CN112950815A - Control system and control method of intelligent lock - Google Patents

Control system and control method of intelligent lock Download PDF

Info

Publication number
CN112950815A
CN112950815A CN202011107627.9A CN202011107627A CN112950815A CN 112950815 A CN112950815 A CN 112950815A CN 202011107627 A CN202011107627 A CN 202011107627A CN 112950815 A CN112950815 A CN 112950815A
Authority
CN
China
Prior art keywords
information
intelligent lock
operator
unlocking
target
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011107627.9A
Other languages
Chinese (zh)
Inventor
海龙
曹磊
杨爱璜
和磊
柳明贤
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Lijiang Power Supply Bureau of Yunnan Power Grid Co Ltd)
Original Assignee
Lijiang Power Supply Bureau of Yunnan Power Grid Co Ltd)
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Lijiang Power Supply Bureau of Yunnan Power Grid Co Ltd) filed Critical Lijiang Power Supply Bureau of Yunnan Power Grid Co Ltd)
Priority to CN202011107627.9A priority Critical patent/CN112950815A/en
Publication of CN112950815A publication Critical patent/CN112950815A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00563Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys using personal physical data of the operator, e.g. finger prints, retinal images, voicepatterns

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The application provides a control system and a control method of an intelligent lockset, which are characterized by comprising the following steps: after receiving an unlocking instruction of a lock manager, a lock operator inputs the unlocking instruction into an intelligent lock control end; the intelligent lock control end verifies an unlocking instruction input by a lock operator; after the verification passes, the intelligent lock is controlled to be opened by the intelligent lock control end, and the whole process of opening the intelligent lock is recorded and stored, the intelligent lock has the advantages that whether the received target unlocking instruction comprises target appointed information or not is judged, whether the target unlocking instruction comprises unlocking authorization information for authorizing a target operator to open the intelligent lock is judged by an appointed administrator or not, if yes, the intelligent lock is opened, all process information of opening the intelligent lock is recorded and stored, the unlocking of the intelligent lock is enabled to be fully ensured, and history management data of the intelligent lock can be recorded and stored.

Description

Control system and control method of intelligent lock
Technical Field
The invention relates to the technical field of lock switch control, in particular to a control system and a control method of an intelligent lock.
Background
In the prior art, the locks equipped for the distribution network cabinets are all traditional locks. On the one hand, the number of keys corresponding to the traditional lockset is huge, and the number of related users and managers is large, so that the management difficulty is high and the maintenance cost is extremely high. At present, in a method for controlling the on-off state of a lock by using an intelligent lock in a power distribution network cabinet, the safety problem still does not obtain great guarantee, and the problem that a password is stolen and then the intelligent lock is opened easily occurs because the password of the current intelligent lock is set simply, the required unlocking information is single, the verification steps are few, and the intelligent lock is easily stolen. In addition, the method for remotely controlling the on-off state of the intelligent lock is immature at present and lacks an effective control method.
Content of application
In order to solve the above problem, the present application is directed to a control method for an intelligent lock capable of being remotely controlled, and the control method is characterized by comprising the following steps:
after receiving an unlocking instruction of a lock manager, a lock operator inputs the unlocking instruction into an intelligent lock control end;
the intelligent lock control end verifies an unlocking instruction input by a lock operator;
after the verification is passed, the intelligent lock is controlled by the intelligent lock control end to be opened, and the whole process of opening the intelligent lock is recorded and stored.
Optionally, the unlocking instruction includes management authentication information, operation authentication information, and unlocking authorization information.
The selectable management authentication information comprises identity card information, fingerprint information, iris information and mobile phone number information of a manager; the operation authentication information comprises identity card information, fingerprint information, iris information and mobile phone number information of an operator.
In order to improve the accuracy of the verification, the management authentication information further comprises video information of the manager, and the video information comprises video speaking information of the manager for confirming the management authentication information when the manager verifies currently.
In order to improve the accuracy of the verification, the operation authentication information further comprises video information of the operator, and the video information comprises video speaking information of the operator for confirming the operation authentication information by current verification.
In order to verify the control end of the intelligent lock, the method comprises the following steps,
the intelligent lock control end compares the authentication information of the manager in the unlocking instruction with the management authentication information of the manager stored in the system one by one, and completes the verification of the management authentication information after the verification is correct;
after the management authentication information is verified, the intelligent lockset control end compares the authentication information of the operator in the unlocking instruction with the operation authentication information of the operator stored in the system one by one, and after the operator confirms that the operator does not have errors through the video information, the operator completes the verification of the operation authentication information;
and after the verification of the operation authentication information passes, verifying unlocking authorization information in the unlocking instruction, verifying that a manager authorizes an operator to open authorization video information of the intelligent lockset, and completing the whole verification process after verification is correct.
Optionally, the operating personnel and the management personnel are operating terminals and management terminals, and the operating terminals and the management terminals are terminals with relevance.
In order to improve the safety of the intelligent lock, the intelligent lock control end detects the state of the intelligent lock at regular time, and comprises the following steps,
detecting whether the intelligent lockset is in an opening state or not and in a closing state to finish detection;
if the intelligent lock is detected to be in the unlocking state, the unlocking process of the intelligent lock is continuously detected, the unlocking process is normal, the unlocking state of the intelligent lock is kept, and the detection is finished;
and if the abnormal opening process is detected, alarming and issuing an instruction to close the intelligent lock.
In order to realize the intelligent lock control method, the application also provides a control system of the intelligent lock, which comprises a first judgment module, a second judgment module, a third judgment module and a lock control module;
the first judgment module receives the unlocking instruction, detects the management authentication information and sends the unlocking instruction to the second judgment module
A module;
the second judgment module receives the unlocking instruction sent by the first judgment module, detects the management authentication information and sends the management authentication information
Sending an unlocking instruction to a third judgment module;
a third judging module for receiving the unlocking instruction sent by the second judging module, detecting the unlocking authorization information and sending the unlocking authorization information
Sending an unlocking instruction to a lockset control module;
and the lock control module controls the opening and closing of the lock.
This application is through judging whether received target unlocking instruction includes target appointed information to judge whether target unlocking instruction includes the authorization information of unblanking that appointed administrator authorizes target operator to open intelligent tool to lock, if then open intelligent tool to lock, and record and save this whole process information of opening intelligent tool to lock, make the unblanking of intelligent tool to lock obtain abundant safety guarantee, and can record and save intelligent tool to lock's historical management data.
Drawings
In order to more clearly explain the technical solution of the present application, the drawings needed to be used in the embodiments will be briefly described below, and it is obvious to those skilled in the art that other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a flowchart illustrating an embodiment of a method for controlling an intelligent lock according to an embodiment of the present invention;
FIG. 2 is a flowchart illustrating another embodiment of a method for controlling an intelligent lock according to an embodiment of the present invention;
FIG. 3 is a block diagram of an embodiment of a control system of an intelligent lockset;
FIG. 4 is a block diagram illustrating an embodiment of a computer device in one embodiment.
Detailed Description
The technical solutions in the embodiments of the present application will be described clearly and completely with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The application provides a control system and a control method of an intelligent lock, wherein the control system mainly comprises a first judgment module, a second judgment module, a third judgment module and a lock control module.
The first judgment module 10 receives the unlocking instruction, detects the management authentication information and sends the unlocking instruction to the second judgment module;
the second judgment module 20 receives the unlocking instruction sent by the first judgment module, detects the management authentication information and sends the unlocking instruction to the third judgment module;
the third judging module 30 receives the unlocking instruction sent by the second judging module, detects the unlocking authorization information and sends the unlocking instruction to the lock control module;
and a lock control module 40 for controlling the opening and closing of the lock.
In order to realize intelligent control of the intelligent lock, the control method of the intelligent lock mainly comprises the following steps:
s1: after receiving an unlocking instruction of a lock manager, a lock operator inputs the unlocking instruction into an intelligent lock control end; the unlocking instruction comprises management authentication information, operation authentication information and unlocking authorization information.
S2: the intelligent lock control end compares the authentication information of the manager in the unlocking instruction with the management authentication information of the manager stored in the system one by one, and completes the verification of the management authentication information after the verification is correct;
s3: after the management authentication information is verified, the intelligent lockset control end compares the authentication information of the operator in the unlocking instruction with the operation authentication information of the operator stored in the system one by one, and after the operator confirms that the operator does not have errors through the video information, the operator completes the verification of the operation authentication information;
s4: and after the verification of the operation authentication information passes, verifying unlocking authorization information in the unlocking instruction, verifying that a manager authorizes an operator to open authorization video information of the intelligent lockset, and completing the whole verification process after verification is correct.
S5: after the verification is passed, the intelligent lock is controlled by the intelligent lock control end to be opened, and the whole process of opening the intelligent lock is recorded and stored.
S6: detecting whether the intelligent lockset is in an opening state or not and in a closing state to finish detection;
s7: if the intelligent lock is detected to be in the unlocking state, the unlocking process of the intelligent lock is continuously detected, the unlocking process is normal, the unlocking state of the intelligent lock is kept, and the detection is finished;
s8: and if the abnormal opening process is detected, alarming and issuing an instruction to close the intelligent lock.
In step S1, the management authentication information includes identification card information, fingerprint information, iris information, video information, and mobile phone number information of the administrator; the video information comprises video speaking information which is currently verified by a manager to affirm the management authentication information;
the operation authentication information comprises identity card information, fingerprint information, iris information, video information and mobile phone number information of an operator; the video information comprises video speaking information of the operator which currently verifies the positive operation authentication information.
In the application, the operator and the manager can also be an operation terminal and a management terminal.
Example 1:
as shown in fig. 1, the method for controlling an intelligent lock of the present embodiment includes the following steps:
step S101: and judging whether the received target unlocking instruction comprises target designated information or not, wherein the target designated information comprises authentication information of a manager corresponding to a designated manager, including identity card information, fingerprint information, iris information and mobile phone number information of the manager.
The number of the designated administrators is at least one, and the intelligent lock can be opened only by authorization of the designated administrators.
In this step, authentication information of the designated administrator is required to be acquired to open the intelligent lock, rather than providing personal information of the operator who requires unlocking, which adds a layer of security guarantee.
In addition, in this step, the identification card information, fingerprint information, and iris information of the designated administrator are unique and must all be in one-to-one correspondence with the mobile phone number of the designated administrator to meet the program requirements. Wherein, the iris is a part of the eye structure, the center of the iris is provided with a circular opening, which is called a pupil, just like a size-adjustable aperture in a camera, and pigment is contained to determine the color of the eye. When the light is stronger in the daytime, the iris will be , only a small beam of light will penetrate the pupil and enter the eye; when the eye drops into a dark environment, the iris retreats backwards, so that the pupil becomes larger, more light enters the eye, and the eyes of most vertebrates have irises. Since each individual's iris is different, it is also used for identification.
Step S102: if the received target unlocking instruction comprises target designated information, whether the target unlocking instruction comprises authentication information of an operator corresponding to a target operator sending the target unlocking instruction is further judged, wherein the authentication information comprises identity card information, fingerprint information, iris information and mobile phone number information of the operator.
The target operator is a person who requires to open the intelligent lock and also a person who sends a target unlocking instruction, and needs to record personal information of the target operator, so that the target operator is guaranteed to be a reliable person, and data is provided for later checking an unlocking record process.
Step S103: if the target unlocking instruction comprises authentication information of an operator corresponding to a target operator sending the target unlocking instruction, whether the target unlocking instruction comprises unlocking authorization information for an appointed administrator to authorize the target operator to unlock the intelligent lock is further judged.
The intelligent lock is opened by using the stolen personal information of the designated administrator, and if the unlocking authorization information of the intelligent lock is not authorized by the designated administrator to open the target operator, the intelligent lock cannot be opened, so that the unlocking safety is further ensured.
Step S104: if the target unlocking instruction comprises unlocking authorization information for an appointed administrator to authorize a target operator to unlock the intelligent lock, the intelligent lock is unlocked, and all process information of unlocking the intelligent lock is recorded and stored.
All process information for opening the intelligent lock at this time comprises authentication information of a manager corresponding to an appointed manager, authentication information of an operator corresponding to a target operator and unlocking authorization information for authorizing the target operator to open the intelligent lock by the appointed manager, and in addition, all process information also comprises position information of the intelligent lock and position information of an external terminal corresponding to a target unlocking instruction sent by the target operator, and the information can be recorded and stored as a storage base to be checked by subsequent workers.
Example 2:
as shown in fig. 2, in another embodiment, a method for controlling an intelligent lock is provided, and referring to fig. 2, the method may be applied to both a terminal and a server, and this embodiment is exemplified by being applied to a terminal, where the method for controlling an intelligent lock specifically includes the following steps:
step 201: and receiving an unlocking instruction sent by the external terminal, acquiring and storing the position information of the external terminal, and judging whether the external terminal sending the unlocking instruction is a target terminal having relevance with the intelligent lock. The target terminal is an external terminal which has a binding relationship with the intelligent lock, and respective ID tag information and an agreed communication protocol are stored between the target terminal and the intelligent lock.
Step 202: if the external terminal sending the unlocking instruction is a target terminal having relevance with the intelligent lock, the unlocking instruction is judged to be the target unlocking instruction, and whether the received target unlocking instruction comprises target specified information or not is judged. Wherein, it is only first step judgement to judge that the instruction of unblanking is target unlocking instruction, and in order to let intelligent tool to lock's unblanking have bigger safety guarantee, still need further judge whether target unlocking instruction includes target appointed information.
Step 203: and judging whether the received target unlocking instruction comprises target designated information or not, wherein the target designated information comprises authentication information of a manager corresponding to a designated manager, including identity card information, fingerprint information, iris information and mobile phone number information of the manager.
The number of the designated administrators is at least one, and the intelligent lock can be opened only by authorization of the designated administrators. In this step, the personal information of the designated administrator (i.e., the first personal information) must be obtained to open the intelligent lock, rather than providing the personal information of the operator who requires unlocking, which adds a layer of security guarantee. In addition, in this step, the identification card information, fingerprint information, and iris information of the designated administrator are unique and must all be in one-to-one correspondence with the mobile phone number of the designated administrator to meet the program requirements. Wherein, the iris is a part of the eye structure, the center of the iris is provided with a circular opening, which is called a pupil, just like a size-adjustable aperture in a camera, and pigment is contained to determine the color of the eye. When the light is stronger in the daytime, the iris will be , only a small beam of light will penetrate the pupil and enter the eye; when the eye drops into a dark environment, the iris retreats backwards, so that the pupil becomes larger, more light enters the eye, and the eyes of most vertebrates have irises. Since each individual's iris is different, it is also used for identification.
Step 204: if the received target unlocking instruction comprises target designated information, whether the target unlocking instruction comprises authentication updates of an operator corresponding to a target operator sending the target unlocking instruction is further judged, wherein the authentication updates comprise identity card information, fingerprint information, iris information and mobile phone number information of the operator. The target operator is a person who requires to open the intelligent lock and also a person who sends a target unlocking instruction, and needs to record personal information of the target operator, so that the target operator is guaranteed to be a reliable person, and data is provided for later checking an unlocking record process.
Step 205: if the target unlocking instruction comprises authentication information of an operator corresponding to a target operator sending the target unlocking instruction, whether the target unlocking instruction comprises unlocking authorization information for an appointed administrator to authorize the target operator to unlock the intelligent lock is further judged. The intelligent lock is opened by using the stolen personal information of the designated administrator, and if the unlocking authorization information of the intelligent lock is not authorized by the designated administrator to open the target operator, the intelligent lock cannot be opened, so that the unlocking safety is further ensured.
Step 206: if the target unlocking instruction comprises unlocking authorization information for an appointed administrator to authorize a target operator to unlock the intelligent lock, the intelligent lock is unlocked, and all process information of unlocking the intelligent lock is recorded and stored. All process information for opening the intelligent lock at this time comprises authentication information of a manager corresponding to an appointed manager, authentication information of an operator corresponding to a target operator and unlocking authorization information for authorizing the target operator to open the intelligent lock by the appointed manager, and in addition, all process information also comprises position information of the intelligent lock and position information of an external terminal corresponding to a target unlocking instruction sent by the target operator, and the information can be recorded and stored as a storage base to be checked by subsequent workers.
Step 207: every is predetermine for a long time, detects intelligent tool to lock's on-off state, judges whether intelligent tool to lock is in the off-state. This step is to avoid the intelligent tool to lock the condition that does not appear locking, leads to appearing great potential safety hazard.
Step 208: if the intelligent lockset is not in a closed state, whether the intelligent lockset is in a normal unlocking state is further judged. The normal unlocking state refers to the unlocking state that a target operator normally opens the intelligent lock according to the operation steps.
Step 209: if the intelligent lockset is not in a normal unlocking state, alarming and executing the operation of closing the intelligent lockset, otherwise keeping the unlocking state of the intelligent lockset.
In this embodiment, the authentication information of the administrator further includes personal video information specifying that the administrator is currently verifying positive personal information, and the personal video information includes video speech information specifying that the administrator is currently verifying positive personal information. The current personal video of the designated administrator is recorded, and the personal information of the designated administrator can be confirmed to be real information.
In this embodiment, the authentication information of the operator further includes current personal video information of the target operator, and the personal video information includes video speech information that the target operator currently verifies and confirms the personal information and the authorization information. The current personal video of the target operator is recorded, and the personal information of the target operator can be confirmed to be real information.
In this embodiment, further judge whether target unlocking instruction includes the unblock authorization information that appointed administrator authorized target operator to open intelligent tool to lock, include:
and judging whether the first video speech information comprises authorized video speech information of the current appointed administrator for authorizing the target operator to open the intelligent lock. The current video speech of the designated administrator can reflect the authorization intention of the administrator most, and because the time is the current time, the problem of counterfeiting does not exist.
In this embodiment, further judge whether target unlocking instruction includes the unlocking authorization information that the target operator authorized to open the intelligent lock by the specified administrator, later include:
if the target unlocking instruction does not include unlocking authorization information for authorizing a target operator to open the intelligent lock by a designated administrator, the closed state of the intelligent lock is kept, and warning information is sent to a target terminal.
Example 3:
as shown in fig. 3, in another embodiment, a control system of an intelligent lock is provided, and as can be obtained by referring to fig. 3, the control system 100 of the intelligent lock mainly includes a first determining module 10, a second determining module 20, a third determining module 30 and a lock control module 40.
The first judging module 10 is configured to judge whether the received target unlocking instruction includes target specifying information, where the target specifying information includes authentication information of an administrator corresponding to a specified administrator, and includes identification card information, fingerprint information, iris information, and mobile phone number information of the administrator.
The number of the designated administrators is at least one, and the intelligent lock can be opened only by authorization of the designated administrators. In this step, the personal information of the designated administrator (i.e., the first personal information) must be obtained to open the intelligent lock, rather than providing the personal information of the operator who requires unlocking, which adds a layer of security guarantee. In addition, in this step, the identification card information, fingerprint information, and iris information of the designated administrator are unique and must all be in one-to-one correspondence with the mobile phone number of the designated administrator to meet the program requirements. Wherein, the iris is a part of the eye structure, the center of the iris is provided with a circular opening, which is called a pupil, just like a size-adjustable aperture in a camera, and pigment is contained to determine the color of the eye. When the light is stronger in the daytime, the iris will be , only a small beam of light will penetrate the pupil and enter the eye; when the eye drops into a dark environment, the iris retreats backwards, so that the pupil becomes larger, more light enters the eye, and the eyes of most vertebrates have irises. Since each individual's iris is different, it is also used for identification.
The second judging module 20 is configured to, when the received target unlocking instruction includes target specifying information, further judge whether the target unlocking instruction includes authentication information of an operator corresponding to a target operator who sends the target unlocking instruction, where the authentication information includes identification card information, fingerprint information, iris information, and mobile phone number information of the operator. The target operator is a person who requires to open the intelligent lock and also a person who sends a target unlocking instruction, and needs to record personal information of the target operator, so that the target operator is guaranteed to be a reliable person, and data is provided for later checking an unlocking record process.
The third judging module 30 is configured to, when the target unlocking instruction includes authentication information of an operator corresponding to a target operator who sends the target unlocking instruction, further judge whether the target unlocking instruction includes unlocking authorization information that an appointed administrator authorizes the target operator to unlock the intelligent lock. The intelligent lock is opened by using the stolen personal information of the designated administrator, and if the unlocking authorization information of the intelligent lock is not authorized by the designated administrator to open the target operator, the intelligent lock cannot be opened, so that the unlocking safety is further ensured.
And the lock control module 40 is used for opening the intelligent lock when the target unlocking instruction comprises unlocking authorization information for authorizing a target operator to open the intelligent lock by an appointed administrator, and recording and storing all process information of opening the intelligent lock. All process information for opening the intelligent lock at this time comprises authentication information of a manager corresponding to an appointed manager, authentication information of an operator corresponding to a target operator and unlocking authorization information for authorizing the target operator to open the intelligent lock by the appointed manager, and in addition, all process information also comprises position information of the intelligent lock and position information of an external terminal corresponding to a target unlocking instruction sent by the target operator, and the information can be recorded and stored as a storage base to be checked by subsequent workers.
FIG. 4 is a diagram illustrating an internal structure of a computer device in one embodiment. The computer device may specifically be a terminal, and may also be a server. As shown in fig. 4, the computer device includes a processor, a memory, and a network interface connected by a system bus. Wherein the memory includes a non-volatile storage medium and an internal memory. The non-volatile storage medium of the computer device stores an operating system and may also store a computer program that, when executed by the processor, causes the processor to implement the age identification method. The internal memory may also have a computer program stored therein, which when executed by the processor, causes the processor to perform the age identification method. Those skilled in the art will appreciate that the architecture shown in fig. 4 is merely a block diagram of some of the structures associated with the disclosed aspects and is not intended to limit the computing devices to which the disclosed aspects apply, as particular computing devices may include more or less components than those shown, or may combine certain components, or have a different arrangement of components.
In another embodiment, a computer device is presented, comprising a memory and a processor, the memory storing a computer program which, when executed by the processor, causes the processor to perform the steps of:
judging whether the received target unlocking instruction comprises target designated information or not, wherein the target designated information comprises administrator authentication information corresponding to a designated administrator, including identity card information, fingerprint information, iris information and mobile phone number information of the administrator; if so, further judging whether the target unlocking instruction comprises authentication information of an operator corresponding to a target operator sending the target unlocking instruction, wherein the authentication information comprises identity card information, fingerprint information, iris information and mobile phone number information of the operator; if so, further judging whether the target unlocking instruction comprises unlocking authorization information for an appointed administrator to authorize a target operator to unlock the intelligent lock; if so, the intelligent lock is opened, and all the process information of opening the intelligent lock is recorded and stored.
In another embodiment, a computer-readable storage medium is proposed, in which a computer program is stored which, when executed by a processor, causes the processor to carry out the steps of:
judging whether the received target unlocking instruction comprises target designated information or not, wherein the target designated information comprises administrator authentication information corresponding to a designated administrator, including identity card information, fingerprint information, iris information and mobile phone number information of the administrator; if so, further judging whether the target unlocking instruction comprises authentication information of an operator corresponding to a target operator sending the target unlocking instruction, wherein the authentication information comprises identity card information, fingerprint information, iris information and mobile phone number information of the operator; if so, further judging whether the target unlocking instruction comprises unlocking authorization information for an appointed administrator to authorize a target operator to unlock the intelligent lock; if so, further judging whether the target unlocking instruction comprises unlocking authorization information for an appointed administrator to authorize a target operator to unlock the intelligent lock; if so, the intelligent lock is opened, and all the process information of opening the intelligent lock is recorded and stored.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by hardware related to instructions of a computer program, and the program can be stored in a non-volatile computer readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. Any reference to memory, storage, database, or other medium used in the embodiments provided herein may include non-volatile and/or volatile memory, among others. Non-volatile memory can include read-only memory (ROM), Programmable ROM (PROM), Electrically Programmable ROM (EPROM), Electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), Dynamic RAM (DRAM), Synchronous DRAM (SDRAM), Double Data Rate SDRAM (DDRSDRAM), Enhanced SDRAM (ESDRAM), Synchronous Link DRAM (SLDRAM), Rambus Direct RAM (RDRAM), direct bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM).
The technical features of the above embodiments can be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the above embodiments are not described, but should be considered as the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above examples only express several embodiments of the present application, and the description thereof is more specific and detailed, but not construed as limiting the scope of the present application. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the concept of the present application, which falls within the scope of protection of the present application. Therefore, the protection scope of the present patent shall be subject to the appended claims. The technical solutions in the embodiments of the present application will be described clearly and completely with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The application provides a control system and a control method of an intelligent lock, wherein the control system mainly comprises a first judgment module, a second judgment module, a third judgment module and a lock control module.
The first judgment module 10 receives the unlocking instruction, detects the management authentication information and sends the unlocking instruction to the second judgment module;
the second judgment module 20 receives the unlocking instruction sent by the first judgment module, detects the management authentication information and sends the unlocking instruction to the third judgment module;
the third judging module 30 receives the unlocking instruction sent by the second judging module, detects the unlocking authorization information and sends the unlocking instruction to the lock control module;
and a lock control module 40 for controlling the opening and closing of the lock.
In order to realize intelligent control of the intelligent lock, the control method of the intelligent lock mainly comprises the following steps:
s1: after receiving an unlocking instruction of a lock manager, a lock operator inputs the unlocking instruction into an intelligent lock control end; the unlocking instruction comprises management authentication information, operation authentication information and unlocking authorization information.
S2: the intelligent lock control end compares the authentication information of the manager in the unlocking instruction with the management authentication information of the manager stored in the system one by one, and completes the verification of the management authentication information after the verification is correct;
s3: after the management authentication information is verified, the intelligent lockset control end compares the authentication information of the operator in the unlocking instruction with the operation authentication information of the operator stored in the system one by one, and after the operator confirms that the operator does not have errors through the video information, the operator completes the verification of the operation authentication information;
s4: and after the verification of the operation authentication information passes, verifying unlocking authorization information in the unlocking instruction, verifying that a manager authorizes an operator to open authorization video information of the intelligent lockset, and completing the whole verification process after verification is correct.
S5: after the verification is passed, the intelligent lock is controlled by the intelligent lock control end to be opened, and the whole process of opening the intelligent lock is recorded and stored.
S6: detecting whether the intelligent lockset is in an opening state or not and in a closing state to finish detection;
s7: if the intelligent lock is detected to be in the unlocking state, the unlocking process of the intelligent lock is continuously detected, the unlocking process is normal, the unlocking state of the intelligent lock is kept, and the detection is finished;
s8: and if the abnormal opening process is detected, alarming and issuing an instruction to close the intelligent lock.
In step S1, the management authentication information includes identification card information, fingerprint information, iris information, video information, and mobile phone number information of the administrator; the video information comprises video speaking information which is currently verified by a manager to affirm the management authentication information;
the operation authentication information comprises identity card information, fingerprint information, iris information, video information and mobile phone number information of an operator; the video information comprises video speaking information of the operator which currently verifies the positive operation authentication information.
In the application, the operator and the manager can also be an operation terminal and a management terminal.
Example 1:
as shown in fig. 1, the method for controlling an intelligent lock of the present embodiment includes the following steps:
step S101: and judging whether the received target unlocking instruction comprises target designated information or not, wherein the target designated information comprises authentication information of a manager corresponding to a designated manager, including identity card information, fingerprint information, iris information and mobile phone number information of the manager.
The number of the designated administrators is at least one, and the intelligent lock can be opened only by authorization of the designated administrators.
In this step, authentication information of the designated administrator is required to be acquired to open the intelligent lock, rather than providing personal information of the operator who requires unlocking, which adds a layer of security guarantee.
In addition, in this step, the identification card information, fingerprint information, and iris information of the designated administrator are unique and must all be in one-to-one correspondence with the mobile phone number of the designated administrator to meet the program requirements. Wherein, the iris is a part of the eye structure, the center of the iris is provided with a circular opening, which is called a pupil, just like a size-adjustable aperture in a camera, and pigment is contained to determine the color of the eye. When the light is stronger in the daytime, the iris will be , only a small beam of light will penetrate the pupil and enter the eye; when the eye drops into a dark environment, the iris retreats backwards, so that the pupil becomes larger, more light enters the eye, and the eyes of most vertebrates have irises. Since each individual's iris is different, it is also used for identification.
Step S102: if the received target unlocking instruction comprises target designated information, whether the target unlocking instruction comprises authentication information of an operator corresponding to a target operator sending the target unlocking instruction is further judged, wherein the authentication information comprises identity card information, fingerprint information, iris information and mobile phone number information of the operator.
The target operator is a person who requires to open the intelligent lock and also a person who sends a target unlocking instruction, and needs to record personal information of the target operator, so that the target operator is guaranteed to be a reliable person, and data is provided for later checking an unlocking record process.
Step S103: if the target unlocking instruction comprises authentication information of an operator corresponding to a target operator sending the target unlocking instruction, whether the target unlocking instruction comprises unlocking authorization information for an appointed administrator to authorize the target operator to unlock the intelligent lock is further judged.
The intelligent lock is opened by using the stolen personal information of the designated administrator, and if the unlocking authorization information of the intelligent lock is not authorized by the designated administrator to open the target operator, the intelligent lock cannot be opened, so that the unlocking safety is further ensured.
Step S104: if the target unlocking instruction comprises unlocking authorization information for an appointed administrator to authorize a target operator to unlock the intelligent lock, the intelligent lock is unlocked, and all process information of unlocking the intelligent lock is recorded and stored.
All process information for opening the intelligent lock at this time comprises authentication information of a manager corresponding to an appointed manager, authentication information of an operator corresponding to a target operator and unlocking authorization information for authorizing the target operator to open the intelligent lock by the appointed manager, and in addition, all process information also comprises position information of the intelligent lock and position information of an external terminal corresponding to a target unlocking instruction sent by the target operator, and the information can be recorded and stored as a storage base to be checked by subsequent workers.
Example 2:
as shown in fig. 2, in another embodiment, a method for controlling an intelligent lock is provided, and referring to fig. 2, the method may be applied to both a terminal and a server, and this embodiment is exemplified by being applied to a terminal, where the method for controlling an intelligent lock specifically includes the following steps:
step 201: and receiving an unlocking instruction sent by the external terminal, acquiring and storing the position information of the external terminal, and judging whether the external terminal sending the unlocking instruction is a target terminal having relevance with the intelligent lock. The target terminal is an external terminal which has a binding relationship with the intelligent lock, and respective ID tag information and an agreed communication protocol are stored between the target terminal and the intelligent lock.
Step 202: if the external terminal sending the unlocking instruction is a target terminal having relevance with the intelligent lock, the unlocking instruction is judged to be the target unlocking instruction, and whether the received target unlocking instruction comprises target specified information or not is judged. Wherein, it is only first step judgement to judge that the instruction of unblanking is target unlocking instruction, and in order to let intelligent tool to lock's unblanking have bigger safety guarantee, still need further judge whether target unlocking instruction includes target appointed information.
Step 203: and judging whether the received target unlocking instruction comprises target designated information or not, wherein the target designated information comprises authentication information of a manager corresponding to a designated manager, including identity card information, fingerprint information, iris information and mobile phone number information of the manager.
The number of the designated administrators is at least one, and the intelligent lock can be opened only by authorization of the designated administrators. In this step, the personal information of the designated administrator (i.e., the first personal information) must be obtained to open the intelligent lock, rather than providing the personal information of the operator who requires unlocking, which adds a layer of security guarantee. In addition, in this step, the identification card information, fingerprint information, and iris information of the designated administrator are unique and must all be in one-to-one correspondence with the mobile phone number of the designated administrator to meet the program requirements. Wherein, the iris is a part of the eye structure, the center of the iris is provided with a circular opening, which is called a pupil, just like a size-adjustable aperture in a camera, and pigment is contained to determine the color of the eye. When the light is stronger in the daytime, the iris will be , only a small beam of light will penetrate the pupil and enter the eye; when the eye drops into a dark environment, the iris retreats backwards, so that the pupil becomes larger, more light enters the eye, and the eyes of most vertebrates have irises. Since each individual's iris is different, it is also used for identification.
Step 204: if the received target unlocking instruction comprises target designated information, whether the target unlocking instruction comprises authentication updates of an operator corresponding to a target operator sending the target unlocking instruction is further judged, wherein the authentication updates comprise identity card information, fingerprint information, iris information and mobile phone number information of the operator. The target operator is a person who requires to open the intelligent lock and also a person who sends a target unlocking instruction, and needs to record personal information of the target operator, so that the target operator is guaranteed to be a reliable person, and data is provided for later checking an unlocking record process.
Step 205: if the target unlocking instruction comprises authentication information of an operator corresponding to a target operator sending the target unlocking instruction, whether the target unlocking instruction comprises unlocking authorization information for an appointed administrator to authorize the target operator to unlock the intelligent lock is further judged. The intelligent lock is opened by using the stolen personal information of the designated administrator, and if the unlocking authorization information of the intelligent lock is not authorized by the designated administrator to open the target operator, the intelligent lock cannot be opened, so that the unlocking safety is further ensured.
Step 206: if the target unlocking instruction comprises unlocking authorization information for an appointed administrator to authorize a target operator to unlock the intelligent lock, the intelligent lock is unlocked, and all process information of unlocking the intelligent lock is recorded and stored. All process information for opening the intelligent lock at this time comprises authentication information of a manager corresponding to an appointed manager, authentication information of an operator corresponding to a target operator and unlocking authorization information for authorizing the target operator to open the intelligent lock by the appointed manager, and in addition, all process information also comprises position information of the intelligent lock and position information of an external terminal corresponding to a target unlocking instruction sent by the target operator, and the information can be recorded and stored as a storage base to be checked by subsequent workers.
Step 207: every is predetermine for a long time, detects intelligent tool to lock's on-off state, judges whether intelligent tool to lock is in the off-state. This step is to avoid the intelligent tool to lock the condition that does not appear locking, leads to appearing great potential safety hazard.
Step 208: if the intelligent lockset is not in a closed state, whether the intelligent lockset is in a normal unlocking state is further judged. The normal unlocking state refers to the unlocking state that a target operator normally opens the intelligent lock according to the operation steps.
Step 209: if the intelligent lockset is not in a normal unlocking state, alarming and executing the operation of closing the intelligent lockset, otherwise keeping the unlocking state of the intelligent lockset.
In this embodiment, the authentication information of the administrator further includes personal video information specifying that the administrator is currently verifying positive personal information, and the personal video information includes video speech information specifying that the administrator is currently verifying positive personal information. The current personal video of the designated administrator is recorded, and the personal information of the designated administrator can be confirmed to be real information.
In this embodiment, the authentication information of the operator further includes current personal video information of the target operator, and the personal video information includes video speech information that the target operator currently verifies and confirms the personal information and the authorization information. The current personal video of the target operator is recorded, and the personal information of the target operator can be confirmed to be real information.
In this embodiment, further judge whether target unlocking instruction includes the unblock authorization information that appointed administrator authorized target operator to open intelligent tool to lock, include:
and judging whether the first video speech information comprises authorized video speech information of the current appointed administrator for authorizing the target operator to open the intelligent lock. The current video speech of the designated administrator can reflect the authorization intention of the administrator most, and because the time is the current time, the problem of counterfeiting does not exist.
In this embodiment, further judge whether target unlocking instruction includes the unlocking authorization information that the target operator authorized to open the intelligent lock by the specified administrator, later include:
if the target unlocking instruction does not include unlocking authorization information for authorizing a target operator to open the intelligent lock by a designated administrator, the closed state of the intelligent lock is kept, and warning information is sent to a target terminal.
Example 3:
as shown in fig. 3, in another embodiment, a control system of an intelligent lock is provided, and as can be obtained by referring to fig. 3, the control system 100 of the intelligent lock mainly includes a first determining module 10, a second determining module 20, a third determining module 30 and a lock control module 40.
The first judging module 10 is configured to judge whether the received target unlocking instruction includes target specifying information, where the target specifying information includes authentication information of an administrator corresponding to a specified administrator, and includes identification card information, fingerprint information, iris information, and mobile phone number information of the administrator.
The number of the designated administrators is at least one, and the intelligent lock can be opened only by authorization of the designated administrators. In this step, the personal information of the designated administrator (i.e., the first personal information) must be obtained to open the intelligent lock, rather than providing the personal information of the operator who requires unlocking, which adds a layer of security guarantee. In addition, in this step, the identification card information, fingerprint information, and iris information of the designated administrator are unique and must all be in one-to-one correspondence with the mobile phone number of the designated administrator to meet the program requirements. Wherein, the iris is a part of the eye structure, the center of the iris is provided with a circular opening, which is called a pupil, just like a size-adjustable aperture in a camera, and pigment is contained to determine the color of the eye. When the light is stronger in the daytime, the iris will be , only a small beam of light will penetrate the pupil and enter the eye; when the eye drops into a dark environment, the iris retreats backwards, so that the pupil becomes larger, more light enters the eye, and the eyes of most vertebrates have irises. Since each individual's iris is different, it is also used for identification.
The second judging module 20 is configured to, when the received target unlocking instruction includes target specifying information, further judge whether the target unlocking instruction includes authentication information of an operator corresponding to a target operator who sends the target unlocking instruction, where the authentication information includes identification card information, fingerprint information, iris information, and mobile phone number information of the operator. The target operator is a person who requires to open the intelligent lock and also a person who sends a target unlocking instruction, and needs to record personal information of the target operator, so that the target operator is guaranteed to be a reliable person, and data is provided for later checking an unlocking record process.
The third judging module 30 is configured to, when the target unlocking instruction includes authentication information of an operator corresponding to a target operator who sends the target unlocking instruction, further judge whether the target unlocking instruction includes unlocking authorization information that an appointed administrator authorizes the target operator to unlock the intelligent lock. The intelligent lock is opened by using the stolen personal information of the designated administrator, and if the unlocking authorization information of the intelligent lock is not authorized by the designated administrator to open the target operator, the intelligent lock cannot be opened, so that the unlocking safety is further ensured.
And the lock control module 40 is used for opening the intelligent lock when the target unlocking instruction comprises unlocking authorization information for authorizing a target operator to open the intelligent lock by an appointed administrator, and recording and storing all process information of opening the intelligent lock. All process information for opening the intelligent lock at this time comprises authentication information of a manager corresponding to an appointed manager, authentication information of an operator corresponding to a target operator and unlocking authorization information for authorizing the target operator to open the intelligent lock by the appointed manager, and in addition, all process information also comprises position information of the intelligent lock and position information of an external terminal corresponding to a target unlocking instruction sent by the target operator, and the information can be recorded and stored as a storage base to be checked by subsequent workers.
FIG. 4 is a diagram illustrating an internal structure of a computer device in one embodiment. The computer device may specifically be a terminal, and may also be a server. As shown in fig. 4, the computer device includes a processor, a memory, and a network interface connected by a system bus. Wherein the memory includes a non-volatile storage medium and an internal memory. The non-volatile storage medium of the computer device stores an operating system and may also store a computer program that, when executed by the processor, causes the processor to implement the age identification method. The internal memory may also have a computer program stored therein, which when executed by the processor, causes the processor to perform the age identification method. Those skilled in the art will appreciate that the architecture shown in fig. 4 is merely a block diagram of some of the structures associated with the disclosed aspects and is not intended to limit the computing devices to which the disclosed aspects apply, as particular computing devices may include more or less components than those shown, or may combine certain components, or have a different arrangement of components.
In another embodiment, a computer device is presented, comprising a memory and a processor, the memory storing a computer program which, when executed by the processor, causes the processor to perform the steps of:
judging whether the received target unlocking instruction comprises target designated information or not, wherein the target designated information comprises administrator authentication information corresponding to a designated administrator, including identity card information, fingerprint information, iris information and mobile phone number information of the administrator; if so, further judging whether the target unlocking instruction comprises authentication information of an operator corresponding to a target operator sending the target unlocking instruction, wherein the authentication information comprises identity card information, fingerprint information, iris information and mobile phone number information of the operator; if so, further judging whether the target unlocking instruction comprises unlocking authorization information for an appointed administrator to authorize a target operator to unlock the intelligent lock; if so, the intelligent lock is opened, and all the process information of opening the intelligent lock is recorded and stored.
In another embodiment, a computer-readable storage medium is proposed, in which a computer program is stored which, when executed by a processor, causes the processor to carry out the steps of:
judging whether the received target unlocking instruction comprises target designated information or not, wherein the target designated information comprises administrator authentication information corresponding to a designated administrator, including identity card information, fingerprint information, iris information and mobile phone number information of the administrator; if so, further judging whether the target unlocking instruction comprises authentication information of an operator corresponding to a target operator sending the target unlocking instruction, wherein the authentication information comprises identity card information, fingerprint information, iris information and mobile phone number information of the operator; if so, further judging whether the target unlocking instruction comprises unlocking authorization information for an appointed administrator to authorize a target operator to unlock the intelligent lock; if so, further judging whether the target unlocking instruction comprises unlocking authorization information for an appointed administrator to authorize a target operator to unlock the intelligent lock; if so, the intelligent lock is opened, and all the process information of opening the intelligent lock is recorded and stored.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by hardware instructions of a computer program, which can be stored in a non-volatile computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. Any reference to memory, storage, database, or other medium used in the embodiments provided herein may include non-volatile and/or volatile memory, among others. Non-volatile memory can include read-only memory (ROM), Programmable ROM (PROM), Electrically Programmable ROM (EPROM), Electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), Dynamic RAM (DRAM), Synchronous DRAM (SDRAM), Double Data Rate SDRAM (DDRSDRAM), Enhanced SDRAM (ESDRAM), Synchronous Link DRAM (SLDRAM), Rambus Direct RAM (RDRAM), direct bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM).
The technical features of the above embodiments can be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the above embodiments are not described, but should be considered as the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above examples only express several embodiments of the present application, and the description thereof is more specific and detailed, but not construed as limiting the scope of the present application. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the concept of the present application, which falls within the scope of protection of the present application. Therefore, the protection scope of the present patent shall be subject to the appended claims.

Claims (9)

1. A control method of an intelligent lockset is characterized by comprising the following steps:
after receiving an unlocking instruction of a lock manager, a lock operator inputs the unlocking instruction into an intelligent lock control end;
the intelligent lock control end verifies an unlocking instruction input by a lock operator;
after the verification is passed, the intelligent lock is controlled by the intelligent lock control end to be opened, and the whole process of opening the intelligent lock is recorded and stored.
2. The intelligent lock control method according to claim 1, wherein the unlocking instruction includes management authentication information, operation authentication information, and unlocking authorization information.
3. The control method of the intelligent lock according to claim 2, wherein the management authentication information includes identification card information, fingerprint information, iris information and mobile phone number information of a manager; the operation authentication information comprises identity card information, fingerprint information, iris information and mobile phone number information of an operator.
4. The method for controlling an intelligent lock according to claim 3, wherein the management authentication information further comprises video information of a manager, and the video information comprises video speech information of the manager confirming that the management authentication information is currently verified.
5. The method for controlling an intelligent lock according to claim 3, wherein the operation authentication information further comprises video information of the operator, and the video information comprises video speech information of the operator for currently verifying the operation authentication information.
6. The control method of the intelligent lock according to claim 1, wherein the verification of the intelligent lock control end comprises the following steps,
the intelligent lock control end compares the authentication information of the manager in the unlocking instruction with the management authentication information of the manager stored in the system one by one, and completes the verification of the management authentication information after the verification is correct;
after the management authentication information is verified, the intelligent lockset control end compares the authentication information of the operator in the unlocking instruction with the operation authentication information of the operator stored in the system one by one, and after the operator confirms that the operator does not have errors through the video information, the operator completes the verification of the operation authentication information;
and after the verification of the operation authentication information passes, verifying unlocking authorization information in the unlocking instruction, verifying that a manager authorizes an operator to open authorization video information of the intelligent lockset, and completing the whole verification process after verification is correct.
7. The method for controlling the intelligent lock according to claim 1, further comprising the step of enabling the operator and the manager to be an operation terminal and a management terminal, wherein the operation terminal and the management terminal are terminals with relevance.
8. The control method of the intelligent lock according to claim 1, wherein the intelligent lock control end detects the state of the intelligent lock at regular time, comprising the following steps,
detecting whether the intelligent lockset is in an opening state or not and in a closing state to finish detection;
if the intelligent lock is detected to be in the unlocking state, the unlocking process of the intelligent lock is continuously detected, the unlocking process is normal, the unlocking state of the intelligent lock is kept, and the detection is finished;
and if the abnormal opening process is detected, alarming and issuing an instruction to close the intelligent lock.
9. A control system of an intelligent lock is characterized by comprising a first judgment module, a second judgment module, a third judgment module and a lock control module;
the first judgment module receives the unlocking instruction, detects the management authentication information and sends the unlocking instruction to the second judgment module;
the second judgment module receives the unlocking instruction sent by the first judgment module, detects the management authentication information and sends the unlocking instruction to the third judgment module;
the third judgment module receives the unlocking instruction sent by the second judgment module, detects the unlocking authorization information and sends the unlocking instruction to the lock control module;
and the lock control module controls the opening and closing of the lock.
CN202011107627.9A 2020-10-16 2020-10-16 Control system and control method of intelligent lock Pending CN112950815A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011107627.9A CN112950815A (en) 2020-10-16 2020-10-16 Control system and control method of intelligent lock

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011107627.9A CN112950815A (en) 2020-10-16 2020-10-16 Control system and control method of intelligent lock

Publications (1)

Publication Number Publication Date
CN112950815A true CN112950815A (en) 2021-06-11

Family

ID=76234634

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011107627.9A Pending CN112950815A (en) 2020-10-16 2020-10-16 Control system and control method of intelligent lock

Country Status (1)

Country Link
CN (1) CN112950815A (en)

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104809777A (en) * 2015-04-20 2015-07-29 北京立成通科技有限公司 Household intelligent door lock control system and method based on Internet communication technology
CN105447936A (en) * 2015-11-20 2016-03-30 安徽省德诺电子科技有限公司 Offline intelligent lock monitoring system
US20160180618A1 (en) * 2014-12-23 2016-06-23 Gate Labs Inc. Increased security electronic lock
CN105931337A (en) * 2016-05-09 2016-09-07 杭州摇光科技有限公司 Electronic lock device and system and authorizing method of electronic lock system
CN106251441A (en) * 2016-07-29 2016-12-21 微云(武汉)科技有限公司 A kind of smart lock and control method thereof
EP3188136A1 (en) * 2015-12-28 2017-07-05 Marques, SA Electronic door lock and operation method thereof
CN108921986A (en) * 2018-06-15 2018-11-30 上海移为通信技术股份有限公司 Hotel house intelligent door lock management system
CN109326030A (en) * 2018-09-29 2019-02-12 安徽南瑞中天电力电子有限公司 A kind of batch meter lock control management system having evidence obtaining, alarm and rights management
CN109658559A (en) * 2018-11-28 2019-04-19 任明和 Dynamic code smart lock remote-authorization method based on personalized acoustic control
CN111080845A (en) * 2019-10-29 2020-04-28 深圳市汇顶科技股份有限公司 Temporary unlocking method, system, door lock, administrator terminal and readable storage medium

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160180618A1 (en) * 2014-12-23 2016-06-23 Gate Labs Inc. Increased security electronic lock
CN104809777A (en) * 2015-04-20 2015-07-29 北京立成通科技有限公司 Household intelligent door lock control system and method based on Internet communication technology
CN105447936A (en) * 2015-11-20 2016-03-30 安徽省德诺电子科技有限公司 Offline intelligent lock monitoring system
EP3188136A1 (en) * 2015-12-28 2017-07-05 Marques, SA Electronic door lock and operation method thereof
CN105931337A (en) * 2016-05-09 2016-09-07 杭州摇光科技有限公司 Electronic lock device and system and authorizing method of electronic lock system
CN106251441A (en) * 2016-07-29 2016-12-21 微云(武汉)科技有限公司 A kind of smart lock and control method thereof
CN108921986A (en) * 2018-06-15 2018-11-30 上海移为通信技术股份有限公司 Hotel house intelligent door lock management system
CN109326030A (en) * 2018-09-29 2019-02-12 安徽南瑞中天电力电子有限公司 A kind of batch meter lock control management system having evidence obtaining, alarm and rights management
CN109658559A (en) * 2018-11-28 2019-04-19 任明和 Dynamic code smart lock remote-authorization method based on personalized acoustic control
CN111080845A (en) * 2019-10-29 2020-04-28 深圳市汇顶科技股份有限公司 Temporary unlocking method, system, door lock, administrator terminal and readable storage medium

Similar Documents

Publication Publication Date Title
CN111835689B (en) Identity authentication method of digital key, terminal device and medium
US10171444B1 (en) Securitization of temporal digital communications via authentication and validation for wireless user and access devices
CN108257290A (en) Cash box security control method, dynamic puzzle-lock and backstage cash box monitoring system
CN109255873A (en) Bluetooth method for unlocking, apparatus and system
KR101878432B1 (en) A recognition device for access control in a multi-access control system and control method for operating convergence
CN114360114B (en) User authority management method and system
CN110136313A (en) Nuclear power station gate inhibition management-control method, device, computer equipment and storage medium
CN110969727A (en) Method for controlling intelligent door lock, mobile terminal and computer readable storage medium
CN111192385A (en) Intelligent lock access control system, control method, device, equipment and storage medium
CN110070656B (en) Security box and unlocking method
CN111260831A (en) Intelligent door lock control device, method and system
CN114360118A (en) Access control system based on block chain and processing method
US8151111B2 (en) Processing device constituting an authentication system, authentication system, and the operation method thereof
CN109041059B (en) Mobile terminal security authentication method, management and control platform and mobile terminal
CN111047750A (en) Method, device and system for controlling offline access control device
CN109243014A (en) Access control system and the double mirror unlocking methods of gate inhibition
CN110298149A (en) Account permission locking means, device, computer equipment and storage medium
KR101834181B1 (en) Access control system using certification schedule of multi certification device
CN112950815A (en) Control system and control method of intelligent lock
KR101159268B1 (en) On line door lock control system for automatic teller machine
KR102089030B1 (en) Access control system and method based on combination of authentications
CN110349301A (en) Gate inhibition's open method and device
CN109109814A (en) A kind of vehicle open method, device and computer storage medium based on NFC identification
KR101159984B1 (en) On line door lock control system for automatic teller machine
US10645070B2 (en) Securitization of temporal digital communications via authentication and validation for wireless user and access devices

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20210611

RJ01 Rejection of invention patent application after publication