CN113766045B - Door lock binding method, device and system - Google Patents

Door lock binding method, device and system Download PDF

Info

Publication number
CN113766045B
CN113766045B CN202111031654.7A CN202111031654A CN113766045B CN 113766045 B CN113766045 B CN 113766045B CN 202111031654 A CN202111031654 A CN 202111031654A CN 113766045 B CN113766045 B CN 113766045B
Authority
CN
China
Prior art keywords
door lock
terminal
password
prompt voice
front panel
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202111031654.7A
Other languages
Chinese (zh)
Other versions
CN113766045A (en
Inventor
岳公和
秦熙
韩盈盈
范伟佳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Qingdao Hisense Smart Life Technology Co Ltd
Original Assignee
Qingdao Hisense Smart Life Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Qingdao Hisense Smart Life Technology Co Ltd filed Critical Qingdao Hisense Smart Life Technology Co Ltd
Priority to CN202111031654.7A priority Critical patent/CN113766045B/en
Publication of CN113766045A publication Critical patent/CN113766045A/en
Application granted granted Critical
Publication of CN113766045B publication Critical patent/CN113766045B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/09Mapping addresses
    • H04L61/25Mapping addresses of the same type
    • H04L61/2503Translation of Internet protocol [IP] addresses
    • H04L61/255Maintenance or indexing of mapping tables
    • H04L61/2553Binding renewal aspects, e.g. using keep-alive messages
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/40Security arrangements using identity modules
    • H04W12/48Security arrangements using identity modules using secure binding, e.g. securely binding identity modules to devices, services or applications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/50Secure pairing of devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/60Subscription-based services using application servers or record carriers, e.g. SIM application toolkits
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/70Services for machine-to-machine communication [M2M] or machine type communication [MTC]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W76/00Connection management
    • H04W76/10Connection setup
    • H04W76/14Direct-mode setup
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • G07C2009/00388Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks code verification carried out according to the challenge/response method
    • G07C2009/00404Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks code verification carried out according to the challenge/response method starting with prompting the lock

Abstract

The application discloses a binding method, device and system of a door lock, and relates to the technical field of electronics. The door lock can play the first prompt voice based on the binding request sent by the terminal so as to prompt the user to execute the target operation on the target key on the rear panel of the door lock. The door lock sends a door lock identification to the terminal after receiving the target operation so as to be bound with a user account logged in the terminal. Since the target key on the rear panel is located in the door, it can be ensured that only the user located in the door can perform the target operation. Therefore, the reliability of the door lock transmitting door lock identification is effectively improved, and the safety of the door lock when being bound with the user account is further improved.

Description

Door lock binding method, device and system
Technical Field
The present application relates to the field of electronic technologies, and in particular, to a method, an apparatus, and a system for binding a door lock.
Background
The terminal can be provided with an application program for controlling the intelligent door lock, and a background server of the application program can bind a user account logged in the application program with the intelligent door lock. Based on this, the user can remotely control the intelligent door lock through an application installed in the terminal.
In the related art, an application program installed in a terminal can establish bluetooth connection with an intelligent door lock and acquire a door lock identifier of the intelligent door lock. And then, the terminal can send the door lock identification and the user account logged in the application program to the server so that the server binds the intelligent door lock with the user account.
However, the above binding method is less secure.
Disclosure of Invention
The application provides a binding method, a binding device and a binding system for a door lock, which can solve the problem of lower safety of the binding method in the related technology. The technical scheme is as follows:
in one aspect, a binding method of a door lock is provided, which is applied to the door lock, and the method includes:
based on Bluetooth connection with a terminal, receiving a binding request sent by the terminal;
responding to the binding request, and playing a first prompt voice, wherein the first prompt voice is used for indicating to execute a first target operation on a first target key on a rear panel of the door lock;
and if the first target operation aiming at the first target key is received, sending a door lock identifier of the door lock to the terminal, wherein the door lock identifier is used for the terminal to send the door lock identifier and a user account logged in the terminal to a server so that the server binds the door lock with the user account.
In another aspect, a binding method of a door lock is provided, which is applied to the door lock, and the method includes:
based on Bluetooth connection with a terminal, receiving a binding request sent by the terminal;
responding to the binding request, and playing a second prompt voice, wherein the second prompt voice is used for indicating that an administrator password is input in a front panel of the door lock;
if the first password received by the front panel of the door lock is the same as the administrator password, sending a door lock identification of the door lock to the terminal, wherein the door lock identification is used for sending the door lock identification and a user account logged in the terminal to a server by the terminal so that the server binds the door lock with the user account.
In yet another aspect, there is provided a door lock including: the Bluetooth communication module, the processor, the loudspeaker and the first target key are positioned on the rear panel of the door lock;
the Bluetooth communication module is used for receiving a binding request sent by the terminal based on Bluetooth connection with the terminal;
the processor is used for responding to the binding request, controlling the loudspeaker to play a first prompt voice, and the first prompt voice is used for indicating to execute a first target operation on a first target key on a rear panel of the door lock;
the processor is further configured to control the bluetooth communication module to send a door lock identifier of the door lock to the terminal if the first target operation for the first target key is received, where the door lock identifier is used for the terminal to send the door lock identifier and a user account logged in the terminal to a server, so that the server binds the door lock with the user account.
Optionally, the first target key is a physical key and is connected with the processor; the first target operation is a pressing operation.
Optionally, the processor is configured to:
responding to the binding request, and if the fact that the manager password is not configured in the door lock is determined, controlling the loudspeaker to play a first prompt voice;
the processor is further configured to:
responding to the binding request, and if the fact that the door lock is configured with the administrator password is determined, controlling the loudspeaker to play a second prompt voice, wherein the second prompt voice is used for indicating that the administrator password is input in the front panel of the door lock;
and if the first password received by the front panel of the door lock is the same as the administrator password, controlling the Bluetooth communication module to send the door lock identification of the door lock to the terminal.
Optionally, the processor is further configured to:
before the Bluetooth communication module receives a binding request sent by a terminal based on Bluetooth connection with the terminal, if a second target operation aiming at a second target key on a rear panel of the door lock is received, controlling the loudspeaker to play a third prompt voice, wherein the third prompt voice is used for indicating that an administrator password is input into the front panel of the door lock;
and configuring a second password received by a front panel of the door lock as the administrator password.
Optionally, the bluetooth communication module is further configured to:
and after the processor configures the second password received by the front panel of the door lock as the administrator password, the administrator password is transmitted to the terminal.
Optionally, the processor is further configured to:
and if the target operation for the target key is not received in the target time after the first prompt voice is played by the loudspeaker, the fourth prompt voice is played by the loudspeaker, and the fourth prompt voice is used for indicating the overtime of the target operation.
In yet another aspect, a door lock is provided, the door lock comprising: the Bluetooth communication module, the processor and the loudspeaker;
the Bluetooth communication module is used for receiving a binding request sent by the terminal based on Bluetooth connection with the terminal;
the processor is configured to:
responding to the binding request, controlling the loudspeaker to play a second prompt voice, wherein the second prompt voice is used for indicating that an administrator password is input in a front panel of the door lock;
the processor is further configured to:
and if the first password received by the front panel of the door lock is the same as the administrator password, controlling the Bluetooth communication module to send a door lock identifier of the door lock to the terminal, wherein the door lock identifier is used for the terminal to send the door lock identifier and a user account logged in the terminal to a server so as to bind the door lock and the user account by the server.
In yet another aspect, a door lock is provided, the door lock comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the method of binding a door lock as described in any one of the preceding aspects when executing the computer program.
In yet another aspect, a computer readable storage medium having a computer program stored therein is provided, the computer program being loaded and executed by a processor to implement the method of binding a door lock as provided in any of the above aspects.
In a further aspect, there is provided a computer program product containing instructions which, when run on the computer, cause the computer to perform the method of binding a door lock provided in any of the above aspects.
The technical scheme provided by the application has the beneficial effects that at least:
the application provides a binding method, device and system of a door lock. The door lock can play the first prompt voice based on the binding request sent by the terminal so as to prompt the user to execute the target operation on the target key on the rear panel of the door lock. The door lock sends a door lock identification to the terminal after receiving the target operation so as to be bound with a user account logged in the terminal. Since the target key on the rear panel is located in the door, it can be ensured that only the user located in the door can perform the target operation. Therefore, the reliability of the door lock transmitting door lock identification is effectively improved, and the safety of the door lock when being bound with the user account is further improved.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings required for the description of the embodiments will be briefly described below, and it is apparent that the drawings in the following description are only some embodiments of the present application, and other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 is a schematic diagram of a binding system for a door lock according to an embodiment of the present application;
FIG. 2 is a flowchart of a method for binding a door lock according to an embodiment of the present application;
FIG. 3 is a flowchart of another method for binding a door lock according to an embodiment of the present application;
fig. 4 is a schematic structural view of a door lock according to an embodiment of the present application;
fig. 5 is a schematic view of a rear panel of a door lock according to an embodiment of the present application;
fig. 6 is a schematic view of a door with a door lock according to an embodiment of the present application;
fig. 7 is a flowchart of a binding method of another door lock according to an embodiment of the present application.
Detailed Description
For the purpose of making the objects, technical solutions and advantages of the present application more apparent, the embodiments of the present application will be described in further detail with reference to the accompanying drawings.
Fig. 1 is a schematic structural diagram of a binding system of a door lock according to an embodiment of the present application. Referring to fig. 1, the system may include: door lock 110, terminal 120, and server 130. The server 130 and the terminal 120, and the server 130 and the door lock 110 may be connected by wired or wireless communication. A bluetooth connection may be established between the terminal 120 and the door lock 110.
Alternatively, the server 130 may be a server, or may be a server cluster formed by a plurality of servers, or may also be a cloud computing service center. The terminal 120 may be a mobile phone, a tablet computer, a notebook computer, or a wearable device. For example, referring to fig. 1, the terminal 120 may be a mobile phone.
It will be appreciated that the terminal 120 may have installed therein a door lock control Application (APP) for controlling a door lock, and the server 130 is a background server of the door lock control APP.
The embodiment of the application provides a door lock binding method, which can be applied to a door lock binding system, such as the door lock binding system shown in fig. 1. Referring to fig. 2, the method includes:
step 101, the terminal sends a binding request to the door lock based on Bluetooth connection between the door lock and the terminal.
In the embodiment of the application, bluetooth connection can be established between the door lock and the terminal, the terminal can send a binding request to the door lock based on the Bluetooth connection, and the door lock can further receive the binding request.
The binding may be that a corresponding relationship between the door lock and a user account logged in the terminal is established, and the user account may be an account logged in a door lock control APP installed in the terminal. Correspondingly, the binding request can be used for requesting to establish the corresponding relation between the door lock and the user account logged in the terminal.
Step 102, the door lock responds to the binding request and plays the first prompt voice.
After receiving a binding request sent by a terminal, the door lock can respond to the binding request to play a first prompt voice. The first prompt voice is used for indicating to execute a first target operation on a first target key on a rear panel of the door lock. The first target key may be a touch key or a physical key. For the touch key, the first target operation may be a click operation, and the click operation may be a single click operation, a double click operation, a long press operation, or the like. For a physical key, the first target operation may be a pressing operation, for example, a long-press operation. The rear panel of the door lock is a panel positioned on the inner side of the door plate, namely, the rear panel of the door lock is positioned indoors.
Step 103, if the door lock receives a first target operation aiming at the first target key, a door lock identification of the door lock is sent to the terminal.
After the door lock finishes playing the first prompt voice, if the first target operation of the user for the first target key is received, the door lock identification of the door lock can be sent to the terminal based on Bluetooth connection with the terminal. The door lock identifier refers to a character string capable of uniquely identifying the door lock.
And 104, the terminal sends the door lock identification and the user account logged in the terminal to the server.
After receiving the door lock identification of the door lock, the terminal can send the door lock identification and the user account logged in the terminal to the server. The door lock identifier and the user account are used for binding the door lock with the user account by the server.
In summary, the embodiment of the application provides a binding method of a door lock. The door lock can play the first prompt voice based on the binding request sent by the terminal so as to prompt the user to execute the target operation on the target key on the rear panel of the door lock. The door lock sends a door lock identification to the terminal after receiving the target operation so as to be bound with a user account logged in the terminal. Since the target key on the rear panel is located in the door, it can be ensured that only the user located in the door can perform the target operation. Therefore, the reliability of the door lock transmitting door lock identification is effectively improved, and the safety of the door lock when being bound with the user account is further improved.
The embodiment of the application provides another door lock binding method, which can be applied to a door lock binding system, such as the door lock binding system shown in fig. 1. Referring to fig. 3, the method includes:
step 201, if the door lock receives a second target operation for a second target key on a rear panel of the door lock, playing a third prompt voice.
In the embodiment of the application, if the user needs to set the administrator password in the door lock, the user can execute the second target operation on the second target key on the rear panel of the door lock. The door lock is capable of playing a third prompt voice in response to the second target operation, wherein the third prompt voice is used for indicating a user to input an administrator password on a front panel of the door lock. For example, the third alert voice may be: please enter the administrator code ".
The second target key may be a touch key or a physical key. For the touch key, the second target operation may be a click operation, and the click operation may be a single click operation, a double click operation, a long press operation, or the like. For a physical key, the second target operation may be a pressing operation, for example, a long-press operation. The front panel of the door lock is a panel positioned on the outer side of the door plate, namely the front panel of the door lock is positioned outdoors.
Fig. 4 is a schematic structural diagram of a door lock according to an embodiment of the present application. As shown in fig. 4, the door lock includes a processor 1101, a speaker 1102, and a rear panel 1103. If the user needs to set the administrator password, the user can press a physical key on the back panel 1103. After detecting the pressing operation, the processor 1103 may control the speaker 1102 to play the third alert voice.
Step 202, the door lock configures the second password received by the front panel as an administrator password.
If the door lock can receive the second password input by the user on the front panel after the third prompt voice is played, the second password can be configured as an administrator password. The second password may be a character string, for example, a group of digits. Alternatively, the second password may be biometric information of the user, for example, fingerprint or facial feature information of the user. Alternatively, the second password may be card information of the door card.
It should be appreciated that the door lock may also create an Identification (ID) of the administrator user after receiving the second password, and may store the ID of the administrator user in correspondence with the administrator password.
Referring to fig. 4, the door lock further includes a front panel 1104. If the user inputs a set of digits by clicking on a touch key of the front panel 1104, the processor 1101 may configure the set of digits received as an administrator password.
Step 203, the terminal sends a binding request to the door lock based on the bluetooth connection between the door lock and the terminal.
In the embodiment of the application, bluetooth connection can be established between the door lock and the terminal, the terminal can send a binding request to the door lock based on the Bluetooth connection, and the door lock can further receive the binding request. The binding may be that a corresponding relationship between the door lock and a user account logged in the terminal is established, and the user account may be an account logged in a door lock control APP installed in the terminal. Correspondingly, the binding request can be used for requesting to establish the corresponding relation between the door lock and the user account logged in the terminal.
Referring to fig. 4, the door lock further includes a bluetooth communication module 1105. The terminal can establish a bluetooth connection with the bluetooth communication module 1105 of the door lock through its bluetooth communication module. The bluetooth communication module of the terminal may send a binding request to the bluetooth communication module 1105 of the door lock based on the bluetooth connection, and the processor 1101 of the door lock may further obtain the binding request.
Optionally, before the terminal and the door lock establish bluetooth connection, the terminal may search whether bluetooth devices exist in a preset range through the bluetooth communication module thereof. If the Bluetooth communication module of the door lock is in a working state and can be searched, the terminal can pair with the door lock when searching the door lock. After the door lock and the terminal are successfully paired, bluetooth connection can be established with the terminal.
Step 204, the door lock responds to the binding request to detect whether an administrator password is configured.
After the door lock receives a binding request sent by the terminal, whether an administrator password is configured in the door lock or not can be detected in response to the binding request. If it is determined that the administrator code is not configured in the door lock, the door lock may perform step 205. If it is determined that the administrator code is configured in the door lock, the door lock may perform step 208.
The door lock responds to a binding request sent by the terminal, and whether an administrator password is configured in the door lock is detected first. And then, the door lock can perform different operations according to different detected result execution, so that the binding process of the door lock and the terminal can be ensured to be more reliable.
Step 205, the door lock plays the first prompt voice.
If the door lock detects that the administrator password is not configured, the first prompt voice can be played. The first prompt voice is used for indicating a user to execute a first target operation on a first target key on a rear panel of the door lock. The first target key may be a touch key or a physical key. For the touch key, the first target operation may be a click operation, and the click operation may be a single click operation, a double click operation, a long press operation, or the like. For a physical key, the first target operation may be a pressing operation, for example, a long-press operation. For example, the first prompt voice may be "please click a set key confirmation".
It will be appreciated that the first target key may be the same or different from the second target key in step 201. The first target operation may be the same as or different from the second target operation in step 201.
Referring to fig. 4, if the door lock detects that the door lock is not configured with the administrator password, the processor 1101 of the door lock may control the speaker 1102 to play the first prompt voice.
Step 206, if the door lock receives a first target operation for the first target key, the door lock sends a door lock identification of the door lock to the terminal.
After the door lock finishes playing the first prompt voice, if the first target operation of the user for the first target key is received, the door lock identification of the door lock can be sent to the terminal based on Bluetooth connection with the terminal. The door lock identifier refers to a character string capable of uniquely identifying the door lock. Since the rear panel of the door lock is located in the door, i.e., the first target key is located in the door, it can be ensured that only a user located in the door can perform the target operation. Therefore, the door lock can be ensured to send the door lock identification to the trusted terminal, and the reliability of the binding process of the door lock and the terminal is improved.
Referring to fig. 4, if the door lock receives a pressing operation for a physical key on the rear panel 1103, the processor 1101 may control the bluetooth communication module 1105 to transmit a door lock identification to the terminal after detecting the pressing operation.
Fig. 5 is a schematic view of a rear panel of a door lock according to an embodiment of the present application. Referring to fig. 5, the first target key 11031 may be a physical key, and the physical key may be located at a side of a rear panel of the door lock. Fig. 6 is a schematic view of a door with a door lock according to an embodiment of the present application. Fig. 6 may represent a scenario in which a user opens a door from within a door. As shown in fig. 6, the rear panel 1103 of the door lock is located inside the door, whereby it can be ensured that only the user located inside the door can perform the target operation. Referring to fig. 6, the first target key 11031 may also be located on the front of the rear panel 1103 of the door lock.
Step 207, if the door lock does not receive the first target operation for the first target key within the target time period after the first prompt voice is played, the door lock plays a fourth prompt voice.
If the door lock does not receive the first target operation of the user for the first target key within the target time after the first prompt voice is played, a fourth prompt voice can be played. The fourth alert voice is used to indicate the first target operation timeout. For example, the fourth alert voice may be "operation timeout, door lock not responsive".
The target duration may be a fixed duration preconfigured in the door lock. For example, the target duration may be 10 seconds or 15 seconds.
It can be understood that after the door lock plays the fourth prompting voice, the binding process with the terminal can be ended, i.e. the door lock does not execute the subsequent operation. Therefore, the user can be timely given feedback so as to perform subsequent operation, the door lock is not required to be in a state of waiting for receiving the first target operation for a long time, and the energy consumption of the door lock is reduced.
Step 208, the door lock plays the second prompt voice.
And when the door lock is detected to be provided with the administrator password, the second prompt voice is played. The second prompt voice is used for indicating a user to input an administrator code on the front panel of the door lock. For example, the second prompt voice may be "please enter an administrator password".
Step 209, if the first password received by the front panel of the door lock is the same as the administrator password, the door lock sends a door lock identification of the door lock to the terminal.
If the door lock receives the first password input by the user on the front panel after the second prompt voice is played, the first password can be compared with the preset administrator password. If the door lock determines that the first password is consistent with the administrator password, the terminal sending the binding request can be determined to be a trusted terminal, and then the door lock identification of the door lock can be sent to the terminal. Therefore, the door lock can be ensured to send the door lock identification to the trusted terminal, and the reliability of the binding process of the door lock and the terminal is improved.
It will be appreciated that the type of the first password is the same as the type of the administrator password. That is, if the administrator password is a string, the first password is also a string. If the administrator password is a fingerprint, the first password is also a fingerprint.
Referring to fig. 4, if the door lock receives a set of numbers input by a user on a front panel 1104 of the door lock and the processor 1101 determines that the set of numbers is identical to an administrator password, the bluetooth communication module 1105 is controlled to transmit a door lock identification to the terminal.
It is further understood that if the door lock determines that the first password entered by the user is different from the administrator password, a fifth alert voice may be played. The fifth prompting voice is used for indicating the input first password error. For example, the fifth prompt voice may be "password error, please re-enter". Therefore, the user can be reminded in time, so that the user can input the first password again.
It may be further understood that if the door lock does not receive the first password input by the user on the front panel within the target time period after the second prompt voice is played, or the first passwords received by the door lock within the target time period are different from the administrator passwords, or the number of error passwords continuously received by the door lock is greater than the threshold, the sixth prompt voice may be played. Wherein, the error password is a password different from the administrator password. The threshold may be a preset value, for example, may be 3 or 5. The sixth prompting voice is used for indicating that the password is input overtime or the password input operation is limited. For example, the sixth prompt voice may be "operation timeout, door lock not responding" or "password error, door lock locked". Therefore, the user can be timely given feedback so as to perform subsequent operation, the door lock is not required to be in a state of waiting for receiving the first password for a long time, and the energy consumption of the door lock is reduced.
The target duration may be a fixed duration preconfigured in the door lock. For example, the target duration may be 10 seconds or 15 seconds. It will be further appreciated that the target duration in step 209 may be the same as or different from the target duration in step 207 described above.
Step 210, the terminal sends the door lock identification and the user account logged in the terminal to the server.
After receiving the door lock identification of the door lock, the terminal can send the door lock identification and the user account logged in the terminal to the server. The door lock identifier and the user account are used for binding the door lock with the user account by the server. The user account number refers to an account number logged in a door lock control APP installed in a terminal.
Step 211, the door lock sends an administrator password to the terminal.
In the embodiment of the application, after the terminal sends the door lock identification and the user account logged in the terminal to the server, the door lock can also send the administrator password to the terminal. The administrator code may be used for viewing by a user of the terminal to facilitate the terminal to manage the door lock. For example, the terminal may generate a temporary password for the door lock based on the administrator password.
In summary, the embodiment of the application provides a binding method of a door lock. The door lock can play the first prompt voice based on the binding request sent by the terminal so as to prompt the user to execute the target operation on the target key on the rear panel of the door lock. The door lock sends a door lock identification to the terminal after receiving the target operation so as to be bound with a user account logged in the terminal. Since the target key on the rear panel is located in the door, it can be ensured that only the user located in the door can perform the target operation. Therefore, the reliability of the door lock transmitting door lock identification is effectively improved, and the safety of the door lock when being bound with the user account is further improved.
The embodiment of the application provides a binding method of a door lock, which can be applied to a binding system of a door lock, such as the binding system of the door lock shown in fig. 1. Referring to fig. 7, the method includes:
step 301, the terminal sends a binding request to the door lock based on bluetooth connection between the door lock.
In the embodiment of the application, bluetooth connection can be established between the door lock and the terminal, the terminal can send a binding request to the door lock based on the Bluetooth connection, and the door lock can further receive the binding request. The implementation of this step 301 may refer to step 101 or step 203 described above.
Step 302, the door lock responds to the binding request to play the second prompt voice.
After receiving the binding request sent by the terminal, the door lock can respond to the binding request to play the second prompt voice. Wherein the second prompt voice is used for indicating that an administrator password is input in the front panel of the door lock. This step 302 may be implemented as described above with reference to step 208.
Step 303, if the first password received by the door lock on the front panel is the same as the administrator password, sending a door lock identification of the door lock to the terminal.
If the door lock receives the first password input by the user on the front panel after the second prompt voice is played, the first password can be compared with the preset administrator password. If the door lock determines that the first password is consistent with the administrator password, the terminal sending the binding request can be determined to be a trusted terminal, and then the door lock identification can be sent to the terminal. The implementation of this step 303 may refer to step 209 described above.
And 304, the terminal sends the door lock identification and the user account logged in the terminal to the server.
After receiving the door lock identification of the door lock, the terminal can send the door lock identification and the user account logged in the terminal to the server. The door lock identifier and the user account are used for binding the door lock with the user account by the server. The implementation of this step 304 may refer to step 104 or step 210 described above.
In summary, the embodiment of the application provides a door lock. The door lock can play a second prompt voice based on the binding request sent by the terminal so as to prompt a user to input an administrator password on the front panel of the door lock. After confirming that the received first password is the same as the administrator password, the door lock sends a door lock identification to the terminal so as to be bound with a user account logged in the terminal. Because only the user of the door lock can input the first password which is the same as the password of the administrator, the reliability of the door lock for sending the door lock identification is effectively improved, and the safety of the door lock when being bound with the user account is further improved.
The embodiment of the application also provides a door lock, which can execute the method for binding the door lock executed by the door lock, such as the method in the embodiment shown in fig. 2 or fig. 3. As shown in fig. 4, the door lock 110 includes: a processor 1101, a speaker 1102, a rear panel 1103 and a bluetooth communication module 1105.
The bluetooth communication module 1105 is configured to receive a binding request sent by a terminal based on bluetooth connection with the terminal.
The processor 1101 is configured to:
in response to the binding request, the speaker 1102 is controlled to play a first prompt voice for instructing to perform a first target operation on a first target key on the rear panel 1103 of the door lock.
The processor 1101 is further configured to:
if a first target operation aiming at a first target key is received, a door lock identifier of a door lock is sent to the terminal, wherein the door lock identifier is used for sending the door lock identifier and a user account logged in the terminal to a server by the terminal, so that the server binds the door lock with the user account.
Optionally, as shown in fig. 5 or fig. 6, the door lock further includes a first target key 11031 located on the rear panel 1103 of the door lock. The first target key 11031 is connected to the processor 1101; the first target operation is a pressing operation.
Optionally, as shown in fig. 4, the door lock further comprises a front panel 1104. The processor 1101 is configured to:
in response to the binding request, if it is determined that the administrator password is not configured in the door lock, the speaker 1102 is controlled to play the first prompt voice.
The processor 1101 is further configured to:
in response to the binding request, if it is determined that the door lock is configured with the administrator password, the speaker 1102 is controlled to play a second prompting voice, where the second prompting voice is used to instruct the front panel 1104 of the door lock to input the administrator password;
if the first password received at the front panel 1104 of the door lock is the same as the administrator password, the door lock identification of the door lock is sent to the terminal.
Optionally, the processor 1101 is further configured to:
before the bluetooth communication module 1105 receives a binding request sent by the terminal based on bluetooth connection with the terminal, if a second target operation for a second target key on the rear panel 1103 of the door lock is received, the speaker 1102 is controlled to play a third prompting voice, and the third prompting voice is used for indicating that an administrator password is input in the front panel 1104 of the door lock;
the second code received by the front panel 1104 of the door lock is configured as an administrator code.
Optionally, the bluetooth communication module 1105 is further configured to:
after the processor 1101 configures the second password received by the front panel 1104 of the door lock as an administrator password, the administrator password is transmitted to the terminal.
Optionally, the processor 1101 is further configured to:
if the target operation for the target key is not received within the target time period after the speaker 1102 is controlled to play the first prompt voice, the speaker 1102 is controlled to play a fourth prompt voice, and the fourth prompt voice is used for indicating that the target operation is overtime.
In summary, the embodiment of the application provides a door lock. The door lock can play the first prompt voice based on the binding request sent by the terminal so as to prompt the user to execute target operation on the target key on the rear panel of the door lock. The door lock sends a door lock identification to the terminal after receiving the target operation so as to be bound with a user account logged in the terminal. Since the target key on the rear panel is located in the door, it can be ensured that only the user located in the door can perform the target operation. Therefore, the reliability of the door lock transmitting door lock identification is effectively improved, and the safety of the door lock when being bound with the user account is further improved.
The embodiment of the application provides another door lock, which can execute the method for binding the door lock executed by the door lock provided by the embodiment of the method, for example, the method in the embodiment shown in fig. 7. As shown in fig. 4, the door lock 110 includes: a processor 1101, a speaker 1102, a front panel 1104 and a bluetooth communication module 1105.
The bluetooth communication module 1105 is configured to receive a binding request sent by a terminal based on bluetooth connection with the terminal.
The processor 1101 is configured to:
in response to the binding request, the speaker 1102 is controlled to play a second prompt voice for instructing an administrator password to be input at the front panel 1104 of the door lock.
The processor 1101 is further configured to:
if the first password received at the front panel 1104 of the door lock is the same as the administrator password, the bluetooth communication module 1105 is controlled to send a door lock identifier of the door lock to the terminal, where the door lock identifier is used for the terminal to send the door lock identifier and a user account logged in the terminal to the server, so that the server binds the door lock with the user account.
In summary, the embodiment of the application provides a door lock. The door lock can play a second prompt voice based on the binding request sent by the terminal so as to prompt a user to input an administrator password on the front panel of the door lock. After confirming that the received first password is the same as the administrator password, the door lock sends a door lock identification to the terminal so as to be bound with a user account logged in the terminal. Because only the user of the door lock can input the first password which is the same as the password of the administrator, the reliability of the door lock for sending the door lock identification is effectively improved, and the safety of the door lock when being bound with the user account is further improved.
The embodiment of the application provides a door lock, which comprises a memory, a processor and a computer program stored in the memory and capable of running on the processor, wherein the binding method of the door lock, such as the binding method of the door lock shown in fig. 2, 3 or 7, is realized when the processor executes the computer program.
An embodiment of the present application provides a computer readable storage medium having a computer program stored therein, the computer program being loaded by a processor and executing the method for binding a door lock provided in the above embodiment, for example, the method for binding a door lock shown in fig. 2, 3 or 7.
The embodiment of the application also provides a computer program product containing instructions, which when run on a computer, cause the computer to execute the method for binding the door lock provided by the above method embodiment, for example, the method for binding the door lock shown in fig. 2, 3 or 7.
It will be understood by those skilled in the art that all or part of the steps for implementing the above embodiments may be implemented by hardware, or may be implemented by a program for instructing relevant hardware, where the program may be stored in a computer readable storage medium, and the storage medium may be a read-only memory, a magnetic disk or an optical disk, etc.
The terms "first," "second," and the like in this disclosure are used for distinguishing between similar elements or items having substantially the same function and function, and it should be understood that there is no logical or chronological dependency between the terms "first," "second," and "n," and that there is no limitation on the amount and order of execution.
The foregoing description of the exemplary embodiments of the application is not intended to limit the application to the particular embodiments disclosed, but on the contrary, the intention is to cover all modifications, equivalents, and alternatives falling within the spirit and scope of the application.

Claims (9)

1. A method of binding a door lock, applied to a door lock, the method comprising:
if a second target operation aiming at a second target key on a rear panel of the door lock is received, playing a third prompt voice, wherein the third prompt voice is used for indicating that an administrator password is input in a front panel of the door lock;
configuring a second password received by a front panel of the door lock as the administrator password;
based on Bluetooth connection with a terminal, receiving a binding request sent by the terminal;
responding to the binding request, and if the fact that the manager password is not configured in the door lock is determined, playing a first prompt voice, wherein the first prompt voice is used for indicating to execute a first target operation on a first target key on a rear panel of the door lock;
and if the first target operation aiming at the first target key is received, sending a door lock identifier of the door lock to the terminal, wherein the door lock identifier is used for the terminal to send the door lock identifier and a user account logged in the terminal to a server so that the server binds the door lock with the user account.
2. The method according to claim 1, wherein the method further comprises:
responding to the binding request, and if the fact that the door lock is configured with the administrator password is determined, playing a second prompt voice, wherein the second prompt voice is used for indicating that the administrator password is input in the front panel of the door lock;
and if the first password received by the front panel of the door lock is the same as the administrator password, sending a door lock identification of the door lock to the terminal.
3. The method of claim 1, wherein after configuring the second password received by the front panel of the door lock as the administrator password, the method further comprises:
and sending the administrator password to the terminal.
4. A method according to any one of claims 1 to 3, wherein the method further comprises:
and if the target operation for the target key is not received within the target time after the first prompt voice is played, playing a fourth prompt voice, wherein the fourth prompt voice is used for indicating that the target operation is overtime.
5. A method of binding a door lock, applied to a door lock, the method comprising:
if a second target operation aiming at a second target key on a rear panel of the door lock is received, playing a third prompt voice, wherein the third prompt voice is used for indicating that an administrator password is input in a front panel of the door lock;
configuring a second password received by a front panel of the door lock as the administrator password;
based on Bluetooth connection with a terminal, receiving a binding request sent by the terminal;
responding to the binding request, and if the fact that the door lock is configured with the administrator password is determined, playing a second prompt voice, wherein the second prompt voice is used for indicating that the administrator password is input in the front panel of the door lock;
if the first password received by the front panel of the door lock is the same as the administrator password, sending a door lock identification of the door lock to the terminal, wherein the door lock identification is used for sending the door lock identification and a user account logged in the terminal to a server by the terminal so that the server binds the door lock with the user account.
6. A door lock, the door lock comprising: the Bluetooth communication device comprises a Bluetooth communication module, a processor, a loudspeaker, a front panel, a rear panel and a first target key and a second target key which are positioned on the rear panel;
the processor is used for playing a third prompt voice if a second target operation aiming at the second target key is received, and the third prompt voice is used for indicating that an administrator password is input in a front panel of the door lock;
the processor is further configured to configure the second password received by the front panel as the administrator password;
the Bluetooth communication module is used for receiving a binding request sent by the terminal based on Bluetooth connection with the terminal;
the processor is further configured to respond to the binding request, and if it is determined that the administrator password is not configured in the door lock, control the speaker to play a first prompt voice, where the first prompt voice is used to instruct to execute a first target operation on the first target key;
the processor is further configured to control the bluetooth communication module to send a door lock identifier of the door lock to the terminal if the first target operation for the first target key is received, where the door lock identifier is used for the terminal to send the door lock identifier and a user account logged in the terminal to a server, so that the server binds the door lock with the user account.
7. The door lock of claim 6, wherein the first target key is a physical key and is coupled to the processor; the first target operation is a pressing operation.
8. The door lock is characterized by comprising a Bluetooth communication module, a processor, a loudspeaker, a front panel, a rear panel and a second target key positioned on the rear panel;
the processor is used for playing a third prompt voice if a second target operation aiming at the second target key is received, and the third prompt voice is used for indicating that an administrator password is input in a front panel of the door lock;
the processor is further configured to configure the second password received by the front panel as the administrator password;
the Bluetooth communication module is used for receiving a binding request sent by the terminal based on Bluetooth connection with the terminal;
the processor is further configured to respond to the binding request, and if it is determined that the door lock is configured with the administrator password, control the speaker to play a second prompting voice, where the second prompting voice is used to instruct that the administrator password is input in a front panel of the door lock;
the processor is further configured to control the bluetooth communication module to send a door lock identifier of the door lock to the terminal if the first password received by the front panel of the door lock is the same as the administrator password, where the door lock identifier is used for the terminal to send the door lock identifier and a user account logged in the terminal to a server, so that the server binds the door lock with the user account.
9. A binding system for a door lock, the system comprising: a terminal, a server and a door lock according to any one of claims 6 to 8;
the terminal is used for sending the door lock identifier and the user account logged in the terminal to a server after receiving the door lock identifier sent by the door lock;
the server is used for binding the door lock with the user account.
CN202111031654.7A 2021-09-03 2021-09-03 Door lock binding method, device and system Active CN113766045B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111031654.7A CN113766045B (en) 2021-09-03 2021-09-03 Door lock binding method, device and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111031654.7A CN113766045B (en) 2021-09-03 2021-09-03 Door lock binding method, device and system

Publications (2)

Publication Number Publication Date
CN113766045A CN113766045A (en) 2021-12-07
CN113766045B true CN113766045B (en) 2023-10-24

Family

ID=78792854

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111031654.7A Active CN113766045B (en) 2021-09-03 2021-09-03 Door lock binding method, device and system

Country Status (1)

Country Link
CN (1) CN113766045B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106296900A (en) * 2016-08-02 2017-01-04 成都荷码科技有限公司 A kind of method opening smart lock
CN107893583A (en) * 2017-10-16 2018-04-10 杭州软库科技有限公司 A kind of intelligent door lock system and control method
CN108765655A (en) * 2018-05-17 2018-11-06 胡泽民 A kind of application method of smart bluetooth lock
CN109685955A (en) * 2019-01-09 2019-04-26 深圳市豪力士智能科技有限公司 A kind of wechat small routine method for unlocking and device
CN110827449A (en) * 2019-10-31 2020-02-21 广东科裕智能科技有限公司 Intelligent door lock control system and control method
CN112105003A (en) * 2020-09-15 2020-12-18 公牛集团股份有限公司 Data synchronization system, method and device of intelligent door lock and readable storage medium

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106296900A (en) * 2016-08-02 2017-01-04 成都荷码科技有限公司 A kind of method opening smart lock
CN107893583A (en) * 2017-10-16 2018-04-10 杭州软库科技有限公司 A kind of intelligent door lock system and control method
CN108765655A (en) * 2018-05-17 2018-11-06 胡泽民 A kind of application method of smart bluetooth lock
CN109685955A (en) * 2019-01-09 2019-04-26 深圳市豪力士智能科技有限公司 A kind of wechat small routine method for unlocking and device
CN110827449A (en) * 2019-10-31 2020-02-21 广东科裕智能科技有限公司 Intelligent door lock control system and control method
CN112105003A (en) * 2020-09-15 2020-12-18 公牛集团股份有限公司 Data synchronization system, method and device of intelligent door lock and readable storage medium

Also Published As

Publication number Publication date
CN113766045A (en) 2021-12-07

Similar Documents

Publication Publication Date Title
US11216097B2 (en) Fingerprint verification method and electronic device for performing the same
US11017399B2 (en) Method and electronic device for paymnet using biometric authentication
AU2017276840B2 (en) Padlock device, systems including a padlock device, and methods of operating therefor
US20180032712A1 (en) Electronic device and method for authenticating biometric information
KR102465249B1 (en) Electronic device for authenticating based on biometric data and operating method thereof
KR102441737B1 (en) Method for authentication and electronic device supporting the same
WO2019072132A1 (en) Face recognition method and related product
US11017066B2 (en) Method for associating application program with biometric feature, apparatus, and mobile terminal
WO2018161743A1 (en) Fingerprint recognition method and related product
WO2018098941A1 (en) Processing method for communication identifier binding and terminal
CN113347242B (en) Cross-device resource access method and device, storage medium and electronic device
WO2019061219A1 (en) Screen unlocking method and terminal
WO2018000370A1 (en) Mobile terminal authentication method and mobile terminal
CN105700869B (en) Control method, information processing method, related device and electronic equipment
EP3131267B1 (en) Electronic device and method for commonly using the same
CN106656985B (en) Backup account login method, device and system
CN105915714A (en) Method and device for prompting terminal loss
CN110958234B (en) Application login control method and device and storage medium
US20080046750A1 (en) Authentication method
US20170295174A1 (en) Electronic device, server, and method for authenticating biometric information
CN114528598A (en) Method and device for determining file integrity of file system and electronic equipment
CN113766045B (en) Door lock binding method, device and system
CN107577933B (en) Application login method and device, computer equipment and computer readable storage medium
CN111031013B (en) Application authentication mode determining method, electronic device and storage medium
GB2423396A (en) Use of a token to retrieve user authentication information

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant