CN112365630A - Lock control method, communication device, communication equipment and storage medium - Google Patents

Lock control method, communication device, communication equipment and storage medium Download PDF

Info

Publication number
CN112365630A
CN112365630A CN201910670212.3A CN201910670212A CN112365630A CN 112365630 A CN112365630 A CN 112365630A CN 201910670212 A CN201910670212 A CN 201910670212A CN 112365630 A CN112365630 A CN 112365630A
Authority
CN
China
Prior art keywords
information
node
lock control
lock
control instruction
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910670212.3A
Other languages
Chinese (zh)
Other versions
CN112365630B (en
Inventor
黄基松
王米虎
沈洁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to CN201910670212.3A priority Critical patent/CN112365630B/en
Publication of CN112365630A publication Critical patent/CN112365630A/en
Application granted granted Critical
Publication of CN112365630B publication Critical patent/CN112365630B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00563Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys using personal physical data of the operator, e.g. finger prints, retinal images, voicepatterns
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Telephonic Communication Services (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The embodiment of the application provides a lock control method, a communication device, communication equipment and a storage medium, target information is collected through an information collection node, a verification service node verifies the target information to generate a lock control instruction, and the lock control instruction is sent to the lock control node by the verification service node, so that the lock control node controls the lock according to the lock control instruction, namely, the information acquisition node, the verification service node and the lock control node participate in the unlocking process of the lock together, and the verification of the target information by the verification service node is not limited by the power supply of the intelligent door lock battery, the unlocking safety of the lock is improved, in addition, since the information recorded in the blockchain is traceably untrustable, when a false unlock occurs, the wrong party and the responsibility of the wrong party can be accurately determined according to the information recorded in the block chain.

Description

Lock control method, communication device, communication equipment and storage medium
Technical Field
The present application relates to the field of communications technologies, and in particular, to a lock control method, a communication apparatus, a communication device, and a storage medium.
Background
The intelligent door lock is different from a common door lock unlocked by a key, the intelligent door lock is more convenient to operate in unlocking, and the conventional common unlocking modes comprise fingerprints, passwords, face recognition and the like. Smart door locks have been accepted by an increasing number of households.
However, in the prior art, the safety of the intelligent door lock is low, and once the intelligent door lock is unlocked by mistake, the responsibility identification is difficult to carry out.
Disclosure of Invention
The application provides a lock control method, a communication device and a storage medium, which are used for improving the unlocking safety of a lock and accurately determining a wrong party and the responsibility of the wrong party according to information recorded in a block chain.
In a first aspect, the application provides a lock control method, which implements control over a lock through information interaction among an information acquisition node, a verification service node and a lock control node, and specifically, the verification service node receives target information acquired by the information acquisition node; the verification service node verifies the target information and generates a lock control instruction; the lock control instruction is sent to a lock control node by the verification service node, the lock control node is used for controlling the lock according to the lock control instruction, in addition, the information acquisition node, the verification service node and the lock control node are used as distributed nodes in a block chain network, information can be broadcasted in the block chain network, so that the information acquisition node, the verification service node and the lock control node jointly maintain the block chain, and the target information, the lock control instruction and the state information of the lock after the lock control instruction is executed by the lock control node are recorded in the block chain. The unlocking safety of the lock is improved, the unlocking process can be traced according to the information recorded in the block chain, and when the lock is unlocked by mistake, the wrong party and the responsibility of the wrong party can be accurately determined according to the information recorded in the block chain.
In one possible design, the target information includes at least one of: target video information, target image information, target fingerprint information, target audio information, a first password input by the target, target iris information and target voiceprint information.
In one possible design, the verifying service node verifies the target information and generates a lock control instruction, including: and the verification service node generates the lock control instruction by comparing the target information with the user information prestored in the verification service node.
In one possible design, the verifying service node generates the lock control instruction by comparing the target information with user information stored in the verifying service node in advance, where the method includes: and when the verification service node determines that the target information is matched with the user information by comparing the target information with the user information prestored in the verification service node, generating the lock control instruction, wherein the lock control instruction is used for controlling the lock to be unlocked.
In one possible design, the method further includes: and when the verification service node determines that the target information is not matched with the user information by comparing the target information with the user information prestored in the verification service node, the verification service node sends the target information to a terminal of a user.
In one possible design, after the verifying service node verifies the target information and generates the lock control instruction, the method further includes: the verification service node broadcasts the receiving time of the target information, the verification result of the verification service node on the target information and the lock control instruction to the blockchain network, so that the distributed node records the receiving time of the target information, the verification result and the lock control instruction in the blockchain.
In one possible design, before the verification service node receives the target information collected by the information collection node, the method further includes: the verification service node receives user information collected by the information collection node, wherein the user information comprises at least one of the following: the method comprises the steps of obtaining user video information, user image information, user fingerprint information, user audio information, a second password input by a user, user iris information and user voiceprint information; the verification service node broadcasts the receiving time of the user information and the user information in the blockchain network, so that the distributed node records the receiving time of the user information and the user information in the blockchain.
In one possible design, the blockchain network further includes a third-party node, where the third-party node is configured to store information broadcast by the information acquisition node, the verification service node, and the lock control node in the blockchain network.
In a second aspect, the present application provides a lock control method, including: the information acquisition node acquires target information; the information acquisition node sends the target information to a verification service node, the verification service node is used for verifying the target information to generate a lock control instruction and sending the lock control instruction to a lock control node, and the lock control node is used for controlling a lock according to the lock control instruction; the information acquisition node, the verification service node and the lock control node are distributed nodes in a block chain network, and the distributed nodes are used for recording the target information, the lock control instruction and state information of the lock after the lock control instruction is executed by the lock control node into a block chain.
In one possible design, the information collecting node collects target information, and includes: and the information acquisition node acquires the target information according to the unlocking trigger instruction.
In one possible design, the acquiring the target information by the information acquisition node according to an unlocking trigger instruction includes: and the information acquisition node acquires the target information according to the unlocking trigger instruction input by the target.
In one possible design, the acquiring the target information by the information acquisition node according to an unlocking trigger instruction includes: and the information acquisition node acquires the target information according to an unlocking trigger instruction generated by a doorbell.
In one possible design, the method further includes: the information acquisition node broadcasts the time information of the unlocking trigger instruction, the trigger mode corresponding to the unlocking trigger instruction and the target information in the block chain network, so that the distributed node records the time information of the unlocking trigger instruction, the trigger mode and the target information in the block chain.
In one possible design, before the information collecting node collects the target information, the method further includes: the information acquisition node acquires user information, wherein the user information comprises at least one of the following: the method comprises the steps of obtaining user video information, user image information, user fingerprint information, user audio information, a second password input by a user, user iris information and user voiceprint information;
the information acquisition node sends the user information to the verification service node; the information acquisition node broadcasts the acquisition time of the user information and the user information in the blockchain network, so that the distributed node records the acquisition time of the user information and the user information in the blockchain.
In one possible design, the blockchain network further includes a third-party node, where the third-party node is configured to store information broadcast by the information acquisition node, the verification service node, and the lock control node in the blockchain network.
In a third aspect, the present application provides a lock control method, including: the method comprises the steps that a lockset control instruction sent by a terminal or a verification service node is received by the lockset control node, wherein the lockset control instruction is generated by the verification service node or the terminal according to target information collected by an information collection node; the lock control node controls the lock according to the lock control instruction; the information acquisition node, the verification service node and the lock control node are distributed nodes in a block chain network, and the distributed nodes are used for recording the target information, the lock control instruction and state information of the lock after the lock control instruction is executed by the lock control node into a block chain.
In one possible design, the lock control node receives a lock control instruction sent by a terminal or a verification service node, and includes: and when the verification service node determines that the target information is not matched with the user information by comparing the target information with the user information prestored in the verification service node, the lock control node receives a lock control instruction sent by the terminal.
In one possible design, the lock control node receives a lock control instruction sent by a terminal or a verification service node, and includes: and when the verification service node determines that the target information is matched with the user information by comparing the target information with the user information prestored in the verification service node, the lock control node receives a lock control instruction sent by the verification service node.
In a possible design, after the lock control node receives a lock control instruction sent by the terminal, the method further includes: the lock control node broadcasts the receiving time of the lock control instruction, the source of the lock control instruction, the lock control instruction and the state information of the lock after the lock control node executes the lock control instruction in the block chain network, so that the distributed node records the receiving time of the lock control instruction, the source of the lock control instruction, the lock control instruction and the state information of the lock after the lock control node executes the lock control instruction in the block chain.
In one possible design, after the lock control node controls the lock according to the lock control instruction, the method further includes: and the lock control node sends the state information of the lock to a terminal of a user after the lock control node executes the lock control instruction.
In one possible design, the blockchain network further includes a third-party node, where the third-party node is configured to store information broadcast by the information acquisition node, the verification service node, and the lock control node in the blockchain network.
In a fourth aspect, the present application provides a lock control method, including: the terminal receives target information collected by the information collection node from the verification service node; the terminal generates a lock control instruction according to the target information; the terminal sends the lock control instruction to a lock control node, and the lock control node is used for controlling a lock according to the lock control instruction; the terminal, the information acquisition node, the verification service node and the lock control node are distributed nodes in a block chain network, and the distributed nodes are used for recording the target information, the lock control instruction and state information of the lock after the lock control instruction is executed by the lock control node into a block chain.
In one possible design, the terminal receives target information collected by the information collecting node from the verification service node, and the target information includes: and when the verification service node determines that the target information is not matched with the user information by comparing the target information acquired by the information acquisition node with the user information prestored in the verification service node, the terminal receives the target information from the verification service node.
In one possible design, after the terminal sends the lock control instruction to the lock control node, the method further includes: and the terminal receives the state information of the lock after the lock control node executes the lock control instruction generated by the terminal.
In one possible design, the blockchain network further includes a third-party node, where the third-party node is configured to store information broadcast by the information acquisition node, the verification service node, and the lock control node in the blockchain network.
In one possible design, the method further includes: the terminal sends a query request to the distributed nodes; and the terminal receives the information recorded in the block chain from the distributed nodes.
In a fifth aspect, the present application provides an authentication service node, comprising a module, a component or a circuit for implementing the lock control method of the first aspect.
In a sixth aspect, the present application provides an information acquisition node, including a module, a component, or a circuit for implementing the lock control method of the second aspect.
In a seventh aspect, the present application provides a lock control node, including a module, a component or a circuit for implementing the lock control method of the third aspect.
In an eighth aspect, the present application provides a terminal including a module, a component or a circuit for implementing the lock control method of the fourth aspect.
In a ninth aspect, the present application provides a communication apparatus comprising: a processor and a transceiver, the processor and the transceiver communicating with each other through an internal connection; the processor is configured to perform the processing steps of the method according to the first, second, third or fourth aspect, and the transceiver is configured to perform the transceiving steps of the method according to the first, second, third or fourth aspect.
In a tenth aspect, the present application provides a computer readable storage medium having stored thereon a computer program which, when run on a computer, causes the computer to perform the method of the first, second, third or fourth aspect.
In an eleventh aspect, the present application provides a computer program for performing the method of the first, second, third or fourth aspect when the computer program is executed by a computer.
In a possible design, the program in the eleventh aspect may be stored in whole or in part on a storage medium packaged with the processor, or in part or in whole on a memory not packaged with the processor.
In a twelfth aspect, an embodiment of the present application further provides a communication system, including the communication apparatus according to the ninth aspect.
It can be seen that, in the above aspects, target information is collected by an information collection node, a verification service node verifies the target information to generate a lock control instruction, and the verification service node sends the lock control instruction to a lock control node, so that the lock control node controls a lock according to the lock control instruction, that is, the lock is unlocked by the information collection node, the verification service node and the lock control node, and the verification service node verifies the target information without being limited by power supply of an intelligent door lock battery, so that the lock unlocking safety is improved, in addition, the information collection node, the verification service node and the lock control node as distributed nodes in a block chain network can record the target information, the lock control instruction and state information of the lock after the lock control instruction is executed by the lock control node into a block chain, since the information recorded in the blockchain is traceable and untrustworthy, when an error unlocking occurs, the wrong party and the responsibility of the wrong party can be accurately determined according to the information recorded in the blockchain.
Drawings
Fig. 1 is a schematic view of an application scenario provided in an embodiment of the present application;
FIG. 2 is a schematic view of a prior art smart door lock control;
FIG. 3 is a block chain structure diagram in the prior art;
FIG. 4 is a signaling diagram of a lock control method provided herein;
fig. 5 is a schematic view of another application scenario provided in the embodiment of the present application;
FIG. 6 is a signaling diagram of another lock control method provided herein;
FIG. 7 is a signaling diagram of another lock control method provided herein;
FIG. 8 is a signaling diagram of another lock control method provided herein; .
Fig. 9 is a schematic structural diagram of a communication device provided in the present application;
fig. 10 is a schematic structural diagram of a communication device according to an embodiment of the present application;
fig. 11 is a schematic structural diagram of another communication device according to an embodiment of the present application;
fig. 12 is a schematic structural diagram of another communication device according to an embodiment of the present application;
fig. 13 is a schematic structural diagram of another communication device according to an embodiment of the present application;
fig. 14 is a schematic structural diagram of another communication device according to an embodiment of the present application.
Detailed Description
The terminology used in the description of the embodiments section of the present application is for the purpose of describing particular embodiments of the present application only and is not intended to be limiting of the present application.
The embodiment of the application can be applied to various types of communication systems. Fig. 1 is a schematic view of an application scenario provided in an embodiment of the present application. The communication system shown in fig. 1 mainly includes a network device 11 and a terminal 12.
Among them, 1) the Network device 11 may be a Network Side device, for example, an Access Point (AP) of a Wireless Local Area Network (WLAN), an Evolved Node B (eNB or eNodeB) of 4G, a base station of next generation communication, such as a New Radio Access Technology (NR) base station (neighbor Node B) or a small station (gbb) of 5G, a micro station, a relay station, a Transmission and Reception Point (TRP), a Road Side Unit (RSU), and the like. In this embodiment, the base stations in the communication systems of different communication systems are different. For the sake of distinction, a base station of the 4G communication system is referred to as a Long Term Evolution (LTE) eNB, a base station of the 5G communication system is referred to as an NR gNB, and a base station supporting both the 4G communication system and the 5G communication system is referred to as an evolved Long Term Evolution (LTE) eNB.
2) The terminal 12, also referred to as a User Equipment (UE), is a device that provides voice and/or data connectivity to a User, such as a handheld device having wireless connection capability, a vehicle-mounted device, a vehicle having vehicle-to-vehicle (V2V) communication capability, and so on. Common terminals include, for example: the mobile phone includes a mobile phone, a tablet computer, a notebook computer, a palm computer, a Mobile Internet Device (MID), and a wearable device such as a smart watch, a smart bracelet, a pedometer, and the like.
3) "plurality" means two or more, and other terms are analogous. "and/or" describes the corresponding relationship of the associated objects, and indicates that three relationships may exist, for example, a and/or B, and may indicate that: a exists alone, A and B exist simultaneously, and B exists alone. The character "/" generally indicates that the former and latter associated objects are in an "or" relationship.
It should be noted that the number and types of the terminals 12 included in the communication system shown in fig. 1 are merely examples, and the embodiment of the present application is not limited thereto. For example, more terminals 12 communicating with the network device 11 may be included, and are not depicted in the figures one by one for simplicity of description. Furthermore, in the communication system shown in fig. 1, although the network device 11 and the terminal 12 are shown, the communication system may not be limited to include the network device 11 and the terminal 12, and may also include a core network node or a device for carrying a virtualized network function, which is obvious to those skilled in the art and is not described herein again.
It should be noted that, as the communication system continuously evolves, names of the network elements may change in other systems that may appear in the future, and in this case, the scheme provided in the embodiment of the present application is also applicable.
With the development of the intelligent door lock, a user can control the door lock in the home through the network equipment or the terminal. As shown in fig. 2, the intelligent door lock 13 includes a processing unit and a lock, after the user purchases the intelligent door lock 13, the user sends a configuration instruction to the intelligent door lock 13 through the terminal 12, so that the intelligent door lock 13 enters a configuration mode, in which the terminal 12 sends an initial password or a user biometric to the intelligent door lock 13, and the processing unit of the intelligent door lock 13 stores the initial password or the user biometric. The user biological characteristics may specifically be fingerprint information, face information, and the like of the user. After the terminal 12 completes configuration of the intelligent door lock 13, when the user triggers the intelligent door lock 13 to unlock, the user may directly input a password or a user biometric feature on the intelligent door lock 13, or the user sends the password or the user biometric feature to the intelligent door lock 13 through the terminal 12. The processing unit receives a password or user biological characteristics input by a user, compares the password or user biological characteristics with an initial password or user biological characteristics stored in advance, and if the password input by the user is matched with the initial password stored in advance by the processing unit or the user biological characteristics input by the user are matched with the user biological characteristics stored in advance by the processing unit, the processing unit sends an unlocking instruction to the lock, and the lock is unlocked according to the unlocking instruction. If the password input by the user is not matched with the initial password pre-stored by the processing unit, or the user biological characteristic input by the user is not matched with the user biological characteristic pre-stored by the processing unit, the processing unit does not send an unlocking instruction to the lock, and the lock is unlocked unsuccessfully.
In general, the algorithm executed by the processing unit shown in fig. 2 is provided by the manufacturer of the smart door lock 13, the processing unit needs to supply power to the battery in the smart door lock 13 when executing the algorithm, and since the power of the battery is limited, in order to reduce the power consumption or the calculation amount of the algorithm, the accuracy of the algorithm may be reduced, which results in the safety of the smart door lock 13 being reduced. In addition, once a wrong unlocking occurs, it is difficult to prove the responsibility of the wrong party. In order to solve the problem, the embodiment of the application adopts a block chain technology to realize the intelligent door lock.
A so-called Block Chain (Block Chain) is a distributed database, with a plurality of independent distributed nodes holding the same record. And the plurality of independent distributed nodes collectively maintain the distributed database in a decentralized and distrust manner. When new data needs to be recorded in the block chain, the new data is collected into one block and then added to the tail end of the existing block chain, and meanwhile, all the distributed nodes ensure that the newly added blocks of all the distributed nodes are completely the same through a consensus algorithm. Wherein the plurality of independent distributed nodes may include network devices and terminals as described above, as well as other communication devices.
Fig. 3 is a schematic diagram of a blockchain in the prior art. As shown in fig. 3, the blockchain includes a plurality of blocks, each block includes a block header, a hash value of a previous block header, and a mercker tree hash root, and meanwhile, each block further records a plurality of transaction records, and the transaction records form a transaction set. Each block is connected in sequence by storing the hash value of the previous block head to form the block chain. And information once recorded in a block is difficult to tamper with. A lock control method based on the blockchain technique is described below with reference to specific embodiments.
Fig. 4 is a signaling diagram of a lock control method provided in the present application. As shown in fig. 4, the information interaction subject related to the lock control method in this embodiment includes: the system comprises an information acquisition node, a verification service node and a lock control node. The information acquisition node can be a camera, a sound sensor, a fingerprint acquirer, a password disk and the like on the intelligent door lock. The authentication service node may specifically be a remote server, a cloud server, or the like. The lock control node may specifically be a control device or a control component that controls the opening or closing of the lock. Specifically, the information acquisition node, the verification service node and the lock control node are distributed nodes in a blockchain network, each distributed node can store a blockchain account book, and the blockchain account book can store information broadcast by each distributed node in the blockchain network.
As a feasible implementation manner, a communication system formed by the information acquisition node, the verification service node, and the lock control node is specifically shown in fig. 5. Wherein, intelligent lock 51 includes tool to lock control node and tool to lock. The information collection node may be integrated into the intelligent door lock 51, or the information collection node may be communicatively connected to the intelligent door lock 51. The verification service node 52 may be in wireless or wired communication with the information collection node and the lock control node, respectively. The present embodiment does not limit a specific communication network.
As shown in fig. 4, the lock control method according to this embodiment includes the following steps:
step S401, the information acquisition node acquires target information.
Optionally, the target information includes at least one of the following: target video information, target image information, target fingerprint information, target audio information, a first password input by the target, target iris information and target voiceprint information.
As a possible way, the information collecting node includes a camera on the intelligent door lock, and the target information collected by the camera may be target video information, for example, video information of a target appearing in a shooting range of the camera. The target may be the user himself or herself, or may be a stranger, or may be another target object.
Or the target information collected by the camera is target image information, namely image information of a target in the shooting range of the camera. In other embodiments, the information collection node further has an image processing function, for example, the information collection node further includes a microprocessor, when the camera collects target video information, the target video information is transmitted to the microprocessor, and after the microprocessor receives the target video information, target iris information, that is, iris information of a target, is analyzed from the target video information.
As another possible way, the information collecting node includes a fingerprint collector on the intelligent door lock, and when a target, such as a stranger, puts a finger on the fingerprint collector, the fingerprint collector collects target fingerprint information, namely fingerprint information of the stranger.
As yet another possible way, the information collecting node comprises a sound sensor on the intelligent door lock. The sound sensor can collect audio signals sent by the stranger, and the audio signals sent by the stranger can be used as target audio information. In other embodiments, the information collection node further has an audio signal processing function, for example, the information collection node further includes a microprocessor, when the sound sensor collects target audio information, the target audio information is transmitted to the microprocessor, and after the microprocessor receives the target audio information, the microprocessor analyzes target voiceprint information, that is, voiceprint information of a stranger, from the target audio information.
As a further possible way, the information collecting node comprises a password disk on the intelligent door lock, and the password disk can collect the password input by a stranger on the password disk, and here, the password input by the stranger on the password disk is marked as the first password input by the target.
It is to be understood that the target information that can be collected by the information collecting node is not limited to the above-mentioned cases, and in some embodiments, the target information may also be a combination of at least two of target video information, target image information, target fingerprint information, target audio information, a first password input by the target, target iris information, and target voiceprint information.
And step S402, the information acquisition node sends target information to the verification service node.
For example, as shown in fig. 5, when the information collection node collects the target information, the target information is sent to the verification service node 52 through the communication network. It is understood that the verification service node 52 may also have an image processing function and/or an audio signal processing function, when the target information received by the verification service node 52 from the information collecting node is target audio information and/or target video information, the verification service node 52 may further parse target iris information, i.e., iris information of a stranger, from the target video information, and/or the verification service node 52 parses target voiceprint information, i.e., voiceprint information of a stranger, from the target audio information.
And S403, the verification service node verifies the target information to generate a lock control instruction.
When the verification service node 52 receives the target information from the information collecting node, the verification service node 52 verifies the target information, and the embodiment does not limit the related verification algorithm. As a possible implementation manner, the verification service node 52 matches the target information with the user information pre-stored by the verification service node 52, and further generates a lock control instruction according to a matching result. For example, when the target information and the user information match, the authentication service node 52 generates a lock control instruction for controlling the lock to be unlocked. When the target information and the user information do not match, the authentication service node 52 does not generate a lock control instruction for controlling the lock to be unlocked, or generates a lock control instruction for controlling the lock not to be unlocked.
And S404, the verification service node sends the lock control instruction to a lock control node.
After the verification service node 52 generates a lock control instruction, the lock control instruction is sent to the lock control node through the communication network.
And S405, controlling the lockset by the lockset control node according to the lockset control instruction.
And after the lockset control node receives the lockset control instruction, controlling the lockset according to the lockset control instruction. Specifically, if the lock control node receives the lock control instruction to control the lock to be opened, the lock control instruction controls the lock to be opened. If the lockset control node receives the lockset control instruction and is used for controlling the lockset not to be unlocked, the lockset control instruction controls the lockset to keep a closed state.
In addition, in this embodiment, the information collection node, the verification service node, and the lock control node are distributed nodes in a blockchain network, and the distributed nodes are configured to record the target information, the lock control instruction, and state information of the lock after the lock control instruction is executed by the lock control node into a blockchain.
Specifically, after the information collection node collects the target information, the information collection node may broadcast the target information to the blockchain network, so that the distributed nodes in the blockchain network record the target information in the blockchain. After the verification service node generates the lock control instruction, the verification service node may broadcast the lock control instruction to the blockchain network, so that the distributed nodes in the blockchain network record the lock control instruction in the blockchain. Similarly, after the lock control node executes the lock control instruction, the lock control node can also acquire the state information of the lock and broadcast the state information of the lock to the block chain network, so that the distributed node in the block chain network records the state information of the lock into the block chain after the lock control node executes the lock control instruction.
It is to be understood that the distributed nodes in the blockchain network are not limited to the information collection node, the authentication service node, and the lock control node as described above, and may include other communication devices in other embodiments. In addition, the information recorded in the block chain by the distributed node is not limited to the target information, the lock control instruction, and the state information of the lock after the lock control instruction is executed by the lock control node, and may also include other information, for example, the acquisition time of the target information, the generation time of the lock control instruction, the identification information of the lock, and the like. In addition, the distributed node may record information such as the target information, the lock control instruction, and the lock state information after the lock control instruction is executed by the lock control node, into the same block of the block chain, or into different blocks of the block chain.
In the embodiment, target information is acquired by an information acquisition node, a verification service node verifies the target information to generate a lock control instruction, and the verification service node sends the lock control instruction to a lock control node, so that the lock control node controls a lock according to the lock control instruction, namely, the lock is unlocked by the information acquisition node, the verification service node and the lock control node, and the verification service node verifies the target information without being limited by power supply of an intelligent door lock battery, so that the lock unlocking safety is improved, in addition, the information acquisition node, the verification service node and the lock control node as distributed nodes in a block chain network can record the target information, the lock control instruction and state information of the lock after the lock control node executes the lock control instruction into a block chain, since the information recorded in the blockchain is traceable and untrustworthy, when an error unlocking occurs, the wrong party and the responsibility of the wrong party can be accurately determined according to the information recorded in the blockchain.
Fig. 6 is a signaling diagram of another lock control method provided in the present application. In the above embodiment, when the verification service node verifies the target information, the target information may be matched with the user information pre-stored by the verification service node, and the process of receiving and storing the user information by the verification service node will be described in this embodiment, which is specifically shown in fig. 6. In addition, on the basis of the above embodiment, the distributed node in the blockchain network may further include a terminal of a user, where the terminal may specifically be the terminal 12 shown in fig. 5, that is, when the information collecting node, the authentication service node, and the lock control node broadcast a message in the blockchain network, the terminal may receive and store the broadcast message, and the terminal, the information collecting node, the authentication service node, and the lock control node may collectively maintain the blockchain, that is, add a new block in the blockchain, where the broadcast message may be stored.
As shown in fig. 6, the lock control method according to this embodiment includes the following steps:
step S601, the terminal sends a configuration instruction to the information acquisition node.
For example, the terminal sends a configuration instruction to the information acquisition node, so that the intelligent door lock enters a configuration mode, and in the configuration mode, the terminal can configure user information in the intelligent door lock, wherein the user information is used for verifying the target information by the verification service node.
Step S602, the information acquisition node acquires user information.
And after receiving the configuration instruction, the information acquisition node enters a configuration mode, and in the configuration mode, the information acquisition node can acquire user information. Optionally, the user information includes at least one of the following: the system comprises user video information, user image information, user fingerprint information, user audio information, a second password input by a user, user iris information and user voiceprint information. Specifically, the method for the information collection node to collect the user information is similar to the method for the information collection node to collect the target information, and is not described herein again.
Step S603, the information acquisition node sends the user information to the verification service node.
Optionally, after the information acquisition node sends the user information to the verification service node, the information acquisition node may further broadcast the acquisition time of the user information and the user information in the blockchain network, so that the distributed node in the blockchain network records the acquisition time of the user information and the user information in the blockchain.
Optionally, after the verification service node receives the user information, the verification service node may further broadcast the receiving time of the user information and the user information in the blockchain network, so that the distributed node in the blockchain network records the receiving time of the user information and the user information in the blockchain.
Step S604, the authentication service node stores the user information.
And step S605, the information acquisition node acquires target information according to the unlocking trigger instruction.
In a possible mode, the information acquisition node acquires the target information according to an unlocking trigger instruction input by the target.
For example, the information collecting node comprises a fingerprint collector, and when a stranger puts a finger on the fingerprint collector, the fingerprint collector collects fingerprint information of the stranger according to an unlocking trigger instruction input by the stranger.
In another possible mode, the information acquisition node acquires the target information according to an unlocking trigger instruction generated by a doorbell.
For example, a doorbell is further arranged on the intelligent door lock, the doorbell and the information acquisition node can be in communication connection, when the doorbell is triggered, for example, a stranger presses the doorbell, the doorbell can generate an unlocking trigger instruction according to unlocking trigger operation of the stranger, and the unlocking trigger instruction is sent to the information acquisition node, for example, the information acquisition node comprises a camera, and the camera acquires video information of the stranger after receiving the unlocking trigger instruction sent by the doorbell.
In addition, the information acquisition node may also broadcast the time information of the unlocking trigger instruction, the trigger mode corresponding to the unlocking trigger instruction, and the target information in the blockchain network, so that the distributed node in the blockchain network records the time information of the unlocking trigger instruction, the trigger mode, and the target information in the blockchain. The time information of the unlocking triggering instruction may specifically be the time when the target triggers the intelligent door lock to unlock, or the time when the doorbell generates the unlocking triggering instruction. The trigger mode corresponding to the unlocking trigger instruction may specifically be target trigger or doorbell trigger.
And step S606, the information acquisition node sends the target information to the verification service node.
And step S607, the verification service node verifies the target information to generate a lock control instruction.
Optionally, after the verification service node verifies the target information and generates a lock control instruction, the receiving time of the target information, the verification result of the verification service node on the target information, and the lock control instruction may be broadcast to the blockchain network, so that a distributed node in the blockchain network records the receiving time of the target information, the verification result, and the lock control instruction in the blockchain.
The receiving time of the target information may specifically be a time when the target information is received by the verification service node. The result of the verification of the target information by the verification service node may specifically refer to whether the target information matches user information pre-stored by the verification service node.
And step S608, the verification service node sends the lock control instruction to the lock control node.
In this embodiment, after the lock control node receives the lock control instruction from the verification service node, the lock control node may further broadcast, in the blockchain network, the receiving time of the lock control instruction, the source of the lock control instruction, and the state information of the lock after the lock control instruction is executed by the lock control node, so that the distributed node in the blockchain network records the receiving time of the lock control instruction, the source of the lock control instruction, and the state information of the lock after the lock control instruction is executed by the lock control node in the blockchain. The receiving time of the lock control instruction can be the time when the lock control node receives the lock control instruction. Here, the source of the lock control instruction is specifically the authentication service node.
And step S609, the lock control node controls the lock according to the lock control instruction.
And step S610, the lock control node sends lock state information to the terminal.
For example, after the lock control node controls the lock according to the lock control instruction, the lock state information can be sent to the terminal, so that the terminal checks whether the lock is successfully unlocked. In some embodiments, the terminal may also send a lock control instruction to the lock control node if the lock is not successfully opened, that is, the terminal may generate the lock control instruction in addition to the verification service node.
In the embodiment, the user information is acquired through the information acquisition node, and the user information is sent to the verification service node, so that the user information is stored in the verification service node in advance, after the verification service node receives the target information, the verification service node can verify the target information according to the user information, the target is ensured that the user himself can control the intelligent door lock to be unlocked, and the safety of the intelligent door lock is further improved.
In the above embodiment, the verification service node generates a lock control instruction, and sends the lock control instruction to the lock control node, so that the lock control node controls the lock according to the lock control instruction. In this embodiment, a lock control instruction can be generated by the terminal, and the lock control instruction is sent to the lock control node, so that the lock control node controls the lock according to the lock control instruction generated by the terminal. As shown in fig. 7, the lock control method according to this embodiment includes the following steps:
and S701, the information acquisition node acquires target information according to the unlocking trigger instruction.
The unlocking trigger instruction in the embodiment may be a trigger instruction for triggering unlocking of the intelligent door lock by a stranger.
Step S702, the information acquisition node sends the target information to the verification service node.
Step S703, the verification service node verifies the target information, and determines that the target information is not matched with the user information.
Step S704, the verification service node sends the target information to the terminal.
Specifically, when the verification service node determines that the target information is not matched with the user information by comparing the target information with the user information pre-stored in the verification service node, the verification service node sends the target information to a terminal of a user.
And step S705, the terminal generates a lock control instruction according to the target information.
And step S706, the terminal sends a lock control instruction to the lock control node.
Specifically, when the verification service node determines that the target information is not matched with the user information by comparing the target information with the user information pre-stored in the verification service node, the lock control node receives a lock control instruction sent by the terminal.
For example, the target information received by the verification service node is video information of a stranger, the verification service node determines that the biological characteristics of the stranger are not matched with the pre-stored biological characteristics of the user according to the video information, the verification service node sends the video information to a terminal of the user, and after the user checks the video information, if the user determines that the door of the stranger is opened, a lock control instruction for controlling the lock to be opened is sent to the lock control node.
In addition, after the lock control node receives a lock control instruction sent by a terminal, the lock control node can also broadcast the receiving time of the lock control instruction, the source of the lock control instruction, and the state information of the lock after the lock control instruction is executed by the lock control node in the block chain network, so that the distributed node in the block chain network records the receiving time of the lock control instruction, the source of the lock control instruction, and the state information of the lock after the lock control instruction is executed by the lock control node in the block chain. The receiving time of the lock control instruction can be the time when the lock control node receives the lock control instruction. The source of the lock control command here may specifically be the terminal.
And S707, controlling the lockset by the lockset control node according to the lockset control instruction.
And step S708, the lock control node sends lock state information to the terminal.
For example, after the lock control node executes a lock control instruction for controlling the lock to be unlocked, the lock is in an unlocked state, and then the lock control node can also send the unlocked state of the lock to the terminal, so that the user can check the state information of the lock.
And step S709, the lock control node sends the lock state information to a third-party node.
In this embodiment, the distributed nodes in the blockchain network may further include a third-party node, and the third-party node may specifically be a third-party server 53 as shown in fig. 5. The third party server 53 may be, for example, a node in the blockchain network of an insurance company.
When the information acquisition node, the verification service node and the lock control node broadcast messages in the block chain network, the third-party node can receive and store the broadcast messages, and the terminal, the third-party node, the information acquisition node, the verification service node and the lock control node can maintain the block chain together, namely, a new block is added in the block chain, and the broadcast messages can be stored in the new block.
For example, after the lock control node executes a lock control instruction for controlling the lock to be unlocked, the lock is in an unlocked state, and then the lock control node can also send the unlocked state of the lock to the third-party node, so that the third-party node performs information backup.
The target information is sent to the verification service node through the information acquisition node, the verification service node verifies the target information, when the verification service node determines that the target information is not matched with the user information, the verification service node sends the target information to the terminal, the terminal generates a lock control instruction according to the target information, and sends the lock control instruction to the lock control node, namely, the lock control node can receive the lock control instruction sent by the verification service node and can also receive the lock control instruction sent by the terminal, and therefore the flexibility of lock control is improved.
In some scenarios, the verification result of the verification service node on the target information may be wrong, so that the lock of the intelligent door lock is unlocked mistakenly. In this case, a method is required to prove which link is wrong. The method will be described with reference to a specific embodiment. As shown in fig. 8, the lock control method according to this embodiment includes the following steps:
and S801, the information acquisition node acquires target information according to the unlocking trigger instruction.
The unlocking trigger instruction in the embodiment may be a trigger instruction for triggering unlocking of the intelligent door lock by a stranger.
And S802, the information acquisition node sends target information to the verification service node.
And step S803, the verification service node verifies the target information and determines that the target information is matched with the user information.
In this embodiment, the target information and the user information do not actually match, but the authentication service node determines that the target information and the user information match due to an erroneous authentication by the authentication service node. Resulting in the authentication service node generating the wrong lock control instruction. For example, the target information and the user information do not actually match, but the authentication service node generates a lock control instruction that controls the unlocking of a lock.
And step S804, the verification service node sends a lock control instruction to the lock control node.
After the lock control node receives the lock control instruction, the lock control node broadcasts the receiving time of the lock control instruction, the source (for example, a verification service node) of the lock control instruction, the lock control instruction and other information in the blockchain network, so that a third party node in the blockchain network can receive the information broadcast by the lock control node.
And S805, controlling the lockset by the lockset control node according to the lockset control instruction.
And step S806, the lock control node sends lock state information to the terminal.
And step S807, the lock control node sends the lock state information to a third-party node.
When the terminal determines that the lock is unlocked mistakenly according to the state information of the lock, the block chain record of the third-party node can be inquired. Specifically, according to the block chain record of the third-party node and the time when the wrong unlocking occurs, it is determined that the lock control instruction executed by the lock control node comes from the verification service node, and further, a verification algorithm executed by the verification service node is detected. For example, after the information collection node collects the target information according to the unlocking trigger instruction, the target information may be broadcast to the blockchain network, so that the third-party node may store the target information in the blockchain. And when the terminal determines that the lock control instruction executed by the lock control node is from the verification service node, acquiring the target information from the third-party node and verifying the target information. For example, the target information is video information of a stranger, the terminal compares whether a face in the target information is matched with a face of a user pre-stored in the terminal, and if the terminal determines that the face in the target information is not matched with the face of the user, the terminal can determine that a problem occurs in a verification algorithm executed by the verification service node, so that the intelligent door lock is unlocked mistakenly.
It can be understood that when a third-party node, an information acquisition node, a verification service node, and a lock control node are all distributed nodes in the blockchain network, and the third-party node, the information acquisition node, the verification service node, and the lock control node maintain the blockchain together, the terminal can not only query blockchain records from the third-party node, but also query blockchain records from the information acquisition node, the verification service node, and the lock control node. Specifically, the terminal sends a query request to the distributed node; further, the terminal receives information recorded in the block chain from the distributed node.
In this embodiment, the information broadcasted in the blockchain network during the unlocking process by the third-party node in the blockchain network is received and stored by the third-party node, the verification service node, the lock control node, the terminal and other nodes in the blockchain network, so that the third-party node and other nodes in the blockchain network can record the information during the whole unlocking process. When the terminal determines that the lock is unlocked incorrectly, the block chain record can be inquired from the third-party node, and the reason of the incorrect unlocking is determined according to the block chain record.
It is to be understood that some or all of the steps or operations in the above-described embodiments are merely examples, and other operations or variations of various operations may be performed by the embodiments of the present application. Further, the various steps may be performed in a different order presented in the above-described embodiments, and it is possible that not all of the operations in the above-described embodiments are performed.
It is to be understood that, in the above embodiments, the operations or steps implemented by the terminal may also be implemented by a component (e.g., a chip or a circuit) available to the terminal, the operations or steps implemented by the authentication service node may also be implemented by a component (e.g., a chip or a circuit) available to the authentication service node, the operations or steps implemented by the information acquisition node may also be implemented by a component (e.g., a chip or a circuit) available to the information acquisition node, the operations or steps implemented by the lock control node may also be implemented by a component (e.g., a chip or a circuit) available to the lock control node.
Fig. 9 shows a schematic structural diagram of a communication apparatus. The communication device may be configured to implement the method for verifying the portion corresponding to the service node, the method for verifying the portion corresponding to the terminal, the method for controlling the portion corresponding to the node by using the lock, or the method for acquiring the portion corresponding to the node by using the lock described in the method embodiment, for specific reference, the description in the method embodiment above is given.
The communication device 90 may comprise one or more processors 91, and the processors 91 may also be referred to as processing units, which may implement certain control functions. The processor 91 may be a general purpose processor or a dedicated processor, etc.
In an alternative design, the processor 91 may also store instructions 93, which may be executed by the processor, to cause the communication device 90 to perform the method described in the above method embodiment, corresponding to the terminal, or the authentication service node, or the lock control node, or the information collecting node.
In yet another possible design, the communication device 90 may include circuitry that may implement the functionality of transmitting or receiving or communicating in the foregoing method embodiments.
Optionally, one or more memories 92 may be included in the communication device 90, on which instructions 94 or intermediate data are stored, the instructions 94 being executable on the processor to cause the communication device 90 to perform the methods described in the above method embodiments. Optionally, other related data may also be stored in the memory. Optionally, instructions and/or data may also be stored in the processor. The processor and the memory may be provided separately or may be integrated together.
Optionally, the communication device 90 may further include a transceiver 95.
The processor 91 may be referred to as a processing unit. The transceiver 95 may be referred to as a transceiver unit, a transceiver, a transceiving circuit, a transceiver, or the like, and is used for implementing transceiving functions of the communication device.
If the communication device is used to implement operations corresponding to the authentication service node in the embodiment shown in fig. 4, for example, the transceiver may receive the target information from the information collecting node. The transceiver may further perform other corresponding communication functions. And the processor is used for completing corresponding determination or control operation, and optionally, corresponding instructions can be stored in the memory. The specific processing manner of each component can be referred to the related description of the previous embodiment.
If the communication device is used to implement the operation corresponding to the information collecting node in fig. 4, the target information may be sent to the authentication service node by the transceiver, for example. The transceiver may further perform other corresponding communication functions. And the processor is used for completing corresponding determination or control operation, and optionally, corresponding instructions can be stored in the memory. The specific processing manner of each component can be referred to the related description of the previous embodiment.
If the communication device is used to implement the operation corresponding to the lock control node in the embodiment shown in fig. 4, the transceiver is used to receive a lock control instruction sent by the terminal or the verification service node. Optionally, the transceiver may be further configured to perform other related communication operations, and the processor may be further configured to perform other corresponding determining or controlling operations, such as determining information of the at least one cell. Optionally, corresponding instructions may also be stored in the memory. The specific processing manner of each component can be referred to the related description of the previous embodiment.
If the communication device is used to implement operations corresponding to the terminal in the embodiment shown in fig. 6, the transceiver is used to receive the target information collected by the information collecting node from the authentication service node. Optionally, the transceiver may be further configured to perform other related communication operations, and the processor may be further configured to perform other corresponding determination or control operations. Optionally, corresponding instructions may also be stored in the memory. The specific processing manner of each component can be referred to the related description of the previous embodiment.
The processors and transceivers described herein may be implemented on Integrated Circuits (ICs), analog ICs, Radio Frequency Integrated Circuits (RFICs), mixed signal ICs, Application Specific Integrated Circuits (ASICs), Printed Circuit Boards (PCBs), electronic devices, and the like. The processor and transceiver may also be fabricated using various 1C process technologies, such as Complementary Metal Oxide Semiconductor (CMOS), N-type metal oxide semiconductor (NMOS), P-type metal oxide semiconductor (PMOS), Bipolar Junction Transistor (BJT), Bipolar CMOS (bicmos), silicon germanium (SiGe), gallium arsenide (GaAs), and the like.
Alternatively, the communication device may be a stand-alone device or may be part of a larger device. For example, the device may be:
(1) a stand-alone integrated circuit IC, or chip, or system-on-chip or subsystem;
(2) a set of one or more ICs, which optionally may also include storage components for storing data and/or instructions;
(3) an ASIC, such as a modem (MSM);
(4) a module that may be embedded within other devices;
(5) receivers, terminals, cellular telephones, wireless devices, handsets, mobile units, network devices, and the like;
(6) others, and so forth.
Fig. 10 is a schematic structural diagram of a communication device according to an embodiment of the present application. The communication device may specifically be an authentication service node. As shown in fig. 10, the communication apparatus 100 includes: a receiving module 1001, a verifying module 1002 and a sending module 1003; the receiving module 1001 is configured to receive target information acquired by an information acquisition node; the verification module 1002 is configured to verify the target information and generate a lock control instruction; the sending module 1003 is configured to send the lock control instruction to a lock control node, where the lock control node is configured to control a lock according to the lock control instruction; the information acquisition node, the verification service node and the lock control node are distributed nodes in a block chain network, and the distributed nodes are used for recording the target information, the lock control instruction and state information of the lock after the lock control instruction is executed by the lock control node into a block chain.
In fig. 10, further, the target information includes at least one of: target video information, target image information, target fingerprint information, target audio information, a first password input by the target, target iris information and target voiceprint information.
In a possible manner, the verification module 1002 is configured to verify the target information, and when generating a lock control instruction, specifically: and generating the lock control instruction by comparing the target information with the user information prestored in the verification service node.
In another possible manner, when the verification module 1002 generates the lock control instruction by comparing the target information with the user information pre-stored in the verification service node, the method is specifically configured to: and when the verification service node determines that the target information is matched with the user information by comparing the target information with the user information prestored in the verification service node, generating the lock control instruction, wherein the lock control instruction is used for controlling the lock to be unlocked.
Optionally, the sending module 1003 is further configured to: when the verification module 1002 determines that the target information and the user information are not matched by comparing the target information with the user information pre-stored in the verification service node, the target information is sent to the terminal of the user.
Optionally, the verifying module 1002 verifies the target information, and after the lock control instruction is generated, the sending module 1003 is further configured to: broadcasting the receiving time of the target information, the verification result of the verification service node on the target information and the lock control instruction to the blockchain network, so that the distributed node records the receiving time of the target information, the verification result and the lock control instruction in the blockchain.
Optionally, before the receiving module 1001 receives the target information collected by the information collecting node, the receiving module is further configured to: receiving user information acquired by the information acquisition node, wherein the user information comprises at least one of the following: the method comprises the steps of obtaining user video information, user image information, user fingerprint information, user audio information, a second password input by a user, user iris information and user voiceprint information; the sending module 1003 is further configured to: broadcasting the reception time of the user information and the user information in the blockchain network to cause the distributed node to record the reception time of the user information and the user information in the blockchain.
Optionally, the blockchain network further includes a third-party node, where the third-party node is configured to store information that is respectively broadcast in the blockchain network by the information acquisition node, the verification service node, and the lock control node.
Optionally, the receiving module 1001 may also receive information broadcast in the blockchain network by other distributed nodes in the blockchain network. That is, the receiving module 1001 is not limited to receiving the target information collected by the information collecting node.
The communication device of the embodiment shown in fig. 10 may be used to implement the technical solution of the above method embodiment, and the implementation principle and technical effect of the technical solution may further refer to the relevant description in the method embodiment, and optionally, the communication device may be an authentication service node, and may also be a component (e.g., a chip or a circuit) of the authentication service node.
Fig. 11 is a schematic structural diagram of another communication device according to an embodiment of the present application. The communication device may specifically be an information collecting node. As shown in fig. 11, the communication device 110 includes: an information acquisition module 1101, a sending module 1102 and a receiving module 1103; the information acquisition module 1101 is configured to acquire target information; the sending module 1102 is configured to send the target information to a verification service node, where the verification service node is configured to verify the target information to generate a lock control instruction, and send the lock control instruction to a lock control node, where the lock control node is configured to control a lock according to the lock control instruction; the information acquisition node, the verification service node and the lock control node are distributed nodes in a block chain network, and the distributed nodes are used for recording the target information, the lock control instruction and state information of the lock after the lock control instruction is executed by the lock control node into a block chain. The receiving module 1103 is configured to receive an unlocking trigger instruction and receive information broadcast in the blockchain network by other distributed nodes in the blockchain network.
In fig. 11, further, when the information collection module 1101 collects the target information, it is specifically configured to: and acquiring the target information according to the unlocking trigger instruction.
In a possible manner, when the information acquisition module 1101 acquires the target information according to an unlocking trigger instruction, the information acquisition module is specifically configured to: and acquiring the target information according to the unlocking trigger instruction input by the target.
In another possible manner, when the information acquisition module 1101 acquires the target information according to the unlocking trigger instruction, the information acquisition module is specifically configured to: and acquiring the target information according to an unlocking trigger instruction generated by the doorbell. For example, after the doorbell generates an unlocking trigger instruction, the doorbell may send the unlocking trigger instruction to the information collection node, and the information collection node receives the unlocking trigger instruction through the receiving module 1103.
Optionally, the sending module 1102 is further configured to: broadcasting the time information of the unlocking trigger instruction, the trigger mode corresponding to the unlocking trigger instruction and the target information in the block chain network, so that the distributed node records the time information of the unlocking trigger instruction, the trigger mode and the target information in the block chain.
Optionally, before the information acquisition module 1101 acquires the target information, the information acquisition module is further configured to: collecting user information, wherein the user information comprises at least one of the following: the method comprises the steps of obtaining user video information, user image information, user fingerprint information, user audio information, a second password input by a user, user iris information and user voiceprint information; the sending module 1102 is further configured to: sending the user information to the verification service node; broadcasting the acquisition time of the user information and the user information in the blockchain network so that the distributed node records the acquisition time of the user information and the user information in the blockchain.
Optionally, the blockchain network further includes a third-party node, where the third-party node is configured to store information that is broadcast by the information acquisition node, the verification service node, and the lock control node in the blockchain network.
The communication device of the embodiment shown in fig. 11 may be used to implement the technical solution of the above method embodiment, and the implementation principle and technical effect of the communication device may further refer to the relevant description in the method embodiment, and optionally, the communication device may be an information acquisition node, and may also be a component (e.g., a chip or a circuit) of the information acquisition node.
Fig. 12 is a schematic structural diagram of another communication device according to an embodiment of the present application. The communication device may specifically be a lock control node. As shown in fig. 12, the communication device 120 includes: a receiving module 1201 and a control module 1202; the receiving module 1201 is configured to receive a lock control instruction sent by a terminal or a verification service node, where the lock control instruction is an instruction generated by the verification service node or the terminal according to target information acquired by an information acquisition node; the control module 1202 is configured to control the lock according to the lock control instruction; the information acquisition node, the verification service node and the lock control node are distributed nodes in a block chain network, and the distributed nodes are used for recording the target information, the lock control instruction and state information of the lock after the lock control instruction is executed by the lock control node into a block chain.
One possible way is that, when the receiving module 1201 receives a lock control instruction sent by a terminal or a verification service node, the receiving module is specifically configured to: and when the verification service node determines that the target information is not matched with the user information by comparing the target information with the user information prestored in the verification service node, receiving a lock control instruction sent by the terminal.
Another possible mode is that, when the receiving module 1201 receives a lock control instruction sent by a terminal or a verification service node, the receiving module is specifically configured to: and when the verification service node determines that the target information is matched with the user information by comparing the target information with the user information prestored in the verification service node, receiving a lock control instruction sent by the verification service node.
In addition, the receiving module 1201 can also receive information broadcast in the blockchain network by other distributed nodes in the blockchain network.
In the above embodiment, the communication device 120 further includes: after the receiving module 1201 receives the lock control instruction sent by the terminal or the verification service node, the sending module 1203 is configured to: broadcasting the receiving time of the lock control instruction, the source of the lock control instruction, the lock control instruction and the state information of the lock after the lock control instruction is executed by the lock control node in the block chain network, so that the receiving time of the lock control instruction, the source of the lock control instruction, the lock control instruction and the state information of the lock after the lock control instruction is executed by the lock control node are recorded in the block chain by the distributed node.
Optionally, after the control module 1202 controls the lock according to the lock control instruction, the sending module 1203 is further configured to: and sending the state information of the lock to a terminal of a user after the lock control node executes the lock control instruction.
Optionally, the blockchain network further includes a third-party node, where the third-party node is configured to store information that is respectively broadcast in the blockchain network by the information acquisition node, the verification service node, and the lock control node.
The communication device in the embodiment shown in fig. 12 may be configured to execute the technical solution of the above method embodiment, and the implementation principle and the technical effect of the communication device may further refer to corresponding descriptions in the method embodiment, which are not described herein again, and optionally, the communication device may be a lock control node, or may be a component (e.g., a chip or a circuit) of the lock control node.
Fig. 13 is a schematic structural diagram of another communication device according to an embodiment of the present application. The communication device may specifically be a terminal. As shown in fig. 13, the communication device 130 includes: a receiving module 1301, an instruction generating module 1302 and a sending module 1303; the receiving module 1301 is configured to receive, from the authentication service node, target information collected by the information collection node; the instruction generating module 1302 is configured to generate a lock control instruction according to the target information; the sending module 1303 is configured to send the lock control instruction to a lock control node, where the lock control node is configured to control a lock according to the lock control instruction; the terminal, the information acquisition node, the verification service node and the lock control node are distributed nodes in a block chain network, and the distributed nodes are used for recording the target information, the lock control instruction and state information of the lock after the lock control instruction is executed by the lock control node into a block chain.
In a possible manner, when the receiving module 1301 receives the target information collected by the information collecting node from the verification service node, the receiving module is specifically configured to: and when the verification service node determines that the target information is not matched with the user information by comparing the target information acquired by the information acquisition node with the user information prestored in the verification service node, receiving the target information from the verification service node.
In another possible mode, after the sending module 1303 sends the lock control instruction to the lock control node, the receiving module 1301 is further configured to receive the state information of the lock after the lock control node executes the lock control instruction generated by the terminal.
In addition, the receiving module 1301 can also receive information broadcast in the blockchain network by other distributed nodes in the blockchain network.
Optionally, the blockchain network further includes a third-party node, where the third-party node is configured to store information that is respectively broadcast in the blockchain network by the information acquisition node, the verification service node, and the lock control node.
Optionally, the sending module 1303 is further configured to send a query request to the distributed node; the receiving module 1301 is further configured to receive information recorded in the block chain from the distributed node.
The communication device of the embodiment shown in fig. 13 may be used to implement the technical solution of the above method embodiment, and its implementation principle and technical effect are similar, and are not described herein again, and the communication device may be a terminal, or may be a component (e.g., a chip or a circuit) of the terminal.
It should be understood that the division of the modules of the communication device shown in fig. 10 to 13 is merely a logical division, and the actual implementation may be wholly or partially integrated into one physical entity or may be physically separated. And these modules can be realized in the form of software called by processing element; or may be implemented entirely in hardware; and part of the modules can be realized in the form of calling by the processing element in software, and part of the modules can be realized in the form of hardware. For example, the verification module may be a processing element that is set up separately, or may be implemented by being integrated in a chip of the communication apparatus, such as a verification service node, or may be stored in a memory of the communication apparatus in the form of a program, and the processing element of the communication apparatus calls and executes the functions of the above modules. Other modules are implemented similarly. In addition, all or part of the modules can be integrated together or can be independently realized. The processing element described herein may be an integrated circuit having signal processing capabilities. In implementation, each step of the above method or each module above may be implemented by an integrated logic circuit of hardware in a processor element or an instruction in the form of software.
For example, the above modules may be one or more integrated circuits configured to implement the above methods, such as: one or more Application Specific Integrated Circuits (ASICs), or one or more microprocessors (DSPs), or one or more Field Programmable Gate Arrays (FPGAs), among others. As another example, when one of the above modules is implemented in the form of a Processing element scheduler, the Processing element may be a general purpose processor, such as a Central Processing Unit (CPU) or other processor capable of invoking programs. As another example, these modules may be integrated together, implemented in the form of a system-on-a-chip (SOC).
Fig. 14 is a schematic structural diagram of another communication device according to an embodiment of the present application. As shown in fig. 14, the communication device 140 includes: the processor 142 and the transceiver 143, the transceiver 143 receives the target information collected by the information collecting node from the verification service node; the processor 142 generates a lock control instruction according to the target information, and the transceiver 143 sends the lock control instruction to a lock control node, where the lock control node is used to control a lock according to the lock control instruction; the terminal, the information acquisition node, the verification service node and the lock control node are distributed nodes in a block chain network, and the distributed nodes are used for recording the target information, the lock control instruction and state information of the lock after the lock control instruction is executed by the lock control node into a block chain. Further, a memory 141 is included for storing computer programs or instructions, which the processor 142 is configured to call.
The communication device in the embodiment shown in fig. 14 may be configured to execute the technical solution of the above method embodiment, and further refer to the relevant description in the method embodiment, which is not described herein again, where the communication device may be a terminal, or may be a component (e.g., a chip or a circuit) of the terminal.
In fig. 14, the transceiver 143 may be connected to an antenna. In the downlink direction, the transceiver 143 receives information transmitted by the base station via the antenna and sends the information to the processor 142 for processing. In the uplink direction, the processor 142 processes the data of the terminal and transmits the processed data to the base station through the transceiver 143.
Alternatively, the processor 142 may be configured to implement corresponding functions in the instruction generating module 1302 of the communication apparatus shown in fig. 13, and the transceiver may be configured to implement corresponding functions of the receiving module 1301 and the sending module 1303 of the communication apparatus shown in fig. 13. Alternatively, part or all of the above modules may be implemented by being embedded in a chip of the terminal in the form of an integrated circuit. And they may be implemented separately or integrated together. That is, the above modules may be configured as one or more integrated circuits implementing the above methods, for example: one or more Application Specific Integrated Circuits (ASICs), or one or more microprocessors (DSPs), or one or more Field Programmable Gate Arrays (FPGAs), among others.
Embodiments of the present application further provide a computer-readable storage medium, in which a computer program is stored, and when the computer program runs on a computer, the computer is caused to execute the communication method described in the above embodiments.
In addition, the present application also provides a computer program product, which includes a computer program that, when running on a computer, causes the computer to execute the communication method described in the above embodiments.
In the above embodiments, the implementation may be wholly or partially realized by software, hardware, firmware, or any combination thereof. When implemented in software, may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. When the computer program instructions are loaded and executed on a computer, the procedures or functions described in accordance with the present application are generated, in whole or in part. The computer may be a general purpose computer, a special purpose computer, a network of computers, or other programmable device. The computer instructions may be stored in a computer readable storage medium or transmitted from one computer readable storage medium to another, for example, the computer instructions may be transmitted from one website, computer, server, or data center to another website, computer, server, or data center by wire (e.g., coaxial cable, fiber optic, digital subscriber line) or wirelessly (e.g., infrared, wireless, microwave, etc.). The computer-readable storage medium can be any available medium that can be accessed by a computer or a data storage device, such as a server, a data center, etc., that incorporates one or more of the available media. The usable medium may be a magnetic medium (e.g., floppy Disk, hard Disk, magnetic tape), an optical medium (e.g., DVD), or a semiconductor medium (e.g., Solid State Disk), among others.

Claims (33)

1. A lock control method, comprising:
the verification service node receives the target information collected by the information collection node;
the verification service node verifies the target information and generates a lock control instruction;
the verification service node sends the lock control instruction to a lock control node, and the lock control node is used for controlling a lock according to the lock control instruction;
the information acquisition node, the verification service node and the lock control node are distributed nodes in a block chain network, and the distributed nodes are used for recording the target information, the lock control instruction and state information of the lock after the lock control instruction is executed by the lock control node into a block chain.
2. The method of claim 1, wherein the target information comprises at least one of:
target video information, target image information, target fingerprint information, target audio information, a first password input by the target, target iris information and target voiceprint information.
3. The method of claim 1 or 2, wherein the verifying service node verifies the target information and generates the lock control instruction, comprising:
and the verification service node generates the lock control instruction by comparing the target information with the user information prestored in the verification service node.
4. The method of claim 3, wherein the authentication service node generates the lock control instruction by comparing the target information with user information pre-stored in the authentication service node, and the method comprises:
and when the verification service node determines that the target information is matched with the user information by comparing the target information with the user information prestored in the verification service node, generating the lock control instruction, wherein the lock control instruction is used for controlling the lock to be unlocked.
5. The method of claim 4, further comprising:
and when the verification service node determines that the target information is not matched with the user information by comparing the target information with the user information prestored in the verification service node, the verification service node sends the target information to a terminal of a user.
6. The method of any of claims 1-5, wherein after the verifying service node verifies the target information and generates the lock control command, the method further comprises:
the verification service node broadcasts the receiving time of the target information, the verification result of the verification service node on the target information and the lock control instruction to the blockchain network, so that the distributed node records the receiving time of the target information, the verification result and the lock control instruction in the blockchain.
7. The method of claim 1, wherein before the verification service node receives the target information collected by the information collection node, the method further comprises:
the verification service node receives user information collected by the information collection node, wherein the user information comprises at least one of the following: the method comprises the steps of obtaining user video information, user image information, user fingerprint information, user audio information, a second password input by a user, user iris information and user voiceprint information;
the verification service node broadcasts the receiving time of the user information and the user information in the blockchain network, so that the distributed node records the receiving time of the user information and the user information in the blockchain.
8. The method according to any one of claims 1 to 7, wherein the blockchain network further comprises a third party node for storing information broadcast by the information collecting node, the verification service node and the lock control node in the blockchain network respectively.
9. A lock control method, comprising:
the information acquisition node acquires target information;
the information acquisition node sends the target information to a verification service node, the verification service node is used for verifying the target information to generate a lock control instruction and sending the lock control instruction to a lock control node, and the lock control node is used for controlling a lock according to the lock control instruction;
the information acquisition node, the verification service node and the lock control node are distributed nodes in a block chain network, and the distributed nodes are used for recording the target information, the lock control instruction and state information of the lock after the lock control instruction is executed by the lock control node into a block chain.
10. The method of claim 9, wherein the information collecting node collects target information, comprising:
and the information acquisition node acquires the target information according to the unlocking trigger instruction.
11. The method of claim 10, wherein the information collecting node collects the target information according to an unlocking triggering instruction, and comprises:
and the information acquisition node acquires the target information according to the unlocking trigger instruction input by the target.
12. The method of claim 10, wherein the information collecting node collects the target information according to an unlocking triggering instruction, and comprises:
and the information acquisition node acquires the target information according to an unlocking trigger instruction generated by a doorbell.
13. The method according to claim 11 or 12, characterized in that the method further comprises:
the information acquisition node broadcasts the time information of the unlocking trigger instruction, the trigger mode corresponding to the unlocking trigger instruction and the target information in the block chain network, so that the distributed node records the time information of the unlocking trigger instruction, the trigger mode and the target information in the block chain.
14. The method according to any one of claims 9-13, wherein before the information collecting node collects the target information, the method further comprises:
the information acquisition node acquires user information, wherein the user information comprises at least one of the following: the method comprises the steps of obtaining user video information, user image information, user fingerprint information, user audio information, a second password input by a user, user iris information and user voiceprint information;
the information acquisition node sends the user information to the verification service node;
the information acquisition node broadcasts the acquisition time of the user information and the user information in the blockchain network, so that the distributed node records the acquisition time of the user information and the user information in the blockchain.
15. The method according to any one of claims 9 to 14, wherein the blockchain network further comprises a third party node for storing information broadcast by the information collecting node, the authentication service node and the lock control node in the blockchain network respectively.
16. A lock control method, comprising:
the method comprises the steps that a lockset control instruction sent by a terminal or a verification service node is received by the lockset control node, wherein the lockset control instruction is generated by the verification service node or the terminal according to target information collected by an information collection node;
the lock control node controls the lock according to the lock control instruction;
the information acquisition node, the verification service node and the lock control node are distributed nodes in a block chain network, and the distributed nodes are used for recording the target information, the lock control instruction and state information of the lock after the lock control instruction is executed by the lock control node into a block chain.
17. The method of claim 16, wherein the receiving, by the lock control node, the lock control instruction sent by the terminal or the authentication service node comprises:
and when the verification service node determines that the target information is not matched with the user information by comparing the target information with the user information prestored in the verification service node, the lock control node receives a lock control instruction sent by the terminal.
18. The method of claim 16, wherein the receiving, by the lock control node, the lock control instruction sent by the terminal or the authentication service node comprises:
and when the verification service node determines that the target information is matched with the user information by comparing the target information with the user information prestored in the verification service node, the lock control node receives a lock control instruction sent by the verification service node.
19. The method of claim 17, wherein after the lock control node receives the lock control command sent by the terminal, the method further comprises:
the lock control node broadcasts the receiving time of the lock control instruction, the source of the lock control instruction, the lock control instruction and the state information of the lock after the lock control node executes the lock control instruction in the block chain network, so that the distributed node records the receiving time of the lock control instruction, the source of the lock control instruction, the lock control instruction and the state information of the lock after the lock control node executes the lock control instruction in the block chain.
20. The method of claim 16, wherein after the lock control node controls the lock according to the lock control instruction, the method further comprises:
and the lock control node sends the state information of the lock to a terminal of a user after the lock control node executes the lock control instruction.
21. The method according to any one of claims 17 to 20, wherein the blockchain network further comprises a third party node for storing information broadcast by the information collecting node, the authentication service node and the lock control node in the blockchain network respectively.
22. A lock control method, comprising:
the terminal receives target information collected by the information collection node from the verification service node;
the terminal generates a lock control instruction according to the target information;
the terminal sends the lock control instruction to a lock control node, and the lock control node is used for controlling a lock according to the lock control instruction;
the terminal, the information acquisition node, the verification service node and the lock control node are distributed nodes in a block chain network, and the distributed nodes are used for recording the target information, the lock control instruction and state information of the lock after the lock control instruction is executed by the lock control node into a block chain.
23. The method of claim 22, wherein the terminal receives the target information collected by the information collecting node from the authentication service node, and comprises:
and when the verification service node determines that the target information is not matched with the user information by comparing the target information acquired by the information acquisition node with the user information prestored in the verification service node, the terminal receives the target information from the verification service node.
24. The method of claim 22, wherein after the terminal sends the lock control instruction to a lock control node, the method further comprises:
and the terminal receives the state information of the lock after the lock control node executes the lock control instruction generated by the terminal.
25. The method according to any one of claims 22-24, wherein the blockchain network further comprises a third party node for storing information broadcast by the information collecting node, the authentication service node and the lock control node in the blockchain network, respectively.
26. The method of claim 25, further comprising:
the terminal sends a query request to the distributed nodes;
and the terminal receives the information recorded in the block chain from the distributed nodes.
27. An authentication service node, characterized in that it comprises means for performing the method of any of claims 1-8.
28. An information collecting node, characterized in that it comprises means for performing the method of any of claims 9-15.
29. A lock control node, characterized by comprising means for performing the method of any one of claims 16-21.
30. A terminal, characterized in that it comprises means for carrying out the method of any one of claims 22 to 26.
31. A communication device comprising a processor and a transceiver, the processor and the transceiver communicating with each other through an internal connection; the processor is configured to perform the processing steps of any of the methods of claims 1-26, and the transceiver is configured to perform the transceiving steps of any of the methods of claims 1-26.
32. A computer-readable storage medium storing a computer program comprising instructions for performing the method of any of claims 1-26.
33. A computer program, characterized in that the computer program comprises instructions for the method of any of claims 1-26.
CN201910670212.3A 2019-07-24 2019-07-24 Lock control method, communication device, communication equipment and storage medium Active CN112365630B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910670212.3A CN112365630B (en) 2019-07-24 2019-07-24 Lock control method, communication device, communication equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910670212.3A CN112365630B (en) 2019-07-24 2019-07-24 Lock control method, communication device, communication equipment and storage medium

Publications (2)

Publication Number Publication Date
CN112365630A true CN112365630A (en) 2021-02-12
CN112365630B CN112365630B (en) 2022-06-14

Family

ID=74516298

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910670212.3A Active CN112365630B (en) 2019-07-24 2019-07-24 Lock control method, communication device, communication equipment and storage medium

Country Status (1)

Country Link
CN (1) CN112365630B (en)

Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106875518A (en) * 2016-06-21 2017-06-20 阿里巴巴集团控股有限公司 The control method of smart lock, device and smart lock
CN107257340A (en) * 2017-06-19 2017-10-17 阿里巴巴集团控股有限公司 A kind of authentication method, authentication data processing method and equipment based on block chain
CN107331012A (en) * 2017-07-04 2017-11-07 济南浪潮高新科技投资发展有限公司 A kind of finger vein gate control system based on block chain
KR101875725B1 (en) * 2017-04-12 2018-07-06 서강대학교산학협력단 Smart door lock system, smart door lock and terminal for controlling the smart door lock
CN108805573A (en) * 2018-04-21 2018-11-13 深圳市元征科技股份有限公司 A kind of Information Authentication method, server and storage medium
CN108806035A (en) * 2018-05-08 2018-11-13 深圳市益鑫智能科技有限公司 A kind of access control system based on block chain
CN109118620A (en) * 2018-07-18 2019-01-01 广州智乐物联网技术有限公司 A kind of fingerprint real-name authentication system based on block chain
CN109168163A (en) * 2018-08-03 2019-01-08 苏州市千尺浪信息科技服务有限公司 A kind of office antitheft security system based on block chain technology
CN109359691A (en) * 2018-10-24 2019-02-19 全链通有限公司 Auth method and system based on block chain
CN109767534A (en) * 2019-01-17 2019-05-17 平安科技(深圳)有限公司 Gate inhibition's access method, system, management terminal and door control terminal based on block chain
CN109828847A (en) * 2019-01-25 2019-05-31 平安科技(深圳)有限公司 Lock processing method, device, computer equipment and storage medium based on block chain
CN109948320A (en) * 2019-03-22 2019-06-28 泰康保险集团股份有限公司 Identity identification managing method, device, medium and electronic equipment based on block chain
KR101997673B1 (en) * 2018-12-06 2019-07-08 주식회사 푸시풀시스템 Digital electronic device based on dual block chain comprising virtual blockchain

Patent Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106875518A (en) * 2016-06-21 2017-06-20 阿里巴巴集团控股有限公司 The control method of smart lock, device and smart lock
KR101875725B1 (en) * 2017-04-12 2018-07-06 서강대학교산학협력단 Smart door lock system, smart door lock and terminal for controlling the smart door lock
CN107257340A (en) * 2017-06-19 2017-10-17 阿里巴巴集团控股有限公司 A kind of authentication method, authentication data processing method and equipment based on block chain
CN107331012A (en) * 2017-07-04 2017-11-07 济南浪潮高新科技投资发展有限公司 A kind of finger vein gate control system based on block chain
CN108805573A (en) * 2018-04-21 2018-11-13 深圳市元征科技股份有限公司 A kind of Information Authentication method, server and storage medium
CN108806035A (en) * 2018-05-08 2018-11-13 深圳市益鑫智能科技有限公司 A kind of access control system based on block chain
CN109118620A (en) * 2018-07-18 2019-01-01 广州智乐物联网技术有限公司 A kind of fingerprint real-name authentication system based on block chain
CN109168163A (en) * 2018-08-03 2019-01-08 苏州市千尺浪信息科技服务有限公司 A kind of office antitheft security system based on block chain technology
CN109359691A (en) * 2018-10-24 2019-02-19 全链通有限公司 Auth method and system based on block chain
KR101997673B1 (en) * 2018-12-06 2019-07-08 주식회사 푸시풀시스템 Digital electronic device based on dual block chain comprising virtual blockchain
CN109767534A (en) * 2019-01-17 2019-05-17 平安科技(深圳)有限公司 Gate inhibition's access method, system, management terminal and door control terminal based on block chain
CN109828847A (en) * 2019-01-25 2019-05-31 平安科技(深圳)有限公司 Lock processing method, device, computer equipment and storage medium based on block chain
CN109948320A (en) * 2019-03-22 2019-06-28 泰康保险集团股份有限公司 Identity identification managing method, device, medium and electronic equipment based on block chain

Also Published As

Publication number Publication date
CN112365630B (en) 2022-06-14

Similar Documents

Publication Publication Date Title
US11951944B2 (en) Localization and passive entry/passive start systems and methods for vehicles
US10965690B2 (en) Method for managing the status of a connected device
CN110868712B (en) Terminal equipment identification method and communication device
EP3923613A1 (en) Device authentication method and apparatus
CN105471890A (en) Unlocking method based on wearable device, apparatus and system
CN110910524B (en) Automatic sign-in system, method, device, electronic equipment and computer storage medium
CN114710524B (en) Data interaction method, device and equipment of in-vehicle local area network and storage medium
CN112365630B (en) Lock control method, communication device, communication equipment and storage medium
CN104715214A (en) Method for locating mobile phones and articles based on double cluster heads
CN109219049B (en) Pseudo base station identification method, pseudo base station identification device and computer readable storage medium
CN116916309A (en) Communication security authentication method, equipment and storage medium
CN109151827B (en) WiFi positioning spoofing detection method and device based on radio frequency fingerprint
CN105939512A (en) Mobile phone and anti-loss system for mobile phone
CN113781695A (en) Access control management method, system, device and computer readable storage medium
KR101131185B1 (en) mobile and service method thereof
CN108848066A (en) A kind of communication means of terminal, terminal and storage medium
CN109195142B (en) NFC data transmission detection method of mobile terminal, mobile terminal and storage medium
CN114726505B (en) Vehicle remote security authentication method and device, storage medium and terminal equipment
US20220417245A1 (en) Authentication system, communication device, information device, and authentication method
CN109845215A (en) A kind of network safety protection method and equipment
CN117643087A (en) Verification method, device, equipment and storage medium
CN115756979A (en) Data processing method, device, equipment and computer readable storage medium
CN117202395A (en) Random access method and device
CN114143333A (en) Method for processing data of prediction machine and centralized prediction machine module
CN117118638A (en) Information verification method, device, equipment and readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant