of an intelligent door lock is provided, the method is applied to the intelligent door lock, and the method comprises the following steps:
Receiving a data acquisition instruction, wherein the data acquisition instruction is used for acquiring door lock binding data, and the door lock binding data comprises data of a client establishing a control binding relation with an intelligent door lock;
determining door lock binding data according to the data acquisition instruction;
And sending the door lock binding data to the client through a first communication network connection according to the data acquisition instruction, wherein the first communication network connection is based on a short-distance wireless network communication technology.
In another aspect, a data synchronization device for an intelligent door lock is provided, the device comprising:
The receiving module is used for receiving door lock binding data sent by the intelligent door lock through a first communication network, wherein the door lock binding data comprises data of a client which establishes a control binding relation with the intelligent door lock, and the first communication network is connected with a network based on a short-distance wireless network communication technology;
The updating module is used for updating the client binding data according to the door lock binding data;
And the sending module is used for forwarding the door lock binding data to the server through the second communication network connection.
In another aspect, a data synchronization device for an intelligent door lock is provided, the device comprising:
the receiving module is used for receiving a data acquisition instruction, wherein the data acquisition instruction is used for acquiring door lock binding data, and the door lock binding data comprises data of a client which establishes a control binding relation with the intelligent door lock;
The determining module is used for determining the door lock binding data according to the data acquisition instruction;
And the sending module is used for sending the door lock binding data to the client through a first communication network connection according to the data acquisition instruction, wherein the first communication network connection is based on a short-distance wireless network communication technology.
In another aspect, a computer device is provided, where the computer device includes a processor and a memory, where the memory stores at least one instruction, at least one program, a code set, or an instruction set, and where the at least one instruction, the at least one program, the code set, or the instruction set is loaded and executed by the processor to implement a data synchronization method of an intelligent door lock according to an embodiment of the present application as described above.
In another aspect, a computer readable storage medium is provided, where at least one instruction, at least one program, a code set, or an instruction set is stored, where at least one instruction, at least one program, a code set, or an instruction set is loaded and executed by a processor to implement a data synchronization method of any of the above-mentioned intelligent door locks.
In another aspect, a computer program product is provided, which when run on a computer causes the computer to perform the data synchronization method of the intelligent door lock according to any of the embodiments of the present application described above.
The technical scheme provided by the application has the beneficial effects that at least:
The intelligent door lock is connected with the server through the communication network, receives the door lock binding data, correspondingly stores and updates the door lock binding data, and forwards the data received from the intelligent door lock to the server through the other communication network.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings required for the description of the embodiments will be briefly described below, and it is apparent that the drawings in the following description are only some embodiments of the present application, and other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 illustrates a schematic diagram of an implementation environment provided by an exemplary embodiment of the present application;
Fig. 2 is a flowchart illustrating a data synchronization method of an intelligent door lock according to an exemplary embodiment of the present application;
FIG. 3 illustrates an interface diagram of an update process provided by an exemplary embodiment of the present application;
fig. 4 is a flowchart illustrating a data synchronization method of an intelligent door lock according to an exemplary embodiment of the present application;
FIG. 5 illustrates a schematic diagram of a selection interface for a client provided by an exemplary embodiment of the present application;
fig. 6 is a flowchart illustrating a data synchronization method of an intelligent door lock according to an exemplary embodiment of the present application;
Fig. 7 is a flowchart illustrating a data synchronization method of an intelligent door lock according to an exemplary embodiment of the present application;
FIG. 8 illustrates a schematic diagram of a control interface for a client provided in accordance with an exemplary embodiment of the present application;
fig. 9 is a schematic process diagram of a data synchronization method of an intelligent door lock according to an exemplary embodiment of the present application;
fig. 10 is a block diagram illustrating a data synchronization apparatus of an intelligent door lock according to an exemplary embodiment of the present application;
Fig. 11 is a block diagram illustrating a data synchronization apparatus of an intelligent door lock according to an exemplary embodiment of the present application;
Fig. 12 is a schematic view showing a structure of a terminal for performing a data synchronization method of an intelligent door lock according to an exemplary embodiment of the present application;
fig. 13 is a schematic diagram showing a structure of a server according to an exemplary embodiment of the present application.
Detailed Description
For the purpose of making the objects, technical solutions and advantages of the present application more apparent, the embodiments of the present application will be described in further detail with reference to the accompanying drawings.
First, the terms involved in the embodiments of the present application will be briefly described:
intelligent door lock: the lock is improved by the traditional mechanical lock, and is more intelligent in terms of user safety, identification and management. In the embodiment of the application, the intelligent door lock is a door lock which can be remotely controlled through a corresponding client on the terminal equipment. Optionally, after a preset password is input in the client, the intelligent door lock is automatically unlocked; or clicking an unlocking identifier corresponding to the intelligent door lock in a control interface of the client, and unlocking the intelligent door lock.
The token is a dynamic password technology, a server generates a string of character passwords every preset time, the character passwords are processed to obtain the token, and the token is sent to a terminal to be verified to perform identity authentication. The terminal may perform processing such as encryption, segmentation, insertion of character segments on the received token to form a new token.
First, an implementation environment related to this embodiment will be described, and as shown in fig. 1, a data synchronization system 100 of an intelligent door lock includes a client 110, a server 120, and an intelligent door lock 130.
A communication network connection is established between the client 110 and the server 120. To ensure the security of the intelligent door lock 130, the intelligent door lock 130 is not directly connected to the server 120 through a communication network. In this embodiment, the smart door lock 130 is communicatively connected to the client 110 only through the first communication network connection. The client 110 and the server 120 are connected by a second communication network connection. That is, the intelligent door lock 130 is connected to the server 120 through the transfer of the client 110, and the client 110 plays a role in data transmission between the intelligent door lock 130 and the server 120.
In the data synchronization process of the intelligent door lock provided by the embodiment of the application, the server sends the data acquisition instruction. The intelligent door lock 130 receives the data acquisition instruction, and sends door lock binding data to the client through the first communication network connection according to the data acquisition instruction, wherein the door lock binding data comprises a control binding relation between the intelligent door lock 130 and the client 110. After receiving the door lock binding data sent by the intelligent door lock 130 through the first communication network connection, the client 110 updates the client binding data in the client 110 according to the door lock binding data. And the server 120 updates the server binding data according to the door lock binding data after receiving the door lock binding data transmitted from the client 110 through the second communication network connection. The client binding data is data of a control binding relationship between the intelligent door lock 130 stored in the client 110 and the client 110, and the server binding data is control binding data between the intelligent door lock 130 stored in the server 120 and the client. In the case of synchronous update, the client binding data, the server binding data and the door lock binding data should be the same, and the door lock binding data is the same.
In the implementation environment, under the condition that the intelligent door lock cannot be directly connected with the server through a network, a first communication network connection is established between the intelligent door lock and the client, a second communication network connection is established between the client and the server, and the client plays a role in transparent transmission of data transmission between the intelligent door lock and the server. In some embodiments of the application, the first Communication network connection between the smart door lock and the client comprises at least one of a Near Field Communication (NFC) network connection, a zigbee network connection, a bluetooth network connection, a hotspot network connection, and the second Communication network connection between the client and the server comprises at least one of a cellular mobile data network connection, a long range Wi-Fi Communication network connection. That is, in the above-described embodiment, the first communication network connection is a communication network connection based on the short-range wireless network communication technology, and the second communication network connection is a communication network connection based on the long-range wireless network communication technology. In the present application, the first communication network connection is different from the second communication network connection.
Fig. 2 shows a flowchart of a data synchronization method of an intelligent door lock according to an exemplary embodiment of the present application, and the method is applied to a client in a data synchronization system for example, and the method includes:
step 201, receiving door lock binding data sent by an intelligent door lock through a first communication network connection, wherein the door lock binding data comprises data of a client establishing a control binding relation with the intelligent door lock.
In the present embodiment, the client is implemented as an application program in a terminal or a computer device having a communication function. In one example, the client is implemented to include an application program that remotely controls the smart door lock.
In the application, the client is provided with an entity interface or a virtual interface for carrying out network communication. Through configuration of the interface, the client can implement a communication connection with other devices. The communication form of the communication connection comprises: at least one of near field communication, wi-Fi communication, bluetooth communication, and cellular mobile data network communication.
As described above in the description of the communication network connection, the first communication network connection between the client and the smart door lock is different from the second communication network connection between the client and the server, which is not described herein.
The door lock binding data is data stored in the intelligent door lock and comprises information of a client side which establishes a control binding relation with the intelligent door lock. Because the door lock and the client are not connected through a network in the binding process of the client and the door lock, after the client and the door lock are bound, the door lock binding data is only stored in the client, cannot be known by the client and is sent to the server for storage through the client.
In one example, the server broadcasts the data acquisition instruction, and after receiving the data acquisition instruction, the intelligent door lock verifies and sends door lock binding data according to the data acquisition instruction; in another example, the server forwards the door lock binding data through the client, and the intelligent door lock sends the door lock binding data according to the data acquisition instruction after receiving the data acquisition instruction forwarded by the client.
In some embodiments of the present application, the door lock binding data further includes log information of the intelligent door lock, that is, information recorded in the intelligent door lock and generated when the door lock state is controlled according to the control command, and after receiving the log information, the client may obtain the controlled condition of the door lock, and display the controlled condition of the door lock through the control interface.
Step 202, updating the client binding data according to the door lock binding data.
In the embodiment of the application, the client side stores the client side binding data corresponding to the client side and the intelligent door lock, and the client side binding data comprises the data of the intelligent door lock which establishes a binding relation with the client side.
Optionally, the user needs to know the door lock binding data, so the update process and the client binding data after the update are known to the user in a visual form. FIG. 3 illustrates an interface diagram of an update process provided by an exemplary embodiment of the present application. As shown in fig. 3, before updating, the selection interface 300 of the client includes an identifier corresponding to the client 310 corresponding to the client itself, and identifiers corresponding to the intelligent door lock 321, the intelligent door lock 322, and the intelligent door lock 323, in which a control binding relationship is established with the client. By clicking the identifier corresponding to the intelligent door lock 321, the information interface 330 of the intelligent door lock 321 may be accessed, where the information interface 330 of the intelligent door lock 321 includes identifiers corresponding to the client 310, the client 311, the client 312, and the client 313 that establish a control binding relation with the intelligent door lock 321. After updating, the client determines that the intelligent door lock 321 and the client 311 are in a control binding relationship, and reestablishes a control binding relationship with the client 314, and the information interface 330 of the intelligent door lock 321 includes the identifiers corresponding to the client 310, the client 312, the client 313 and the client 314.
And step 203, forwarding the door lock binding data to the server through the second communication network connection.
After the client binding data is updated according to the door lock binding information, the client forwards the door lock binding data to the server, and at the moment, the door lock binding data is used for updating the server binding data. The server binding data is data stored in the server relating to control binding messages between the server and the client. After the server updates the server binding data, the server may send a message notification to the intelligent door lock and/or the client according to the updated data, and instruct the intelligent door lock and/or the client to execute an operation corresponding to the message notification. In one example, after the server binds the data update, the server sends an unbinding message to the intelligent door lock, and the client deletes the control binding relationship between itself and the intelligent door lock according to the unbinding message.
In summary, according to the method provided by the embodiment, the door lock binding data is received through the communication network connection between the client and the intelligent door lock, the corresponding storage and updating are performed, the data received from the intelligent door lock is forwarded to the server through the other communication network connection, and under the condition that the client and the server can both know the content of the door lock binding data stored in the intelligent door lock, the client is connected through different communication networks and the data between the intelligent door lock and the client is transmitted through the client, so that the intelligent door lock is not directly connected with the server when the data is transmitted, and the use safety of the intelligent door lock is ensured.
Fig. 4 is a schematic flow chart of a data synchronization method of an intelligent door lock according to an exemplary embodiment of the present application, and the method is applied to a data synchronization system of an intelligent door lock for example, and includes:
Step 401, the intelligent door lock receives a data acquisition instruction.
In this embodiment, the data acquisition instruction received by the intelligent door lock is sent by the server.
The data acquisition instruction is generated according to a synchronization request sent by the client to the server. In one example, each time a client connects to the smart door lock via a first communication network connection, the client simultaneously sends a synchronization request to the server, the synchronization request indicating that the client has a communication network connection to the smart door lock and requesting the server to obtain an indication of door lock binding data. After receiving the synchronization request, the server generates a data acquisition instruction according to the synchronization request and sends the data acquisition instruction.
The form of sending the data acquisition instruction by the server at least comprises the following two modes:
(1) The server broadcasts the data acquisition instruction, and the protocol header of the broadcast comprises the verification key. After receiving the broadcast, the intelligent door lock acquires a data acquisition instruction from the broadcast through verification of the verification key.
(2) And the server sends the data acquisition instruction to the client, and forwards the data acquisition instruction through the client.
In order to ensure the safety of information stored in the intelligent door lock, in this embodiment, the server transmits the data acquisition instruction in a transparent transmission manner through the client.
Step 402, the intelligent door lock sends door lock binding data to the client through the first communication network connection according to the data acquisition instruction.
After the intelligent door lock receives the data acquisition instruction, the intelligent door lock sends door lock binding data through the first communication network connection established with the client.
Optionally, before the sending of the door lock binding data, a network allocation verification process needs to be performed between the intelligent door lock and the client, and in response to the network allocation verification passing, the intelligent door lock sends the door lock binding data to the client.
In this embodiment, the first communication network connection is a network connection based on a short-range wireless communication technology. Optionally, because the security of the Wi-Fi network connection is not high, before the sending of the door lock binding data is performed, the intelligent door lock first performs communication network detection, and when the first communication network connection is detected to be the Wi-Fi network connection, the sending of the door lock binding data is interrupted, and warning data is sent to the client. After receiving the warning data, the client displays warning information in the control interface, wherein the warning information is used for reminding a user of switching the connection mode of the first network connection. Optionally, the intelligent door lock stores an allowed connection mode of the first communication network connection, and when the communication network is detected, the intelligent door lock sends door lock binding data to the client in response to the connection mode of the first network connection belonging to the allowed connection mode.
In step 403, the client receives door lock binding data.
In this embodiment, the client receives the door lock binding data through the first communication network connection. Referring to fig. 5, in the selection interface 500 of the client, when the client 511 receives the door lock binding data from the intelligent door lock 521, the update identifier 530 is displayed on the identifier corresponding to the intelligent door lock 521 in the selection interface 500 during the receiving process. At this time, the user may enter the information interfaces corresponding to the other intelligent door locks 522, 523, 524, which have the control binding relationship with the client 511, but cannot enter the information interface corresponding to the intelligent door lock 521.
In step 404, the client updates the client binding data according to the door lock binding data.
The client has client authority corresponding to the intelligent door lock. In the present application, client rights include administrator rights and general rights. The administrator authority indicates the authority that the client can change the control binding relationship between the intelligent door lock and other clients, and the common authority indicates the authority that the client cannot change the control binding relationship between the intelligent door lock and other clients and only can change the state of the intelligent door lock. In the process that the client updates the client binding data according to the door lock binding data, the client determines the authority of the client in the intelligent door lock from the door lock binding data.
In step 405, the client forwards the door lock binding data to the server via the second communication network connection.
As described above, in the present application, the connection manner of the second communication network connection and the first communication network connection is different, and the intelligent door lock performs the transparent transmission of the door lock binding data to the server through the client.
In step 406, the server receives door lock binding data.
In step 407, the server updates the server binding data according to the door lock binding data.
The server stores history binding data, wherein the history binding data is stored before updating and indicates the control binding relation between the client and the intelligent door lock. After receiving the control binding data, the server correspondingly updates the history binding data.
After updating, the server can send a verification instruction to the client according to the updated server binding data, the client verifies the control binding relation with the intelligent door lock according to the verification instruction, and the client modifies the control binding relation according to the verification instruction in response to the difference between the control binding relation between the client and the intelligent door lock and the control binding relation indicated in the verification instruction.
In summary, in the method provided in this embodiment, the client receives the door lock binding data through the communication network connection with the intelligent door lock, stores and updates the door lock binding data accordingly, and forwards the data received from the intelligent door lock to the server through another communication network connection.
Under the condition that the server can know the door lock binding data stored in the server, information is forwarded through different communication network connections, and the safety of transmission of the door lock binding information is guaranteed under the condition that the service efficiency of the intelligent door lock is guaranteed.
In some embodiments of the present application, since the first communication network connection is a communication network connection based on a short-range wireless network communication technology, the network connection speed is slow and the network connection is unstable. The door lock binding data is packed into a plurality of sub-data sets and transmitted in batches to ensure the success rate of transmission. Fig. 6 is a flowchart illustrating a data synchronization method of an intelligent door lock according to an exemplary embodiment of the present application, and the process may alternatively be implemented after step 402 shown in fig. 4. The method is applied to a data synchronization system of an intelligent door lock for explanation, and comprises the following steps:
In step 601, the intelligent door lock acquires the sub-data group identifier from the data acquisition instruction.
In this embodiment, in order to ensure stability of data transmission of the intelligent door lock, the intelligent door lock packages the door lock binding data in a split manner to obtain at least one sub-data set. In one example, the intelligent door lock packages the door lock binding data according to a fixed file size; in another example, the intelligent door lock packages the door lock binding data in a split manner according to the corresponding client. After subpackaging and packaging, each sub-data group corresponds to a sub-data group identification. Optionally, the intelligent door lock distributes the sub-data group identifiers according to the packing sequence.
The data acquisition instruction sent by the server also comprises a sub-data group identifier corresponding to the sending form of the sub-data group of the intelligent door lock.
In step 602, the intelligent door lock sends a sub-data group corresponding to the sub-data group identifier to the client through the first communication network connection.
After the intelligent door lock determines the sub-data group in the data acquisition instruction sent by the server, the intelligent door lock selects the sub-data group corresponding to the sub-data group identifier and sends the sub-data group to the client through the first communication network connection.
The intelligent door lock interrupts transmission of the sub-data group when the sub-data group identification in the data acquisition instruction does not match the expected sub-data group identification of the intelligent door lock. The expected sub-data set of the intelligent door lock is a sub-data set sent by the intelligent door lock in an original mode. For example, the smart door lock sets the expected sub-data group identification to 2 after transmitting the sub-data group with the sub-data group identification of 1. In one example, the intelligent door lock includes 10 sub-data groups, the sub-data group identification is classified into 1 to 10, and the sub-data group identification in the data acquisition instruction is 20, so that the server sends an error data acquisition instruction to the intelligent door lock or sends information with aggressiveness to the intelligent door lock, so that the intelligent door lock interrupts the sending of the sub-data group; in another example, the intelligent door lock includes 10 sub-data sets in total, the sub-data set identification is classified into 1 to 10, the sub-data set identification in the data acquisition instruction is 7, and the transmission of the intelligent door lock sub-data set is interrupted when the expected sub-data set identification of the intelligent door lock is 6.
In step 603, the client receives the sub-data set.
The user receives the sub-data set via a first communication network connection. The process is a segment receiving process in which the client can receive all sub-data sets in one time of connection through the first communication network; or the client is connected with the intelligent door lock for a plurality of times through the first communication network connection, and each connection receives one sub-data group until all the sub-data groups are received.
In step 604, the client generates client binding data from the sub-data group.
After receiving all the sub-data sets, the client generates complete client binding data; or, each time a client receives a sub-data set, a portion of the client binding data is generated from the sub-data set. In this embodiment, a part of the client binding data generated according to a sub data group, which is each time the client receives a sub data group, will be described as an example.
In step 605, the client forwards the sub-data set to the server over the second communication network connection.
In the embodiment of the application, the second communication network connection established between the client and the server is stable, so that the client commonly sends all received sub-data sets to the server in one connection.
The server receives the sub-data set, step 606.
In step 607, the server generates server binding data from the sub-data group.
After receiving all the sub-data sets, the server combines the data in each sub-data set to obtain server binding data, and after obtaining the server binding data, the server stores the server binding data.
Optionally, after transmitting all the sub-data sets, the intelligent door lock transmits a transmission completion identification to the server, and in response to receiving the transmission completion indication forwarded by the client, the server determines that the transmission of the sub-data sets is complete.
In summary, according to the method provided by the embodiment, aiming at the situation that the first communication network connection between the client and the intelligent door lock is unstable, the intelligent door lock is used for split charging and packaging of the door lock binding data, and the door lock binding data is directly sent to the client and forwarded to the server through the client in the form of the sub-data group, so that the success rate of sending the door lock binding data is improved, and the sending efficiency of the door lock binding data is further improved on the premise of ensuring the safety.
After the client and the server update the binding data of the client according to the door lock binding data, the connection process of controlling the binding relationship between the client and the intelligent door lock can be performed according to the content of the updated binding data. In this case, the intelligent door lock can change the door lock state according to the instruction sent by the client under the condition that the intelligent door lock is verified. Fig. 7 is a flowchart illustrating a data synchronization method of an intelligent door lock according to an exemplary embodiment of the present application. The method is applied to a data synchronization system of an intelligent door lock for explanation, and comprises the following steps:
in step 701, the client sends a synchronization request to the server through the second communication network connection.
In this embodiment, after the client and the intelligent door lock are connected through the first communication network connection, the client sends the synchronization request to the server at the same time. Before the client and the server carry out self binding data according to the door lock binding data, the client does not operate according to instructions of a user on a control interface of the client.
In step 702, the server receives a synchronization request.
As previously described, the second communication network connection comprises at least one of a cellular mobile data network connection, a long-range Wi-Fi communication network connection.
In step 703, the server generates a data acquisition instruction according to the synchronization request.
After the server receives the synchronization request, the server judges a client side requesting data synchronization and an intelligent door lock connected with the client side through a first communication network according to the synchronization request. In one example, the synchronization request includes a first client identifier that uniquely indicates the client and a smart door lock identifier that uniquely indicates the smart door lock, and the server determines the client and the smart door lock based on the first client identifier and the smart door lock, and generates the data acquisition instruction.
Step 704, the server sends a data acquisition instruction.
In this embodiment, the server transmits the data acquisition instruction through the client. And because the first communication network connection established between the intelligent door lock and the client is unstable, the intelligent door lock transmits the door lock binding data in batches in the form of a sub-data group. Therefore, when the server sends the data acquisition instruction, the sub-data group identification is added in the data acquisition instruction.
Meanwhile, the door lock binding data also comprises log information of the intelligent door lock, namely information which is recorded in the intelligent door lock and is generated when the door lock state is controlled according to the control instruction.
Step 705, the intelligent door lock receives a data acquisition instruction.
The intelligent door lock receives a data acquisition instruction with a sub-data group identifier, which is forwarded by the server, from the client.
In step 706, the intelligent door lock acquires the sub-data group identifier from the data acquisition instruction.
After receiving the data acquisition instruction, the intelligent door lock acquires and verifies the sub-data group identification in the data acquisition instruction, and when the sub-data group identification is different from the sub-data group identification corresponding to the sub-data group stored in the intelligent door lock, the intelligent door lock does not send door lock binding data to the server.
In step 707, the intelligent door lock sends the sub-data set corresponding to the sub-data set identifier to the client through the first communication network connection.
In this embodiment, the server sends a data acquisition instruction with a sub-data group identifier to the intelligent door lock for a plurality of times, and the intelligent door lock sends a sub-data group corresponding to the sub-data group identifier to the client in response to receiving the data acquisition instruction for a plurality of times.
The client receives the sub-data set, step 708.
In step 709, the client generates client binding data from the sub-data group.
Optionally, after receiving a sub-data set, the client analyzes the sub-data set to obtain a part of the door lock binding data, and updates the client binding data according to the part to generate new client binding data; or after receiving all the sub-data groups, the client obtains complete door lock binding data, and updates the client binding data according to the door lock binding data to generate new client binding data.
Because the door lock binding information comprises the log information, the client can acquire the log information and determine whether the intelligent door lock has abnormal behaviors.
In step 710, the client forwards the sub-data set to the server over a second communication network connection.
In another embodiment of the present application, the client forwards the door lock binding data directly to the server after receiving the complete door lock binding data.
The server receives 711 the sub-data group.
In an embodiment as described in step 710, the server directly receives the client-forwarded door lock binding data.
The server generates server binding data from the sub-data group, step 712.
In an embodiment as described in step 710, the server updates the server binding data directly from the received door lock binding data to generate new server binding data.
In step 713, the client indicates that the client and the intelligent door lock have a control binding relationship in response to the updated client binding data, and sends a control instruction to the intelligent door lock through the first communication network connection.
After the data updating is carried out on the client, if the control interface of the client shows that the control binding relationship is not established between the client and the intelligent door lock, the client can send a control instruction after the control binding relationship is required to be reestablished between the client and the intelligent door lock.
The control instruction is used for controlling the state of the intelligent door lock. Referring to fig. 8, a control interface 800 is an interface for controlling the intelligent door lock 810 after a control binding relationship is established between a client and the intelligent door lock 810. Within the control region 811, an unlock control 8111, a lock control 8112, and an unbind control 8113 are included. Through the unlocking control 8111, the client can switch the intelligent door lock to an unlocking state; through the lockout control 8112, the client may switch the intelligent door lock into a lockout state; through unbinding control 8113, the client may unbind the smart door lock. That is, the control instruction of the client to the intelligent door lock includes an unlocking instruction, a locking instruction and an unbinding instruction.
In step 714, the intelligent door lock receives the control command.
In step 715, the intelligent door lock generates a first random string according to the control instruction.
After the intelligent door lock receives a control instruction sent by the client through the first communication network connection, a first random character string is generated, and the first random character string is used for verifying the intelligent door lock between the clients.
In step 716, the intelligent door lock indicates that the client and the intelligent door lock have a control binding relationship in response to the door lock binding data, and sends a first random string to the client.
In one embodiment of the application, a timer is arranged in the intelligent door lock, the intelligent door lock sends the timer to the client side at the same time of sending the random character string, the client side and the intelligent door lock synchronously count time, and the timer is used for determining the timeliness of the first random character string so as to limit the verification duration between the client side and the intelligent door lock.
In step 717, the client receives the first random string.
In step 718, the client encrypts the first random string with the first temporary key to obtain an encrypted string.
In this embodiment, the client encrypts the first random string using a temporary key shared with the smart door lock to obtain an encrypted string, and the encryption method includes an advanced encryption standard (Advanced Encryption Standard, AES) encryption algorithm.
In step 719, the client sends the first client identification, the client token, and the encrypted string to the smart door lock.
The first client identifier is a client identifier uniquely indicating the client.
The client token is configured by the server for the client, indicates client information, and is used for carrying out matching verification between the client and the intelligent door lock. The client token comprises a second client identifier, wherein the second client identifier is a client identifier configured by the server for the client.
In step 720, the smart door lock receives the first client identification, the client token, and the encrypted string.
In this embodiment, the smart door lock stores a door lock key for unlocking the client token.
In step 721, the smart door lock verifies according to the first client identifier, the client token and the encrypted string.
In this embodiment, the client has rights discrimination corresponding to the intelligent door lock, where the rights include an administrator right and a normal right, and the administrator right is higher than the normal right. The client side with the manager authority of the intelligent door lock can control other client sides which establish a control binding relation with the intelligent door lock.
The intelligent door lock can determine the authority of the client to the intelligent door lock according to the first client identifier from the door lock binding data.
After the intelligent door lock judges that the client has the administrator authority according to the first client identifier, unlocking the client token through the door lock key to obtain a second client identifier, decrypting the encrypted character string through a second temporary key stored in the client to obtain a second random character string in response to the fact that the first client identifier is identical to the second client identifier, and determining that verification is successful when the first random character string is identical to the second random character string.
When the intelligent door lock judges that the client has the common right according to the first client identifier, before verifying whether the first random character string is identical to the second random character string, the intelligent door lock is matched with the door lock key to determine the identity of the intelligent door lock.
In step 722, in response to the verification success, the intelligent door lock alters the door lock state according to the control instruction.
After verification is successful, the intelligent door lock changes the state of the door lock such as unlocking, locking and unbinding according to the control instruction sent by the client.
In summary, in the method provided in this embodiment, the client receives the door lock binding data through the communication network connection with the intelligent door lock, stores and updates the door lock binding data accordingly, and forwards the data received from the intelligent door lock to the server through another communication network connection.
Under the condition that the server can know the door lock binding data stored in the server, information is forwarded through different communication network connections, and the safety of transmission of the door lock binding information is guaranteed under the condition that the service efficiency of the intelligent door lock is guaranteed.
Aiming at the situation that the first communication network connection between the client and the intelligent door lock is unstable, the intelligent door lock is used for split charging and packaging of door lock binding data, and the door lock binding data are directly sent to the client in a form of a sub-data group and forwarded to a server through the client, so that the success rate of sending the door lock binding data is ensured, and the sending efficiency of the door lock binding data is further improved.
The client sends the synchronization request to enable the server to generate the setting of the data acquisition instruction, so that the client can actively control the synchronization time of the data, and the data can be synchronized in time when the client operates, thereby further improving the service efficiency of the intelligent door lock.
Through setting the administrator authority and the common authority, the client with the administrator authority can actively manage other clients, the verification mode is convenient and fast, the operation method is simple, and the control efficiency of the client on the intelligent door lock is improved.
By adding log information in the door lock binding data, the client can intuitively judge whether the history information of the intelligent door lock is abnormal or not, and the use safety of the intelligent door lock is further ensured.
The verification process is added in the process of controlling the intelligent door lock by the client, so that the control of the intelligent door lock is safer.
Through the setting of the counter, the verification process is timeliness, and the safety of control is further improved.
Fig. 9 is a schematic process diagram of a data synchronization method of an intelligent door lock according to an exemplary embodiment of the present application, where the process includes:
In step 901, the client sends a request for managing synchronization to the intelligent door lock, including the type and state of the synchronization.
In this embodiment, the management synchronization request includes a requirement for the data type in the door lock binding data and for the data state.
In step 902, the intelligent door lock determines the type and number of users needed.
The intelligent door lock stores door lock binding data, and after receiving the management synchronization request, the intelligent door lock invokes data related to the management synchronization request in the door lock binding data.
In step 903, the smart door lock uploads the number of corresponding states.
The process is that the intelligent door lock performs information pre-transmission of door lock binding data, namely, the process of sending the content of the sub-data group identification to the client according to the sub-data group identification included in the sub-data group divided by the door lock binding data.
Step 904, the client transparently transmits the number of states corresponding to the management information to the cloud.
In this embodiment, in order to ensure the security of the intelligent door lock, the client is used to perform transparent transmission of data. The process is a process of pre-transmitting the content identified by the sub-data group.
In step 905, the server parses the data packet and saves the number of the corresponding states.
The process is a process that the server stores the content identified by the sub-data group.
Step 906, the server returns the index that the user management is currently synchronizing to the client.
The process is that the server carries out the transparent transmission of the sub-data group identification through the client, and the intelligent door lock sends the corresponding sub-data group.
In step 907, the client obtains the user management synchronization data from the lock, and the cloud end updates the synchronized index.
The process is the forwarding process of the client side to the sub-data group identification, and the sub-data group identification is forwarded.
Step 908, the intelligent door lock returns user management data to the server, including adding, deleting, fingerprint card password number identification and corresponding validity period.
The process is a process of transmitting the sub-data group through the client by the intelligent door lock. In the transmitting process, the intelligent door lock also synchronously transmits verification information for verifying the client, wherein the verification information can be at least one of a client token, a first client identifier, a temporary key and a random character string.
In step 909, the client transparently transmits the user management information to the cloud.
The process is that the client side carries out transparent transmission on the door lock binding information corresponding to the sub data group. And in the transparent transmission, the client can store the door lock binding information and synchronously update the client binding information.
In step 910, the server parses the data packet, stores the synchronized user information, and records the latest index.
The process is a process that the server updates the server binding data according to the door lock binding information.
In step 911, the server returns the index that the user management is currently synchronizing to the client.
In step 912, the client acquires the user management synchronization data from the lock, and synchronizes the latest index with the cloud.
Steps 911 to 912 are the same as steps 906 to 907, and the process is to repeatedly confirm and send the door lock binding data according to the sub-data group identifier.
Step 913, the intelligent door lock judges the index, if the index is equal to the number of the states corresponding to the lock ends, the synchronization is completed.
And when the intelligent door lock transmits all the door lock binding data, judging that the transmission is completed.
Step 914, the intelligent door lock returns the user management synchronization completion to the client.
The process indicates that the data of the intelligent door lock is finished synchronously, and the client and the server update own data according to the door lock binding data.
Fig. 10 is a block diagram illustrating a data synchronization apparatus of an intelligent door lock according to an exemplary embodiment of the present application. The device comprises:
the receiving module 1001 is configured to receive door lock binding data sent by the intelligent door lock through a first communication network connection, where the door lock binding data includes data of a client that establishes a control binding relationship with the intelligent door lock, and the first communication network connection is based on a short-distance wireless network communication technology.
An updating module 1002, configured to update the client binding data according to the door lock binding data.
And a sending module 1003, configured to forward the door lock binding data to the server through the second communication network connection.
According to the device provided by the embodiment, the door lock binding data is received through the communication network connection between the device and the intelligent door lock, the corresponding storage and updating are carried out, the data received from the intelligent door lock is forwarded to the server through the other communication network connection, under the condition that the content of the door lock binding data stored in the intelligent door lock can be known by the device and the server, the client side is connected through different communication networks, and the data between the intelligent door lock and the client side are transmitted through the client side, so that the intelligent door lock is not directly connected with the server when the data are transmitted, and the use safety of the intelligent door lock is ensured.
Fig. 11 is a block diagram illustrating a data synchronization apparatus of an intelligent door lock according to an exemplary embodiment of the present application. The device comprises:
the receiving module 1101 is configured to receive a data acquisition instruction, where the data acquisition instruction is configured to acquire door lock binding data, and the door lock binding data includes data of a client that establishes a control binding relationship with an intelligent door lock.
The determining module 1102 is configured to determine door lock binding data according to the data acquisition instruction.
The sending module 1103 is configured to send the door lock binding data to the client through a first communication network connection according to the data acquisition instruction, where the first communication network connection is a network connection based on a short-range wireless network communication technology.
According to the device provided by the embodiment, under the condition that the server can know the door lock binding data stored in the server, information is forwarded through different communication network connections, and the safety of transmission of the door lock binding information is guaranteed under the condition that the service efficiency of the intelligent door lock is guaranteed.
It should be noted that: the data synchronization device of the intelligent door lock provided in the above embodiment is only exemplified by the division of the above functional modules, and in practical application, the above functional allocation may be performed by different functional modules according to needs, that is, the internal structure of the device is divided into different functional modules, so as to complete all or part of the content described above.
Fig. 12 is a schematic structural view showing a terminal for performing a data synchronization method of an intelligent door lock according to an exemplary embodiment of the present application, the terminal including:
The processor 1201 includes one or more processing cores, and the processor 1201 performs various functional applications and data processing by running software programs and modules.
The receiver 1202 and the transmitter 1203 may be implemented as one communication component, which may be a communication chip. Alternatively, the communication component may enable a communication connection between any two computer devices in the data synchronization system of the smart door lock. That is, the transmitter 1203 may be configured to transmit communication network signals and the receiver 1202 may be configured to receive communication network signals.
The memory 1204 is connected to the processor 1201 by a bus 1205.
The memory 1204 may be used for storing at least one instruction that the processor 1201 is configured to execute to implement the various steps of the method embodiments described above.
The application also provides a server, which comprises a processor and a memory, wherein at least one instruction is stored in the memory, and the at least one instruction is loaded and executed by the processor to realize the data synchronization method of the intelligent door lock provided by each method embodiment. It should be noted that the server may be a server as provided in fig. 13 below.
Referring to fig. 13, a schematic diagram of a server according to an exemplary embodiment of the present application is shown. Specifically, the present application relates to a method for manufacturing a semiconductor device. The server 1300 includes a central processing unit (Central Processing Unit, CPU) 1301, a system Memory 1304 including a random access Memory (Random Access Memory, RAM) 1302 and a Read-Only Memory (ROM) 1303, and a system bus 1305 connecting the system Memory 1304 and the central processing unit 1301. The server 1300 also includes a basic input/output (Input Output System, I/O) system 1306 to facilitate the transfer of information between various devices within the computer, and a mass storage device 1307 for storing an operating system 1313, application programs 1314, and other program modules 1315.
The basic input/output system 1306 includes a display 1308 for displaying information, and an input device 1309, such as a mouse, keyboard, etc., for a user to input information. Wherein both the display 1308 and the input device 1309 are connected to the central processing unit 1301 through an input output controller 1310 connected to the system bus 1305. The basic input/output system 1306 may also include an input/output controller 1310 for receiving and processing input from a keyboard, mouse, or electronic stylus, among a plurality of other devices. Similarly, the input output controller 1310 also provides output to a display screen, a printer, or other type of output device.
The mass storage device 1307 is connected to the central processing unit 1301 through a mass storage controller (not shown) connected to the system bus 1305. The mass storage device 1307 and its associated computer-readable media provide non-volatile storage for the server 1300. That is, the mass storage device 1307 may include a computer-readable medium (not shown), such as a hard disk or CD-ROM drive.
Computer readable media may include computer storage media and communication media without loss of generality. Computer storage media includes volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules or other data. Computer storage media includes RAM, ROM, erasable programmable read-Only Memory (Erasable Programmable Read Only Memory, EPROM), electrically erasable programmable read-Only Memory (ELECTRICALLY ERASABLE PROGRAMMABLE READ-Only Memory, EEPROM), flash Memory or other solid state Memory technology, CD-ROM, digital versatile disks (Digital Video Disc, DVD) or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices. Of course, those skilled in the art will recognize that computer storage media are not limited to the ones described above. The system memory 1304 and mass storage device 1307 described above may be referred to collectively as memory.
The memory stores one or more programs configured to be executed by the one or more central processing units 1301, the one or more programs including instructions for implementing the data synchronization method of the intelligent door lock, and the central processing unit 1301 executes the one or more programs to implement the data synchronization method of the intelligent door lock provided in the above respective method embodiments.
According to various embodiments of the application, the server 1300 may also operate by a remote computer connected to the network through a network, such as the Internet. I.e., the server 1300 may be connected to the network 1312 via a network interface unit 1311 coupled to the system bus 1305, or the network interface unit 1311 may be used to connect to other types of networks or remote computer systems (not shown). Optionally, in an embodiment of the present application, the server 1300 may be connected to a communication network through the network interface unit 1311, and optionally, the server 1300 may also establish a connection with other devices through a wireless network.
The memory further includes one or more programs, one or more programs are stored in the memory, and one or more programs include steps executed by the server in the data synchronization method for performing the intelligent door lock provided by the embodiment of the present application.
The foregoing description of the preferred embodiments of the present application is not intended to limit the application, but rather, the application is to be construed as limited to the appended claims.

Claims (11)

1. The data synchronization system of the intelligent door lock is characterized by comprising a server, the intelligent door lock and a client; the intelligent door lock is used for receiving a data acquisition instruction, the data acquisition instruction is used for acquiring door lock binding data of the intelligent door lock, the door lock binding data comprise data of a client which establishes a control binding relation with the intelligent door lock, the door lock binding data comprise at least one sub-data group, the sub-data group corresponds to a sub-data group identifier, and the data acquisition instruction comprises the sub-data group identifier; acquiring the sub-data group identification from the data acquisition instruction; transmitting a sub-data group corresponding to the sub-data group identifier to the client through a first communication network connection, wherein the first communication network connection is based on a network connection of a short-distance wireless network communication technology, and the transmitting of the sub-data group is interrupted in response to the sub-data group identifier in the data acquisition instruction not being consistent with an expected sub-data group identifier of the intelligent door lock, and the expected sub-data group of the intelligent door lock is a sub-data group originally transmitted by the intelligent door lock;
The client is used for receiving the sub-data group sent by the intelligent door lock through the first communication network connection; generating client binding data according to the sub-data group; forwarding the sub-data set to the server via a second communication network connection;
The server is used for receiving the sub-data group sent by the client through the second communication network; generating server binding data according to the sub-data group;
The client is further configured to, in response to the client binding data, instruct the client to be in the control binding relationship with the intelligent door lock, and send a control instruction to the intelligent door lock through the first communication network connection;
The intelligent door lock is further used for receiving the control instruction sent by the client through the first communication network connection; generating a first random character string according to the control instruction, wherein the first random character string is used for carrying out identity verification between the intelligent door lock and the client; responding to the door lock binding data to indicate that the client side and the intelligent door lock have a control binding relation, and sending the first random character string to the client side;
The client is further configured to receive a first random string, encrypt the first random string with a first temporary key to obtain an encrypted string, and feed back the encrypted string to the intelligent door lock;
The intelligent door lock is also used for receiving the encrypted character string; decrypting the encrypted character string through a second temporary key to obtain a second random character string; determining that the verification is successful in response to the first random string being the same as the second random string; responding to successful verification, and changing a door lock state according to the control instruction, wherein the door lock state indicates the use state of the intelligent door lock; wherein the first temporary key used by the client is a temporary key shared with the smart door lock.
2. The system of claim 1, wherein the system further comprises a controller configured to control the controller,
The client is further configured to send a first client identifier, a client token and the encrypted string to the intelligent door lock, where the first client identifier is used to uniquely indicate the client, the client token is used to perform matching verification between the client and the intelligent door lock, and the client token includes a second client identifier added by the server;
The intelligent door lock is further configured to receive the first client identifier, the client token and the encrypted string; responding to the first client identifier to indicate that the client has an administrator authority, unlocking the client token through a door lock key to obtain the second client identifier, wherein the administrator authority indicates that the client has a management function for the intelligent door lock; and in response to the first client identifier being the same as the second client identifier, decrypting the encrypted string with a second temporary key.
3. The system of claim 2, wherein the system further comprises a controller configured to control the controller,
The intelligent door lock is further used for responding to the first client side identifier to indicate that the client side has common authority, matching the first client side identifier with the door lock key, responding to the door lock identifier matched with the door lock key, and unlocking the client side token through the door lock key to obtain the second client side identifier.
4. The system of claim 1, wherein the door lock binding data includes log information, the log information being information generated when the intelligent door lock performs control of a door lock state according to a history control instruction.
5. The system of claim 1, wherein the system further comprises a controller configured to control the controller,
The client is further configured to send a synchronization request to the server, where the synchronization request is used to instruct the client, the server, and the intelligent door lock to perform synchronization of binding data;
the server is further configured to receive the synchronization request; generating the data acquisition instruction according to the synchronous request; and sending the data acquisition instruction.
6. A data synchronization method of an intelligent door lock, wherein the method is applied to a client, and the method comprises the following steps:
Receiving a sub-data group sent by the intelligent door lock through a first communication network connection; generating client binding data according to the sub-data group; the first communication network connection is based on a short-distance wireless network communication technology; forwarding the sub-data set to a server via a second communication network connection;
Responding to the client binding data, indicating that a control binding relationship exists between the client and the intelligent door lock, and sending a control instruction to the intelligent door lock through the first communication network connection;
receiving a first random character string, encrypting the first random character string through a first temporary key to obtain an encrypted character string, and feeding back the encrypted character string to the intelligent door lock, wherein the first random character string is generated by the intelligent door lock according to the control instruction, and the first random character string is used for carrying out identity authentication between the intelligent door lock and the client; wherein the first temporary key used by the client is a temporary key shared with the smart door lock.
7. A data synchronization method of an intelligent door lock, wherein the method is applied to the intelligent door lock, and the method comprises the following steps:
Receiving a data acquisition instruction, wherein the data acquisition instruction is used for acquiring door lock binding data, the door lock binding data comprises data of a client establishing a control binding relation with the intelligent door lock, the door lock binding data comprises at least one sub-data group, the sub-data group corresponds to a sub-data group identifier, and the data acquisition instruction comprises the sub-data group identifier; acquiring the sub-data group identification from the data acquisition instruction; transmitting a sub-data group corresponding to the sub-data group identifier to the client through a first communication network connection, wherein the first communication network connection is based on a network connection of a short-distance wireless network communication technology, and the transmitting of the sub-data group is interrupted in response to the sub-data group identifier in the data acquisition instruction not being consistent with an expected sub-data group identifier of the intelligent door lock, and the expected sub-data group of the intelligent door lock is a sub-data group originally transmitted by the intelligent door lock;
receiving a control instruction sent by the client through the first communication network connection;
Generating a first random character string according to the control instruction, wherein the first random character string is used for carrying out identity verification between the intelligent door lock and the client;
Responding to the door lock binding data to indicate that the client side and the intelligent door lock have a control binding relation, and sending the first random character string to the client side;
Receiving an encryption character string, wherein the encryption character string is obtained by encrypting the first random character string through a first temporary key by the client;
decrypting the encrypted character string through a second temporary key to obtain a second random character string;
Determining that the verification is successful in response to the first random string being the same as the second random string; responding to successful verification, and changing the door lock state according to the control instruction, wherein the door lock state indicates the using state of the intelligent door lock; wherein the first temporary key used by the client is a temporary key shared with the smart door lock.
8. A data synchronization device for an intelligent door lock, the device comprising:
The receiving module is used for receiving the sub-data group sent by the intelligent door lock through the first communication network connection; generating client binding data according to the sub-data group; the first communication network is a network connection based on a short-distance wireless network communication technology;
the sending module is used for forwarding the sub-data group to a server through a second communication network connection;
the sending module is further configured to, in response to the client binding data, indicate that a control binding relationship exists between the client and the intelligent door lock, and send a control instruction to the intelligent door lock through the first communication network connection;
The receiving module is further configured to receive a first random string, encrypt the first random string with a first temporary key to obtain an encrypted string, and feed back the encrypted string to the intelligent door lock, where the first random string is generated by the intelligent door lock according to the control instruction, and the first random string is used to perform identity authentication between the intelligent door lock and the client; wherein the first temporary key used by the client is a temporary key shared with the smart door lock.
9. A data synchronization device for an intelligent door lock, the device comprising:
The intelligent door lock comprises a receiving module, a data acquisition module and a control module, wherein the receiving module is used for receiving a data acquisition instruction, the data acquisition instruction is used for acquiring door lock binding data, the door lock binding data comprises data of a client which establishes a control binding relation with the intelligent door lock, the door lock binding data comprises at least one sub-data group, the sub-data group corresponds to a sub-data group identifier, and the data acquisition instruction comprises the sub-data group identifier; acquiring the sub-data group identification from the data acquisition instruction; transmitting a sub-data group corresponding to the sub-data group identifier to the client through a first communication network connection, wherein the first communication network connection is based on a network connection of a short-distance wireless network communication technology, and the transmitting of the sub-data group is interrupted in response to the sub-data group identifier in the data acquisition instruction not being consistent with an expected sub-data group identifier of the intelligent door lock, and the expected sub-data group of the intelligent door lock is a sub-data group originally transmitted by the intelligent door lock;
The receiving module is further configured to receive a control instruction sent by the client through the first communication network connection; generating a first random character string according to the control instruction, wherein the first random character string is used for carrying out identity verification between the intelligent door lock and the client;
The sending module is further used for sending the first random character string to the client in response to the door lock binding data indicating that the client and the intelligent door lock have a control binding relationship;
The receiving module is further configured to receive an encrypted string, where the encrypted string is obtained by encrypting the first random string by the client through a first temporary key; decrypting the encrypted character string through a second temporary key to obtain a second random character string; determining that the verification is successful in response to the first random string being the same as the second random string; responding to successful verification, and changing the door lock state according to the control instruction, wherein the door lock state indicates the using state of the intelligent door lock; wherein the first temporary key used by the client is a temporary key shared with the smart door lock.
10. A computer device comprising a processor and a memory having stored therein at least one instruction, at least one program, code set, or instruction set that is loaded and executed by the processor to implement the method of data synchronization for a smart door lock according to claim 6 or 7.
11. A computer readable storage medium having stored therein at least one instruction, at least one program, code set, or instruction set loaded and executed by a processor to implement the method of data synchronization for an intelligent door lock according to claim 6 or 7.
CN202010967806.3A 2020-09-15 2020-09-15 Data synchronization system, method and device of intelligent door lock and readable storage medium Active CN112105003B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010967806.3A CN112105003B (en) 2020-09-15 2020-09-15 Data synchronization system, method and device of intelligent door lock and readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010967806.3A CN112105003B (en) 2020-09-15 2020-09-15 Data synchronization system, method and device of intelligent door lock and readable storage medium

Publications (2)

Publication Number Publication Date
CN112105003A CN112105003A (en) 2020-12-18
CN112105003B true CN112105003B (en) 2024-05-03

Family

ID=73759067

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010967806.3A Active CN112105003B (en) 2020-09-15 2020-09-15 Data synchronization system, method and device of intelligent door lock and readable storage medium

Country Status (1)

Country Link
CN (1) CN112105003B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113192232A (en) * 2021-03-15 2021-07-30 深圳市广通远驰科技有限公司 Log acquisition method and log acquisition system
CN113766045B (en) * 2021-09-03 2023-10-24 青岛海信智慧生活科技股份有限公司 Door lock binding method, device and system

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016107088A1 (en) * 2014-12-29 2016-07-07 张泽 Centralized control method and system for intelligent door lock
CN107121938A (en) * 2017-06-30 2017-09-01 北京金茂绿建科技有限公司 Intelligent home equipment control method, the device and system of identity-based identification
KR101907923B1 (en) * 2018-03-28 2018-10-15 패스테크 주식회사 Locking system with enhanced smart phone security function and Method thereof, The recording medium
CN111130602A (en) * 2019-12-03 2020-05-08 珠海格力电器股份有限公司 Near field communication card data writing system, method, device and medium
CN210714180U (en) * 2019-09-05 2020-06-09 南京科蓝德网络科技有限公司 Intelligent trick lock of loRa control
CN111583458A (en) * 2020-04-28 2020-08-25 德施曼机电(中国)有限公司 Data management method of intelligent door lock system
US10769873B1 (en) * 2019-06-28 2020-09-08 Alibaba Group Holding Limited Secure smart unlocking

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016107088A1 (en) * 2014-12-29 2016-07-07 张泽 Centralized control method and system for intelligent door lock
CN107121938A (en) * 2017-06-30 2017-09-01 北京金茂绿建科技有限公司 Intelligent home equipment control method, the device and system of identity-based identification
KR101907923B1 (en) * 2018-03-28 2018-10-15 패스테크 주식회사 Locking system with enhanced smart phone security function and Method thereof, The recording medium
US10769873B1 (en) * 2019-06-28 2020-09-08 Alibaba Group Holding Limited Secure smart unlocking
CN210714180U (en) * 2019-09-05 2020-06-09 南京科蓝德网络科技有限公司 Intelligent trick lock of loRa control
CN111130602A (en) * 2019-12-03 2020-05-08 珠海格力电器股份有限公司 Near field communication card data writing system, method, device and medium
CN111583458A (en) * 2020-04-28 2020-08-25 德施曼机电(中国)有限公司 Data management method of intelligent door lock system

Also Published As

Publication number Publication date
CN112105003A (en) 2020-12-18

Similar Documents

Publication Publication Date Title
CN111799867B (en) Mutual trust authentication method and system between charging equipment and charging management platform
US20160269176A1 (en) Key Configuration Method, System, and Apparatus
EP2590356B1 (en) Method, device and system for authenticating gateway, node and server
US10091650B2 (en) Wireless terminal configuration method, device, and system
US11671228B2 (en) Method and apparatus for MoCA network with protected set-up
US11329805B2 (en) First vehicle-side terminal, method for operating the first terminal, second vehicle-side terminal and method for operating the second vehicle-side terminal
CN109309650B (en) Data processing method, terminal equipment and network equipment
CN112105003B (en) Data synchronization system, method and device of intelligent door lock and readable storage medium
CN106559213B (en) Equipment management method, equipment and system
CN109729000B (en) Instant messaging method and device
US20170264615A1 (en) System, information processing apparatus, and storage medium
CN114547583A (en) Identity authentication system, method, device, equipment and computer readable storage medium
KR102181776B1 (en) Apparatus and method for transceiving in a general purpose deivice
WO2023279897A1 (en) Secure binding method and system, storage medium, and electronic apparatus
CN112053477B (en) Control system, method and device of intelligent door lock and readable storage medium
CN109492384B (en) Method for receiving entity access and accessing password device, password device and entity
CN114760112A (en) Wireless local area network-oriented intelligent household equipment network access method, system, equipment and storage medium
CN115955358B (en) Data stream transmission system based on point-to-point communication
CN109862027A (en) Data transmission method for uplink, data receiver method and equipment, data transmission system
CN115242480A (en) Device access method, system and non-volatile computer storage medium
KR20200137520A (en) A database structure capable of synchronizing data between devices in a local area network environment and a data synchronization method using the same
CN116761167B (en) Data encryption transmission method, system, electronic equipment and storage medium
CN116996587B (en) Distributed sdp tunnel control method and device
CN113709069B (en) Lossless switching method and device for data transmission
CN110234110B (en) Automatic switching method for mobile network

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20231116

Address after: 315300 No.88 rixian North Road, Cixi Binhai Economic Development Zone, Ningbo City, Zhejiang Province

Applicant after: Ningbo bull Intelligent Technology Co.,Ltd.

Address before: 315300 East District of Industrial Park, Cixi, Ningbo, Zhejiang

Applicant before: GONGNIU GROUP Co.,Ltd.

TA01 Transfer of patent application right
GR01 Patent grant