CN112634493A - Intelligent door lock, terminal equipment, control method of intelligent door lock and storage medium - Google Patents

Intelligent door lock, terminal equipment, control method of intelligent door lock and storage medium Download PDF

Info

Publication number
CN112634493A
CN112634493A CN202011463385.7A CN202011463385A CN112634493A CN 112634493 A CN112634493 A CN 112634493A CN 202011463385 A CN202011463385 A CN 202011463385A CN 112634493 A CN112634493 A CN 112634493A
Authority
CN
China
Prior art keywords
card
data
door lock
check
verification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202011463385.7A
Other languages
Chinese (zh)
Other versions
CN112634493B (en
Inventor
李先极
何国泽
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Qingdao Hisense Smart Life Technology Co Ltd
Original Assignee
Qingdao Hisense Smart Life Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Qingdao Hisense Smart Life Technology Co Ltd filed Critical Qingdao Hisense Smart Life Technology Co Ltd
Priority to CN202011463385.7A priority Critical patent/CN112634493B/en
Publication of CN112634493A publication Critical patent/CN112634493A/en
Application granted granted Critical
Publication of CN112634493B publication Critical patent/CN112634493B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00182Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with unidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00896Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses
    • G07C9/00904Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses for hotels, motels, office buildings or the like

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The embodiment of the application provides an intelligent door lock, a terminal device, a control method of the intelligent door lock and a storage medium. And in the case of failure of the verification, verifying the second verification data of the target door card. And if the second check data is successful, executing unlocking operation, namely, when the first check data of the door card is not stored in the intelligent door lock due to network abnormality, executing the check operation aiming at the second check data of the target door card, and judging whether to execute the unlocking operation according to a check result. Therefore, the problem that related services cannot be developed due to the fact that an intelligent system is paralyzed and cannot normally operate when the network is abnormal in the related technology is solved.

Description

Intelligent door lock, terminal equipment, control method of intelligent door lock and storage medium
Technical Field
The application relates to the technical field of intelligent equipment, in particular to an intelligent door lock, terminal equipment, a control method of the intelligent door lock and a storage medium.
Background
With the rapid development of the internet, the number of smart hotels increases. The intelligent Hotel (Smart Hotel) is a complete intelligent system, and services such as accommodation, catering and the like of the Hotel can be realized only through a network. In the related technology, the smart hotel adopts a write lock mode to remotely issue cards and has the advantages of remote check-in, remote loss reporting, quick card selling and the like. When the network is abnormal, the intelligent system is paralyzed and cannot normally operate, so that related services cannot be developed.
Disclosure of Invention
The application aims to provide an intelligent door lock, a terminal device, a control method of the intelligent door lock and a storage medium, and aims to solve the problem that related services cannot be developed due to the fact that an intelligent system is paralyzed and cannot normally run when a network is abnormal in the related technology.
In a first aspect, the present application provides an intelligent door lock, comprising: a memory and a controller, wherein:
the memory for storing a computer program executable by the controller;
the controller is connected with the memory and is configured to:
acquiring first verification data from a target door card, and performing verification operation on the first verification data;
if the first check data fails to be checked, checking second check data in the target door card;
and if the second check data passes the check, executing unlocking operation.
In some possible embodiments, the smart door lock stores a loss report list recording loss reports, and the controller, before performing the verification operation on the first verification data, is further configured to:
and if the first verification data of the target door card is in the loss report list, outputting prompt information for indicating unlocking failure.
In some possible embodiments, if the first check-up data is not in the loss report list, the controller is further configured to:
identifying the card type of the target door card, and if the card type does not meet the preset card type capable of opening the intelligent door lock, outputting prompt information for indicating unlocking failure;
and if the card type is the preset card type, executing the step of carrying out the verification operation on the first verification data.
In some possible embodiments, the second check-up data includes room information and a validity period corresponding to the target door card, and the controller, when performing the check-up operation on the second check-up data, is configured to:
if the room information is inconsistent with the room information corresponding to the intelligent door lock, determining that the second check data fails to check;
if the room information is consistent with the room information corresponding to the intelligent door lock, acquiring the current time, and if the current time is within the validity period, determining that the second check data passes the check;
if the current time is not within the validity period, determining that the second check data fails to be checked;
the controller is further configured to:
and if the second check data fails to check, outputting prompt information for indicating the failure of unlocking.
In some possible embodiments, the smart door lock stores a set of available cards, and the controller, when performing the verification operation on the first verification data, is configured to:
checking whether the first check data is in the available card set;
if the first verification data is not in the available card set, determining that the verification of the first verification data fails;
if the first verification data is in the available card set, determining that the first verification data passes verification;
if the first check data fails to check and the second check data passes, the controller is further configured to:
updating the first verification data into the set of available cards; and the number of the first and second electrodes,
and updating the second check data into the intelligent door lock.
In some possible embodiments, the controller is further configured to:
removing the door card information of the target door card stored in the intelligent door lock in response to a card canceling instruction aiming at the target door card and sent by the intelligent door lock; wherein the door card information comprises the first verification data and the second verification data of the target door card;
and sending the operation result of the removing operation to the intelligent door lock.
In some possible embodiments, the controller is further configured to:
and for each piece of stored door card information, if the door card information exceeds the corresponding validity period, removing the door card information.
In a second aspect, the present application provides a terminal device, where a target door card stores first verification data, and the terminal device includes: a display, a memory, and a controller, wherein:
the display is used for displaying information;
the memory for storing a computer program executable by the controller;
the controller, connected to the display and the memory, configured to:
responding to user operation, and obtaining second check data of the target door card;
and writing the second check data into the target door card, so that the second check data of the target door card is checked after the intelligent door lock fails to check the first check data.
In some possible embodiments, before the controller performs writing the second check-up data into the target door card, the controller is further configured to:
sending the first verification data to the intelligent door lock:
the controller performs the writing of the second check-up data into the target door card, configured to:
and if the first check data are determined not to be successfully written into the intelligent door lock, writing the second check data into the target door card.
In a third aspect, the present application further provides a control method for an intelligent door lock, which is applied to the intelligent door lock, and the method includes:
acquiring first verification data from a target door card, and performing verification operation on the first verification data;
if the first check data fails to be checked, checking second check data in the target door card;
and if the second check data passes the check, executing unlocking operation.
In some possible embodiments, a loss report list for recording loss report cards is stored in the intelligent door lock, and before the verifying operation is performed on the first verification data, the method further includes:
and if the first verification data of the target door card is in the loss report list, outputting prompt information for indicating unlocking failure.
In some possible embodiments, if the first check-up data is not in the loss report list, the method further includes:
identifying the card type of the target door card, and if the card type does not meet the preset card type capable of opening the intelligent door lock, outputting prompt information for indicating unlocking failure;
and if the card type is the preset card type, executing the step of carrying out the verification operation on the first verification data.
In some possible embodiments, the second check-up data includes room information and a validity period corresponding to the target door card, and performing the check-up operation on the second check-up data includes:
if the room information is inconsistent with the room information corresponding to the intelligent door lock, outputting prompt information for indicating unlocking failure;
if the room information is consistent with the room information corresponding to the intelligent door lock, acquiring the current time, and if the current time is within the validity period, determining that the second check data passes the check;
if the current time is not within the validity period, determining that the second check data fails to be checked;
the method further comprises the following steps:
and if the second check data fails to check, outputting prompt information for indicating the failure of unlocking.
In some possible embodiments, the smart door lock stores a set of available cards, and the performing the verification operation on the first verification data includes:
checking whether the first check data is in the available card set;
if the first verification data is not in the available card set, determining that the verification of the first verification data fails;
if the first verification data is in the available card set, determining that the first verification data passes verification;
if the first check data fails to be checked and the second check data passes the check, the method further comprises:
updating the first verification data into the set of available cards; and the number of the first and second electrodes,
and updating the second check data into the intelligent door lock.
In some possible embodiments, the method further comprises:
removing the door card information of the target door card stored in the intelligent door lock in response to a card canceling instruction aiming at the target door card and sent by terminal equipment; wherein the door card information comprises the first verification data and the second verification data of the target door card;
and sending the operation result of the removing operation to the terminal equipment.
In some possible embodiments, the method further comprises:
and for each piece of stored door card information, if the door card information exceeds the corresponding validity period, removing the door card information.
In a fourth aspect, the present application further provides a control method for an intelligent door lock, which is applied to a terminal device, and the method includes:
responding to user operation, and obtaining second check data of the target door card;
and writing the second check data into the target door card, so that the second check data of the target door card is checked after the intelligent door lock fails to check the first check data.
In some possible embodiments, before writing the second parity data into the target door card, the method further comprises:
sending the first verification data to the intelligent door lock:
the controller performs the writing of the second check-up data into the target door card, configured to:
and if the first check data are determined not to be successfully written into the intelligent door lock, writing the second check data into the target door card.
In a fifth aspect, another embodiment of the present application further provides a computer storage medium storing a computer program, where the computer program is used to make a computer execute the method of the third aspect and/or the fourth aspect provided by the embodiment of the present application.
According to the embodiment of the application, after the intelligent door lock identifies the first verification data of the target door card, verification operation is carried out on the first verification data. And in the case of failure of the verification, verifying the second verification data of the target door card. And if the second check data is successful, executing unlocking operation, namely, when the first check data of the door card is not stored in the intelligent door lock due to network abnormality, executing the check operation aiming at the second check data of the target door card, and judging whether to execute the unlocking operation according to a check result. Therefore, the problem that related services cannot be developed due to the fact that an intelligent system is paralyzed and cannot normally operate when the network is abnormal in the related technology is solved.
Additional features and advantages of the application will be set forth in the description which follows, and in part will be obvious from the description, or may be learned by the practice of the application. The objectives and other advantages of the application may be realized and attained by the structure particularly pointed out in the written description and claims hereof as well as the appended drawings.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings needed to be used in the embodiments of the present application will be briefly described below, and it is obvious that the drawings described below are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
FIG. 1a is a schematic illustration of an application environment according to one embodiment of the present application;
FIG. 1b is a block diagram of a hardware configuration of the smart door lock 100 of FIG. 1a according to an embodiment of the present application;
fig. 1c is a block diagram of a hardware configuration of the terminal device 200 in fig. 1a according to an embodiment of the present application;
FIG. 1d is a block diagram of the server 300 of FIG. 1a according to one embodiment of the present application;
fig. 2 is an overall flowchart of a control method of an intelligent door lock according to some embodiments of the present application;
fig. 3 is a flowchart illustrating that the control method for the intelligent door lock according to some embodiments of the present application is applied to the intelligent door lock;
fig. 4 is a flowchart illustrating that a control method of an intelligent door lock according to some embodiments of the present application is applied to a terminal device.
Detailed Description
The technical solutions in the embodiments of the present application will be described in detail and clearly with reference to the accompanying drawings. In the description of the embodiments of the present application, "/" means or, unless otherwise stated, for example, a/B may mean a or B; "and/or" in the text is only an association relationship describing an associated object, and means that three relationships may exist, for example, a and/or B may mean: three cases of a alone, a and B both, and B alone exist, and in addition, "a plurality" means two or more than two in the description of the embodiments of the present application.
In the description of the embodiments of the present application, the term "plurality" means two or more unless otherwise specified, and other terms and the like should be understood as being equivalent to those of the preferred embodiments described herein for the purpose of illustration and explanation only, and not limitation, and features in the embodiments and examples of the present application may be combined with each other without conflict.
To further illustrate the technical solutions provided by the embodiments of the present application, the following detailed description is made with reference to the accompanying drawings and the detailed description. Although the embodiments of the present application provide method steps as shown in the following embodiments or figures, more or fewer steps may be included in the method based on conventional or non-inventive efforts. In steps where no necessary causal relationship exists logically, the order of execution of the steps is not limited to that provided by the embodiments of the present application. The method can be executed in the order of the embodiments or the method shown in the drawings or in parallel in the actual process or the control device.
Additional features and advantages of the application will be set forth in the description which follows, and in part will be obvious from the description, or may be learned by the practice of the application. The objectives and other advantages of the application may be realized and attained by the structure particularly pointed out in the written description and claims hereof as well as the appended drawings.
The inventor has found that the existing remote card issuing technology transmits the SN Number (Serial Number) of the house card and the validity period of the check-in to the smart door lock (i.e., remote write lock) through the network. When the intelligent door lock checks the house card, if the SN number of the house card is identified to be the same as the SN number prestored in the door lock and the current time is within the validity period of entering residence, the unlocking operation can be executed. However, the remote lock writing technology is too dependent on the stability of the network, and when the network is abnormal, the related information of the house card cannot be stored in the intelligent door lock. That is, in the intelligent door lock, the house card cannot be checked because the related information of the house card is not stored, and before the network problem is repaired in the aspect of a hotel, the intelligent system is paralyzed and cannot normally operate, so that related services cannot be developed, and the check-in experience of a user is influenced. In order to solve the above problems, the inventive concept of the present application is: when the network is normal, the intelligent system can complete the related business in a remote write lock mode when the intelligent system can normally run. When the network is abnormal, the provided alternative scheme can complete the related service through foreground local operation. For example, in the embodiment of the present application, the remote write lock performs verification by using first verification data, such as an SN number of a door card, and in the card issuing stage, second verification data is added to the target door card in a card writing manner, where the second verification data may include room information for check-in and a validity period for check-in, for example. When the intelligent door lock checks the target door card, first checking data is checked, if the first checking data passes the checking, unlocking operation is executed, if the first checking data does not pass the checking, second checking data in the door card can be checked, and if the second checking data passes the checking, the unlocking operation is executed. The first check data can be used as the first identity information of the door card, the second check data can be used as the second identity information of the door card by necessary information stored in the intelligent door lock, and a double identity verification mode is realized for the check of the second check data, so that the situation that the check operation cannot be executed on the house card due to the fact that the related information of the door card is not stored in the intelligent door lock can be avoided through the method. By the method, the problem that related services cannot be developed due to the fact that an intelligent system is paralyzed and cannot normally operate when the network is abnormal in the related technology can be solved as much as possible.
It should be noted that the control method for the intelligent door lock provided by the embodiment of the application is not only suitable for hotels, but also suitable for access control management of communities, that is, the internet technology is adopted for remote lock writing, and the application scene of unlocking by using a door card is all suitable for the embodiment of the application.
The following describes a control method of an intelligent door lock according to an embodiment of the present application, with reference to an intelligent system of a smart hotel as an example.
Referring to fig. 1a, the application environment may include, for example, a network 10, an intelligent door lock 100, a terminal device 200, and a server 300. Wherein: the server 300 may be a cluster of servers in a distributed system or a server in a single system.
The terminal device 200 transmits data for storage into the smart door lock 100 to the server 300 through the network 10, and the server 300 performs a detection operation for the data according to internally set detection logic after receiving the data. After detecting the detection result that the data is allowed to be issued to the intelligent door lock 100, the data is transmitted to the intelligent door lock 100 through the network 10.
In some possible embodiments, the hotel manager issues an update instruction to the intelligent door lock 100 through the terminal device 200. The terminal device 100 transmits data for update (such as a room entry validity period) to the server 300 via the network 10 in response to the update instruction. The server 300 performs a verification operation on the data, and sends the data to the intelligent door lock 100 through the network 10 after determining that the data is correct.
In some possible embodiments, the smart door lock 100 has a voice function, and when the door card is verified, if it is recognized that the door card has no unlocking authority, a prompt voice indicating that the unlocking is failed is output.
In some possible embodiments, the smart door lock 100 may further include a display screen, and when it is recognized that the door card has no unlocking right, a prompt message indicating that the unlocking has failed is output to the display screen. Of course, the prompt information may also be prompted in an audio manner or a light manner, for example, a red light indicates an error, and the specific prompt method is not limited in this application.
In the description of the present application, only a single server, a single intelligent door lock, or a terminal device is described in detail, but it should be understood by those skilled in the art that the intelligent door lock 100, the terminal device 200, and the server 300 shown in fig. 1a are intended to indicate that the intelligent door lock related to the technical solution of the present application is a door lock of a room-side door, the server is at least one of integrated servers in a distributed system, and the related terminal device may be a terminal device having a page display function and an instruction issuing function, such as a laptop, a desktop, a mobile phone, and the like. The detailed description of the single intelligent door lock, the single terminal device and the single server is for convenience of illustration only and does not imply any limitation on the number, types or locations of the intelligent door lock, the terminal device and the server.
A block diagram of one configuration of the intelligent door lock 100 is illustrated in fig. 1 b. As shown in fig. 1b, the smart door lock 100 includes a controller 110, a memory 120, a communicator 130, and a power supply 160.
The controller 110 includes a Random Access Memory (RAM)111, a Read Only Memory (ROM)112, a processor 113, a communication interface, and a communication bus. The controller 110 is used to control the operation of the intelligent door lock 100, the communication cooperation among the internal components, and the external and internal data processing functions.
In some possible embodiments, when the smart door lock 100 performs the verification operation on the first verification data of the target door card, the controller 110 performs the verification operation on the data. And if the verification fails, performing verification operation on second verification data of the target door card, and if the verification passes on the second verification data, performing unlocking operation.
And a memory 120 for storing various operation programs, data and applications for driving and controlling the intelligent door lock 100 under the control of the controller 110. The memory 120 may store various control signal commands input by a user.
The communicator 130 enables communication of control signals and data signals with the terminal device 200 under the control of the controller 110. Such as: the intelligent door lock 100 transmits a control signal (e.g., a touch signal or a control signal) to the terminal device 200 via the communicator 130, and the intelligent door lock 100 may receive the signal transmitted by the terminal device 200 via the communicator 130. The communicator 130 may include an infrared signal interface 131 and a radio frequency signal interface 132. For example: when the infrared signal interface is used, the user input instruction needs to be converted into an infrared control signal according to an infrared control protocol, and the infrared control signal is sent to the terminal device 200 through the infrared sending module. The following steps are repeated: when the rf signal interface is used, a user input command needs to be converted into a digital signal, and then the digital signal is modulated according to the rf control signal modulation protocol and then transmitted to the terminal device 200 through the rf transmitting terminal.
The user input interface 140 may include at least one of a microphone 141, a touch pad 142, a sensor 143, a key 144, and the like, so that the user can input a user instruction to the smart door lock 100 through voice, touch, gesture, press, and the like. For example, the maintenance person may input a designated password to the smart door lock 100 through the button 144, and the smart door lock 100 performs a shutdown operation in response to a maintenance instruction after receiving the password.
The user output interface 150 outputs the execution result of the user instruction received by the smart door lock 100 to the terminal device 200, or outputs the execution result in the form of an image or a voice signal. Here, the user output interface 150 may include an LED interface 151, a vibration interface 152 generating vibration, a sound output interface 153 outputting sound, a display 154 outputting images, and the like.
In some possible embodiments, when the smart door lock 100 performs the verification operation on the first verification data of the target door card, the controller 110 detects that the first verification data of the target door card is the same as the first verification data stored in the local storage 120. The controller 110 controls the user output interface 150 to output a prompt voice of success of unlocking and performs an unlocking operation.
And a power supply 160 for providing operation power support for the components of the intelligent door lock 100 under the control of the controller 110. In the form of a battery and associated control circuitry.
A hardware configuration block diagram of the terminal device 200 is exemplarily shown in fig. 1 c. As shown in fig. 1c, the terminal device 200 may include therein a tuner demodulator 210, a communicator 220, a detector 230, an external device interface 240, a controller 250, a memory 260, a user interface 265, a video processor 270, a display 275, a rotating component 276, an audio processor 280, an audio output interface 285, and a power supply 290.
The rotating assembly 276 may also include other components, such as a transmission component, a detection component, and the like. Wherein, the transmission component can adjust the rotating speed and the torque output by the rotating component 276 through a specific transmission ratio, and can be in a gear transmission mode; the detection means may be composed of a sensor, such as an angle sensor, an attitude sensor, or the like, provided on the rotation shaft. These sensors may detect parameters such as the angle of rotation of the rotating member 276 and transmit the detected parameters to the controller 250, so that the controller 250 can judge or adjust the state of the terminal apparatus 200 according to the detected parameters. In practice, rotating assembly 276 may include, but is not limited to, one or more of the components described above.
The tuner/demodulator 210 receives the broadcast signal in a wired or wireless manner, may perform modulation/demodulation processing such as amplification, mixing, and resonance, and is configured to demodulate an audio/video signal carried in a frequency selected by a user and additional information (e.g., EPG data) from a plurality of wireless or wired broadcast signals.
The communicator 220 is a component for communicating with an external device or an external server according to various communication protocol types. For example, the terminal device 200 may transmit content data to an external device connected via the communicator 220, or browse and download content data from an external device connected via the communicator 220. The communicator 220 may include a network communication protocol module or a near field communication protocol module, such as a WIFI module 221, a bluetooth communication protocol module 222, and a wired ethernet communication protocol module 223, so that the communicator 220 may receive a control signal of the intelligent door lock 100 according to the control of the controller 250, and implement the control signal as a WIFI signal, a bluetooth signal, a radio frequency signal, and the like.
The detector 230 is a component of the smart terminal 200 for collecting signals of an external environment or interaction with the outside. The detector 230 may include a sound collector 231, such as a microphone, which may be used to receive the sound of the user, such as a voice signal of a control instruction of the user controlling the terminal device 200; or, the environmental sound for identifying the environmental scene type may be collected, so that the terminal device 200 may adapt to the environmental noise.
In some possible embodiments, the detector 230, which may further include an image collector 232, such as a camera, a video camera, etc., may be configured to collect external environment scenes to adaptively change the display parameters of the terminal device 200; and the function of acquiring the attribute of the user or interacting gestures with the user so as to realize interaction between the terminal equipment and the user.
The external device interface 240 is a component for providing the controller 250 to control data transmission between the terminal apparatus 200 and an external apparatus. The external device interface 240 may be connected to an external apparatus such as a set-top box, a game device, a notebook computer, etc. in a wired/wireless manner, and may receive data such as a video signal (e.g., moving image), an audio signal (e.g., music), additional information (e.g., EPG), etc. of the external apparatus.
The controller 250 controls the operation of the terminal device 200 and responds to the operation of the user by running various software control programs (such as an operating system and various application programs) stored on the memory 260.
Controller 250 includes, among other things, Random Access Memory (RAM)251, Read Only Memory (ROM)252, graphics processor 253, CPU processor 254, communication interface 255, and communication bus 256. The RAM251, the ROM252, the graphic processor 253, and the CPU processor 254 are connected to each other through a communication bus 256 through a communication interface 255.
The ROM252 stores various system boot instructions. If the terminal apparatus 200 starts the power-on upon receiving the power-on signal, the CPU processor 254 executes the system boot instruction in the ROM252, and copies the operating system stored in the memory 260 to the RAM251 to start the running of the boot operating system. After the start of the operating system is completed, the CPU processor 254 copies the various application programs in the memory 260 to the RAM251 and then starts running and starting the various application programs.
And a graphic processor 253 for generating various graphic objects such as icons, operation menus, and user input instruction display graphics, etc. The graphic processor 253 may include an operator for performing an operation by receiving various interactive instructions input by a user, and further displaying various objects according to display attributes; and a renderer for generating various objects based on the operator and displaying the rendered result on the display 275.
A CPU processor 254 for executing operating system and application program instructions stored in memory 260. And according to the received user input instruction, processing of various application programs, data and contents is executed so as to finally display and play various audio-video contents.
The communication interface 255 may include a first interface to an nth interface. These interfaces may be network interfaces that are connected to external devices via a network.
The controller 250 may control the overall operation of the terminal device 200. For example: in response to receiving a user input command for selecting a GUI object displayed on the display 275, the controller 250 may perform an operation related to the object selected by the user input command.
Where the object may be any one of the selectable objects, such as a hyperlink or an icon. The operation related to the selected object is, for example, an operation of displaying a link to a hyperlink page, document, image, or the like, or an operation of executing a program corresponding to the object. The user input command for selecting the GUI object may be a command input through various input means (e.g., a mouse, a keyboard, a touch panel, etc.) connected to the terminal apparatus 200 or a voice command corresponding to a voice spoken by the user.
The memory 260 stores various types of data, software programs, or applications that drive and control the operation of the terminal device 200. The memory 260 may include volatile and/or nonvolatile memory. And the term "memory" includes the memory 260, the RAM251 and the ROM252 of the controller 250, or a memory card in the terminal device 200.
In one embodiment provided herein, the controller 250 is configured to obtain second verification data of the target door card in response to a user operation;
the controller 250 writes the second verification data into the target door card in a card writing manner, so that the smart door lock 100 performs a verification operation on the second verification data of the target door card after the verification of the first verification data fails.
A block diagram of the hardware configuration of the server 300 is illustrated in fig. 1 d. As shown in FIG. 1d, the components of server 300 may include, but are not limited to: at least one processor 131, at least one memory 132, and a bus 133 that connects the various system components (including the memory 132 and the processor 131).
Bus 133 represents one or more of any of several types of bus structures, including a memory bus or memory controller, a peripheral bus, a processor, or a local bus using any of a variety of bus architectures.
The memory 132 may include readable media in the form of volatile memory, such as Random Access Memory (RAM)1321 and/or cache memory 1322, and may further include Read Only Memory (ROM) 1323.
Memory 132 may also include a program/utility 1325 having a set (at least one) of program modules 1324, such program modules 1324 including, but not limited to: an operating system, one or more application programs, other program modules, and program data, each of which, or some combination thereof, may comprise an implementation of a network environment.
The server 300 may also communicate with one or more external devices 134 (e.g., keyboard, pointing device, etc.), with one or more devices that enable a user to interact with the server 300, and/or with any devices (e.g., router, modem, etc.) that enable the server 300 to communicate with one or more other electronic devices. Such communication may occur via input/output (I/O) interfaces 135. Further, server 300 may also communicate with one or more networks (e.g., a Local Area Network (LAN), a Wide Area Network (WAN) and/or a public network, such as the Internet) via network adapter 136. As shown, network adapter 136 communicates with the other modules for server 300 over bus 133. It should be understood that although not shown in the figures, other hardware and/or software modules may be used in conjunction with the server 300, including but not limited to: microcode, device drivers, redundant processors, external disk drive arrays, RAID systems, tape drives, and data backup storage systems, among others.
In some embodiments, various aspects of a control method of an intelligent door lock provided by the present application may also be implemented in the form of a program product, which includes program code for causing a computer device to execute the steps in the processing method of an intelligent door lock according to various exemplary embodiments of the present application described above in this specification when the program product runs on the computer device.
The program product may employ any combination of one or more readable media. The readable medium may be a readable signal medium or a readable storage medium. A readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples (a non-exhaustive list) of the readable storage medium include: an electrical connection having one or more wires, a portable disk, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
The program product for control of an intelligent door lock of the embodiments of the present application may employ a portable compact disc read only memory (CD-ROM) and include program code, and may be run on an electronic device. However, the program product of the present application is not limited thereto, and in this document, a readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
A readable signal medium may include a propagated data signal with readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A readable signal medium may also be any readable medium that is not a readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device.
Program code embodied on a readable medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
After the intelligent door lock device, the terminal device and the server related to the application are integrally introduced, the intelligent hotel is taken as an application scene, and the control method of the intelligent door lock provided by the application is further explained. Fig. 2 is a schematic flow chart illustrating a control method of an intelligent door lock according to an embodiment of the present application, and the control method of the intelligent door lock according to the embodiment of the present application is described with an intelligent hotel as an example. The method comprises a terminal device 200a, an intelligent door lock 200b and a server 200c, wherein the complete process of the user for entering the hotel is approximate, and after the user arranges a room for entering, a card for entering the room is made for the user in the aspect of the hotel. The intelligent door lock can be opened by the house card after the house card is checked through the intelligent door lock of the living room. When the user leaves the house, the hotel party can sell the house card. Based on the above flow, the following four parts, namely, making a check-in house card, continuing the house card, checking the house card, and selling the house card, are respectively used to explain the control method of the intelligent door lock provided by the application, including:
part 1: making house card
The house card used when the user enters the hotel is made of a blank door card of which the card type is an 'empty card' type. Each blank door card carries its own SN number. When the user transacts the check-in service, the hotel selects a blank door card as the target door card, and the terminal device 200a identifies the SN number of the target door card. After the terminal device 200a recognizes the SN number of the target door card, the SN number may be used as first verification data of the target door card, and certainly, other data that may be used to represent the identity of the target door card may also be used as the first verification data in the implementation. The terminal device 200a uses the room information of the user's check-in and the valid period of the check-in as the second check-up data of the target door card, and certainly, other information may be used to represent the identity information of the house card, that is, the house card in the embodiment of the present application may have two kinds of identity information, one is the first check-up data, and the other is the second check-up data. In step 201: the terminal device 200a transmits the door card information of the target door card to the server 200 c. The door card information is the first check data and the second check data of the target door card.
After receiving the door card information issued by the terminal device 200a, the server 200c, in step 202, performs: and checking whether the target door card is a loss report card.
In some possible embodiments, the server 200c stores the SN number of the loss report house card in advance, and is used to check whether the target door card is a loss report card. The server 200c reads the first verification data of the target door card from the door card information, and compares the first verification data (such as an SN number) with a loss report card list locally stored in the server 200 c. If the first verification data is in the loss report card list, it indicates that the target door card is a lost door card and cannot be used to make a new house card, and at this time, the server 200c performs step 203: and sending indication information for indicating card sending rejection to the terminal equipment 200a, wherein the indication information can inform that the card cannot be written due to the fact that the door card is reported to be lost, so that a user can know the reason for rejecting the card sending and take corresponding countermeasures. If the first check data is not in the loss report card list, the target door card can be used for making a new house card. At this time, server 200c executes step 204: the first verification data of the target door card is sent to the smart door lock 200 b.
In some possible embodiments, after determining that the first check data of the target door card is stored in the local loss report card list, the server 200c sends an indication indicating that the door card is lost to the terminal device 200a, and adds the notification information carrying that the target door card is a loss report door card to the indication. By the indication, the hotel manager can timely find that the target door card is a lost door card and timely issue a new blank door card for manufacturing the house card.
After receiving the first verification data of the target door card in step 205, the smart door lock 200b stores the first verification data of the target door card locally, and sends feedback information on whether the first verification data of the target door card is successfully stored to the terminal device 200 a.
When the network is abnormal, it is considered that the first verification data of the target door card may not be successfully written to the smart door lock 200 b. In order to enable the target door card to be normally used even under the condition of network abnormality, the embodiment of the application adds the door card information of the target door card into the target door card in a card writing mode. That is, regardless of whether the smart door lock 200b successfully performs step 205, or the terminal device 200a does not successfully write the first verification data of the target door card in the smart door lock 200b in step 206: and adding the second check-up data of the target door card into the target door card. Through the above manner, under the condition of network abnormality, the intelligent door lock 200b can still execute the verification operation on the second verification data in the target door card, and judge whether to execute the unlocking operation according to the verification result.
In some possible embodiments, when the first verification data of the target door card is other identification information used for representing the target door card, such as a version number generated by the card reader according to the SN number, in step 206, the first verification information and the second verification information (i.e., the door card information) of the target door card need to be added to the target door card.
In addition, considering the types of cards used in existing hotel management, there are roughly classified into a house card for use by a resident user, a loss report card for loss without recovery, and a general card for use by a hotel manager (the general card can open all aspects of rooms in the hotel to make emergency back-up). In order to improve the verification process, when the terminal device 200a adds the second verification data of the target door card to the target door card, a preset card type may be set for the target door card. The smart door lock 200b needs to perform a verification operation on the first verification data of the target door card only when the card type of the target door card is recognized as the preset card type. When the preset card type is set, the preset card type can be determined as a house card and a general card.
In some possible embodiments, if the terminal device 200a does not receive the feedback information sent by the smart door lock 200b within the preset feedback time, it indicates that the smart door lock 200b fails to successfully store the first verification data of the target door card due to the network anomaly, or the smart door lock 200b fails to write the first verification data of the target door card into the smart door lock due to the network anomaly, or the received smart door lock feedback information indicates that the writing of the first verification data fails. In order to ensure that the target door card can be normally used, the second check data of the target door card can be written into the target door card in a card writing mode, and the card type of the target door card is updated to be the preset card type.
In addition, in order to further increase the security of the process of manufacturing the house card, a verification password may be preset in the target door card, and when the card writing operation is performed on the target door card, the verification operation needs to be performed on the verification password preset in the target door card in advance. If the password input during the verification is consistent with the preset verification password, card writing operation can be executed aiming at the target door card. And if the input password is inconsistent with the preset verification password, the card writing operation cannot be executed aiming at the target door card.
Part 2: house card verification
When the target door card is used for unlocking, the intelligent door lock 200b can recognize the door card information carried in the target door card. For example, in step 207, the smart door lock 200b performs a verification operation on the first verification data in the door card information, and if the smart door lock 200b identifies the first verification data of the target door card in the locally stored door card information, it indicates that the verification of the first verification data of the target door card is successful, and at this time, the smart door lock 200b performs an unlocking operation.
If the first verification data of the target door card is not identified in the locally stored door card data of the smart door lock 200b, it indicates that the first verification data verification for the target door card fails. At this time, cases causing a verification failure are classified into the following two types:
in case 1, the target door card is not a room card of a room corresponding to the smart door lock 200 b;
in case 2, the first verification data of the target door card is not successfully stored in the smart door lock 200b due to the network abnormality.
In consideration of the fact that the hotel guest room can still be opened by the lost house card in the actual application scene, in order to ensure the safety problem, a lost card list for recording the lost card is prestored in the intelligent door lock 200b, and first verification data of the lost house card is stored in the lost card list. Before the verification operation is performed on the first verification data of the target door card, the intelligent door lock 200b performs a retrieval operation on the loss report card list, if the first verification data of the target door card is in the loss report card list, the target door card is the loss report card, and at this time, the intelligent door lock 200b outputs prompt information for indicating that the unlocking is failed.
In some possible embodiments, when the smart door lock 200b recognizes that the target door card is a loss-reported door card, the current time is automatically recorded, and the usage record of the loss-reported door card is sent to the terminal device 200a according to the current time and the room information corresponding to the smart door lock 200b, so as to be referred by the hotel manager. This information may be, for example, April B, day C; a, b minutes, c seconds, a lost house card with SN number 00xx1 is used in the 033 room.
In order to further ensure the security problem, the smart door lock 200b has a function of detecting the card type of the target door card, and in the implementation, the door card with the preset card type can be preset to open the room corresponding to the smart door lock 200 b. The preset card type can be a house card, a general card and the like. If the smart door lock 200b does not recognize the first verification data of the target door card in the loss report card list, the card type of the target door card is recognized. And if the card type of the target door card is the house card, performing verification operation aiming at the second verification data of the target card. And if the card type of the target door card is the master card, executing unlocking operation. And if the card type of the target door card is not the preset card type, outputting prompt information for indicating unlocking failure.
When the first verification data for the target door card in step 207 fails to be verified, the smart door lock 200b performs a verification operation for the second verification data of the target door card. In implementation, the execution time for reading the first check data and the second check data from the target door card can be set according to actual requirements. For example, the first check data and the second check data may be read simultaneously, or the first check data may be read first for checking, and the second check data may be read when the checking fails.
The intelligent door lock 200b stores the room information corresponding to the door lock in advance, and when the second verification data of the target door card is verified, the intelligent door lock 200b first executes step 208: and checking the room information in the second checking data of the target door card, if the room information of the target door card is inconsistent with the room information prestored in the intelligent door lock, indicating that the target door card is not the room card of the room corresponding to the intelligent door lock 200b, and outputting prompt information for indicating unlocking failure by the intelligent door lock 200 b. In addition, in addition to checking the room information of the target door card, it is also necessary to check whether the target door card is within the lifetime. Therefore, the smart door lock 200b can verify the validity period in the second verification data of the target door card in step 209. It should be noted that, the present application is not limited to the above-mentioned flow for the execution sequence of verifying the room credit and the validity period in the second verification data of the target door card. After the second check data of the target door card are identified, the room information and the validity period of the target door card can be simultaneously verified, and the verification sequence can be set according to actual requirements.
In some possible embodiments, the smart door lock 200b identifies the current time in the local time counting device, and if the current time is within the validity period of the target door card, it indicates that the target door card has not expired, and then performs the unlocking operation. If the current time is not within the valid period of the target door card, it indicates that the target door card is the card of the room corresponding to the smart door lock 200b, but the card has exceeded the check-in period. At this time, the smart door lock 200b outputs a prompt message indicating that the unlocking has failed. The method can further improve the verification process aiming at the target card.
Through the contents in the above steps 207 to 209, it can be realized that when the smart door lock 200b does not locally store the door card information of the target door card due to a network anomaly, the second verification data of the target door card can still be verified, and whether to execute the unlocking operation is determined according to the verification result. Further, in order to save the verification process, when the smart door lock 200b successfully verifies the second verification data of the target door card, the door card information of the target door card may be stored locally. When the target door card is verified next time, the unlocking operation can be executed after the first verification data of the target door card is verified.
In some possible embodiments, the smart door lock 200b is pre-stored with a set of available cards having stored therein door card information for each house card that is capable of opening the smart door lock 200 b. In step 207, a verification operation is performed on the first verification data of the target door card, and if it is identified that the first verification data of the target door card is in the available card set, it is determined that the verification of the first verification data of the target door card is successful, and at this time, the smart door lock 200b performs an unlocking operation. If the smart door lock 200b does not recognize the first verification data of the target door card in the available card set, it indicates that the verification of the first verification data of the target door card fails, and at this time, in step 208, a verification operation is performed on the second verification data of the target door card. And if the second check data aiming at the target door card is successfully checked, updating the door card information of the target door card into the available card set.
Part 3: house card continuous live
When the stay service is executed for the living room, the terminal device 200a, in response to the stay instruction, executes step 210: the validity period after the target door card is continuously held is transmitted to the smart door lock 200 b. After receiving the valid period after the target door card continues to be held, the smart door lock executes step 211: and updating the valid period after the persistence to the local. Considering that the abnormal network may result in the failure of the smart door lock 200b to successfully receive the valid period of the target door card after the target door card is held, or the failure of the smart door lock 200b to update the valid period to the local. Based on the above card writing operation, the verification process of the intelligent door lock 200b on the target door card can be solved under the abnormal condition of the network. Therefore, when the network is abnormal, the smart terminal 200a performs step 212: and writing the valid period of the target door card after the target door card is continuously held into the target door card through equipment with a card writing function, such as a card reader.
In some possible embodiments, the terminal device presets a persistence time, and if the terminal device does not receive the prompt information, which is fed back by the smart door lock 200b and used for indicating that the validity period of the target door card is updated successfully, after issuing the validity period after the target door card is persisted to the smart door lock 200b, the validity period after the target door card is persisted is updated to the target door card through the card reader.
Part 4: house card selling card
When the user leaves the house, the terminal device 200a performs an identification operation for the target door card for card distribution, and after the first verification data of the target door card is identified, performs step 213: a pin indication is sent to server 200 c. After the server 200c receives the card-canceling instruction sent by the terminal device 200a, the smart door lock 200b executes step 214: and removing the first verification data of the target door card stored locally. In order to ensure that the hotel supervisor can timely obtain the card cancellation result in consideration of the situation that the removal of the first verification data of the target door card by the intelligent door lock 200b is failed due to the existence of the network abnormality, after the intelligent door lock 200b performs step 211, the intelligent door lock 200b performs step 215: the operation result of the removal operation is transmitted to the terminal apparatus 200 a. When implemented, the operation result of the removal operation may also be an operation timeout, i.e., an operation result fed back by the terminal device or the network.
In some possible embodiments, the card-canceling instruction issued by the terminal device 200a carries the door card information of the target door card, and the smart door lock 200b, in response to the card-canceling instruction, identifies the door card information of the target door card from the card-canceling instruction, then performs an identification operation on an available card set stored locally according to the door card information, removes the same door card information as that in the card-canceling instruction, which is stored in the available card set, and sends the removal result to the terminal device 200 a.
In order to be suitable for the intelligent door lock which can be used for timely canceling the card without a network, in the embodiment of the application, the intelligent door lock 200b is further provided with an automatic card canceling function, and the intelligent door lock 200b regularly executes retrieval operation aiming at locally stored door card information. And if the target door card with the expiration date is searched, removing the door card information of the target door card.
In some possible embodiments, the smart door lock 200b is provided with an execution command for automatically executing the card-locking operation every a preset time period. When the card-canceling operation is performed, the smart door lock 200b obtains the current time from the local device, and if the current time is within the valid period of the target door card, it indicates that the target door card is not expired and can still be used normally. If the current time is not in the valid period of the target door card, the target door card is indicated to have passed the valid period. Of course, each piece of door card information can be timed, and when the preset time length is reached, the door card information is removed. At this time, the smart door lock 200b removes the door card information of the target door card from the set of available cards locally used for storing the door lock and can open the door lock, and sends prompt information indicating that the target door card is expired to the terminal device 200a for the hotel manager to view.
In some possible embodiments, the card-canceling time is preset in the terminal device 200a, and if the prompt message for indicating that the card canceling is successful, which is sent by the smart door lock 200b, is not received within a specified time, it indicates that the network is abnormal, so that the smart door lock fails to receive the card-canceling indication. At this time, the terminal device 200a marks the target gate card for card distribution as an abnormal gate card, and outputs prompt information indicating that the card distribution is abnormal. According to the prompt information, hotel management personnel can adopt equipment such as a card reader to execute card-selling operation on the target door card, and can timely find the situation that the hotel has remote card-selling failure according to the information, so that the hotel management personnel can timely handle the situation.
Fig. 3 shows a control method of an intelligent door lock according to an embodiment of the present application, which is applied to a flowchart of the intelligent door lock, and includes:
step 301: and acquiring first verification data from the target door card, and verifying the first verification data.
Step 302: and if the first check data fails to be checked, checking second check data in the target door card.
Step 303: and if the second check data passes the check, executing unlocking operation.
In some possible embodiments, a loss report list for recording loss report cards is stored in the intelligent door lock, and before the verifying operation is performed on the first verification data, the method further includes:
and if the first verification data of the target door card is in the loss report list, outputting prompt information for indicating unlocking failure.
In some possible embodiments, if the first check-up data is not in the loss report list, the method further includes:
identifying the card type of the target door card, and if the card type does not meet the preset card type capable of opening the intelligent door lock, outputting prompt information for indicating unlocking failure;
and if the card type is the preset card type, executing the step of carrying out the verification operation on the first verification data.
In some possible embodiments, the second check-up data includes room information and a validity period corresponding to the target door card, and performing the check-up operation on the second check-up data includes:
if the room information is inconsistent with the room information corresponding to the intelligent door lock, outputting prompt information for indicating unlocking failure;
if the room information is consistent with the room information corresponding to the intelligent door lock, acquiring the current time, and if the current time is within the validity period, determining that the second check data passes the check;
if the current time is not within the validity period, determining that the second check data fails to be checked;
the method further comprises the following steps:
and if the second check data fails to check, outputting prompt information for indicating the failure of unlocking.
In some possible embodiments, the smart door lock stores a set of available cards, and the performing the verification operation on the first verification data includes:
checking whether the first check data is in the available card set;
if the first verification data is not in the available card set, determining that the verification of the first verification data fails;
if the first verification data is in the available card set, determining that the first verification data passes verification;
if the first check data fails to be checked and the second check data passes the check, the method further comprises:
updating the first verification data into the set of available cards; and the number of the first and second electrodes,
and updating the second check data into the intelligent door lock.
In some possible embodiments, the method further comprises:
removing the door card information of the target door card stored in the intelligent door lock in response to a card canceling instruction aiming at the target door card and sent by terminal equipment; wherein the door card information comprises the first verification data and the second verification data of the target door card;
and sending the operation result of the removing operation to the terminal equipment.
In some possible embodiments, the method further comprises:
and for each piece of stored door card information, if the door card information exceeds the corresponding validity period, removing the door card information.
Fig. 4 shows a flowchart of a control method for an intelligent door lock, which is applied to a terminal device, and includes:
step 401: responding to user operation, and obtaining second check data of the target door card;
step 402: and writing the second check data into the target door card, so that the second check data of the target door card is checked after the intelligent door lock fails to check the first check data.
In some possible embodiments, before the controller performs writing the second check-up data into the target door card, the controller is further configured to:
sending the first verification data to the intelligent door lock:
the controller performs the writing of the second check-up data into the target door card, configured to:
and if the first check data are determined not to be successfully written into the intelligent door lock, writing the second check data into the target door card.

Claims (12)

1. An intelligent door lock, comprising: a memory and a controller, wherein:
the memory for storing a computer program executable by the controller;
the controller is connected with the memory and is configured to:
acquiring first verification data from a target door card, and performing verification operation on the first verification data;
if the first check data fails to be checked, checking second check data in the target door card;
and if the second check data passes the check, executing unlocking operation.
2. The intelligent door lock of claim 1, wherein a loss report list for recording loss report cards is stored in the intelligent door lock, and before the controller performs the verification operation on the first verification data, the controller is further configured to:
and if the first verification data of the target door card is in the loss report list, outputting prompt information for indicating unlocking failure.
3. The intelligent door lock of claim 2, wherein if the first verification data is not in the loss report list, the controller is further configured to:
identifying the card type of the target door card, and if the card type does not meet the preset card type capable of opening the intelligent door lock, outputting prompt information for indicating unlocking failure;
and if the card type is the preset card type, executing the step of carrying out the verification operation on the first verification data.
4. The intelligent door lock of claim 1, wherein the second verification data comprises room information and a validity period corresponding to the target door card, and the controller, when performing the verification operation on the second verification data, is configured to:
if the room information is inconsistent with the room information corresponding to the intelligent door lock, determining that the second check data fails to check;
if the room information is consistent with the room information corresponding to the intelligent door lock, acquiring the current time, and if the current time is within the validity period, determining that the second check data passes the check;
if the current time is not within the validity period, determining that the second check data fails to be checked;
the controller is further configured to:
and if the second check data fails to check, outputting prompt information for indicating the failure of unlocking.
5. The intelligent door lock of claim 1, wherein the intelligent door lock stores a set of available cards, and wherein the controller, when performing the verification operation on the first verification data, is configured to:
checking whether the first check data is in the available card set;
if the first verification data is not in the available card set, determining that the verification of the first verification data fails;
if the first verification data is in the available card set, determining that the first verification data passes verification;
if the first check data fails to check and the second check data passes, the controller is further configured to:
updating the first verification data into the set of available cards; and the number of the first and second electrodes,
and updating the second check data into the intelligent door lock.
6. The intelligent door lock of claim 1, wherein the controller is further configured to:
removing the door card information of the target door card stored in the intelligent door lock in response to a card canceling instruction aiming at the target door card and sent by the intelligent door lock; wherein the door card information comprises the first verification data and the second verification data of the target door card;
and sending the operation result of the removing operation to the intelligent door lock.
7. The intelligent door lock of any of claims 1-6, wherein the controller is further configured to:
and for each piece of stored door card information, if the door card information exceeds the corresponding validity period, removing the door card information.
8. A terminal device, wherein a target door card stores first verification data therein, the terminal device comprising: a display, a memory, and a controller, wherein:
the display is used for displaying information;
the memory for storing a computer program executable by the controller;
the controller, connected to the display and the memory, configured to:
responding to user operation, and obtaining second check data of the target door card;
and writing the second check data into the target door card, so that the second check data of the target door card is checked after the intelligent door lock fails to check the first check data.
9. The terminal device of claim 8, wherein prior to the controller performing the writing of the second parity data into the target door card, the controller is further configured to:
sending the first verification data to the intelligent door lock:
the controller performs the writing of the second check-up data into the target door card, configured to:
and if the first check data are determined not to be successfully written into the intelligent door lock, writing the second check data into the target door card.
10. A control method of an intelligent door lock is characterized by comprising the following steps:
acquiring first verification data from a target door card, and performing verification operation on the first verification data;
if the first check data fails to be checked, checking second check data in the target door card;
and if the second check data passes the check, executing unlocking operation.
11. An intelligent door lock control method is characterized in that a target door card stores first verification data, and the method comprises the following steps:
responding to user operation, and obtaining second check data of the target door card;
and writing the second check data into the target door card, so that the second check data of the target door card is checked after the intelligent door lock fails to check the first check data.
12. A computer storage medium, characterized in that the computer storage medium stores a computer program for causing a computer to perform the method according to any one of claims 10-11.
CN202011463385.7A 2020-12-11 2020-12-11 Intelligent door lock, terminal equipment, control method of intelligent door lock and storage medium Active CN112634493B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011463385.7A CN112634493B (en) 2020-12-11 2020-12-11 Intelligent door lock, terminal equipment, control method of intelligent door lock and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011463385.7A CN112634493B (en) 2020-12-11 2020-12-11 Intelligent door lock, terminal equipment, control method of intelligent door lock and storage medium

Publications (2)

Publication Number Publication Date
CN112634493A true CN112634493A (en) 2021-04-09
CN112634493B CN112634493B (en) 2022-07-01

Family

ID=75312443

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011463385.7A Active CN112634493B (en) 2020-12-11 2020-12-11 Intelligent door lock, terminal equipment, control method of intelligent door lock and storage medium

Country Status (1)

Country Link
CN (1) CN112634493B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113936371A (en) * 2021-09-18 2022-01-14 青岛海信智慧生活科技股份有限公司 Authority management method and device

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106097504A (en) * 2016-06-14 2016-11-09 苏州嗨嗨网络科技有限公司 The implementation method that a kind of hotel moves in voluntarily
CN205788363U (en) * 2016-05-25 2016-12-07 象山赛柏斯智能科技有限公司 A kind of multiple authentication Gate-ban Monitoring System of Home House
CN106447855A (en) * 2016-09-19 2017-02-22 深圳博科智能科技有限公司 Shake-based unlocking method and terminal equipment
CN108091024A (en) * 2018-01-11 2018-05-29 成都千帆科技开发有限公司 Access control equipment Off-line control method
CN109147111A (en) * 2017-10-31 2019-01-04 北京三快在线科技有限公司 It is self-service to move in management system and method, electronic equipment and storage medium
CN109272610A (en) * 2015-07-06 2019-01-25 福建省新泽尔资讯科技有限公司 A kind of method that highly-safe bluetooth is unlocked
CN109712293A (en) * 2018-12-28 2019-05-03 深圳市简工智能科技有限公司 Control method, mobile terminal and the readable storage medium storing program for executing of smart lock
CN109920102A (en) * 2019-02-02 2019-06-21 江门市新会区博上科技有限公司 A kind of smart lock method, apparatus, equipment and storage medium that bluetooth enters without spoon
CN111340987A (en) * 2020-03-02 2020-06-26 深圳晒尔科技有限公司 Internet of things door lock communication method, device and system and computer storage medium
CN111882766A (en) * 2020-07-24 2020-11-03 南宁职业技术学院 Intelligent hotel self-help check-in terminal
CN112001191A (en) * 2020-08-19 2020-11-27 上海盛巨信息技术有限公司 Door card and door lock unlocking method and device and door card and door lock system

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109272610A (en) * 2015-07-06 2019-01-25 福建省新泽尔资讯科技有限公司 A kind of method that highly-safe bluetooth is unlocked
CN109285247A (en) * 2015-07-06 2019-01-29 福建省新泽尔资讯科技有限公司 A method of with simultaneously activate the bluetooth of all-purpose card function to unlock
CN205788363U (en) * 2016-05-25 2016-12-07 象山赛柏斯智能科技有限公司 A kind of multiple authentication Gate-ban Monitoring System of Home House
CN106097504A (en) * 2016-06-14 2016-11-09 苏州嗨嗨网络科技有限公司 The implementation method that a kind of hotel moves in voluntarily
CN106447855A (en) * 2016-09-19 2017-02-22 深圳博科智能科技有限公司 Shake-based unlocking method and terminal equipment
CN109147111A (en) * 2017-10-31 2019-01-04 北京三快在线科技有限公司 It is self-service to move in management system and method, electronic equipment and storage medium
CN108091024A (en) * 2018-01-11 2018-05-29 成都千帆科技开发有限公司 Access control equipment Off-line control method
CN109712293A (en) * 2018-12-28 2019-05-03 深圳市简工智能科技有限公司 Control method, mobile terminal and the readable storage medium storing program for executing of smart lock
CN109920102A (en) * 2019-02-02 2019-06-21 江门市新会区博上科技有限公司 A kind of smart lock method, apparatus, equipment and storage medium that bluetooth enters without spoon
CN111340987A (en) * 2020-03-02 2020-06-26 深圳晒尔科技有限公司 Internet of things door lock communication method, device and system and computer storage medium
CN111882766A (en) * 2020-07-24 2020-11-03 南宁职业技术学院 Intelligent hotel self-help check-in terminal
CN112001191A (en) * 2020-08-19 2020-11-27 上海盛巨信息技术有限公司 Door card and door lock unlocking method and device and door card and door lock system

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113936371A (en) * 2021-09-18 2022-01-14 青岛海信智慧生活科技股份有限公司 Authority management method and device

Also Published As

Publication number Publication date
CN112634493B (en) 2022-07-01

Similar Documents

Publication Publication Date Title
US7496627B2 (en) Automation control system having digital logging
CN107040777A (en) A kind of remote debugging method, set top box and server
CN105872088A (en) Operating system switching method and device for driverless vehicle
US20070169074A1 (en) Upgrade apparatus and its method for home network system
EP1918842A2 (en) Upgrade service system
CN112634493B (en) Intelligent door lock, terminal equipment, control method of intelligent door lock and storage medium
CN112148312A (en) Firmware upgrading management method, device, equipment and medium for electronic controller
KR20210096997A (en) Method for maintenance of kiosk
US11119747B2 (en) System and method for application release orchestration and deployment
CN113934758A (en) Vehicle fault repairing method and device, vehicle-mounted terminal, server and storage medium
KR102137891B1 (en) Server managing Method, Server, and Recording medium using User Specialized Operating Mechanism on BMC environment
CN101393538A (en) Information playback system,Data generation apparatus and data playback apparatus
CN110489210A (en) Create method, apparatus, equipment and the computer storage medium of virtual machine
CN110223414A (en) Monitor method, apparatus, equipment and the computer storage medium of vehicle
CN111734221B (en) Well lid unlocking method, device, equipment, storage medium and system
CN109543420B (en) Permission configuration method and device based on sud, electronic equipment and storage medium
CN113612756B (en) Shared login method and device, computer readable storage medium and electronic equipment
CN113660245B (en) Terminal access right control method, device, equipment and medium
US7295986B2 (en) Information processing apparatus and method, and recording medium therefor
CN110351147B (en) Fault recognition device of server
US20230260014A1 (en) Device management system
CN118260151A (en) Log file acquisition method, display device and server
TWM592193U (en) Management system for remote maintenance through instant messaging
PROTECTION About This Manual
CN114815683A (en) Control device, terminal equipment and equipment control method based on interface dynamic identification

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant