CN113888779A - User authority management method, system and device based on intelligent lock and storage medium - Google Patents

User authority management method, system and device based on intelligent lock and storage medium Download PDF

Info

Publication number
CN113888779A
CN113888779A CN202111154317.7A CN202111154317A CN113888779A CN 113888779 A CN113888779 A CN 113888779A CN 202111154317 A CN202111154317 A CN 202111154317A CN 113888779 A CN113888779 A CN 113888779A
Authority
CN
China
Prior art keywords
user
administrator
account
intelligent lock
user account
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111154317.7A
Other languages
Chinese (zh)
Inventor
王妙玉
周亮
林国瑞
吴宁泉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Hotata Smart Home Co Ltd
Original Assignee
Guangdong Hotata Smart Home Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Hotata Smart Home Co Ltd filed Critical Guangdong Hotata Smart Home Co Ltd
Priority to CN202111154317.7A priority Critical patent/CN113888779A/en
Publication of CN113888779A publication Critical patent/CN113888779A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The invention discloses a user authority management method based on an intelligent lock, which is characterized in that user roles with different user authorities are set in the intelligent lock management process, so that users with different authorities are created; the user roles comprise a super administrator user and a second user, the second user comprises multiple types of users, corresponding user permissions are set for each user respectively, unlocking information of the intelligent lock and user management are achieved, and various requirements of different users are met. The invention also discloses a user authority management system, a device and a storage medium based on the intelligent lock.

Description

User authority management method, system and device based on intelligent lock and storage medium
Technical Field
The present invention relates to intelligent lock management, and more particularly, to a method, system, apparatus, and storage medium for managing user rights based on an intelligent lock.
Background
At present, corresponding application APP is generally installed on mobile equipment for managing the authority and the password of the intelligent lock, the administrator and the common user are set, and the fixed authority is set, so that the management of the unlocking password is realized, but the authorities of the administrator and the user are fixed and cannot be modified, and when the intelligent lock is used for multiple families, only one administrator realizes the password management of the user, and other users can only check the password management, so that the population number of family users is limited, and the use of the multiple families cannot be met.
Disclosure of Invention
In order to overcome the defects of the prior art, one of the objectives of the present invention is to provide a user right management method based on an intelligent lock, which can solve the problem that only one administrator cannot satisfy the use of a family with multiple populations in the existing intelligent lock management.
The invention also aims to provide a user right management system based on the intelligent lock, which can solve the problem that only one administrator cannot meet the requirement of family use of multiple population in the existing intelligent lock management.
The invention also aims to provide a user authority management device based on the intelligent lock, which can solve the problem that only one administrator cannot meet the requirement of family use of multiple people in the conventional intelligent lock management.
The fourth objective of the present invention is to provide a storage medium, which can solve the problem that only one administrator cannot satisfy the use of a family with multiple population in the existing intelligent lock management.
One of the purposes of the invention is realized by adopting the following technical scheme:
the user authority management method based on the intelligent lock comprises the following steps:
an initialization step: acquiring registration information of a super administrator user of the intelligent lock, creating a user account with a role as a super administrator user role according to the registration information of the super administrator user, recording the user account as the super administrator user account, and acquiring unlocking information of the super administrator; the registration information comprises a unique identification number registered by a user;
a user creating step: acquiring registration information of a second user, creating a user account with a user role as a second user role through a super administrator user account, recording the user account as the second user account, and acquiring unlocking information of the second user; the second user roles comprise a plurality of types, and the second user roles of different types are correspondingly distributed with corresponding user permissions;
data uploading and issuing steps: and uploading the created registration information and unlocking information of each user to a cloud server for storage, and issuing the unlocking information of each user to the intelligent lock through the cloud server.
Further, still include: and (3) query step: acquiring a query instruction, and acquiring and displaying a corresponding query result from a cloud server according to the query instruction; and the query result comprises the registration information and the unlocking information of the current login user.
Further, the second user role comprises an administrator user role and a common user role; the second users comprise administrator users and ordinary users; the user authority of the super administrator user is greater than that of the administrator user, and the user authority of the administrator user is greater than that of the common user.
Further, the user creating step includes:
a common user creating step: acquiring registration information of a common user, creating a user account with a user role as the common user role through an administrator user account or a super administrator user account, recording the user account as the common user account, and acquiring unlocking information of the common user;
an administrator user creating step: acquiring registration information of an administrator user, creating a user account with a user role as an administrator user role through a super administrator user account, recording the user account as an administrator user account, and acquiring unlocking information of the administrator user;
a user information pushing step: and pushing the registration information and the unlocking information of the created common users and the created administrator users to the corresponding users.
Further, still include: and (3) permission modification step: acquiring a permission modification request of a second user and sending the permission modification request to a cloud server, so that the cloud server modifies the user permission of the second user;
when the cloud server modifies the user permission of the second user, a modification confirmation notice is sent to the super administrator user, and the user permission of the second user is modified according to the received feedback confirmation signal.
Further, still include: unlocking information updating step: acquiring an unlocking updating instruction, identifying the unlocking updating instruction through a first management user account to obtain unlocking information of a user to be updated, modifying the unlocking information of the user to be updated through the first management user account, and issuing the modified unlocking information to the intelligent lock through a cloud server; when the user to be updated is a common user, the first management user account is a super administrator user account or an administrator user account; when the user to be updated is an administrator user, the first management user account is a super administrator user account; and when the user to be updated is a super administrator user, the first management user account is a super administrator user account.
Further, still include: and a user deleting step: acquiring a deletion instruction, analyzing the deletion instruction through a second management user account to obtain a user to be deleted, and deleting the registration information and unlocking information of the user to be deleted from a cloud server through the second management user account; meanwhile, deleting unlocking information of the user to be deleted, which is stored in the intelligent lock, through a cloud server; when the user to be deleted is a second user, the second management user account is a super administrator user account or an administrator user account; and when the user to be deleted is an administrator user, the second administrative user account is a super administrator user account.
The second purpose of the invention is realized by adopting the following technical scheme:
the user authority management system based on the intelligent lock comprises:
an intelligent lock;
an intelligent terminal for executing the steps of the user right management method based on the intelligent lock adopted as one of the purposes of the invention;
and the cloud server is in communication connection with the intelligent terminal and the intelligent lock, and is used for performing data interaction with the intelligent terminal and issuing the unlocking information of each user acquired by the intelligent terminal to the intelligent lock.
The third purpose of the invention is realized by adopting the following technical scheme:
the user right management device based on the intelligent lock comprises a memory, a processor and a computer program which is stored on the memory and runs on the processor, wherein the computer program is a user right management program, and the processor executes the user right management program to realize the steps of the user right management method based on the intelligent lock, which is adopted by one of the purposes of the invention.
The fourth purpose of the invention is realized by adopting the following technical scheme:
a storage medium being a computer readable storage medium having stored thereon a computer program being a user right management program for performing the steps of a smart lock based user right management method as employed in one of the objects of the present invention.
Compared with the prior art, the invention has the beneficial effects that:
(1) the invention sets a plurality of user roles in the system and sets corresponding user authority for each user role so as to meet the use of different people in family population; the super manager is used for managing and controlling the intelligent lock, and other user roles are set so as to distinguish the distribution and use of family resident personnel and family temporary personnel, so that the convenient use of a family with multiple ports is met, the management of the intelligent lock is more flexible, and the problems that in the prior art, the use of the family with multiple ports is inconvenient because only one manager can modify a password in the management of the intelligent lock are solved;
(2) by deleting the created users, the situation that the users cannot be added due to excessive created users can be avoided, and flexible management of the users is realized;
(3) the created user authority is modified, so that the flexible management of the user can be realized, and a common user can be upgraded to an administrator user under the condition that the administrator user account is not enough; or the user rights of different administrator users or common users are modified to meet the use requirements of different personnel;
(4) the created registration information and unlocking information of the user are pushed to the corresponding user, the unlocking information can be pushed to the corresponding user, the situation that the corresponding user can check the unlocking information only by logging in an account is avoided, and user experience is improved.
Drawings
Fig. 1 is a schematic diagram of connection between an intelligent lock, an intelligent terminal and a cloud server provided by the present invention;
FIG. 2 is a flowchart of a user right management method based on an intelligent lock according to the present invention;
fig. 3 is a flowchart illustrating a step S3 according to an embodiment of the present invention.
Detailed Description
The present invention will be further described with reference to the accompanying drawings and the detailed description, and it should be noted that any combination of the embodiments or technical features described below can be used to form a new embodiment without conflict.
Example one
The invention sets a plurality of user roles in the system, and sets corresponding user authorities for different user roles respectively, thereby meeting the use of different people in a multi-user family.
As shown in fig. 1, the present invention provides a preferred embodiment, a user right management system based on an intelligent lock, including an intelligent terminal, an intelligent lock, and a cloud server.
The intelligent terminal is used as a terminal device for interacting with people and is used for providing a user interaction interface for a user so as to realize creation, password setting, authority setting and the like of the user.
In addition, the intelligent terminal can be in communication connection with the intelligent lock and used for acquiring information of the intelligent lock. Of course, the information of the intelligent lock may be obtained by the intelligent terminal in other manners, for example, the information is input into the corresponding application software of the intelligent terminal when the user registers.
The cloud server is in communication connection with the intelligent terminal and the intelligent lock, serves as an intermediate business for communication between the intelligent terminal and the intelligent lock, and is used for receiving data such as registration information and unlocking information uploaded by the intelligent terminal and transmitting the unlocking information to the intelligent lock.
The intelligent lock is in communication connection with the cloud server and used for acquiring unlocking information issued by the cloud server so as to be used for unlocking.
More preferably, the embodiment is based on the intelligent management of user permissions, and users with different roles can be created and given different permissions, so that the intelligent lock is more flexibly and conveniently managed and is more suitable for being used by families with multiple mouths.
Specifically, the user roles in this embodiment are three, which are: the hypervisor user role and the second user role, correspondingly, there may be three types of users in the system: a hypervisor user and a second user.
The user role of the super administrator user is the super administrator user role, is the user with the maximum authority in the whole system, and can be used for creating other users in the system, setting unlocking information of the intelligent lock and setting and changing the authority of other users. An intelligent lock generally has only one super manager user, and the super manager user can be created when the intelligent lock is initially installed. Specifically, when the intelligent lock is initially installed, the corresponding intelligent APP is installed on the intelligent terminal, the registration information of the user is obtained through the intelligent APP to create a user account, meanwhile, the information of the intelligent lock is obtained, and after the intelligent lock is established to be bound with the user account, the user account is set as a super administrator user account.
Meanwhile, when a super administrator user account is created, unlocking information is obtained, and then the unlocking information is issued to the intelligent lock through the cloud server. Therefore, the intelligent lock can be compared with the stored unlocking information after acquiring the unlocking information again, and whether unlocking is carried out is judged.
The second user is a user except for the super administrator, and the user authority of the second user is smaller than that of the super administrator. More specifically, the second user in this embodiment includes an administrator user and a general user. Correspondingly, the second user role is an administrator user role and a normal user role.
The user role of the administrator user is the administrator user role, the user authority of the administrator user is smaller than that of the super administrator user, and unlocking information, common users and the like can be created.
And the user role of the ordinary user is the ordinary user role, and the user authority of the ordinary user is smaller than that of the administrator user. For example, the ordinary user in this embodiment cannot set the unlocking information, and can only check the unlocking information and other permissions, thereby realizing the unlocking permission.
The invention sets user roles with different user authorities in the system so as to register the user roles into corresponding user accounts with different authorities, thereby meeting the use requirements of different personnel. Specifically, for example, the owner in the family is set as the super manager user, the resident people in other families set the manager user, and the temporary resident people set as the common users, so that different user permissions can be set according to different people, and the safety of the intelligent lock can be ensured, and the flexibility of the unlocking information setting of the intelligent lock can be ensured.
For another example: in the actual house renting process, the landlord serves as a super manager user, and the maximum authority of the whole intelligent lock is realized. The house renting personnel can be used as an administrator user to flexibly set the unlocking information of the house renting personnel, and meanwhile, common users can be created for temporary visitor personnel, the unlocking information is set for the temporary visitor personnel, and the temporary visitor personnel are pushed to the corresponding temporary visitor personnel. Like this, the administrator user can set up interim information of unblanking to interim visitor's unblanking still can carry out remote setting simultaneously. In addition, the administrator user can set the unlocking information of the temporary visitor personnel according to the self condition, and meanwhile, when the temporary visitor personnel walk, the user account of the temporary visitor personnel can be deleted, so that the safety of the intelligent lock is guaranteed.
In addition, the administrator user in this embodiment also has the functions of creating and deleting the ordinary user account, so that the problem that when the ordinary user account needs to be created, a super administrator needs to perform operation, which causes trouble, can be avoided. For example, for a tenant, a temporary visitor is a person familiar to the tenant, so that trouble caused by going to a trouble landlord is avoided, and unlocking information of a common user can be set directly through an administrator user.
Similarly, when the tenant is replaced, the super administrator can delete and create the tenant of the administrator user, so that the corresponding administrator user is prevented from being deleted in time after the tenant leaves, and the safety of the intelligent lock is guaranteed.
In addition, only three user roles are set in the embodiment, however, in the actual using process, multiple user roles can be set according to different requirements of users of the intelligent lock, and a corresponding user right is set for each user role, so that the requirements of different people can be met, and the flexible use of the intelligent lock can be guaranteed, for example, the intelligent lock can be further used for common users, for example, the intelligent lock can be divided into a first common user and a second common user, and similarly, the intelligent lock can also be divided into a main manager user, a secondary manager user and the like.
In addition, in order to meet the requirement of multiple users, the administrator user and the common user in the embodiment may include multiple users. That is, there may be one or more administrator users and ordinary users created in the system. For example, for a tenant, there may be a possibility of a lease, and thus, the administrator user may set more than 2 to meet the needs of multiple tenants. Similarly, there are many common users.
Preferably, the number of administrator users in the embodiment can be set to 1-3, and the number of common users can be set to 1-5. Specifically, set up 1 ~ 3 with administrator user can, avoid administrator user more probably to lead to the intelligence lock insecurity.
That is, the super administrator user in this embodiment is used to create other users, and the user authority of the super administrator user is the maximum. And the administrator user is used for realizing the creation of the common user, and the user authority of the administrator user is smaller than that of the super administrator user. The ordinary user can only check the unlocking information by the user, namely, the system can only be read without a writing function.
For the super administrator user and the administrator user, the super administrator user and the administrator user may modify the unlocking information and the registration information.
In addition, when unlocking information of a common user is set, the validity period of the unlocking information can be set. That is, within the validity period, the intelligent lock can be opened by inputting the unlocking information. When the intelligent lock is not in the valid period, the intelligent lock cannot be opened even if unlocking information is input.
After the administrator or super administrator creates the common user, the user information of the common user is pushed to the common user, for example, according to the registered mobile phone number or through two-dimensional code pushing. Like this, ordinary user can check the mode of unblanking and information of unblanking according to cell-phone number or two-dimensional code etc. and log in APP. For example, when there is the visitor, the owner or other managers can long-rangely establish ordinary user account through the APP on the intelligent terminal to for it sets up information of unblanking, the mode of unblanking after propelling movement give corresponding visitor, like this, the visitor can log in APP or the mode of direct scanning two-dimensional code and acquire the mode of unblanking and information of unblanking according to the information of propelling movement, opens the intelligence lock.
When the visitor leaves, the common user account can be deleted, and the safety of the intelligent lock can be ensured. Or the validity period of the unlocking information is set, for example, the unlocking information can only be used once or the service life is set, and when the validity period is invalid, the visitor can not unlock the lock according to the unlocking information.
In addition, when each user is registered, the registration information and the unlocking information of each user are uploaded to the cloud server, so that the cloud server sends the unlocking information to the intelligent lock; meanwhile, the cloud server stores the registration information and the unlocking information of each registered user so as to be convenient for subsequent inquiry of the registration information and the unlocking information of the users in the system.
The unlocking mode of the intelligent lock in the embodiment can support common unlocking modes, such as fingerprint unlocking, face recognition unlocking, password unlocking, entrance guard card unlocking and the like. When the unlocking information is set, corresponding unlocking information can be set for the user when the user registers according to the requirements of different personnel. The unlocking information can be any one or combination of more of the following: fingerprint, human face, password, entrance guard card code, etc.
Further, the present embodiment may also modify the user right of the registered user. Specifically, for the second user, namely the administrator user and the ordinary user, the present invention adaptively modifies the user authority of the second user to meet different requirements. Specifically, the user authority of each user role may be set in the system, and a default user authority of each user role may be set. Thus, each registered second user may have a user right smaller than the user right of the corresponding user role set in the system. In this way, the user right of the registered user can be modified according to the actual requirement.
In addition, the invention can change the user role, and particularly change the common user into the administrator user through the super administrator. Therefore, when the registration number of the administrator user in the system cannot be increased, the conversion of the user roles can be realized by changing the common user into the administrator user.
Example two
Based on the first embodiment, the present invention further provides an embodiment, a user right management method based on an intelligent lock, as shown in fig. 2, including the following steps:
and step S1, acquiring the intelligent lock and the registration information of the super administrator user of the intelligent lock, then creating a user account with the user role as the super administrator user role according to the registration information of the super administrator user, recording the user account as the super administrator user account, and acquiring the unlocking information of the super administrator user.
An intelligent lock has only one supervisor user. Specifically, when the intelligent lock is initially installed, the intelligent lock and the user information can be bound by installing corresponding application software on the intelligent terminal, and the user bound for the first time is used as a super administrator user.
Specifically, a user is created after registration information of the user is obtained, and then information of the intelligent lock is obtained and the user and the intelligent lock are bound, so that the user is called a super administrator user of the intelligent lock; or, simultaneously acquiring the information of the intelligent lock and the registration information of the user to create the super administrator user.
And step S2, acquiring the registration information of the second user, creating a user account with the user role as the second user role through the super administrator user account, recording the user account as the second user account, and acquiring the unlocking information of the second user.
The second user roles comprise multiple types, corresponding user permissions are correspondingly distributed to the second user roles of different types, and the user permissions of the second user roles are smaller than the user permissions of the super-administrator user roles.
Specifically, the second user role in the present invention includes an administrator user role and a general user role. Correspondingly, the second user includes an administrator user and a general user. Different types of user roles have different user permissions, and in the actual use process, the user roles with different user permissions can be set according to actual requirements. Similarly, the second users correspond to the second user roles, and the number of the types of the second users is the same as that of the second user roles.
Correspondingly, the users in the system can comprise a super administrator user, an administrator user and a common user, wherein the user authority of the super administrator user is greater than that of the administrator user, and the user authority of the administrator user is greater than that of the common user. The user authority of each user role is specified and set by the system.
And S3, uploading the created registration information and unlocking information of each user to a cloud server for storage, and issuing the unlocking information of each user to the intelligent lock through the cloud server.
More specifically, the registration information of the user includes a user unique registration identification number for distinguishing different user accounts. Specifically, the identification number may be set according to a mobile phone number, a mailbox, a user number, and the like.
As shown in fig. 3, step S3 further includes:
and step S31, acquiring the registration information of the common user, creating a user account with the user role as the common user role through an administrator user account or a super administrator user account, recording the user account as the common user account, and acquiring the unlocking information of the common user.
Since the user authority of the ordinary user is smaller than the user authority of the administrator user and the super administrator user, the creation of the ordinary user can be realized by the administrator user or the super administrator user.
For example, when the intelligent lock of the family is controlled and managed: when a temporary visitor needs to unlock the lock, a common user can be created and unlocking information can be set by personnel with administrator users or super administrator users, and then the unlocking information is issued to the intelligent lock through the cloud server. Therefore, as a temporary visitor, the intelligent lock can be unlocked according to the created unlocking information of the common user, and the intelligent lock can be flexibly managed conveniently. By setting various types of management users (such as administrator users and super administrator users), the problem that unlocking cannot be performed due to the fact that unlocking information cannot be set when one management user is busy can be avoided. For example, when the person having the super administrator user does not have time to set the unlocking information, the setting can be performed by the person having the administrator user. Similarly, flexible management of the intelligent lock can be realized by setting various types of administrator users.
In addition, for example, for a tenant, the tenant is set as an administrator user, the tenant can create a common user for the visitor personnel of the tenant, the setting by the owner as a super administrator user is not needed at each time, the use of the tenant and the owner is facilitated, and the user experience is improved.
Likewise, the specific examples for the creation of administrator users are:
and step S32, acquiring the registration information of the administrator user, creating a user account with the user role as the administrator user role through the super administrator user account, recording the user account as the administrator user account, and acquiring the unlocking information of the administrator user.
The creation of the administrator user account is realized through a super administrator user, and the management of the administrator user is realized.
And step S33, pushing the created common user account, the registration information of the administrator user and the unlocking information to the corresponding user. Because the user is created by other accounts when the user is created, the registration information and the unlocking information can be pushed to the corresponding user after the user is created, so that the user can know the registration information and the unlocking information.
For example, at actual in-process, the administrator or super administrator can set up the information of unblanking of interim visitor remotely to on the mode through the two-dimensional code will unblank information propelling movement for interim visitor's cell-phone or social application APP, like this, interim visitor can obtain the information of unblanking through the two-dimensional code and realize unblanking.
Further, the present invention also includes:
step S4, obtaining a deletion instruction, processing the deletion instruction through the second management user account to obtain a user to be deleted, deleting the registration information and the unlocking information of the user to be deleted from the cloud server through the second management user account, and deleting the unlocking information of the user to be deleted stored in the smart lock through the cloud server.
More specifically, when the user to be deleted is the second user, the second administrative user account is the super administrator user account or the administrator user account. And when the user to be deleted is an administrator user, the second administrative user account is a super administrator user account. In the invention, the user with the user management function is used as the management user, and the corresponding user account is the management user account. Specifically, the administrator user and the super administrator user in this embodiment may be referred to as the administrator user.
Specific examples thereof are: when the temporary visitor leaves, the ordinary user corresponding to the temporary visitor can be deleted by a super administrator user or a person of the administrator user, so that the safety of the intelligent lock is ensured. For another example, when a tenant is replaced, the administrator user of the tenant who leaves can be deleted by a person (owner) with the super administrator user, the intelligent lock does not need to be replaced, and the safety of the intelligent lock can be ensured.
Further, the present invention also includes:
and S5, acquiring an unlocking updating instruction, identifying the unlocking updating instruction through a first management user account to obtain unlocking information of a user to be updated, modifying the unlocking information of the user to be updated through an administrator user account, and issuing the modified unlocking information to the intelligent lock through the cloud server.
When the user to be updated is a common user, the first management user account is a super administrator user account or an administrator user account. When the user to be updated is an administrator user, the first administrative user account is a super administrator user account. And when the user to be updated is a super administrator user, the first management user account is a super administrator user account. The first administrative user account is defined as the second administrative user account, which does not specifically refer to a certain created user account.
That is, the hypervisor user can realize the replacement of the unlocking information of any one user. And the manager user can realize the replacement of the unlocking information of the manager user or the unlocking information of the ordinary user. And the common user does not have the authority of unlocking information replacement, and by the arrangement, not only can the flexible management of the intelligent lock be realized, but also the safety can be ensured.
Further, the present invention also includes:
and step S6, acquiring the query instruction, and acquiring and displaying a corresponding query result from the cloud server according to the query instruction.
In order to ensure safety, only the user can check the registration information and the unlocking information of the user when inquiring. Therefore, the method and the device can avoid possible personal privacy leakage when different users check the registration information and the unlocking information mutually.
Further, the present embodiment may also modify the user right of the created user accordingly. Specifically, the present invention further comprises:
step S7, obtaining an authority modification request of the second user and sending the authority modification request to the cloud server, so that the cloud server modifies the user authority of the second user.
When the user authority of the second user is modified, the super administrator user needs to confirm, and if the modification is confirmed, the modification is successful; if the modification is not confirmed, the modification cannot be carried out so as to ensure the data security. That is, in this embodiment, the user right of the created second user may be modified, so that the common user is changed to the administrator user or the user right of the administrator user is modified.
In addition, the cloud server is further used for sending a modification confirmation notification to the super administrator user when modifying the user permission of the second user, receiving a feedback confirmation signal after the super administrator confirms modification, and modifying the user permission of the second user according to the feedback confirmation signal. Specifically, during modification, the second user may initiate an authority modification request for authority modification after logging in application software installed on the smart terminal.
Further, the hypervisor user may also modify the user permissions of the second user. In particular, in the case of a hypervisor user login, modification of the user permission of the second user may be achieved.
EXAMPLE III
Based on the user right management method based on the intelligent lock provided by the second embodiment, the invention also provides another embodiment, the user right management device based on the intelligent lock comprises a memory, a processor and a computer program which is stored on the memory and runs on the processor, the computer program is a user right management program, and the processor implements the following steps when executing the user right management program:
an initialization step: acquiring registration information of a super administrator user of the intelligent lock, creating a user account with a role as a super administrator user role according to the registration information of the super administrator user, recording the user account as the super administrator user account, and acquiring unlocking information of the super administrator; the registration information comprises a unique identification number registered by a user;
a user creating step: acquiring registration information of a second user, creating a user account with a user role as a second user role through a super administrator user account, recording the user account as the second user account, and acquiring unlocking information of the second user; the second user roles comprise a plurality of types, and the second user roles of different types are correspondingly distributed with corresponding user permissions;
data uploading and issuing steps: and uploading the created registration information and unlocking information of each user to a cloud server for storage, and issuing the unlocking information of each user to the intelligent lock through the cloud server.
Further, the processor implements the following steps when executing the user right management program: and (3) query step: acquiring a query instruction, and acquiring and displaying a corresponding query result from a cloud server according to the query instruction; and the query result comprises the registration information and the unlocking information of the current login user.
Further, the second user role comprises an administrator user role and a common user role; the second users comprise administrator users and ordinary users; the user authority of the super administrator user is greater than that of the administrator user, and the user authority of the administrator user is greater than that of the common user.
Further, the user creating step includes:
a common user creating step: acquiring registration information of a common user, creating a user account with a user role as the common user role through an administrator user account or a super administrator user account, recording the user account as the common user account, and acquiring unlocking information of the common user;
an administrator user creating step: acquiring registration information of an administrator user, creating a user account with a user role as an administrator user role through a super administrator user account, recording the user account as an administrator user account, and acquiring unlocking information of the administrator user;
a user information pushing step: and pushing the registration information and the unlocking information of the created common users and the created administrator users to the corresponding users.
Further, the processor implements the following steps when executing the user right management program: and (3) permission modification step: acquiring a permission modification request of a second user and sending the permission modification request to a cloud server, so that the cloud server modifies the user permission of the second user;
when the cloud server modifies the user permission of the second user, a modification confirmation notice is sent to the super administrator user, and the user permission of the second user is modified according to the received feedback confirmation signal.
Further, the processor implements the following steps when executing the user right management program: unlocking information updating step: acquiring an unlocking updating instruction, identifying the unlocking updating instruction through a first management user account to obtain unlocking information of a user to be updated, modifying the unlocking information of the user to be updated through the first management user account, and issuing the modified unlocking information to the intelligent lock through a cloud server; when the user to be updated is a common user, the first management user account is a super administrator user account or an administrator user account; when the user to be updated is an administrator user, the first management user account is a super administrator user account; and when the user to be updated is a super administrator user, the first management user account is a super administrator user account.
Further, the processor implements the following steps when executing the user right management program: and a user deleting step: acquiring a deletion instruction, analyzing the deletion instruction through a second management user account to obtain a user to be deleted, and deleting the registration information and unlocking information of the user to be deleted from a cloud server through the second management user account; meanwhile, deleting unlocking information of the user to be deleted, which is stored in the intelligent lock, through a cloud server; when the user to be deleted is a second user, the second management user account is a super administrator user account or an administrator user account; and when the user to be deleted is an administrator user, the second administrative user account is a super administrator user account.
Example four
Based on the second embodiment provided by the present invention, the present invention further provides an embodiment, a storage medium, where the storage medium is a computer-readable storage medium, and a computer program is stored on the storage medium, where the computer program is a user right management program, and when executed by a processor, the user right management program implements the following steps:
an initialization step: acquiring registration information of a super administrator user of the intelligent lock, creating a user account with a role as a super administrator user role according to the registration information of the super administrator user, recording the user account as the super administrator user account, and acquiring unlocking information of the super administrator; the registration information comprises a unique identification number registered by a user;
a user creating step: acquiring registration information of a second user, creating a user account with a user role as a second user role through a super administrator user account, recording the user account as the second user account, and acquiring unlocking information of the second user; the second user roles comprise a plurality of types, and the second user roles of different types are correspondingly distributed with corresponding user permissions;
data uploading and issuing steps: and uploading the created registration information and unlocking information of each user to a cloud server for storage, and issuing the unlocking information of each user to the intelligent lock through the cloud server.
Further, the user right management program realizes the following steps when being executed by the processor: and (3) query step: acquiring a query instruction, and acquiring and displaying a corresponding query result from a cloud server according to the query instruction; and the query result comprises the registration information and the unlocking information of the current login user.
Further, the second user role comprises an administrator user role and a common user role; the second users comprise administrator users and ordinary users; the user authority of the super administrator user is greater than that of the administrator user, and the user authority of the administrator user is greater than that of the common user.
Further, the user creating step includes:
a common user creating step: acquiring registration information of a common user, creating a user account with a user role as the common user role through an administrator user account or a super administrator user account, recording the user account as the common user account, and acquiring unlocking information of the common user;
an administrator user creating step: acquiring registration information of an administrator user, creating a user account with a user role as an administrator user role through a super administrator user account, recording the user account as an administrator user account, and acquiring unlocking information of the administrator user;
a user information pushing step: and pushing the registration information and the unlocking information of the created common users and the created administrator users to the corresponding users.
Further, the user right management program realizes the following steps when being executed by the processor: and (3) permission modification step: acquiring a permission modification request of a second user and sending the permission modification request to a cloud server, so that the cloud server modifies the user permission of the second user;
when the cloud server modifies the user permission of the second user, a modification confirmation notice is sent to the super administrator user, and the user permission of the second user is modified according to the received feedback confirmation signal.
Further, the user right management program realizes the following steps when being executed by the processor: unlocking information updating step: acquiring an unlocking updating instruction, identifying the unlocking updating instruction through a first management user account to obtain unlocking information of a user to be updated, modifying the unlocking information of the user to be updated through the first management user account, and issuing the modified unlocking information to the intelligent lock through a cloud server; when the user to be updated is a common user, the first management user account is a super administrator user account or an administrator user account; when the user to be updated is an administrator user, the first management user account is a super administrator user account; and when the user to be updated is a super administrator user, the first management user account is a super administrator user account.
Further, the user right management program realizes the following steps when being executed by the processor: and a user deleting step: acquiring a deletion instruction, analyzing the deletion instruction through a second management user account to obtain a user to be deleted, and deleting the registration information and unlocking information of the user to be deleted from a cloud server through the second management user account; meanwhile, deleting unlocking information of the user to be deleted, which is stored in the intelligent lock, through a cloud server; when the user to be deleted is a second user, the second management user account is a super administrator user account or an administrator user account; and when the user to be deleted is an administrator user, the second administrative user account is a super administrator user account.
The above embodiments are only preferred embodiments of the present invention, and the protection scope of the present invention is not limited thereby, and any insubstantial changes and substitutions made by those skilled in the art based on the present invention are within the protection scope of the present invention.

Claims (10)

1. The user right management method based on the intelligent lock is characterized by comprising the following steps:
an initialization step: acquiring registration information of a super administrator user of the intelligent lock, creating a user account with a role as a super administrator user role according to the registration information of the super administrator user, recording the user account as the super administrator user account, and acquiring unlocking information of the super administrator; the registration information comprises a unique identification number registered by a user;
a user creating step: acquiring registration information of a second user, creating a user account with a user role as a second user role through a super administrator user account, recording the user account as the second user account, and acquiring unlocking information of the second user; the second user roles comprise a plurality of types, and the second user roles of different types are correspondingly distributed with corresponding user permissions;
data uploading and issuing steps: and uploading the created registration information and unlocking information of each user to a cloud server for storage, and issuing the unlocking information of each user to the intelligent lock through the cloud server.
2. The intelligent lock-based user right management method according to claim 1, further comprising: and (3) query step: acquiring a query instruction, and acquiring and displaying a corresponding query result from a cloud server according to the query instruction; and the query result comprises the registration information and the unlocking information of the current login user.
3. The smart lock-based user right management method according to claim 1, wherein the second user role comprises an administrator user role and a normal user role; the second users comprise administrator users and ordinary users; the user authority of the super administrator user is greater than that of the administrator user, and the user authority of the administrator user is greater than that of the common user.
4. The smart lock-based user rights management method of claim 3, wherein the user creating step comprises:
a common user creating step: acquiring registration information of a common user, creating a user account with a user role as the common user role through an administrator user account or a super administrator user account, recording the user account as the common user account, and acquiring unlocking information of the common user;
an administrator user creating step: acquiring registration information of an administrator user, creating a user account with a user role as an administrator user role through a super administrator user account, recording the user account as an administrator user account, and acquiring unlocking information of the administrator user;
a user information pushing step: and pushing the registration information and the unlocking information of the created common users and the created administrator users to the corresponding users.
5. The intelligent lock-based user right management method according to claim 4, further comprising: and (3) permission modification step: acquiring a permission modification request of a second user and sending the permission modification request to a cloud server, so that the cloud server modifies the user permission of the second user;
when the cloud server modifies the user permission of the second user, a modification confirmation notice is sent to the super administrator user, and the user permission of the second user is modified according to the received feedback confirmation signal.
6. The intelligent lock-based user right management method according to claim 4, further comprising: unlocking information updating step: acquiring an unlocking updating instruction, identifying the unlocking updating instruction through a first management user account to obtain unlocking information of a user to be updated, modifying the unlocking information of the user to be updated through the first management user account, and issuing the modified unlocking information to the intelligent lock through a cloud server;
when the user to be updated is a common user, the first management user account is a super administrator user account or an administrator user account; when the user to be updated is an administrator user, the first management user account is a super administrator user account; and when the user to be updated is a super administrator user, the first management user account is a super administrator user account.
7. The intelligent lock-based user right management method according to claim 1, further comprising: and a user deleting step: acquiring a deletion instruction, analyzing the deletion instruction through a second management user account to obtain a user to be deleted, and deleting the registration information and unlocking information of the user to be deleted from a cloud server through the second management user account; meanwhile, deleting unlocking information of the user to be deleted, which is stored in the intelligent lock, through a cloud server;
when the user to be deleted is a second user, the second management user account is a super administrator user account or an administrator user account; and when the user to be deleted is an administrator user, the second administrative user account is a super administrator user account.
8. User's authority management system based on intelligence lock, its characterized in that includes:
an intelligent lock;
an intelligent terminal for executing the steps of the intelligent lock based user right management method according to any one of claims 1-7;
and the cloud server is in communication connection with the intelligent terminal and the intelligent lock, and is used for performing data interaction with the intelligent terminal and issuing the unlocking information of each user acquired by the intelligent terminal to the intelligent lock.
9. User right management device based on intelligent lock, comprising a memory, a processor and a computer program stored on the memory and running on the processor, wherein the computer program is a user right management program, characterized in that the processor implements the steps of the user right management method based on intelligent lock according to any one of claims 1-7 when executing the user right management program.
10. A storage medium being a computer readable storage medium having stored thereon a computer program being a user rights management program, characterized in that the user rights management program is adapted to perform the steps of the smart lock based user rights management method according to any of claims 1-7.
CN202111154317.7A 2021-09-29 2021-09-29 User authority management method, system and device based on intelligent lock and storage medium Pending CN113888779A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111154317.7A CN113888779A (en) 2021-09-29 2021-09-29 User authority management method, system and device based on intelligent lock and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111154317.7A CN113888779A (en) 2021-09-29 2021-09-29 User authority management method, system and device based on intelligent lock and storage medium

Publications (1)

Publication Number Publication Date
CN113888779A true CN113888779A (en) 2022-01-04

Family

ID=79008379

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111154317.7A Pending CN113888779A (en) 2021-09-29 2021-09-29 User authority management method, system and device based on intelligent lock and storage medium

Country Status (1)

Country Link
CN (1) CN113888779A (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104091376A (en) * 2014-06-16 2014-10-08 小米科技有限责任公司 Intelligent lock control method and apparatus thereof
JP2015064820A (en) * 2013-09-26 2015-04-09 株式会社 日立産業制御ソリューションズ Entry-exit management system
CN105389870A (en) * 2015-10-28 2016-03-09 广州畅联信息科技有限公司 Entrance guard management method and system
CN108537923A (en) * 2018-03-27 2018-09-14 丁巨波 Network-based smart lock management control method and system
CN109544735A (en) * 2018-10-24 2019-03-29 天津大学 A kind of intelligent cipher lock control system of safety that supporting multi-operation mode
WO2019132439A1 (en) * 2017-12-28 2019-07-04 (주)신화시스템 Method for matching access right of accessing person in access control system
CN111600862A (en) * 2020-05-09 2020-08-28 青岛海信智慧家居系统股份有限公司 User account management method and device

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2015064820A (en) * 2013-09-26 2015-04-09 株式会社 日立産業制御ソリューションズ Entry-exit management system
CN104091376A (en) * 2014-06-16 2014-10-08 小米科技有限责任公司 Intelligent lock control method and apparatus thereof
CN105389870A (en) * 2015-10-28 2016-03-09 广州畅联信息科技有限公司 Entrance guard management method and system
WO2019132439A1 (en) * 2017-12-28 2019-07-04 (주)신화시스템 Method for matching access right of accessing person in access control system
CN108537923A (en) * 2018-03-27 2018-09-14 丁巨波 Network-based smart lock management control method and system
CN109544735A (en) * 2018-10-24 2019-03-29 天津大学 A kind of intelligent cipher lock control system of safety that supporting multi-operation mode
CN111600862A (en) * 2020-05-09 2020-08-28 青岛海信智慧家居系统股份有限公司 User account management method and device

Similar Documents

Publication Publication Date Title
US20210304540A1 (en) Determining whether a user with a credential should be granted access to a physical space
CN103248484B (en) Access control system and method
US10572645B2 (en) Systems and methods for a credential including multiple access privileges
KR101296863B1 (en) Entry authentication system using nfc door lock
CN108639875A (en) A kind of block chain Intelligent recognition elevator safeguard management method and its system
CN105719376A (en) Door access control system and method
US20190156297A1 (en) Mobile credentials for resources management in collaborative applications
CN104157029A (en) Access control system, mobile terminal based control method thereof and mobile terminal
MX2013011116A (en) Distribution of premises access information.
CN104751545A (en) System, method and device for processing permissions of door lock
CN205354152U (en) Intelligent gate inhibition system
EP3584769A1 (en) Improved access control system and a method thereof controlling access of persons into restricted areas
CN109493469A (en) Authority setting method and management equipment of intelligent door lock
CN110766850B (en) Visitor information management method, access control system, server and storage medium
US11455854B2 (en) Access control for property management
CN109859350B (en) Remote authorized fingerprint self-service entry method and hotel self-service check-in method
TWI804975B (en) Management method of electronic locks
CN108364376A (en) A kind of gate inhibition and integrated Work attendance method of checking card
JP2016194212A (en) Entry/exit management device, management pc, and id key identification information copy method
CN113888779A (en) User authority management method, system and device based on intelligent lock and storage medium
CN114175115A (en) Asset management system
JP7259106B2 (en) Information processing device, information processing method, and information processing system
JP2009060231A (en) Security system, management device, mobile terminal, and program
KR20130082678A (en) Server for meeting room reservation and control method thereof
EP4148693A1 (en) An access control system and a method therein for handling access to an access-restricted physical resource

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination