CN112822630B - Data processing method of device and computer-readable storage medium - Google Patents

Data processing method of device and computer-readable storage medium Download PDF

Info

Publication number
CN112822630B
CN112822630B CN202110036793.2A CN202110036793A CN112822630B CN 112822630 B CN112822630 B CN 112822630B CN 202110036793 A CN202110036793 A CN 202110036793A CN 112822630 B CN112822630 B CN 112822630B
Authority
CN
China
Prior art keywords
user
target equipment
target
target device
bluetooth
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110036793.2A
Other languages
Chinese (zh)
Other versions
CN112822630A (en
Inventor
杨磊
李俊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Junzheng Network Technology Co Ltd
Original Assignee
Shanghai Junzheng Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Junzheng Network Technology Co Ltd filed Critical Shanghai Junzheng Network Technology Co Ltd
Priority to CN202110036793.2A priority Critical patent/CN112822630B/en
Publication of CN112822630A publication Critical patent/CN112822630A/en
Application granted granted Critical
Publication of CN112822630B publication Critical patent/CN112822630B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/14Direct-mode setup

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Lock And Its Accessories (AREA)
  • Selective Calling Equipment (AREA)

Abstract

The present specification provides a data processing method of an apparatus and a computer-readable storage medium. Based on the method, the user terminal can automatically scan peripheral Bluetooth signals and establish a first Bluetooth connection with the target equipment under the condition of detecting that the Bluetooth information of the target equipment bound in advance exists in a preset range; meanwhile, monitoring the distance between the user terminal and the target equipment, and generating an unlocking instruction under the condition that the monitored distance between the user terminal and the target equipment is smaller than or equal to a preset trigger distance; encrypting the unlocking instruction by using the user secret key, and sending the ciphertext data of the unlocking instruction to the target equipment through the first Bluetooth connection; after receiving the ciphertext data of the unlocking instruction, the target device can decrypt the ciphertext data by using a user secret key stored locally in advance, and responds to the unlocking instruction to execute a first unlocking operation under the condition of successful decryption. Therefore, the target equipment can be automatically and efficiently unlocked.

Description

Data processing method of device and computer-readable storage medium
Technical Field
The present disclosure relates to the field of internet technologies, and in particular, to a data processing method and a computer-readable storage medium for a device.
Background
In an interaction scene of an existing device, when a user needs to use a leased device, the user is often required to perform corresponding operations on a mobile phone APP: firstly, equipment which needs to be used and is already leased is selected; and then according to the related indication, corresponding instruction operation is carried out on the equipment to send an unlocking instruction, so that the unlocking operation of the equipment can be completed, the original locking state of the equipment is changed into the unlocking state, and the user can normally use the equipment.
Therefore, based on the existing data processing method of the equipment, when the user needs to use the equipment rented before, the unlocking operation is complicated and not intelligent enough, and the user experience is relatively poor.
In view of the above problems, no effective solution has been proposed.
Disclosure of Invention
The specification provides a data processing method of a device and a computer-readable storage medium, which can automatically and efficiently unlock a target device when recognizing that a user needs to use the target device when approaching the target device, thereby simplifying user operation and improving user experience.
The present specification provides a data processing method of a device, which is applied to a user terminal, and includes:
scanning a Bluetooth signal to detect whether Bluetooth information of a target device exists in a preset range; the target equipment is equipment bound with a user in advance;
under the condition that the Bluetooth information of target equipment exists in a preset range, establishing a first Bluetooth connection with the target equipment;
monitoring the distance between a user terminal and target equipment; generating an unlocking instruction under the condition that the monitored distance between the user terminal and the target equipment is less than or equal to a preset trigger distance; encrypting the unlocking instruction by using a user secret key to obtain ciphertext data of the unlocking instruction;
sending the ciphertext data of the unlocking instruction to target equipment through first Bluetooth connection; and the target equipment decrypts the ciphertext data of the unlocking instruction by using a user secret key stored in local in advance, and responds to the unlocking instruction to execute a first unlocking operation under the condition of successful decryption.
The present specification also provides a data processing method of a device, which is applied to a target device, and includes:
establishing a first Bluetooth connection with a user terminal; the user terminal is bound with target equipment in advance;
receiving ciphertext data of an unlocking instruction through the first Bluetooth connection; the user terminal generates ciphertext data of the unlocking instruction under the condition that the monitored distance between the user terminal and target equipment is smaller than or equal to a preset trigger distance;
and decrypting the ciphertext data of the unlocking instruction by using a user secret key stored in the local in advance, and responding to the unlocking instruction to execute a first unlocking operation under the condition of successful decryption.
The present specification also provides a computer readable storage medium having stored thereon computer instructions which, when executed, implement the respective steps in the data processing method of the above-described apparatus.
The present specification provides a data processing method of a device and a computer-readable storage medium, based on which a user terminal can automatically scan peripheral bluetooth signals, and establish a first bluetooth connection with a target device bound with the user terminal in advance, in a case where it is detected that bluetooth information of the target device exists within a preset range; meanwhile, triggering to start monitoring the distance between the user terminal and the target equipment, and generating an unlocking instruction under the condition that the monitored distance between the user terminal and the target equipment is less than or equal to a preset triggering distance; encrypting an unlocking instruction by using a user secret key obtained during the previous binding, and sending ciphertext data of the unlocking instruction to target equipment through first Bluetooth connection; after receiving the ciphertext data of the unlocking instruction, the target device can decrypt the ciphertext data by using the user secret key which is obtained during the previous binding and stored in the local, and responds to the unlocking instruction to execute a first unlocking operation under the condition of successful decryption. Therefore, when the fact that the user is close to the target device and needs to use the target device is automatically recognized, unlocking operation is automatically and efficiently conducted on the target device, user operation is simplified, and use experience of the user is improved.
Drawings
In order to more clearly illustrate the embodiments of the present specification, the drawings needed to be used in the embodiments will be briefly described below, and the drawings in the following description are only some of the embodiments described in the present specification, and it is obvious to those skilled in the art that other drawings can be obtained according to the drawings without any creative effort.
FIG. 1 is a schematic diagram of an embodiment of a data processing method for a device provided by an embodiment of the present specification;
FIG. 2 is a schematic diagram illustrating an embodiment of a data processing method for a device according to an embodiment of the present disclosure;
FIG. 3 is a flow chart illustrating a data processing method of an apparatus provided by an embodiment of the present specification;
FIG. 4 is a flowchart illustrating a data processing method of a device according to an embodiment of the present disclosure;
fig. 5 is a schematic structural component diagram of a server provided in an embodiment of the present specification;
FIG. 6 is a schematic diagram of a data processing apparatus of a device according to an embodiment of the present disclosure;
fig. 7 is a schematic structural composition diagram of a data processing apparatus of a device provided in an embodiment of the present specification.
Detailed Description
In order to make those skilled in the art better understand the technical solutions in the present specification, the technical solutions in the embodiments of the present specification will be clearly and completely described below with reference to the drawings in the embodiments of the present specification, and it is obvious that the described embodiments are only a part of the embodiments of the present specification, and not all of the embodiments. All other embodiments obtained by a person of ordinary skill in the art based on the embodiments in the present specification without making any creative effort shall fall within the protection scope of the present specification.
In consideration of the existing data processing method based on the equipment, when the user needs to use the equipment rented before, the user often needs to perform relatively complicated operation on terminals such as a mobile phone APP and the like to complete the unlocking operation of the equipment, and the equipment is normally used. However, the above processes are complicated, not intelligent enough and efficient, and influence the use experience of the user.
For the root cause of the above problems, the present specification considers that peripheral bluetooth signals can be automatically scanned by a user terminal, and when detecting that bluetooth information of a target device bound with the user terminal in advance exists in a preset range, it can be predicted that the user currently has a certain probability to use the target device, and at this time, a first bluetooth connection can be established with the target device first; meanwhile, triggering the user terminal to start monitoring the distance between the user terminal and the target equipment, when the distance between the user terminal and the target equipment is monitored to be small, further prejudging that the user has a high probability of using the target equipment currently, automatically generating ciphertext data of an unlocking instruction at the moment, and sending the ciphertext data of the unlocking instruction to the target equipment in time through the first Bluetooth connection established previously; after receiving the ciphertext data of the unlocking instruction, the target device can decrypt the ciphertext data by using the user secret key stored in the local during the previous binding, and further responds to the unlocking instruction to automatically execute a first unlocking operation under the condition that the unlocking instruction is obtained after decryption is successful. Therefore, when the user is automatically identified to be close to the target equipment and the target equipment needs to be used, the target equipment is automatically and efficiently unlocked, the user can use the target equipment conveniently, and the use experience of the user is improved.
The embodiment of the present specification provides a data processing method of a device, which may be specifically applied to a system including a server, a user terminal, and a target device.
The target device may be configured with a control component or smart plug (e.g., TBOX plug, etc.) that includes, for example, a signal transceiver, bluetooth module, processor, etc.
In particular, reference may be made to fig. 1. The user terminal, the server and the target device in the system can be connected in a wired or wireless mode to carry out data interaction. Moreover, bluetooth communication can be supported between the user terminal and the target device.
In this embodiment, the server may specifically include a background server that is applied to the rental platform side and is capable of implementing functions such as data transmission and data processing. Specifically, the server may be, for example, an electronic device having data operation, storage function and network interaction function. Alternatively, the server may be a software program running in the electronic device to support data processing, storage, and network interaction. In this embodiment, the number of servers included in the server is not particularly limited. The server may specifically be one server, several servers, or a server cluster formed by several servers.
In this embodiment, the user terminal may specifically include a front-end device that is applied to a user side and is capable of implementing functions such as data acquisition and data transmission. Specifically, the user terminal may be, for example, a desktop computer, a tablet computer, a notebook computer, a smart phone, a smart wearable device, and the like. Alternatively, the user terminal may be a software application capable of running in the electronic device. For example, it may be a certain device rental APP or the like that is installed and run on a smartphone.
In this embodiment, the target device may specifically include a device provided for rental by the rental platform. Specifically, the target device may be, for example, a bicycle, a car, or an electric vehicle, which has been rented by the user and needs to be unlocked for use currently.
Before the implementation, in the rental stage, referring to fig. 1, when the user wants to rent the target device, a rental request may be generated and sent to the server through the held user terminal. The lease request at least carries the equipment identification of the target equipment and the user identification of the user.
And the server receives the lease request and carries out identity authentication on the user who initiates the request according to the user identification carried in the lease request. After the user identity authentication is confirmed to pass, the binding relationship between the user and the target device can be established according to the lease request so as to provide the requested lease service for the user. Also, a user key corresponding to the user identification may be generated.
Further, the server may generate a binding instruction for the target device. The binding instruction at least carries a user identifier and a user key. And the binding instruction is used for indicating the target equipment to store the carried user identifier and the carried user key in the local target equipment. The server also acquires an administrator secret key which is held by the target equipment according to the equipment identification of the target equipment; and the binding instruction is encrypted by using the administrator secret key to obtain ciphertext data of the binding instruction.
Further, the server may transmit the user key and the ciphertext data of the binding command to the user terminal.
Usually, the target device continuously broadcasts the bluetooth signal to the outside. After receiving the user key and the ciphertext data of the binding instruction, the user terminal can find out the target device from the bluetooth signals scanned from the periphery according to the device identifier of the target device, and perform bluetooth pairing with the target device. Under the condition of successful pairing, the user terminal can establish Bluetooth connection with the target equipment and can be marked as second Bluetooth connection; and sending the ciphertext data of the binding instruction to the target device through the second Bluetooth connection.
After receiving the ciphertext data of the binding instruction, the target device may attempt to decrypt the ciphertext data of the binding instruction by using a locally-held administrator key. And feeding back the first confirmation information through the first Bluetooth connection under the conditions that the decryption is successful, the binding instruction is obtained, and the user identifier and the user key carried by the binding instruction are obtained.
And the user terminal receives and responds to the first confirmation information, and tests and verifies the first confirmation information and the target equipment so as to verify whether the user key is accurate and effective.
In case the test verification passes, the user terminal may locally store the user key and bluetooth information (e.g., bluetooth address, bluetooth name, etc.) of the target device. Accordingly, the target device may locally store the user key and the bluetooth information of the user terminal. Thereby, the binding of the user terminal and the target device can be completed.
In the specific implementation, when a user needs to unlock the lock to use the target device, reference may be made to fig. 2.
Usually, the target device continuously broadcasts the bluetooth signal to the outside. The user terminal can start the Bluetooth function and scan the peripheral Bluetooth signals to detect whether the Bluetooth information of the target equipment exists in the preset range. Under the condition that the user terminal detects that the Bluetooth information of the target equipment exists in the preset range, the user terminal can prejudge that the user is close to the target equipment currently, and the target equipment needs to be unlocked and used with a certain probability. At this time, the user terminal may automatically interact with the target device, and a bluetooth connection between the user terminal and the target device is established in advance, which may be recorded as a first bluetooth connection.
And simultaneously, triggering the target equipment to monitor the distance between the user terminal and the target equipment. Under the condition that the distance between the user terminal and the target equipment is monitored to be smaller than or equal to the preset trigger distance, the fact that the user is located on the side of the target equipment currently can be judged in advance, and the target equipment is required to be unlocked and used with high probability. At this time, an unlocking instruction can be automatically generated, and the user secret key obtained in the previous binding stage is used for encrypting the unlocking instruction to obtain ciphertext data of the unlocking instruction.
And the user terminal can send the ciphertext data of the unlocking instruction to the target equipment through the established first Bluetooth connection.
The target equipment receives ciphertext data of the unlocking instruction through the first Bluetooth connection; and decrypting by using the user key obtained in the previous binding stage. And under the condition that the decryption is successful and the unlocking instruction is obtained, the target equipment can respond to the unlocking instruction and automatically execute the first unlocking operation. For example, the target device automatically opens the power lock.
After the target device executes the first unlocking operation, the target device may trigger and call a preset sensor (e.g., a pressure sensor disposed on a cushion, a wheel movement sensor disposed on a wheel, etc.) disposed on the target device to acquire a corresponding motion state parameter, and detect whether a preset trigger state parameter that can represent that a user has contacted the target device is acquired.
Under the condition that the preset trigger state parameters are determined to be collected, the target device can judge that the user really needs to unlock the lock to use the target device currently. At this time, the target device may further automatically perform the second unlocking operation. For example, a lock is used to automatically unlock an antitheft lock provided on a wheel.
Therefore, automatic unlocking of the target equipment can be intelligently and efficiently completed, and a user can directly use the target equipment which is originally in a locking state without any operation.
Referring to fig. 3, an embodiment of the present specification provides a data processing method for a device. The method is particularly applied to the user terminal side. In particular implementations, the method may include the following.
S301: scanning the Bluetooth signal to detect whether Bluetooth information of the target equipment exists in a preset range; the target device is a device bound with a user in advance.
In this embodiment, the data processing method of the device is specifically applied to the side of the user terminal held by the user. The user terminal may be a hardware device such as a smart phone used by a user and supporting bluetooth communication, or may be an executable application installed and running on the hardware device.
In this embodiment, the target device may specifically include a rentable device (which may be denoted as a target rentable device) that the user has rented and has established a binding relationship with the user.
In this embodiment, the target device may specifically include a device that is already purchased by the user. Specifically, for example, the target device may be a device such as a bicycle, an electric vehicle, or the like, which is purchased by a user and provided with a corresponding electronic lock (e.g., a power lock and/or a use lock, or the like).
In the present embodiment, a specific description is mainly given by taking an example of a target rental device such as a rentable bicycle and a rentable electric vehicle that the user has currently rented. For target devices that the user has currently purchased, the following example process for target rental devices may be referred to. Therefore, the description is omitted.
Wherein, the user terminal side stores the user key and the Bluetooth information of the target device; the user key and the Bluetooth information of the user terminal obtained when binding are stored in the target device side. The above binding process will be described in further detail later.
In this embodiment, the target device may specifically include a bicycle, a car, or an electric vehicle that the user has rented. Of course, the above listed target devices are only illustrative. In specific implementation, the target device may further include other types of rentable devices according to specific application scenarios and processing requirements. The present specification is not limited to these.
In this embodiment, the target device may further be specifically provided with a bluetooth module or a bluetooth chip, which supports bluetooth communication. Typically, the target device will be in a locked state when not being used by the user. In this case, if the target device is not unlocked first, the target device is unlocked, and the user cannot use the target device.
In this embodiment, the target device may broadcast the bluetooth signal to the outside in real time. The bluetooth signal may carry bluetooth information of the target device.
In this embodiment, in the specific implementation, the bluetooth function of the user terminal may be manually turned on by the user, or the bluetooth function may be automatically turned on by the user terminal. Further, the user terminal may automatically scan the peripheral bluetooth signals to detect whether the bluetooth information of the target device exists within a preset range determined by the current location of the user.
In this embodiment, the preset range may be specifically understood as a circular range area with a radius of 10 meters and a center of a current location of the user. Of course, the above-listed predetermined ranges are merely illustrative. In specific implementation, the preset range may further include other types of range regions according to specific application scenarios and processing requirements. The present specification is not limited to these.
During detection, the user terminal can scan and collect the Bluetooth information in the preset range and match the collected Bluetooth information in the preset range with the stored Bluetooth information of the target device. And under the condition that at least one piece of Bluetooth information in the collected Bluetooth information in the preset range is matched with the Bluetooth information of the target equipment, determining that the Bluetooth information of the target equipment exists in the preset range.
S302: and under the condition that the Bluetooth information of the target equipment exists in the preset range, establishing a first Bluetooth connection with the target equipment.
In this embodiment, when detecting that the bluetooth information of the target device exists within the preset range, the user terminal may determine that the user is currently approaching the target device, or that the user is currently relatively close to the target device; and then the user can be prejudged to have a certain probability to unlock and use the target equipment subsequently. And may automatically initiate a bluetooth connection request to the target device. After the target device responds to the agreement of the Bluetooth connection request, the user terminal can establish Bluetooth connection with the target device and is marked as first Bluetooth connection.
In this embodiment, the target device and the user terminal will also perform bluetooth pairing first during the binding. When the target device is bound, the target device stores the Bluetooth information of the user terminal and sets a paired mark for the Bluetooth information; the user terminal stores the Bluetooth information of the target device and sets a paired mark for the Bluetooth information.
Therefore, after receiving the Bluetooth connection request initiated by the user terminal, the target device does not need to be paired, and can directly establish the first Bluetooth connection with the user terminal, so that the establishment efficiency of the first Bluetooth connection can be improved.
S303: monitoring the distance between a user terminal and target equipment; generating an unlocking instruction under the condition that the monitored distance between the user terminal and the target equipment is less than or equal to a preset trigger distance; and encrypting the unlocking instruction by using the user secret key to obtain the ciphertext data of the unlocking instruction.
In this embodiment, after the user terminal establishes the first bluetooth connection with the target device, the user terminal may be triggered to start monitoring the distance between the user terminal and the target device.
In this embodiment, the preset triggering distance may be a distance threshold smaller than a range radius of a preset range.
In one embodiment, the user terminal may monitor the distance to the target device by collecting and detecting the signal strength of the bluetooth signal of the target device.
Specifically, the monitoring of the distance between the user terminal and the target device may include the following steps: the user terminal acquires the signal intensity of a Bluetooth signal of target equipment; and determining the distance between the user terminal and the target equipment according to the signal intensity of the Bluetooth signal of the target equipment.
Accordingly, the user terminal may determine whether the distance between the user terminal and the target device is less than or equal to a preset trigger distance by detecting whether the signal strength of the bluetooth signal is greater than a preset strength threshold (e.g., -80dB, etc.).
Of course, it should be noted that the above listed manner of monitoring the distance between the user terminal and the target device is only an illustrative example. In specific implementation, according to a specific application scenario and a processing requirement, the user terminal may also monitor a distance between the user terminal and the target device in other suitable manners. For example, the user terminal may further obtain the signal strength of the mobile network signal sent by the target device, and then monitor the distance to the target device according to the signal strength of the mobile network signal. It is also possible to determine the distance to the target device by calculation, etc. by collecting GPS positioning data transmitted by the target device and combining the acquired GPS positioning data of the user terminal.
In this embodiment, when the user terminal detects that the distance between the user terminal and the target device is less than or equal to the preset trigger distance, it may be determined that the user is further close to the target device, and at this time, it may be determined that the user has a relatively higher probability of needing to unlock the target device.
In this case, the user terminal may generate an unlock instruction, and encrypt the unlock instruction using the user key obtained during binding to obtain ciphertext data of the unlock instruction. The unlocking instruction may be specifically understood as instruction data for instructing the target device to execute the first unlocking operation.
In this embodiment, in specific implementation, the user terminal may generate a heartbeat signal as an unlocking instruction according to a preset protocol rule.
S304: sending the ciphertext data of the unlocking instruction to target equipment through first Bluetooth connection; and the target equipment decrypts the ciphertext data of the unlocking instruction by using a user secret key stored in local in advance, and responds to the unlocking instruction to execute a first unlocking operation under the condition of successful decryption.
In this embodiment, the user terminal may quickly send the ciphertext data of the unlocking instruction to the target device through the first bluetooth connection that has been established previously.
In this embodiment, after receiving the ciphertext data of the unlocking instruction, the target device may decrypt the ciphertext data of the unlocking instruction by using the local user key that exists when the target device was previously bound, and may obtain the unlocking instruction when decryption is successful. Further, the target device can be changed from the original locked state to the unlocked state by automatically executing the first unlocking operation or the like in response to the unlocking instruction.
Therefore, the user does not need to additionally operate to send an unlocking instruction to instruct the target equipment to unlock the lock, the operation of the user is simplified, and the user can conveniently and directly use the target equipment after reaching the position of the target equipment.
In one embodiment, in the case that the target device includes a device that needs to use a power source, such as an electric vehicle, an automobile, or the like, the first unlocking operation may specifically include: and opening a power lock of the target device.
In this embodiment, after the target device responds to the first unlocking instruction and opens the power lock of the target device, the target device may be powered by the power supply to prepare for subsequent use by the user. For example, the electric vehicle can turn on the power supply of the whole vehicle, and the instrument indicator light of the electric vehicle is turned on.
In one embodiment, after the target device executes the first unlocking operation in response to the unlocking instruction, the target device may further trigger to call a preset sensor of the target device to acquire a motion state parameter, and monitor whether a preset trigger state parameter is acquired; the preset trigger state parameter is used for representing that a user touches the target equipment; executing a second unlocking operation under the condition that the preset trigger state parameters are determined to be acquired; wherein the second unlocking operation comprises unlocking the use lock of the target device.
In this embodiment, after the target device has performed the first unlocking operation, the preset sensor disposed on the target device may be further used to acquire the corresponding motion state parameter. And according to the acquired motion state parameters, determining whether the user contacts the target equipment by detecting whether preset trigger state parameters capable of representing that the user contacts the target equipment exist.
When the preset trigger state parameter is detected and the user is determined to contact the target device, the user can be determined to use the target device currently, and then the second unlocking operation can be automatically executed to unlock the use lock of the target device. And when the target equipment finishes the second unlocking operation, the target lease is automatically changed from the original locking state to the unlocking state. The user can then use the target device normally. For example, the user may normally ride the rented electric vehicle.
In this embodiment, the usage lock may be an anti-theft lock of the target device. The use lock may be a lock provided on a wheel, a lock provided on a vehicle body, or the like.
In particular, the usage lock may be an electronic lock, such as an electronic faucet lock, an electronic hub lock, an electronic motor lock, and so on.
In the present embodiment, the preset sensors may specifically include a pressure sensor provided on the seat cushion, a wheel movement sensor provided on the wheel, a state sensor provided on the foot rest, an acceleration sensor provided on the vehicle body, and the like. Of course, the above-listed default sensors are merely illustrative. In specific implementation, the preset sensor may further include other types of sensors according to a specific use mode of the target device. The present specification is not limited to these.
In this embodiment, taking an example that the target device is an automatic vehicle or an electric vehicle, the preset trigger state parameter may be a pressure parameter that a data value acquired by a pressure sensor disposed on a seat cushion is greater than a preset pressure threshold, a wheel movement parameter that a data value acquired by a wheel movement sensor disposed on a wheel is greater than a preset wheel movement threshold, an acceleration parameter that a data value acquired by a deceleration sensor disposed on a vehicle body is greater than a preset acceleration threshold, or the like.
In one embodiment, where the target device comprises a device that does not require the use of a power source, such as a bicycle, the target device does not have a power lock of its own.
In this case, the target device may be a device provided with two-way use locks (e.g., a wheel lock and a body lock). At this time, the first unlocking operation may specifically refer to unlocking a first use lock (e.g., a wheel lock) of the target device; the second unlocking operation may specifically refer to unlocking a second-pass use lock (e.g., a vehicle body lock) of the target device.
The target device may be a device provided with only one use lock. At this time, the second unlocking operation may not be present. After the target device executes the first unlocking operation, the original locking state can be changed into the unlocking state, and the user can normally use the target device.
In this embodiment, based on the method, the user terminal automatically scans peripheral bluetooth signals, and establishes a first bluetooth connection with a target device when detecting that bluetooth information of the target device bound with a user in advance exists in a preset range; meanwhile, monitoring the distance between the user terminal and the target equipment, and generating an unlocking instruction under the condition that the monitored distance between the user terminal and the target equipment is smaller than or equal to a preset trigger distance; encrypting the unlocking instruction by using the user secret key, and sending the ciphertext data of the unlocking instruction to the target equipment through the first Bluetooth connection; after receiving the ciphertext data of the unlocking instruction, the target device can decrypt the ciphertext data by using a user secret key stored locally in advance, and responds to the unlocking instruction to execute a first unlocking operation under the condition of successful decryption. Therefore, when the fact that the user is close to the target device and needs to use the target device is automatically recognized, unlocking operation is automatically and efficiently conducted on the target device, user operation is simplified, and use experience of the user is improved.
In one embodiment, in the process that the user is using the target device, the user terminal may generate data synchronization information at preset time intervals; and sending the data synchronization information to the target equipment through a first Bluetooth connection so as to carry out state data synchronization with the target equipment.
Therefore, the user can keep the synchronization of the state data of the user terminal and the target device in the process of using the target device. Meanwhile, through the embodiment, the connection state of the first Bluetooth connection between the user terminal and the target equipment can be detected and maintained in the process that the user uses the target equipment, and the data interaction between the user terminal and the target equipment is ensured to be normal in the process that the user uses the target equipment.
In one embodiment, the target device can also be automatically locked when the user stops the target device at a certain location after using up the target device.
In an embodiment, when the method is implemented, the following may be further included: monitoring the distance between a user terminal and target equipment; under the condition that the monitored distance between the user terminal and the target equipment is greater than the preset trigger distance, disconnecting the first Bluetooth connection; the target equipment triggers and calls a preset sensor of the target equipment to acquire motion state parameters under the condition that the target equipment detects that the first Bluetooth connection is disconnected, and determines the current motion state of the target equipment according to the acquired motion state parameters; and under the condition that the current motion state of the target equipment is determined to be a static state, the target equipment executes locking operation.
In this embodiment, after the unlocking operation is completed, the user terminal may continuously monitor the distance between the user terminal and the target device. When the situation that the distance between the user terminal and the target equipment is larger than the preset triggering distance is monitored, the fact that the user is leaving the target equipment currently can be determined, at the moment, the fact that the user has a high probability currently and does not need to use the target equipment temporarily can be judged, and then the fact that locking operation needs to be carried out on the target equipment is determined.
In this embodiment, the user terminal may disconnect the first bluetooth connection when monitoring that the distance between the user terminal and the target device is greater than a preset trigger distance. After detecting that the user terminal is disconnected from the first Bluetooth connection, the target device can judge that the user has a high probability currently and does not need to use the target device for a while, and then can automatically execute the locking operation, so that the target device is changed from the unlocking state to the locking state.
In one embodiment, when the ue monitors that the distance to the target device is greater than the preset trigger distance, the first bluetooth connection may not be immediately disconnected, but the ue is triggered to monitor whether the distance to the target device is greater than the preset trigger distance for a preset tolerable time period (for example, 30 seconds from the time when the distance to the target device is monitored to be greater than the preset trigger distance). Under the condition that the distance between the user terminal and the target equipment is always greater than the preset trigger distance within the preset tolerable time period, the user terminal can disconnect the first Bluetooth connection, so that the mistaken disconnection of the first Bluetooth connection can be effectively reduced.
In one embodiment, in specific implementation, the user terminal may also calculate a variation trend of the distance between the user terminal and the target device within a last time period (for example, a last 1 minute) while monitoring the distance between the user terminal and the target device; under the condition that the change trend of the distance between the user terminal and the target device is determined to be farther and the distance between the user terminal and the target device is greater than the preset trigger distance, the user terminal can disconnect the first Bluetooth connection, so that the mistaken disconnection of the first Bluetooth connection can be further reduced.
In an embodiment, after the target device detects that the user terminal has disconnected the first bluetooth connection, the lock-off operation may not be immediately performed, but a preset sensor of the target device is triggered and called to acquire a motion state parameter related to the target device, and the current motion state of the target device is determined according to the acquired motion state parameter; and under the condition that the current motion state of the target equipment is determined to be a static state, determining that the user does not need to use the target equipment currently, and executing automatic locking operation by the target equipment.
In one embodiment, after determining that the current motion state of the target device is a static state, the target device may further continuously acquire the motion state parameters within a preset time period (for example, 2 minutes); and determining whether the target equipment is continuously in a static state within the preset time period according to the motion state parameters within the preset time period. And under the condition that the target equipment is determined to be continuously in the static state within the preset time period, determining that the user does not need to use the target equipment currently, and then executing automatic locking operation by the target equipment.
Through the embodiment, automatic locking caused by false triggering in the process of using the target equipment by the user can be effectively avoided, the use safety of the user is protected, and the use experience of the user is further improved.
In one embodiment, considering that in some scenarios, a user sometimes needs to rent and use multiple devices at the same time, the user terminal establishes a binding relationship with multiple target devices in advance. Correspondingly, the user terminal supports the simultaneous establishment of a plurality of first Bluetooth connections with a plurality of target devices.
In an embodiment, when detecting that bluetooth information of a plurality of target devices exists within a preset range, a user terminal may establish a plurality of first bluetooth connections with the plurality of target devices within the preset range at the same time, so that data interaction may be performed with any one of the plurality of target devices at any time through the established first bluetooth connections according to specific conditions.
In one embodiment, after the plurality of first bluetooth connections are established in the above manner, the user terminal further triggers the respective monitoring of the distance between the user terminal and each of the plurality of target devices.
In one embodiment, the user terminal sends the ciphertext data of the unlocking instruction to the target devices through the first bluetooth connections when monitoring that the distance between the user terminal and the target devices is smaller than or equal to a preset trigger distance.
At this time, the target device that receives the ciphertext data of the unlocking instruction may respond to the unlocking instruction to perform in advance to complete the first unlocking operation. Meanwhile, the target device which executes the first unlocking operation can respectively call a preset sensor to detect whether preset trigger state parameters are acquired.
Furthermore, when the user walks to one of the target devices which establish the first bluetooth connection and contacts the target device, only the contacted target device can acquire the preset trigger state parameters, and correspondingly, only the target device can execute the second locking operation, so that the target device is changed from the original locking state to the unlocking state. And other target devices which execute the first unlocking operation cannot execute the second unlocking operation because the preset trigger state parameters are not acquired, and are still in a locking state.
In addition, the target device can maintain a plurality of first Bluetooth connections with a plurality of different user terminals during the use process of the target device by the user. And as long as at least one first Bluetooth in the plurality of first Bluetooth is not disconnected, the target terminal device does not trigger the automatic locking operation. Therefore, the use safety of the user using the target device can be better protected.
In one embodiment, before the implementation, in the rental stage, the user may use the held user terminal to interact with the server of the rental platform, so as to rent the desired target device, and bind the user with the target device.
In an embodiment, before scanning signals of the bluetooth device, when the method is implemented, the following may be further included:
s1: generating and transmitting a lease request on a target device to a server; the lease request at least carries a user identifier of a user and an equipment identifier of target equipment; the server establishes a binding relationship between the user and the target equipment according to the lease request and generates a user secret key corresponding to the user identifier; the server also generates a binding instruction aiming at the target equipment, and encrypts the binding instruction by using an administrator secret key corresponding to the target equipment to obtain ciphertext data of the binding instruction; the binding instruction at least carries a user identifier and a user key; the binding instruction is used for instructing the target device to locally store the user identifier and the user key;
s2: and receiving the user key fed back by the server and the ciphertext data of the binding instruction.
In this embodiment, in specific implementation, when a user wants to lease a selected target device, the user may open a scanning function of a device lease APP (that is, a user terminal) installed and running in the smart phone, and scan and acquire a device identifier (for example, a device number and a device name of a device, or a two-dimensional code of the device, etc.) set on the target device. Correspondingly, the user terminal may obtain the device identifier of the target device, and also obtain a user identifier (for example, an account name of the user, a user registration mobile phone number, and the like) used when the user logs in the APP. The user terminal can generate a lease request at least carrying the equipment identifier of the target equipment and the user identifier of the user; and sending the lease request to a server.
After receiving the lease request, the server may first obtain the user identifier and the device identifier carried in the lease request, and perform authentication processing on the user. Specifically, for example, the server may authenticate the user according to the user identifier to determine whether to provide the corresponding rental service for the user in response to the rental request.
In the case that the authentication process is passed, the server may respond to the lease request, bind the user and the target device, and establish a binding relationship between the two.
For example, the server may establish a corresponding relationship between the user identifier of the user and the device identifier of the target device in the database, thereby establishing a binding relationship between the user and the target device.
In addition, the lease request may also carry a lease duration set by the user. Correspondingly, after the corresponding relationship is established, the server can mark the information of the lease achievement starting time, the appointed lease duration and the like on the corresponding relationship according to the lease duration carried in the lease request.
Further, the server may generate a corresponding user key for the user, and establish a correspondence between the user key and the user identifier of the user, to obtain the user key corresponding to the user identifier of the user.
In addition, the server can also generate an aging parameter for indicating the effective duration of the user key according to the lease duration carried in the lease request or the default lease duration. The aging parameters can be set on the corresponding user secret key to obtain the user secret key carrying the aging parameters. When the target device and the user terminal are used in the following concrete mode, the use duration of the user key can be detected according to the user key aging parameter. When the usage duration of the user key is longer than or equal to the valid duration, the user key is set to be in an invalid state. And the user terminal can not use the target device based on the original user key.
Then, the server may further generate a binding instruction carrying the user identifier and the user key for the target device. The binding instruction may be used to instruct the target device to locally store information data carried by the binding instruction, for example, a carried user key, a user identifier, and the like. The binding instruction may further carry other related information data such as a time efficiency parameter of the key.
Further, the server may obtain ciphertext data of the binding instruction by querying an administrator key (e.g., a factory key) held by the target device based on the device identifier of the target device, and encrypting the binding instruction using the administrator key. And sending the user secret key and the ciphertext data of the binding instruction to the user terminal together.
Accordingly, the user terminal can receive and acquire the user key and the ciphertext data of the binding instruction from the server.
In an embodiment, after receiving the user key and the ciphertext data of the binding instruction, the user terminal may perform bluetooth pairing with the target device, perform first bluetooth connection, and perform corresponding test verification.
In an embodiment, after receiving the user key and the ciphertext data of the binding instruction fed back by the server, when the method is implemented, the following may be further included.
S1: performing Bluetooth pairing with target equipment according to equipment identification of the target equipment;
s2: under the condition of successful pairing, establishing a second Bluetooth connection with the target equipment; sending the ciphertext data of the binding instruction to target equipment through the second Bluetooth connection; the target device decrypts the ciphertext data of the binding instruction by using a locally-held administrator secret key, and feeds back first confirmation information under the condition that the decryption is successful and a user identifier and a user secret key are obtained;
s3: receiving and responding the first confirmation information, and carrying out test verification on the first confirmation information and the target equipment;
s4: under the condition that the test verification is passed, storing a user key and Bluetooth information of the target equipment; wherein the target device stores a user key and bluetooth information of the user terminal.
In this embodiment, the user terminal may first scan a peripheral bluetooth signal, find out bluetooth information of the target device according to the device identifier of the target device, and perform bluetooth pairing with the target device. After the bluetooth pairing is completed, the user terminal can perform first bluetooth connection with the target device, and can record the first bluetooth connection as second bluetooth connection.
Further, the user terminal may send the ciphertext data of the binding instruction to the target device through the second bluetooth connection. Correspondingly, the target device receives the ciphertext data of the binding instruction.
After the target device obtains the ciphertext data of the binding instruction, the ciphertext data of the binding instruction may be decrypted by using a locally-held administrator key. And under the condition that the decryption is successful and the user identifier and the user key carried by the binding instruction are obtained, generating and feeding back corresponding first confirmation information to the user terminal.
After receiving the first confirmation information, the user terminal may perform test verification with the target device to verify whether the user key and the bluetooth connection between the user terminal and the target device are reliable and valid.
In case the test is verified, the user terminal locally stores the user key and the bluetooth information of the target device. Meanwhile, the target device stores the user key and the bluetooth information of the user terminal locally.
In an embodiment, the performing of the test verification with the target device may include the following steps:
s1: generating a test request; encrypting the test request by using a user secret key to obtain ciphertext data of the test request;
s2: sending the ciphertext data of the test request to target equipment through the second Bluetooth connection; the target device decrypts the ciphertext data of the test request by using the user key, and feeds back second confirmation information under the condition of successful decryption;
s3: and receiving and determining that the test verification is passed according to the second confirmation information.
In this embodiment, in specific implementation, the user terminal may generate a heartbeat signal as the test request. Of course, in specific implementation, the user terminal may generate other types of signals as the test request. The present specification is not limited thereto.
In this embodiment, after receiving the ciphertext data of the test request, the target device may attempt to decrypt the ciphertext data of the test request by using the previously obtained user key. If the decryption is successful, it can be determined that the user key and the Bluetooth connection are reliable and valid. Furthermore, the target device may generate and feed back second confirmation information, and the test is verified.
And under the condition that the test verification is passed, the subsequent user can normally use the leased target equipment bound with the user by using the data processing method of the target equipment by using the user terminal.
Conversely, if decryption fails, it may be that the user key is in question, or that the ciphertext data of the test request is in question during transmission over the bluetooth connection. Furthermore, the target device may generate and feed back failure confirmation information, and the test verification fails.
In the case that the test verification fails, the user terminal and the target device do not store the user key and the bluetooth information of the other party. In addition, the user terminal also feeds back an error prompt to the server.
The server can respond to the error prompt to regenerate a new user key and cipher text data of a new binding instruction for the user and send the new user key and the cipher text data to the user terminal; and/or the server inquires the nearest equipment which is not rented by other users around the target equipment and is used as recommended equipment, and generates prompt information for prompting the user to replace the equipment and rent the recommended equipment.
As can be seen from the above, in the data processing method of the device provided in the embodiments of the present specification, based on the method, the user terminal may automatically scan the peripheral bluetooth signals, and establish a first bluetooth connection with the target device when detecting that the bluetooth information of the target device bound with the user terminal in advance exists within the preset range; meanwhile, triggering to start monitoring the distance between the user terminal and the target equipment, and generating an unlocking instruction under the condition that the monitored distance between the user terminal and the target equipment is less than or equal to a preset triggering distance; encrypting an unlocking instruction by using the user secret key obtained during the previous binding, and sending ciphertext data of the unlocking instruction to the target equipment through the first Bluetooth connection; after receiving the ciphertext data of the unlocking instruction, the target device can decrypt the ciphertext data by using the user secret key which is obtained in the previous binding and stored in the local, and responds to the unlocking instruction to execute a first unlocking operation under the condition of successful decryption. Therefore, when the fact that the user needs to use the target equipment when approaching the target equipment is automatically identified, unlocking operation is automatically and efficiently carried out on the target equipment, user operation is simplified, and use experience of the user is improved. Under the condition that the first Bluetooth connection is disconnected, firstly triggering and acquiring the motion state parameters of the target equipment; and after the target equipment is determined to be in a static state according to the acquired motion state parameters, the locking operation is triggered to be executed, so that the error locking in the process of using the target equipment by a user can be effectively avoided, and the use safety of the user is protected.
Referring to fig. 4, another data processing method of a device is further provided in an embodiment of the present disclosure. The method is specifically applied to one side of the target equipment. When implemented, the following may be included.
S401: establishing a first Bluetooth connection with a user terminal; the user terminal is bound with the target equipment in advance;
s402: receiving ciphertext data of an unlocking instruction through the first Bluetooth connection; the user terminal generates ciphertext data of the unlocking instruction under the condition that the monitored distance between the user terminal and target equipment is smaller than or equal to a preset trigger distance;
s403: and decrypting the ciphertext data of the unlocking instruction by using a user secret key pre-stored in the local, and responding to the unlocking instruction to execute a first unlocking operation under the condition of successful decryption.
In an embodiment, after the target device performs the first unlocking operation in response to the unlocking instruction, the method may further include the following steps.
S1: calling a preset sensor of the target equipment to acquire motion state parameters, and monitoring whether preset trigger state parameters are acquired or not; the preset trigger state parameter is used for representing that a user touches the target equipment;
s2: and under the condition that the preset trigger state parameters are determined to be acquired, the target equipment executes a second unlocking operation.
In one embodiment, for a target device that needs to use energy, such as an electric vehicle, an automobile, and the like, the first unlocking operation may specifically include unlocking a power lock of the target device. Accordingly, the second unlocking operation may specifically include unlocking the use lock of the target device.
In one embodiment, for a target device such as an electric vehicle, an automobile, etc. which needs to use energy, in some cases, only a power lock may be provided, and accordingly, a complete unlocking operation may also only include one first unlocking operation. The first unlocking operation may specifically be unlocking a power lock of the target device.
In one embodiment, for a target device such as a bicycle that does not require the use of energy, although a power lock is not provided, one or more different use locks (e.g., two different use locks provided at different locations of the target device) may be provided.
In one embodiment, for a target device such as a bicycle that does not require the use of energy and is provided with only one lock, the complete unlocking operation may also include only one first unlocking operation. Correspondingly, the first unlocking operation can unlock the use lock of the target device.
In one embodiment, for a target device such as a bicycle which does not need to use energy and is only provided with two different use locks, a complete unlocking operation may only comprise two unlocking operations, namely a first unlocking operation and a second unlocking operation, wherein the first unlocking operation may be to unlock a first use lock of the target device, and the second unlocking operation may be to unlock a second use lock of the target device.
Through the embodiment, the target device can automatically complete the unlocking operation, so that the target device is changed from the original locking state to the unlocking state. At this time, the user can directly use the target device.
In an embodiment, after the first unlocking operation is executed in response to the unlocking instruction, in a process of using the target device by the user, the method may further include the following steps: monitoring a connection state of the first bluetooth connection; under the condition that the first Bluetooth connection is detected to be disconnected, triggering and calling a preset sensor of the target equipment to acquire motion state parameters; determining the current motion state of the target equipment according to the acquired motion state parameters; and performing locking operation under the condition that the current motion state of the target equipment is determined to be a static state.
In an embodiment, the target device may further support establishing multiple bluetooth connections with multiple user terminals within a preset range.
In one embodiment, the ue may specifically include a plurality of ues within a preset range; correspondingly, the target device may establish a plurality of first bluetooth connections with a plurality of user terminals within the preset range at the same time.
Furthermore, the target device may be triggered by ciphertext data of an unlocking instruction sent by a user terminal that detects, at the earliest, a distance that is less than or equal to a preset trigger distance from among the plurality of user terminals that establish the first bluetooth connection, and execute the first unlocking operation. And after the first unlocking operation is executed, the target equipment can be triggered by the user who contacts the target equipment at the earliest time, and the second unlocking operation is executed, so that automatic unlocking is completed, and the user can normally use the target equipment.
In one embodiment, during normal use of the target device by the user, the target device maintains a first bluetooth connection (denoted as a target first bluetooth connection) established previously with other user terminals in addition to the first bluetooth connection (denoted as a target first bluetooth connection) currently used by the user.
Therefore, under certain conditions, when the target device detects that the target first Bluetooth connection is disconnected suddenly but at least one of the non-target first Bluetooth connections is not disconnected yet, the target device still cannot trigger the automatic locking operation, so that the use safety of a user can be better protected, and the problem that the user mistakenly closes the lock suddenly in the use process and the use safety of the user is influenced due to the fact that the Bluetooth connection is disconnected suddenly due to the problems of signals and the like in the process of using the target device by the user is avoided.
As can be seen from the above, in the data processing method for a device provided in the embodiment of the present specification, the target device and the user terminal automatically perform interaction of related data, so that when it is automatically recognized that a user approaches the target device and needs to use the target device, the target device can automatically and efficiently perform a corresponding unlocking operation, so that the target device is automatically changed from an original locking state to an unlocking state, and when the user contacts the target device, the user can normally use the target device without performing any operation, thereby simplifying user operation and improving user experience.
Embodiments of the present specification further provide an electronic device, including a processor and a memory for storing processor-executable instructions, where the processor, when implemented in detail, may perform the following steps according to the instructions: scanning the Bluetooth signal to detect whether Bluetooth information of the target equipment exists in a preset range; the target equipment is equipment bound with a user in advance; under the condition that the Bluetooth information of target equipment exists in a preset range, establishing a first Bluetooth connection with the target equipment; monitoring the distance between a user terminal and target equipment; generating an unlocking instruction under the condition that the monitored distance between the user terminal and the target equipment is less than or equal to a preset trigger distance; encrypting the unlocking instruction by using a user secret key to obtain ciphertext data of the unlocking instruction; sending the ciphertext data of the unlocking instruction to target equipment through first Bluetooth connection; and the target equipment decrypts the ciphertext data of the unlocking instruction by using a user secret key stored locally in advance, and responds to the unlocking instruction to execute a first unlocking operation under the condition of successful decryption.
In order to more accurately complete the above instructions, referring to fig. 5, the present specification further provides another specific electronic device, where the electronic device includes a network communication port 501, a processor 502, and a memory 503, and the above structures are connected by an internal cable, so that the structures may perform specific data interaction.
The network communication port 501 may be specifically configured to scan a bluetooth signal to detect whether bluetooth information of a target device exists within a preset range; the target equipment is equipment bound with a user in advance; and under the condition that the Bluetooth information of the target equipment exists in the preset range, establishing a first Bluetooth connection with the target equipment.
The processor 502 may be specifically configured to monitor a distance between the user terminal and the target device; generating an unlocking instruction under the condition that the monitored distance between the user terminal and the target equipment is less than or equal to a preset trigger distance; and encrypting the unlocking instruction by using the user secret key to obtain the ciphertext data of the unlocking instruction.
The network communication port 501 may be specifically configured to send ciphertext data of the unlocking instruction to a target device through a first bluetooth connection; and the target equipment decrypts the ciphertext data of the unlocking instruction by using a user secret key stored locally in advance, and responds to the unlocking instruction to execute a first unlocking operation under the condition of successful decryption.
The memory 503 may be specifically configured to store a corresponding instruction program.
In this embodiment, the network communication port 501 may be a virtual port that is bound to different communication protocols, so that different data can be sent or received. For example, the network communication port may be a port responsible for web data communication, a port responsible for FTP data communication, or a port responsible for mail data communication. In addition, the network communication port can also be a communication interface or a communication chip of an entity. For example, it may be a wireless mobile network communication chip, such as GSM, CDMA, etc.; it can also be a Wifi chip; it may also be a bluetooth chip.
In this embodiment, the processor 502 may be implemented in any suitable manner. For example, the processor may take the form of, for example, a microprocessor or processor and a computer-readable medium that stores computer-readable program code (e.g., software or firmware) executable by the (micro) processor, logic gates, switches, an Application Specific Integrated Circuit (ASIC), a programmable logic controller and embedded microcontroller, and so forth. The description is not intended to be limiting.
In this embodiment, the memory 503 may include multiple layers, and in a digital system, the memory may be any memory as long as it can store binary data; in an integrated circuit, a circuit without a physical form and with a storage function is also called a memory, such as a RAM, a FIFO and the like; in the system, the storage device in physical form is also called a memory, such as a memory bank, a TF card and the like.
The present specification also provides another electronic device, including a processor and a memory for storing processor-executable instructions, where the processor, when implemented, may perform the following steps according to the instructions: establishing a first Bluetooth connection with a user terminal; the user terminal is bound with target equipment in advance; receiving ciphertext data of an unlocking instruction through the first Bluetooth connection; the user terminal generates ciphertext data of the unlocking instruction under the condition that the monitored distance between the user terminal and target equipment is smaller than or equal to a preset trigger distance; and decrypting the ciphertext data of the unlocking instruction by using a user secret key pre-stored in the local, and responding to the unlocking instruction to execute a first unlocking operation under the condition of successful decryption.
The present specification further provides a computer storage medium based on the data processing method of the above device, where the computer storage medium stores computer program instructions, and when the computer program instructions are executed, the computer storage medium implements: scanning the Bluetooth signal to detect whether Bluetooth information of the target equipment exists in a preset range; the target equipment is equipment bound with a user in advance; under the condition that the Bluetooth information of target equipment exists in a preset range, establishing a first Bluetooth connection with the target equipment; monitoring the distance between a user terminal and target equipment; generating an unlocking instruction under the condition that the monitored distance between the user terminal and the target equipment is smaller than or equal to a preset trigger distance; encrypting the unlocking instruction by using a user secret key to obtain ciphertext data of the unlocking instruction; sending the ciphertext data of the unlocking instruction to target equipment through first Bluetooth connection; and the target equipment decrypts the ciphertext data of the unlocking instruction by using a user secret key stored locally in advance, and responds to the unlocking instruction to execute a first unlocking operation under the condition of successful decryption.
In this embodiment, the storage medium includes, but is not limited to, a Random Access Memory (RAM), a Read-Only Memory (ROM), a Cache (Cache), a Hard Disk (HDD), or a Memory Card (Memory Card). The memory may be used to store computer program instructions. The network communication unit may be an interface for performing network connection communication, which is set in accordance with a standard prescribed by a communication protocol.
In this embodiment, the functions and effects specifically realized by the program instructions stored in the computer storage medium can be explained by comparing with other embodiments, and are not described herein again.
The embodiment of the present specification further provides a computer storage medium based on the data processing method of the above device, where the computer storage medium stores computer program instructions, and when the computer program instructions are executed, the computer program instructions implement: establishing a first Bluetooth connection with a user terminal; the user terminal is bound with the target equipment in advance; receiving ciphertext data of an unlocking instruction through the first Bluetooth connection; the user terminal generates ciphertext data of the unlocking instruction under the condition that the monitored distance from the user terminal to the target device is smaller than or equal to a preset trigger distance; and decrypting the ciphertext data of the unlocking instruction by using a user secret key pre-stored in the local, and responding to the unlocking instruction to execute a first unlocking operation under the condition of successful decryption.
Referring to fig. 6, on a software level, the embodiment of the present specification further provides a data processing apparatus of a device, where the apparatus may specifically include the following structural modules.
The detection module 601 may be specifically configured to scan a bluetooth signal to detect whether bluetooth information of a target device exists within a preset range; the target equipment is equipment bound with a user in advance;
the establishing module 602 may be specifically configured to establish a first bluetooth connection with a target device when detecting that bluetooth information of the target device exists within a preset range;
the monitoring module 603 may be specifically configured to monitor a distance between the user terminal and the target device; generating an unlocking instruction under the condition that the monitored distance between the user terminal and the target equipment is less than or equal to a preset trigger distance; encrypting the unlocking instruction by using a user secret key to obtain ciphertext data of the unlocking instruction;
the sending module 604 may be specifically configured to send the ciphertext data of the unlocking instruction to the target device through the first bluetooth connection; and the target equipment decrypts the ciphertext data of the unlocking instruction by using a user secret key stored locally in advance, and responds to the unlocking instruction to execute a first unlocking operation under the condition of successful decryption.
It should be noted that, the units, devices, modules, etc. illustrated in the above embodiments may be implemented by a computer chip or an entity, or implemented by a product with certain functions. For convenience of description, the above devices are described as being divided into various modules by functions, which are described separately. It is to be understood that, in implementing the present specification, functions of each module may be implemented in one or more pieces of software and/or hardware, or a module that implements the same function may be implemented by a combination of a plurality of sub-modules or sub-units, or the like. The above-described embodiments of the apparatus are merely illustrative, and for example, the division of the units is only one type of logical functional division, and other divisions may be realized in practice, for example, multiple units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
Referring to fig. 7, the present specification also provides another data processing apparatus of a device, which may specifically include the following structural modules.
The establishing module 701 may specifically establish a first bluetooth connection with a user terminal; the user terminal is bound with the target equipment in advance;
the receiving module 702 may be specifically configured to receive ciphertext data of the unlocking instruction through the first bluetooth connection; the user terminal generates ciphertext data of the unlocking instruction under the condition that the monitored distance between the user terminal and target equipment is smaller than or equal to a preset trigger distance;
the processing module 703 may be specifically configured to decrypt the ciphertext data of the unlocking instruction by using a user key stored in advance locally, and execute a first unlocking operation in response to the unlocking instruction when decryption is successful.
Therefore, the data processing device of the equipment, which is provided based on the embodiment of the specification, can automatically and efficiently carry out unlocking operation on the target equipment when the situation that the user approaches the target equipment and needs to use the target equipment is automatically identified, so that the user operation is simplified, and the use experience of the user is improved.
In a specific scenario example, the data processing method of the device provided in the present specification may be used to automatically control the unlocking and locking of an electric vehicle released by a rental platform for rental use by a user. The following can be referred to as a specific implementation procedure.
The specific implementation process can comprise two parts: the first binding (corresponding to the leasing stage) and the daily vehicle use (corresponding to the unlocking use).
The first binding process may specifically include the following steps:
s1: when a user purchases or rents a vehicle (e.g., a target device), a request for binding the vehicle (e.g., a rental request) is initiated to the server by scanning a code or entering a vehicle number by an APP (e.g., a user terminal).
S2: the server authenticates the user (which may include account validity, security, payment information, etc.), and after the authentication is passed, sends a set of information to the mobile phone APP, where the set of information includes: the user's encryption key (e.g., user key) for operating the vehicle and a series of encryption instructions a (e.g., ciphertext data of the bind instruction) for sending to the vehicle. The instruction is an instruction instructing to add a user key, and the server may encrypt the instruction using a master encryption key (for example, an administrator key) of the vehicle. The instruction further includes user information (e.g., user id), a user key, a validity period of the key (e.g., an aging parameter of the user key), and the like.
S3: the APP scans the peripheral Bluetooth equipment and initiates a connection pairing request to the vehicle.
S4: after the pairing is successful, the APP sends the encryption instruction A received from the server to the vehicle.
S6: the vehicle decrypts the received command by using the master key, and if the command passes verification after decryption, the next step can be carried out, otherwise, the pairing process is terminated.
S7: the vehicle stores the received user key and user information in the chip, and replies to the result (e.g., first confirmation information).
S8: the APP generates a set of data request instructions (e.g., heartbeat) and encrypts it using the user key, sending it to the vehicle.
S9: and after the vehicle receives the information, the information is decrypted and verified through the user secret key, and the verification is passed and then the information is replied (second confirmation information).
S10: after the APP receives the reply, the first binding process verification is finished, the APP stores device information (for example, bluetooth information of the target device) and a user key of the vehicle bluetooth, and the bluetooth device information (for example, bluetooth information of the user terminal) and the user key of the vehicle storage mobile phone.
In the above flow, if the check fails, the flow is terminated and the related information is deleted.
The unlocking process in the daily use process specifically comprises the following steps:
s1: when the user approaches the vehicle, the mobile phone automatically initiates a connection (e.g., establishes a first bluetooth connection) after detecting a bluetooth signal of the vehicle (after the mobile phone is paired).
S2: after the connection is successful, the APP can receive an event notification of the mobile phone system.
S3: the mobile phone detects the Bluetooth signal intensity of the vehicle, and if the signal intensity is greater than-80 db, a heartbeat signal (e.g., ciphertext data of an unlocking instruction) encrypted by using a user key of the mobile phone is initiated.
S4: after the vehicle received the instruction that APP sent, carry out the deciphering, the verification passes through after the analysis, then carries out unlocking action 1 (for example, first unlocking operation). Meanwhile, a heartbeat signal can be replied to the APP.
S5: the vehicle detects whether the user touches the vehicle, and when the user touches the vehicle is detected, the vehicle performs an unlocking operation 2 (for example, a second unlocking operation).
Therefore, the user can finish automatic unlocking, and can normally ride and use the vehicle.
In the process of using the vehicle after the user unlocks the lock, the vehicle and the mobile phone can perform heartbeat communication periodically under the condition of Bluetooth connection so as to keep Bluetooth connection and perform state data synchronization all the time.
In this scenario example, the two unlocking actions may include unlocking action 1 and unlocking action 2. The unlocking action 1 can be that the power supply of the whole vehicle is turned on, the instrument indicating lamp is turned on, and the controller supplies power; the unlocking action 2 may be to remove the anti-theft operation, at which time the rotating handle is effective.
In the present scene example, various sensors may be used to detect whether the user touches the vehicle, for example, a pressure sensor of a seat cushion, a state sensor of a foot rest, an acceleration sensor capable of detecting shaking of the vehicle, a wheel motion sensor, and the like.
The locking process in the daily use process may specifically include the following steps:
s1: under the prerequisite that the vehicle was unblanked for the response, the vehicle detected that all bluetooth connections have all been broken, and the vehicle does not detect the action of riding in continuous 10 seconds, then closes the lock operation.
S2: if when all bluetooth connections were disconnected, the vehicle still was in the state of riding, then closed automatic locking function to guarantee user safety in utilization.
In this scenario example, the premise that the vehicle is unlocked by induction means that the previous unlocking action is the unlocking action performed through the previously described automatic unlocking step, and a user who comes from a mobile network or a channel such as bluetooth or NFC does not receive a lock opening and closing instruction formed by clicking through an APP after unlocking.
In this scenario example, the vehicle bluetooth supports 1-to-many connection, that is, one vehicle can connect with multiple user handsets simultaneously. In some business scenarios, there may be multiple users in 1 vehicle, and when any two or more users are beside the vehicle, only one user may need to perform the riding operation, so that the vehicle may be allowed to have multiple connections at the same time. The connections may be provided with an upper limit number (e.g., 16). If a plurality of connections are not allowed to exist at the same time, the situation that the Bluetooth connection is disconnected after a user who does not establish the connection rides beyond the Bluetooth connection range may occur, so that the automatic locking is triggered by mistake, and the use safety of the user is protected.
In this scenario example, the mobile phone APP can support simultaneous connection with multiple vehicles, so that when one user has multiple vehicles, any one of the vehicles can be ridden randomly.
In this scenario example, the inductive unlocking and locking functions may be configured by the server, and a user who does not need the inductive unlocking and locking functions may turn off the inductive unlocking and locking functions by himself or herself.
Through the scene example, it is verified that the data processing method of the device provided by the specification can automatically and efficiently perform unlocking operation on the target device when the situation that the user approaches the target device and needs to use the target device is automatically recognized, so that the user operation is simplified, and the use experience of the user is improved; in addition, the method can also avoid the error locking in the process of using the target equipment by the user, thereby protecting the use safety of the user.
Although the present specification provides method steps as described in the examples or flowcharts, additional or fewer steps may be included based on conventional or non-inventive means. The order of steps recited in the embodiments is merely one manner of performing the steps in a multitude of sequences, and does not represent a unique order of performance. When an apparatus or client product in practice executes, it may execute sequentially or in parallel (e.g., in a parallel processor or multithreaded processing environment, or even in a distributed data processing environment) according to the embodiments or methods shown in the figures. The terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, the presence of additional identical or equivalent elements in processes, methods, articles, or apparatus that include the recited elements is not excluded. The terms first, second, etc. are used to denote names, but not to denote any particular order.
Those skilled in the art will also appreciate that, in addition to implementing the controller as pure computer readable program code, the same functionality can be implemented by logically programming method steps such that the controller is in the form of logic gates, switches, application specific integrated circuits, programmable logic controllers, embedded microcontrollers and the like. Such a controller may therefore be considered as a hardware component, and the means included therein for performing the various functions may also be considered as a structure within the hardware component. Or even means for performing the functions may be conceived to be both a software module implementing the method and a structure within a hardware component.
This description may be described in the general context of computer-executable instructions, such as program modules, being executed by a computer. Generally, program modules include routines, programs, objects, components, data structures, classes, etc. that perform particular tasks or implement particular abstract data types. The specification may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote computer storage media including memory storage devices.
From the above description of the embodiments, it is clear to those skilled in the art that the present specification can be implemented by software plus necessary general hardware platform. Based on such understanding, the technical solutions in this specification may be essentially embodied in the form of a software product, which may be stored in a storage medium, such as a ROM/RAM, a magnetic disk, an optical disk, etc., and includes several instructions for enabling a computer device (which may be a personal computer, a mobile terminal, a server, or a network device, etc.) to execute the methods described in the embodiments or some parts of the embodiments in this specification.
The embodiments in the present specification are described in a progressive manner, and the same or similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from the other embodiments. The description is operational with numerous general purpose or special purpose computing system environments or configurations. For example: personal computers, server computers, hand-held or portable devices, tablet-type devices, multiprocessor systems, microprocessor-based systems, set top boxes, programmable electronic devices, network PCs, minicomputers, mainframe computers, distributed computing environments that include any of the above systems or devices, and the like.
While the specification has been described with examples, those skilled in the art will appreciate that there are numerous variations and permutations of the specification that do not depart from the spirit of the specification, and it is intended that the appended claims include such variations and modifications that do not depart from the spirit of the specification.

Claims (12)

1. A data processing method of equipment is applied to a user terminal and comprises the following steps:
scanning a Bluetooth signal to detect whether Bluetooth information of a target device exists in a preset range; the target equipment is equipment bound with a user in advance;
under the condition that the Bluetooth information of target equipment exists in a preset range, establishing a first Bluetooth connection with the target equipment;
monitoring the distance between a user terminal and target equipment; generating an unlocking instruction under the condition that the monitored distance between the user terminal and the target equipment is smaller than or equal to a preset trigger distance; encrypting the unlocking instruction by using a user secret key to obtain ciphertext data of the unlocking instruction; the user key is generated after binding is successful and corresponds to the user identifier;
sending the ciphertext data of the unlocking instruction to target equipment through first Bluetooth connection; and the target equipment decrypts the ciphertext data of the unlocking instruction by using a user secret key stored in local in advance, and responds to the unlocking instruction to execute a first unlocking operation under the condition of successful decryption.
2. The method of claim 1, prior to scanning for bluetooth device signals, further comprising:
generating and sending a lease request about a target device to a server; the lease request at least carries a user identifier of a user and an equipment identifier of target equipment; the server establishes a binding relationship between the user and the target equipment according to the lease request and generates a user secret key corresponding to the user identifier; the server also generates a binding instruction aiming at the target equipment, and encrypts the binding instruction by using an administrator secret key corresponding to the target equipment to obtain ciphertext data of the binding instruction; the binding instruction at least carries a user identifier and a user key; the binding instruction is used for instructing the target device to locally store the user identifier and the user key;
and receiving the user key fed back by the server and the ciphertext data of the binding instruction.
3. The method of claim 2, after receiving the user key and the ciphertext data of the binding instruction fed back by the server, the method further comprising:
performing Bluetooth pairing with the target equipment according to the equipment identification of the target equipment;
under the condition of successful pairing, establishing a second Bluetooth connection with the target equipment; sending the ciphertext data of the binding instruction to target equipment through the second Bluetooth connection; the target device decrypts the ciphertext data of the binding instruction by using a local-held administrator secret key, and feeds back first confirmation information under the condition that the decryption is successful and a user identifier and a user secret key are obtained;
receiving and responding the first confirmation information, and carrying out test verification on the first confirmation information and the target equipment;
under the condition that the test verification is passed, storing a user key and Bluetooth information of the target equipment; wherein the target device stores a user key and bluetooth information of the user terminal.
4. The method of claim 3, performing test validation with the target device, comprising:
generating a test request; encrypting the test request by using a user secret key to obtain ciphertext data of the test request;
sending the ciphertext data of the test request to target equipment through the second Bluetooth connection; the target equipment decrypts the ciphertext data of the test request by using the user secret key, and feeds back second confirmation information under the condition that decryption is successful;
and receiving and determining that the test verification passes according to the second confirmation information.
5. The method of claim 1, the first unlocking operation comprising: opening a power lock of the target device; after the target device responds to the unlocking instruction to execute the first unlocking operation, triggering and calling a preset sensor of the target device to acquire motion state parameters, and monitoring whether preset triggering state parameters are acquired or not; the preset trigger state parameter is used for representing that a user touches the target equipment;
correspondingly, under the condition that the preset trigger state parameters are determined to be acquired, the target device executes a second unlocking operation; wherein the second unlocking operation includes unlocking the use lock of the target device.
6. The method of claim 1, further comprising:
generating data synchronization information at preset time intervals;
and sending the data synchronization information to the target equipment through a first Bluetooth connection so as to perform data synchronization with the target equipment.
7. The method of claim 1, further comprising:
monitoring the distance between a user terminal and target equipment;
under the condition that the monitored distance between the user terminal and the target equipment is greater than the preset trigger distance, disconnecting the first Bluetooth connection; the target equipment triggers and calls a preset sensor of the target equipment to acquire motion state parameters under the condition that the target equipment detects that the first Bluetooth connection is disconnected, and determines the current motion state of the target equipment according to the acquired motion state parameters; and under the condition that the current motion state of the target equipment is determined to be a static state, the target equipment executes locking operation.
8. The method of claim 1, wherein a plurality of first Bluetooth connections are established with a plurality of target devices in the case of detecting that Bluetooth information of the target devices exists within a preset range; correspondingly, under the condition that the monitored distance between the user terminal and the target devices is smaller than or equal to the preset trigger distance, the ciphertext data of the unlocking instruction are respectively sent to the target devices through the first Bluetooth connections.
9. A data processing method of a device is applied to a target device and comprises the following steps:
establishing a first Bluetooth connection with a user terminal; the user terminal is bound with target equipment in advance;
receiving ciphertext data of an unlocking instruction through the first Bluetooth connection; the user terminal generates ciphertext data of the unlocking instruction under the condition that the monitored distance from the user terminal to the target device is smaller than or equal to a preset trigger distance;
decrypting the ciphertext data of the unlocking instruction by using a user secret key stored in the local in advance, and responding to the unlocking instruction to execute a first unlocking operation under the condition of successful decryption; the user key is a user key corresponding to the user identifier and generated after the user key is successfully bound.
10. The method of claim 9, after performing a first unlocking operation in response to the unlocking instruction, the method further comprising:
monitoring a connection state of the first bluetooth connection;
under the condition that the first Bluetooth connection is detected to be disconnected, triggering and calling a preset sensor of the target equipment to acquire motion state parameters;
determining the current motion state of the target equipment according to the acquired motion state parameters;
and performing locking operation under the condition that the current motion state of the target equipment is determined to be a static state.
11. The method of claim 9, the user terminal comprising a plurality of user terminals;
correspondingly, the first bluetooth connection is established with the user terminal, and the method comprises the following steps: and establishing a plurality of first Bluetooth connections with the plurality of user terminals.
12. A computer readable storage medium having stored thereon computer instructions which, when executed, implement the steps of the method of any of claims 1 to 8, or 9 to 11.
CN202110036793.2A 2021-01-12 2021-01-12 Data processing method of device and computer-readable storage medium Active CN112822630B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110036793.2A CN112822630B (en) 2021-01-12 2021-01-12 Data processing method of device and computer-readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110036793.2A CN112822630B (en) 2021-01-12 2021-01-12 Data processing method of device and computer-readable storage medium

Publications (2)

Publication Number Publication Date
CN112822630A CN112822630A (en) 2021-05-18
CN112822630B true CN112822630B (en) 2022-12-23

Family

ID=75868892

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110036793.2A Active CN112822630B (en) 2021-01-12 2021-01-12 Data processing method of device and computer-readable storage medium

Country Status (1)

Country Link
CN (1) CN112822630B (en)

Families Citing this family (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115457682A (en) * 2021-06-09 2022-12-09 华为技术有限公司 Unlocking method, device and storage medium
CN115604390A (en) * 2021-07-07 2023-01-13 云丁网络技术(北京)有限公司(Cn) Offline control method and device for intelligent equipment
CN115705762A (en) * 2021-08-16 2023-02-17 中国移动通信有限公司研究院 Vehicle control method, device, equipment, terminal and medium
CN113676474A (en) * 2021-08-19 2021-11-19 浙江大华技术股份有限公司 Equipment unlocking method and device, storage medium and electronic device
CN113971852B (en) * 2021-10-25 2023-01-20 珠海格力电器股份有限公司 Door lock control method and device, storage medium, processor and terminal equipment
CN114040323B (en) * 2021-10-29 2023-12-19 青岛海尔科技有限公司 Control method and device of equipment, storage medium and electronic device
CN114246420B (en) * 2021-12-13 2023-03-24 罗谢明 Intelligence chinese reading bookshelf
CN114399854A (en) * 2021-12-30 2022-04-26 荣耀终端有限公司 Unlocking method of intelligent door lock, mobile device and storage medium
CN114828289A (en) * 2022-05-10 2022-07-29 上海钧正网络科技有限公司 Communication connection method, communication connection device and computer storage medium
CN114926923A (en) * 2022-05-10 2022-08-19 上海钧正网络科技有限公司 Lock control method and device and computer storage medium
CN115240299B (en) * 2022-07-07 2024-05-24 上海钧正网络科技有限公司 Resource using method and system
CN115379590B (en) * 2022-10-27 2023-02-14 深圳市正浩创新科技股份有限公司 Bluetooth connection establishing method and device, electronic equipment and computer storage medium
CN116484346B (en) * 2023-06-19 2023-08-22 四川金投科技股份有限公司 Intelligent money box management system based on multidimensional information
CN117058789A (en) * 2023-08-18 2023-11-14 深圳市泰比特科技有限公司 Intelligent sensing switch lock method, device, equipment and storage medium

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106593120A (en) * 2017-01-12 2017-04-26 武汉世纪金桥安全技术有限公司 Working method of electronic lock supplying power wirelessly in real time
CN107690030A (en) * 2017-08-31 2018-02-13 恒宝股份有限公司 A kind of method and Bluetooth intelligent card for unlocking and locking intelligent movable equipment
CN108111998A (en) * 2017-12-18 2018-06-01 北京博创联动科技有限公司 A kind of wireless method for unlocking and system
CN109727354A (en) * 2018-12-27 2019-05-07 北京摩拜科技有限公司 A kind of control method and system of vehicle
CN109840980A (en) * 2019-04-04 2019-06-04 兰溪铂蓝智能科技有限公司 A kind of bluetooth locks auto-unlocking method automatically
CN111798691A (en) * 2020-05-29 2020-10-20 领翌技术(横琴)有限公司 Control method and system of parking place ground lock
WO2020211465A1 (en) * 2019-04-15 2020-10-22 美的集团股份有限公司 Smart home device control method, medium, mobile terminal, and apparatus
WO2020211714A1 (en) * 2019-04-16 2020-10-22 华为技术有限公司 Bluetooth scanning method and electronic device

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106593120A (en) * 2017-01-12 2017-04-26 武汉世纪金桥安全技术有限公司 Working method of electronic lock supplying power wirelessly in real time
CN107690030A (en) * 2017-08-31 2018-02-13 恒宝股份有限公司 A kind of method and Bluetooth intelligent card for unlocking and locking intelligent movable equipment
CN108111998A (en) * 2017-12-18 2018-06-01 北京博创联动科技有限公司 A kind of wireless method for unlocking and system
CN109727354A (en) * 2018-12-27 2019-05-07 北京摩拜科技有限公司 A kind of control method and system of vehicle
CN109840980A (en) * 2019-04-04 2019-06-04 兰溪铂蓝智能科技有限公司 A kind of bluetooth locks auto-unlocking method automatically
WO2020211465A1 (en) * 2019-04-15 2020-10-22 美的集团股份有限公司 Smart home device control method, medium, mobile terminal, and apparatus
WO2020211714A1 (en) * 2019-04-16 2020-10-22 华为技术有限公司 Bluetooth scanning method and electronic device
CN111798691A (en) * 2020-05-29 2020-10-20 领翌技术(横琴)有限公司 Control method and system of parking place ground lock

Also Published As

Publication number Publication date
CN112822630A (en) 2021-05-18

Similar Documents

Publication Publication Date Title
CN112822630B (en) Data processing method of device and computer-readable storage medium
CN108122311B (en) Vehicle virtual key implementation method and system
CN108111998B (en) Wireless unlocking method and system
JP6670801B2 (en) Car sharing system and car sharing program
CN106553617B (en) Control method for vehicle, sharing method and device
CN104363266B (en) Method, TSP background systems and the car-mounted terminal of remote control vehicle
CN109328348B (en) Service authentication method, system and related equipment
CN105516103B (en) Method, device and system for binding intelligent household electrical appliance
CN104468582B (en) Authentication and authorization method and system for user information
US20150339334A1 (en) Method for entering identification data of a vehicle into a user database of an internet server device
CN104890623A (en) Vehicle-mounted intelligent terminal control system and control method
CN109895734B (en) Authorized Bluetooth key activation method and system, storage medium and T-BOX
CN103401880B (en) The system and method that a kind of industrial control network logs in automatically
CN105704131A (en) Vehicle lock control method and cloud management server
CN109920114B (en) Door lock control method and system based on geographic position
CN111422163B (en) Vehicle ignition method and system based on face recognition and vehicle
WO2012062067A1 (en) Method, device and system for unlocking mobile terminal by operator
JP2008065829A (en) Method for updating authority data of access device and service center
CN107864124B (en) Terminal information security protection method, terminal and Bluetooth lock
GB2516939A (en) Access authorisation system and secure data communications system
CN105636037B (en) Authentication method, device and electronic equipment
CN105279818A (en) Electronic lock and opening method and system thereof, and mobile terminal
CN111845624B (en) Method for starting vehicle without key
CN105187442A (en) Vehicle authorization method, device, vehicle-mounted terminal, terminal and system
CN106853810A (en) Method, device, car body control module, vehicle and system that vehicle remote is controlled

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant