CN112785757A - Intelligent lock authorization authentication method and intelligent lock - Google Patents

Intelligent lock authorization authentication method and intelligent lock Download PDF

Info

Publication number
CN112785757A
CN112785757A CN202011632450.4A CN202011632450A CN112785757A CN 112785757 A CN112785757 A CN 112785757A CN 202011632450 A CN202011632450 A CN 202011632450A CN 112785757 A CN112785757 A CN 112785757A
Authority
CN
China
Prior art keywords
authorization
server
intelligent lock
information
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011632450.4A
Other languages
Chinese (zh)
Inventor
林孝发
林孝山
柯学标
刘名林
谢长城
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jomoo Kitchen and Bath Co Ltd
Original Assignee
Jomoo Kitchen and Bath Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jomoo Kitchen and Bath Co Ltd filed Critical Jomoo Kitchen and Bath Co Ltd
Priority to CN202011632450.4A priority Critical patent/CN112785757A/en
Publication of CN112785757A publication Critical patent/CN112785757A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00563Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys using personal physical data of the operator, e.g. finger prints, retinal images, voicepatterns
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The invention discloses an intelligent lock authorization authentication method and an intelligent lock.

Description

Intelligent lock authorization authentication method and intelligent lock
Technical Field
The invention relates to the technical field of smart home, in particular to an intelligent lock authorization authentication method and an intelligent lock.
Background
With the development of the smart home technology, the smart lock gradually replaces the traditional mechanical lock to become an entrance product of the smart home. The application of the intelligent lock in dormitories, apartments and the like is also rapidly developed due to the addition of an intelligent background management system.
At present, commercial intelligent locks (especially intelligent locks such as dormitories and apartments) usually adopt an authorization mode of opening a door by using a card or a fingerprint of a resident, background management personnel are required to cooperate with the resident to input authorization information through an issuer of the fingerprint or the card, and the authorization information needs to be timely synchronized to the intelligent lock through a network, so that the implementation is complicated, and the authorization is actively issued to the intelligent lock from a background server side, so that a safety risk exists.
Disclosure of Invention
The invention provides an intelligent lock authorization authentication method and an intelligent lock, which can simply and safely realize the authorization authentication of the intelligent lock.
The embodiment of the invention provides an intelligent lock authorization authentication method, which comprises the following steps:
the intelligent lock sends an authorization code which is input by a user in the intelligent lock to a server through a network;
the intelligent lock receives the authorization code verification success information returned by the server, and prompts the user to operate according to the authorization information from the server;
and the intelligent lock synchronizes the authorization information input by the user to the server.
In one illustrative example, the method further comprises: when the authorization code is input into the intelligent lock, the intelligent lock actively accesses the Internet through a wireless network or a gateway, and reports the authorization code to the server;
and receiving a judgment result of judging the validity of the authorization code from the server.
In one illustrative example, further comprising:
and the intelligent lock receives the information that the authentication code returned by the server is unsuccessful, and disconnects the network connection to cancel the authentication operation.
In an exemplary embodiment, the prompting the user operation according to the authorization information from the server includes:
the intelligent lock receives an authorization authentication message returned by the server, and when the validity identification carried in the authorization authentication message shows that the authorization code is valid, the authorization code is successfully verified;
and the intelligent lock prompts the user to operate according to the authorization information carried in the authorization authentication message.
In an exemplary instance, when the type of the authorization operation in the authorization information includes an authorization adding key, the smart lock prompts a user to operate according to the authorization information carried in the authorization authentication message, including:
the intelligent lock automatically enters a fingerprint or card or password input mode;
prompting a user to input a fingerprint or a card or a password by voice;
and receiving a fingerprint or a card or a password input by a user to complete the input of the authorization information of the intelligent lock.
In an exemplary instance, when the type of the authorization operation in the authorization information includes an authorization update key, the smart lock prompts a user to operate according to the authorization information carried in the authorization authentication message, including:
the intelligent lock automatically enters an updating mode of fingerprints or cards or passwords;
prompting a user to input a new fingerprint or card or password by voice;
and receiving the fingerprint or the card or the password input by the user to complete the updating of the authorization information of the intelligent lock.
In an illustrative example, the authorization information includes one or any combination of the following:
the authorization method comprises the steps of authorization time-validity period, authorization unlocking times, authorization entry type, authorization type authorization entry maximum number, authorization user information, authorization user number and authorization operation type.
In one illustrative example, further comprising:
the intelligent lock stores the entered or updated authorization information;
synchronizing the stored authorization information to the server.
In an exemplary embodiment, after the smart lock synchronizes the stored authorization information to the server, the smart lock further includes:
the intelligent lock disconnects the network.
In one illustrative example, the smart lock synchronizes stored authorization information to a server, comprising:
when the intelligent lock is opened or an alarm occurs in the intelligent lock, the intelligent lock is actively connected with a network, and unlocking information or alarm information is reported to a server;
receiving the latest authorization information from the server.
In one illustrative example, comprising:
the intelligent lock actively connects with the network according to preset time;
synchronizing the authorization information with the server.
The embodiment of the present application further provides an intelligent lock, which includes a memory and a processor, where the memory stores the following instructions that can be executed by the processor: the steps of the intelligent lock authorization authentication method are executed.
The embodiment of the application also provides an intelligent lock, which comprises an operation module, a first processing module, a second processing module and a synchronization module; wherein the content of the first and second substances,
the operation module is set to receive input operation from a user and obtain an authorization code;
a first processing module configured to send the received authorization code to a server via a network;
the second processing module is set to receive the authorization code verification success information returned by the server and prompt the user to operate according to the authorization information from the server;
and the synchronization module synchronizes the authorization information input by the user to the server.
In an exemplary embodiment, the first processing module is specifically configured to:
when the authorization code input by the user is received, the user actively accesses the Internet through a wireless network or a gateway; reporting the received authorization code to the server; and receiving a judgment result of judging the validity of the authorization code from the server.
In one illustrative example, the second processing module is further configured to:
and after receiving the authentication unsuccessful information of the authorization code returned by the server, disconnecting the network connection to cancel the authorization operation.
In an exemplary embodiment, the second processing module is specifically configured to:
receiving an authorization authentication message returned by the server, and when the validity identification carried in the authorization authentication message shows that the authorization code is valid, indicating that the authorization code is successfully verified;
and prompting the user to operate according to the authorization information carried in the authorization authentication message.
In one illustrative example, the synchronization module is further configured to:
storing the recorded or updated authorization information;
synchronizing the stored authorization information to the server.
In one illustrative example, the synchronization module is further configured to: the network is disconnected.
In one illustrative example, the synchronizing of the stored authorization information to the server in the synchronization module comprises:
when the intelligent lock to which the synchronization module belongs is opened or an alarm occurs in the intelligent lock to which the synchronization module belongs, the intelligent lock actively connects with a network and reports unlocking information or alarm information to the server; receiving the latest authorization information from the server;
or, according to the preset time, actively connecting the network; synchronizing authorization information with the server.
The embodiment of the invention comprises the following steps: the intelligent lock sends the received authorization code to a server through a network; the intelligent lock receives the authorization code verification success information returned by the server, and prompts the user to operate according to the authorization information from the server; the intelligent lock synchronizes the information operated by the user to the server. By the intelligent lock authorization authentication method provided by the embodiment of the invention, when a user inputs authorization information (such as input fingerprints, cards, passwords, faces, irises, finger veins and the like), the authorization authentication of the intelligent lock is simply and safely realized without the assistance of an administrator or the additional arrangement of a fingerprint issuing device or an IC card issuing device.
Additional features and advantages of the invention will be set forth in the description which follows, and in part will be obvious from the description, or may be learned by practice of the invention. The objectives and other advantages of the invention will be realized and attained by the structure particularly pointed out in the written description and claims hereof as well as the appended drawings.
Drawings
The accompanying drawings are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the example serve to explain the principles of the invention and not to limit the invention.
FIG. 1 is a schematic flow chart illustrating an authorization and authentication method for an intelligent lock according to an embodiment of the present invention;
FIG. 2 is a flowchart illustrating an embodiment of an authorization and authentication method for an intelligent lock according to the present invention;
FIG. 3 is a flowchart illustrating a process of adding a key to an intelligent lock according to an embodiment of the present invention;
FIG. 4 is a schematic flow chart illustrating the process of synchronizing authorization information between the smart lock and the server according to an embodiment of the present invention;
FIG. 5 is a schematic diagram of a structure of an intelligent lock according to an embodiment of the present invention;
fig. 6 is a schematic diagram of a structure of an intelligent lock according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, embodiments of the present invention will be described in detail below with reference to the accompanying drawings. It should be noted that the embodiments and features of the embodiments of the present invention may be arbitrarily combined with each other without conflict.
In one exemplary configuration of the invention, the computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include forms of volatile memory in a computer readable medium, Random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, computer readable media does not include non-transitory computer readable media (transient media), such as modulated data signals and carrier waves.
The steps illustrated in the flow charts of the figures may be performed in a computer system such as a set of computer-executable instructions. Also, while a logical order is shown in the flow diagrams, in some cases, the steps shown or described may be performed in an order different than here.
Fig. 1 is a schematic flowchart of an authorization and authentication method for an intelligent lock according to an embodiment of the present invention, as shown in fig. 1, including:
step 100: the intelligent lock sends the authorization code entered by the user in the intelligent lock to the server through the network.
In an exemplary embodiment, the step may be preceded by:
the intelligent lock obtains the authorization code through the input operation of the user on the intelligent lock.
In one embodiment, a user can register an account through an APP (application program) of a mobile terminal (such as a mobile phone and the like), and apply for authorization entry permission of an intelligent lock to a server; in another embodiment, the user can apply the authorized entry right of the intelligent lock to the server through a short message; in yet another embodiment, the authorization entry authority of the intelligent lock can also be directly entered by a background administrator through the server. In one illustrative example, entering rights can include, but is not limited to, such as: adding a key input authority, updating the key input authority and the like.
In an exemplary embodiment, taking an example that a user requests an authorization entry permission from a server through a mobile phone APP, the registering an account number by the user through the mobile phone APP, and applying for the authorization entry permission of a room smart lock from the server, may include:
the user registers an account through a mobile phone APP and sends an authorization entry permission request to a server, wherein the authorization entry permission request can include but is not limited to the following steps: user information, intelligent lock use object information (such as room number) and other information;
the server receives an authorization entry authority request from a user, and generates an authorization code for the intelligent lock use object according to user information and intelligent lock use object information;
and the server sends the generated authorization code to the mobile phone of the user in a mobile phone APP or short message mode.
In one illustrative example, step 100 may comprise:
when the intelligent lock receives the authorization code input by the user, namely the authorization code is input into the intelligent lock, the intelligent lock actively accesses the internet through a wireless network such as WiFi or a gateway, the received authorization code is reported to the server, so that the server judges the validity of the authorization code, and the intelligent lock receives a judgment result of judging the validity of the authorization code from the server. The determination result may include that the authorization code verification is successful or that the authorization code verification is unsuccessful.
Step 101: and the intelligent lock receives the authorization code verification success information returned by the server and prompts the user to operate according to the authorization information from the server.
In one illustrative example, the present step further comprises:
and the intelligent lock receives the information that the authentication code returned by the server is unsuccessful, and disconnects the network connection to cancel the current authorization request operation.
In one illustrative example, step 101 may comprise:
the intelligent lock receives an authorization authentication message returned by the server, and when the validity identification carried in the authorization authentication message shows that the authorization code is valid, the authorization code is successfully verified;
and the intelligent lock prompts the user to operate according to the authorization information carried in the authorization authentication message.
In one illustrative example, the authorization information includes a validity flag indicating whether the authorization code is valid, and includes but is not limited to: the authorization method includes the steps of authorization expiration date, authorization unlocking times, authorization entry types (such as fingerprints, passwords, cards and the like), the maximum number of authorization entry types, user information (such as user ID) of authorized users, the number of authorized users, authorization operation types (such as authorization adding keys and authorization updating keys) and the like.
In an exemplary instance, when the type of the authorization operation in the authorization information includes authorization to add a key, the smart lock prompts a user to operate according to the authorization information carried in the authorization authentication message, including:
the intelligent lock automatically enters a fingerprint or card input mode;
prompting a user to input a fingerprint or a card by voice;
and the authorization information input of the intelligent lock is completed after the fingerprint or the card input by the user is received.
In an exemplary instance, when the type of the authorization operation in the authorization information includes an authorization update key, the smart lock prompts a user to operate according to the authorization information carried in the authorization authentication message, including:
the intelligent lock automatically enters a fingerprint or card updating mode;
prompting a user to input a new fingerprint or card by voice;
and finishing the updating of the authorization information of the intelligent lock after receiving the fingerprint or the card input by the user.
Step 102: and the intelligent lock synchronizes the authorization information input by the user to the server.
In one illustrative example, the step may include:
the intelligent lock stores the key information recorded or updated, key timeliness, authorized unlocking times and other authorized information in the intelligent lock;
synchronizing the stored authorization information to the server.
In one illustrative example, the smart lock synchronizes stored authorization information to a server, comprising:
when the intelligent lock is opened, such as door opening (whether door opening is successful or failed) or when the intelligent lock gives an alarm, the intelligent lock actively connects with a network and reports unlocking information or alarm information to a server;
the latest authorization information from the server is received.
In one illustrative example, the smart lock synchronizes stored authorization information to a server, comprising:
the intelligent lock actively connects to the network according to preset time, such as 0 am every day and synchronizes authorization information with the server.
By the intelligent lock authorization authentication method provided by the embodiment of the invention, when a user inputs authorization information (such as input fingerprints, cards, passwords, faces, irises, finger veins and the like), the authorization authentication of the intelligent lock is simply and safely realized without the assistance of an administrator or the additional arrangement of a fingerprint issuing device or an IC card issuing device.
In an exemplary embodiment, the method may further include:
and after the intelligent lock successfully synchronizes the authorization information, the network connection is automatically disconnected. Therefore, the safety of the intelligent lock is further improved, and electricity is saved.
In an exemplary embodiment, if the server actively deletes or updates the authorization information, such as the authorization validity period, the embodiment of the present invention may further include:
and the intelligent lock receives the synchronous updating notice from the server, and synchronously removes or updates the corresponding authorization information, so that the intelligent lock and the authorization information at two ends of the server are kept consistent.
The invention also provides a computer-readable storage medium, which stores computer-executable instructions for executing the intelligent lock authorization authentication method.
The invention further provides equipment for realizing the authorization and authentication of the intelligent lock, which comprises a memory and a processor, wherein the memory stores the following instructions which can be executed by the processor: the steps of the method for authenticating the authorization of the intelligent lock are executed.
Fig. 2 is a schematic flowchart of an embodiment of an authorization authentication method for an intelligent lock in an embodiment of the present invention, and as shown in fig. 2, in this embodiment, taking an example in which a user registers an account through a mobile phone APP and sends an authorization entry permission request to a server, the method includes:
step 200: and the server receives an authorization entry authority request of the user and issues an authorization code to a mobile phone APP of the user.
Step 201: the mobile phone APP of the user receives the authorization code, and the user enters the authorization code on the intelligent lock. In connection with a smart lock as shown in fig. 6, the user may touch a key to enter the authorization code.
Step 202: when the authorization code is entered into the smart lock, the smart lock actively accesses the network, and as with the smart lock shown in fig. 6, the user can access the network through the WiFi module.
Step 203: the smart lock reports the authorization code entered by the user to the server to request the server to verify the validity of the currently entered authorization code.
Step 204: the smart lock receives a judgment result of judging the validity of the authorization code from the server, and if the judgment result from the server is successful in authentication, the step 205 is entered; if the judgment result from the server is that the authentication is not successful, step 210 is entered.
Step 205: the intelligent lock prompts the user to operate through voice, such as adding a key, updating the key and the like.
Step 206 to step 207: and after the user operation is finished, the intelligent lock synchronizes the data of the user operation to the server.
Step 208 to step 209: and disconnecting the accessed network after the intelligent lock completes synchronization, and ending.
Step 210 to step 211: the intelligent lock disconnects the accessed network and cancels the current authorization operation.
Fig. 3 is a schematic flowchart of a key adding process of the smart lock in the embodiment of the present invention, where when the type of the authorization operation in the authorization information includes an authorized key adding process, the smart lock automatically enters a fingerprint or card entry mode, in this embodiment, it is assumed that a user is prompted by a voice, and as shown in fig. 3, the key adding process includes:
step 300 to step 302: whether a fingerprint needs to be input, if so, prompting a user to input the fingerprint until the user finishes inputting after successfully inputting the fingerprint, and ending the process; if not, step 304 is entered.
Step 303: judging whether the number of input fingerprints exceeds the number of input fingerprints, and if the number of input fingerprints does not exceed the number of input fingerprints and the user inputs a fingerprint error, returning to the step 301 of prompting the user to input a fingerprint; if the number of fingerprint entries is exceeded, step 304 is entered.
Step 304 to step 306: whether the card needs to be input or not, if so, prompting the user to input the card until the user finishes inputting after successfully inputting the card, and ending the process; if not, step 308 is entered.
Step 307: judging whether the number of the input cards exceeds the number of the input cards, if the number of the input cards does not exceed the number of the input fingerprints and the user inputs the cards wrongly, returning to the step 305 for prompting the user to input the cards; if the number of fingerprint entries is exceeded, step 308 is entered.
Step 308 to step 310: whether a password needs to be input or not, if so, prompting the user to input the password until the user successfully inputs the password, and ending the process; if not, step 312 is entered.
Step 311: judging whether the number of the input passwords exceeds the number of the input passwords, if the number of the input passwords does not exceed the number of the input passwords and the input passwords of the user are wrong, returning to the step 309 of prompting the user to input the passwords; if the number of password entries is exceeded, step 312 is entered.
Step 312: and completing the logging.
By the intelligent lock authorization authentication method provided by the embodiment of the invention, when a user inputs authorization information (such as input fingerprints, cards, passwords and the like), the authorization authentication of the intelligent lock is simply and safely realized without the assistance of an administrator or the additional arrangement of a fingerprint issuing device or an IC card issuing device.
Fig. 4 is a schematic flowchart of a process of synchronizing authorization information between an intelligent lock and a server according to an embodiment of the present invention, as shown in fig. 4, including:
step 400 to step 401: a user unlocks, whether unlocking is successful is determined, and if unlocking is successful, the step 402 is carried out; if the unlock is not successful, go to step 404.
Step 402: the smart lock connects to the network, such as through a WiFi access network.
Step 403: the smart lock reports the unlocking success message to the server and proceeds to step 411.
Step 404: judging whether unlocking is failed for a first preset time, and if so, entering step 405; if not, step 408 is entered.
Step 405: the smart lock may be set to be locked within a preset time period, for example, within 5 minutes.
Step 406: the smart lock connects to the network, such as through a WiFi access network.
Step 407: the smart lock reports a lock alarm message to the server and proceeds to step 411.
Step 408: judging whether unlocking is failed for a second preset time, and if so, entering step 409; if not, go back to step 400 to continue attempting to unlock.
The second preset number is smaller than the first preset number. In one embodiment, the first predetermined number is, for example, 5 times, and the second predetermined number is, for example, 3 times.
Step 409: the smart lock connects to the network, such as through a WiFi access network.
Step 410: the smart lock reports a test-on alarm message to the server and proceeds to step 411.
Step 411: and synchronizing the authorization information between the intelligent lock and the server.
Step 412: the intelligent lock disconnects the network.
Fig. 5 is a schematic diagram of a composition structure of an intelligent lock according to an embodiment of the present invention, as shown in fig. 5, at least including: the device comprises an operation module, a first processing module, a second processing module and a synchronization module; wherein the content of the first and second substances,
the operation module is set to receive input operation from a user and obtain an authorization code;
a first processing module configured to send the received authorization code to a server via a network;
the second processing module is set to receive the authorization code verification success information returned by the server and prompt the user to operate according to the authorization information from the server;
and the synchronization module synchronizes the authorization information input by the user to the server.
In an exemplary embodiment, the first processing module is specifically configured to:
when receiving an authorization code entered by a user, actively accessing the internet through a wireless network such as WiFi or a gateway, and reporting the received authorization code to a server so that the server judges the validity of the authorization code and receives a judgment result from the server for judging the validity of the authorization code.
In an exemplary embodiment, the second processing module is specifically configured to:
receiving an authorization authentication message returned by the server, and when the validity identification carried in the authorization authentication message shows that the authorization code is valid, indicating that the authorization code is successfully verified;
and prompting the user to operate according to the authorization information carried in the authorization authentication message.
In one illustrative example, the second processing module is further configured to:
and after receiving the authentication code verification unsuccessful information returned by the server, disconnecting the network connection to cancel the current authorization request operation.
In one illustrative example, the authorization information includes a validity flag indicating whether the authorization code is valid, and includes but is not limited to: the authorization method includes the steps of authorization expiration date, authorization unlocking times, authorization entry types (such as fingerprints, passwords, cards and the like), the maximum number of authorization entry types, user information (such as user ID) of authorized users, the number of authorized users, authorization operation types (such as authorization adding keys and authorization updating keys) and the like.
In one illustrative example, the synchronization module is further configured to:
storing the key information, key timeliness and authorized information such as authorized unlocking times and the like which are input or updated;
synchronizing the stored authorization information to the server.
In one illustrative example, the synchronization module is further configured to: the accessed network is disconnected.
In one illustrative example, synchronizing the stored authorization information to the server in the synchronization module may include:
when the intelligent lock to which the synchronization module belongs is opened, such as door opening (whether door opening is successful or failed) or when the intelligent lock to which the synchronization module belongs gives an alarm, the intelligent lock is actively connected with a network, and unlocking information or alarm information is reported to a server;
the latest authorization information from the server is received.
In one illustrative example, synchronizing the stored authorization information to the server in the synchronization module may include:
actively connecting the network according to a preset time, such as 0 am every day and the like, and synchronizing the authorization information with the server.
Through the intelligent lock provided by the embodiment of the invention, when a user inputs authorization information (such as input fingerprints, cards, passwords and the like), the intelligent lock does not need the assistance of an administrator, and does not need to be additionally provided with a fingerprint issuing device or an IC card issuing device, so that the authorization authentication of the intelligent lock is simply and safely realized.
Although the embodiments of the present invention have been described above, the above description is only for the convenience of understanding the present invention, and is not intended to limit the present invention. It will be understood by those skilled in the art that various changes in form and details may be made therein without departing from the spirit and scope of the invention as defined by the appended claims.

Claims (19)

1. An intelligent lock authorization authentication method comprises the following steps:
the intelligent lock sends an authorization code which is input by a user in the intelligent lock to a server through a network;
the intelligent lock receives the authorization code verification success information returned by the server, and prompts the user to operate according to the authorization information from the server;
and the intelligent lock synchronizes the authorization information input by the user to the server.
2. The smart lock authorization authentication method of claim 1, the method further comprising: when the authorization code is input into the intelligent lock, the intelligent lock actively accesses the Internet through a wireless network or a gateway, and reports the authorization code to the server;
and receiving a judgment result of judging the validity of the authorization code from the server.
3. The smart lock authorization authentication method of claim 2, further comprising:
and the intelligent lock receives the information that the authentication code returned by the server is unsuccessful, and disconnects the network connection to cancel the authentication operation.
4. The smart lock authorization and authentication method according to claim 1 or 2, wherein the prompting the user operation according to the authorization information from the server comprises:
the intelligent lock receives an authorization authentication message returned by the server, and when the validity identification carried in the authorization authentication message shows that the authorization code is valid, the authorization code is successfully verified;
and the intelligent lock prompts the user to operate according to the authorization information carried in the authorization authentication message.
5. The intelligent lock authorization and authentication method according to claim 4, wherein when the type of authorization operation in the authorization information includes authorization to add a key, the intelligent lock prompts a user to operate according to the authorization information carried in the authorization and authentication message, and the method includes:
the intelligent lock automatically enters a fingerprint or card or password input mode;
prompting a user to input a fingerprint or a card or a password by voice;
and receiving a fingerprint or a card or a password input by a user to complete the input of the authorization information of the intelligent lock.
6. The intelligent lock authorization and authentication method according to claim 4, wherein when the type of authorization operation in the authorization information includes an authorization update key, the intelligent lock prompts a user to operate according to the authorization information carried in the authorization and authentication message, including:
the intelligent lock automatically enters an updating mode of fingerprints or cards or passwords;
prompting a user to input a new fingerprint or card or password by voice;
and receiving the fingerprint or the card or the password input by the user to complete the updating of the authorization information of the intelligent lock.
7. The smart lock authorization and authentication method according to claim 4, wherein the authorization information includes one or any combination of the following:
the authorization method comprises the steps of authorization time-validity period, authorization unlocking times, authorization entry type, authorization type authorization entry maximum number, authorization user information, authorization user number and authorization operation type.
8. The smart lock authorization authentication method according to any one of claims 1 to 7, further comprising:
the intelligent lock stores the entered or updated authorization information;
synchronizing the stored authorization information to the server.
9. The smart lock authorization authentication method according to claim 8, after the smart lock synchronizes the stored authorization information to the server, further comprising:
the intelligent lock disconnects the network.
10. The smart lock authorization authentication method according to claim 8 or 9, wherein the smart lock synchronizes the stored authorization information to a server, comprising:
when the intelligent lock is opened or an alarm occurs in the intelligent lock, the intelligent lock is actively connected with a network, and unlocking information or alarm information is reported to a server;
receiving the latest authorization information from the server.
11. The smart lock authorization authentication method according to claim 8 or 9, comprising:
the intelligent lock actively connects with the network according to preset time;
synchronizing the authorization information with the server.
12. An intelligent lock comprising a memory and a processor, wherein the memory has stored therein the following instructions executable by the processor: the steps for performing the smart lock authorization authentication method of any one of claims 1 to 10.
13. An intelligent lock comprises an operation module, a first processing module, a second processing module and a synchronization module; wherein the content of the first and second substances,
the operation module is set to receive input operation from a user and obtain an authorization code;
a first processing module configured to send the received authorization code to a server via a network;
the second processing module is set to receive the authorization code verification success information returned by the server and prompt the user to operate according to the authorization information from the server;
and the synchronization module synchronizes the authorization information input by the user to the server.
14. The smart lock of claim 13, wherein the first processing module is specifically configured to:
when the authorization code input by the user is received, the user actively accesses the Internet through a wireless network or a gateway; reporting the received authorization code to the server; and receiving a judgment result of judging the validity of the authorization code from the server.
15. The smart lock of claim 13, the second processing module further configured to:
and after receiving the authentication unsuccessful information of the authorization code returned by the server, disconnecting the network connection to cancel the authorization operation.
16. The smart lock of claim 13 or 15, wherein the second processing module is specifically configured to:
receiving an authorization authentication message returned by the server, and when the validity identification carried in the authorization authentication message shows that the authorization code is valid, indicating that the authorization code is successfully verified;
and prompting the user to operate according to the authorization information carried in the authorization authentication message.
17. The smart lock of claim 13 or 15, the synchronization module further configured to:
storing the recorded or updated authorization information;
synchronizing the stored authorization information to the server.
18. The smart lock of claim 17, the synchronization module further configured to: the network is disconnected.
19. The smart lock of claim 17 or 18, wherein synchronizing the stored authorization information to a server in the synchronization module comprises:
when the intelligent lock to which the synchronization module belongs is opened or an alarm occurs in the intelligent lock to which the synchronization module belongs, the intelligent lock actively connects with a network and reports unlocking information or alarm information to the server; receiving the latest authorization information from the server;
or, according to the preset time, actively connecting the network; synchronizing authorization information with the server.
CN202011632450.4A 2020-12-31 2020-12-31 Intelligent lock authorization authentication method and intelligent lock Pending CN112785757A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011632450.4A CN112785757A (en) 2020-12-31 2020-12-31 Intelligent lock authorization authentication method and intelligent lock

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011632450.4A CN112785757A (en) 2020-12-31 2020-12-31 Intelligent lock authorization authentication method and intelligent lock

Publications (1)

Publication Number Publication Date
CN112785757A true CN112785757A (en) 2021-05-11

Family

ID=75754805

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011632450.4A Pending CN112785757A (en) 2020-12-31 2020-12-31 Intelligent lock authorization authentication method and intelligent lock

Country Status (1)

Country Link
CN (1) CN112785757A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114501350A (en) * 2022-01-27 2022-05-13 浪潮软件科技有限公司 Remote upgrading method for safety intelligent lock

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102638790A (en) * 2012-03-15 2012-08-15 华为终端有限公司 Password control method, device and system
CN102904883A (en) * 2012-09-25 2013-01-30 上海交通大学 Man-in-middle attack defense method of online trading system
CN109920100A (en) * 2019-02-01 2019-06-21 天地融科技股份有限公司 A kind of smart lock method for unlocking and system
CN110084931A (en) * 2019-04-22 2019-08-02 北京摇光智能科技有限公司 A kind of electronic lock authorization method
CN110738759A (en) * 2019-07-17 2020-01-31 北京华大智宝电子系统有限公司 fingerprint storage method, identity verification method, device and system
CN111768527A (en) * 2020-06-30 2020-10-13 惠州拓邦电气技术有限公司 Method and device for inputting user fingerprint of intelligent lock, intelligent lock and system
CN111882704A (en) * 2020-07-10 2020-11-03 安安(深圳)智能电子有限公司 Control method of intelligent door lock system and intelligent door lock management system
CN212160784U (en) * 2019-12-31 2020-12-15 深圳阜时科技有限公司 Identity recognition device and entrance guard equipment

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102638790A (en) * 2012-03-15 2012-08-15 华为终端有限公司 Password control method, device and system
CN102904883A (en) * 2012-09-25 2013-01-30 上海交通大学 Man-in-middle attack defense method of online trading system
CN109920100A (en) * 2019-02-01 2019-06-21 天地融科技股份有限公司 A kind of smart lock method for unlocking and system
CN110084931A (en) * 2019-04-22 2019-08-02 北京摇光智能科技有限公司 A kind of electronic lock authorization method
CN110738759A (en) * 2019-07-17 2020-01-31 北京华大智宝电子系统有限公司 fingerprint storage method, identity verification method, device and system
CN212160784U (en) * 2019-12-31 2020-12-15 深圳阜时科技有限公司 Identity recognition device and entrance guard equipment
CN111768527A (en) * 2020-06-30 2020-10-13 惠州拓邦电气技术有限公司 Method and device for inputting user fingerprint of intelligent lock, intelligent lock and system
CN111882704A (en) * 2020-07-10 2020-11-03 安安(深圳)智能电子有限公司 Control method of intelligent door lock system and intelligent door lock management system

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114501350A (en) * 2022-01-27 2022-05-13 浪潮软件科技有限公司 Remote upgrading method for safety intelligent lock
CN114501350B (en) * 2022-01-27 2023-07-18 浪潮软件科技有限公司 Remote upgrading method of safe intelligent lock

Similar Documents

Publication Publication Date Title
AU2016273890B2 (en) Controlling physical access to secure areas via client devices in a networked environment
US20180262891A1 (en) Electronic access control systems and methods using near-field communications, mobile devices and cloud computing
CN107231234B (en) Identity registration method and device
US20190092279A1 (en) Identity Management for Implementing Vehicle Access and Operation Management
US20120171992A1 (en) System and method for secure containment of sensitive financial information stored in a mobile communication terminal
US11212283B2 (en) Method for authentication and authorization and authentication server using the same for providing user management mechanism required by multiple applications
US20120038454A1 (en) Gate Control System and Method of Remote Unlocking by Validated Users
CN103840944A (en) Short message authentication method, server and system
CN112330855A (en) Electronic lock safety management method, equipment and system
CN102625309A (en) Access control method and device
CN105959277A (en) Method of locking/unlocking computer screen based on NFC terminal
WO2014180345A1 (en) User identity verification and authorization system
AU2011350196A1 (en) System and method for secure containment of sensitive financial information stored in a mobile communication terminal
CN112785757A (en) Intelligent lock authorization authentication method and intelligent lock
CN114297622A (en) Password authorization method and system
CN112734989B (en) Bluetooth key distribution method for intelligent door lock
CN114241631A (en) Control method and registration method of intelligent door lock and related devices
CN111786995B (en) Account password management method, management middleware, system, equipment and storage medium
CN113904821A (en) Identity authentication method and device and readable storage medium
CN112073967B (en) Method and device for downloading identity certificate of mobile phone shield equipment and electronic equipment
JP7380430B2 (en) Information processing device, information processing method, and program
CN112634501A (en) Visitor authorization method for property management
US20230412400A1 (en) Method for suspending protection of an object achieved by a protection device
CN109859349A (en) A kind of entrance guard authentication method and system based on data SMS technology
KR101413117B1 (en) System for Processing Financial Transaction by using Token Code

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20210511

RJ01 Rejection of invention patent application after publication