CN113920619A - Rental house management system - Google Patents

Rental house management system Download PDF

Info

Publication number
CN113920619A
CN113920619A CN202111149205.2A CN202111149205A CN113920619A CN 113920619 A CN113920619 A CN 113920619A CN 202111149205 A CN202111149205 A CN 202111149205A CN 113920619 A CN113920619 A CN 113920619A
Authority
CN
China
Prior art keywords
door lock
management system
rental
intelligent door
instruction
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202111149205.2A
Other languages
Chinese (zh)
Other versions
CN113920619B (en
Inventor
吴伟
张嵘
周兴
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing Institute Of Jindun Public Security Technology Co ltd
Original Assignee
Nanjing Institute Of Jindun Public Security Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing Institute Of Jindun Public Security Technology Co ltd filed Critical Nanjing Institute Of Jindun Public Security Technology Co ltd
Priority to CN202111149205.2A priority Critical patent/CN113920619B/en
Publication of CN113920619A publication Critical patent/CN113920619A/en
Application granted granted Critical
Publication of CN113920619B publication Critical patent/CN113920619B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00944Details of construction or manufacture

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Manufacturing & Machinery (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The invention discloses a rental house management system, which comprises a rental house management system platform, a user side and an intelligent door lock, wherein the intelligent door lock is arranged on the rental house management system platform; and the rental house management system platform, the user side and the intelligent door lock generate instructions according to a set protocol format. The invention provides a set of security protocols compatible with a rental housing management system platform, a user side and an intelligent door lock side, which not only ensures the security of data interaction, but also ensures the high efficiency of protocol transmission.

Description

Rental house management system
Technical Field
The invention relates to a rental housing management system, and belongs to the technical field of public security and public security management and security protection.
Background
The existing rental housing management system in the market mainly comprises a rental housing management system platform, a user side and an intelligent door lock. In conclusion, the existing rental house management system platform solves the basic problems of house renting, renting and rent delinquent to a great extent, but as the state attaches importance to the rental house, the volume of the rental house can be gradually increased, the management pressure and difficulty of the government on the rental house to the tenants are increased, and the problems of public security management and epidemic situation prevention and control become the key problems of the current and future rental management attention; the rental housing management system platform is used as a core of data interaction, and the real-time performance and safety of the interaction are further improved, so that the problems that the password of the door lock is leaked and the door lock is abnormally opened due to the fact that the concurrence of the intelligent door lock is multiplied and the interaction protocol is unsafe are solved.
Disclosure of Invention
The invention provides a rental house management system aiming at the problems that the password of a door lock is leaked and the door lock is abnormally opened probably due to the fact that the concurrence of an intelligent door lock is multiplied and an interaction protocol is unsafe in the existing rental house management system.
In order to achieve the technical purpose, the invention adopts the following technical scheme.
Provided is a rental-house management system including: the system comprises a rental-house management system platform, a user side and an intelligent door lock; the rental shop management system platform, the user side and the intelligent door lock generate instructions according to a set protocol format;
the client is used for acquiring tenant information, generating a registration instruction according to the tenant information and sending the registration instruction to the rental house management system platform; the taxi renting system is also used for sending a service configuration parameter instruction for applying for issuing a door lock to the taxi renting management system platform; the client is further used for sending a door opening application instruction to the rental housing management system platform and receiving a remote door opening instruction sent by the rental housing management system platform, and the client generates an unlocking instruction according to the remote door opening instruction and sends the unlocking instruction to the intelligent door lock;
the intelligent door lock is used for sending a door lock information reporting instruction to the rental housing management system platform, receiving a service configuration parameter instruction sent by the rental housing management system platform, receiving an unlocking instruction sent by a user side, verifying, and completing unlocking after verification is passed;
the rental house management system platform is used for receiving a registration instruction sent by a user end to complete the registration of a tenant, responding to a service configuration parameter instruction which is sent by the user end and applies for issuing a door lock, and issuing the service configuration parameter instruction of the door lock to the intelligent door lock; and the remote door opening device is also used for responding to a door opening application instruction sent by the user side and sending a remote door opening instruction to the user side.
Further, the set protocol format includes: frame header, data length, encryption mode, equipment type, equipment number, functional code, load, check bit and frame tail;
the data length describes the sum of the equipment type, the equipment number, the function code and the data length of the load;
the equipment types comprise a rental house management system platform, a user side and an intelligent door lock;
the equipment number describes the numbers of the rental house management system platform, the user side and the intelligent door lock;
the payload is used to identify the various types of service data bytes.
Further, the information of the tenant acquired by the user side comprises an identity card number, an IMEI number of user side equipment, a user name, a mobile phone number, address information, house application time and house renting days, and optionally further comprises IC card unlocking verification information.
Further, the step of issuing the configuration parameter instruction to the intelligent door lock by the rental house management system platform comprises: the system comprises a door lock ID, the time of applying for housing, the number of days of renting the housing, the IMEI number of the user terminal equipment and optionally, IC card unlocking verification information.
Still further, the intelligent door lock comprises an ultra-bandwidth module,
the ultra-bandwidth module is used for detecting the number of people around the door lock, and when the detected number of people exceeds a preset value, an alarm signal is sent out and unlocking action is not executed;
the method for detecting the number of surrounding people comprises the following steps:
monitoring whether a mobile phone or other mobile equipment exists in the peripheral range of the door lock in a time-sharing scanning mode, if so, calculating the distance between the mobile phone or other mobile equipment and the intelligent door lock, and reporting early warning information to a platform through a communication module under the condition that the number of the mobile phones or mobile terminals with the distance smaller than a set distance is not less than N, wherein N is a preset value, and the distance calculation formula is as follows:
Figure BDA0003286575330000031
DisA_B1the distance between the intelligent door lock A and the mobile phone or other mobile equipment B1 is represented, X _ Loop represents the difference between the time when the ultra-bandwidth module of the intelligent door lock A sends a signal and the time when a return signal is received, and X1Loop is the processing time between the receipt of a signal and the transmission of a signal by the handset or other mobile device B1, and C is the speed of light.
Further, the intelligent door lock further comprises a time calibration module, the time calibration module is used for synchronizing the time of the intelligent door lock and the time of the rental housing management system platform server, and the specific calibration method executed by the time calibration module comprises the following steps: after the intelligent door lock is initialized, setting the time of the intelligent door lock; the intelligent door lock sends an intelligent door lock time calibration request instruction to the rental house management system platform, and records the current time T1 of sending the request;
the rental shop management system platform starts a thread for processing an intelligent door lock time synchronization request, and sends a response signal instruction to the intelligent door lock if the time synchronization request is received, wherein the response signal instruction comprises time T2 for sending response information;
and after receiving the response signal instruction, the intelligent door lock calculates the time difference between the time T1 of the current sending request and the time T2 of sending the response information, and completes time synchronization according to the time difference.
Furthermore, the user side is also used for calling the intelligent door lock through a wireless channel so that the intelligent door lock exits the sleep mode and reports the door lock information at regular time.
Furthermore, the intelligent door lock receives an unlocking instruction sent by the user side, detects whether user configuration information exists in a storage unit of the intelligent door lock, receives the user configuration information if the user configuration information does not exist in the storage unit of the intelligent door lock, stores the user configuration information into the door lock storage unit after verification is successful, compares the user configuration information in the unlocking instruction with the user configuration information in the door lock storage unit, executes unlocking action after the comparison is successful, and does not execute the unlocking action if the comparison is failed.
The invention has the following beneficial technical effects: the invention provides a set of security protocols compatible with a rental housing management system platform, a user side and an intelligent door lock side, which not only ensures the security of data interaction, but also ensures the high efficiency of protocol transmission.
The intelligent door lock adopted by the invention is provided with the ultra-bandwidth module (namely the UWB module), and the number of people around the door lock is predicted through the UWB module, so that the unlocking safety and reliability of the intelligent door lock are improved.
According to the invention, the time synchronization of the intelligent door lock and the platform server is realized, and the working time consistency of the intelligent door lock and the server is ensured.
Drawings
Fig. 1 is an encryption and decryption process of registering tenant information to a platform by a mobile phone terminal in a specific embodiment;
fig. 2 shows a bluetooth unlocking process for the user terminal in the embodiment;
FIG. 3 is a flow diagram illustrating time synchronization of an intelligent door lock with a platform in an exemplary embodiment;
FIG. 4 is a hardware architecture of a secure intelligent door lock in an embodiment;
FIG. 5 illustrates the principle of the UWB module predicting the number of people around the door lock in an embodiment.
Detailed Description
The invention is further described below with reference to the figures and the specific examples.
Example 1: a rental-house managing system comprising: the system comprises a rental-house management system platform, a user side and an intelligent door lock; the rental shop management system platform, the user side and the intelligent door lock generate instructions according to a set protocol format;
the client is used for acquiring tenant information, generating a registration instruction according to the tenant information and sending the registration instruction to the rental house management system platform; the taxi renting system is also used for sending a service configuration parameter instruction for applying for issuing a door lock to the taxi renting management system platform; the client is further used for sending a door opening application instruction to the rental housing management system platform and receiving a remote door opening instruction sent by the rental housing management system platform, and the client generates an unlocking instruction according to the remote door opening instruction and sends the unlocking instruction to the intelligent door lock;
the intelligent door lock is used for sending a door lock information reporting instruction to the rental housing management system platform, receiving a service configuration parameter instruction sent by the rental housing management system platform, and completing an unlocking action according to an unlocking instruction sent by a user side;
the rental house management system platform is used for receiving a registration instruction sent by a user end to complete the registration of a tenant, responding to a service configuration parameter instruction which is sent by the user end and applies for issuing a door lock, and issuing the service configuration parameter instruction of the door lock to the intelligent door lock; and the remote door opening device is also used for responding to a door opening application instruction sent by the user side and sending a remote door opening instruction to the user side.
In a particular embodiment, the instructions are optionally encrypted and decrypted according to a selected encryption and decryption algorithm. Alternative encryption and decryption algorithms include: AES (Advanced Encryption Standard, the most common symmetric Encryption algorithm), DES (Data Encryption Standard, a block algorithm using key Encryption), RC4 (abbreviation from Rivest Cipher 4, a stream Encryption algorithm, the key length of which is variable, or rabbity (the rabbity Encryption algorithm is a high-performance stream Encryption method).
The protocol format set by the invention is a set of safe interaction protocol with strong compatibility, and is simultaneously suitable for three components of a rental house management system, and the protocol comprises the following steps: frame header, data length, encryption mode, equipment type, equipment number, functional code, load, check bit and frame tail; the data length describes the sum of the equipment type, the equipment number, the function code and the data length of the load;
the equipment types comprise a rental house management system platform, a user side and an intelligent door lock;
the equipment number describes the numbers of the rental house management system platform, the user side and the intelligent door lock; the payload is used to identify the various types of service data bytes.
The present example is specifically shown in table 1.
TABLE 1 protocol Format
Figure BDA0003286575330000071
Description of protocol formats
Frame head: the root is different from the transmitting and receiving parties, and is specific. The data type is byte type, and the byte number is 2 bytes;
data length: the data length is the equipment type + the equipment number + the function code + the load, the data type is the byte type, the byte number is 2 bytes;
an encryption mode: 1Byte, 0x00 indicates no encryption or decryption; 0x01 represents encryption and decryption by the AES mode; 0x02 represents encryption and decryption by DES; 0x03 represents the encryption and decryption by RC 4; 0x04 represents encryption and decryption by a Rabbit mode; the data type is byte type, and the byte number is 1 byte;
the device type: the intelligent door lock mainly comprises a platform end, a user end and an intelligent door lock end, wherein the data type is byte type, and the byte number is 1 byte;
(1) platform side (i.e. rental house management system platform): 0x53 denotes a platform-side server;
(2) a user side: 0x4d for a user handset;
(3) intelligence door lock end: 0x45 denotes the smart door lock end;
equipment numbering: equipment number for describing taxi room management system platform, user side and intelligent door lock
Function code: describing specific functions to be realized by taxi management system platform, mobile phone and intelligent door lock
(1) Platform end of the rental house management system: 0x 21: issuing service configuration parameters of the door lock; 0x 22: issuing a remote door opening command;
(2) a user side: 0x 31: registering tenant information; 0x 32: applying for issuing service configuration parameters of the door lock to a server; 0x 33: applying for opening a door;
(3) intelligence door lock end: 0x 41: reporting the door lock information;
loading: variable length
And checking: 1Byte, and for device type, device number, function code, variable load
Checking, the data type is byte type, the byte number is 1byte
And (4) frame end: 0xff 0xff, the data type is byte type, the byte number is 2 bytes.
The following describes the core instructions.
1. The taxi room management system platform server sends the service configuration parameters of the door lock to the intelligent door lock,
issuing a service configuration parameter command of the door lock as follows: 0x 530 x45 DLen _2B 0x01 DevType DevNo Funcode payload chkSum 0xff
Data length: is not changed
And (3) encryption and decryption modes: 1Byte, mainly comprising AES, DES, RC4 and Rabbit;
the device type: 2Byte, including 1Byte data length and 1Byte detail content;
equipment numbering: the method comprises the steps of 1Byte data length and fixed length detail content;
function code: 2Byte, including 1Byte data length and 1Byte detail content;
original service data load:
(1) door lock ID: 15Bytes
(2) Applying for housing time: 6Bytes (year, month, day, hour, minute)
(3) Days of renting house
(4) IMEI number of customer premises equipment (e.g. handset): when the lock is unlocked through a wireless channel (such as Bluetooth), the user terminal equipment applying for unlocking is identified according to the IMEI number of the user terminal equipment.
Optionally, the method further comprises (5) IC card unlocking verification information: the IC card unlocking, such as unlocking with an identity card, needs to provide an identity card IC serial number, namely an identity card UID (User Identification);
the server issues a configuration parameter protocol encryption example to the intelligent door lock:
step 1: the intelligent door lock is in a working mode, a non-sleep mode and the server self-organizes the following protocol contents
The device type: 0x 010 x53
Equipment numbering: '234562059766825'
Function code: 0x 010 x21
Original service data load:
(1) door lock ID: '863703012336456'
(2) Applying for housing time: 0x 370 x0c 0x1e 0x 170 x3b 0x3b
(3) House renting days: 0x 020 xba
(4) IC card unlocking verification information: 0x 110 x 220 x 330 x 440 x 550 x 660 x 770 x88
Step 2: uniformly coding the protocol content
The device type: '0153'
Equipment numbering: '0f 3233343536323035393736383235'
Function code: '0121'
Original service data load:
(1) door lock ID: '0f383633373033303132333336343536'
(2) Applying for housing time: '06370c1e173b3b'
(3) House renting days: '0202ba'
(4) IC card unlocking verification information: '0800000000a5c727ec'
The overall service data after unified coding is as follows:
’01530f32333435363230353937363638323501210f38363337303330313233333634353606370c1e173b3b0202ba0800000000a5c727ec'
and 3, step 3: key generation
Equipment number: '863703012336456'
(1) Acquiring an IMEI number of the intelligent door lock;
(2) firstly, converting an IMEI number character string of the intelligent door lock into a 15-byte array;
(3) performing exclusive or operation on the 15bytes IMEI number and the 15bytes 0xFF, and indicating B with 15bytes as a result;
(4) carrying out byte-by-byte summation operation on the 15bytes of B to obtain 1byte of C; taking C as the highest byte of the key;
(5) the key result is:
Figure BDA0003286575330000111
and 4, step 4: encrypting the uniformly coded data (AES is taken as an example)
l5EKjXwWLaMR0E9E7fqbcwzGErbzmDtv+WnAam1R8yDbwULNFHocrPZUSpK/33SAK0uXDx8OS2BpB1i1Js4R6OgbZej9ijM9wqbjJf+1Bpj0fJJCEi302ofsh7i+jSkBki4nSHcomsw9R2zYenARJQ==
And 5, step 5: packaging the encrypted content and reporting
The packaged frame content:
'5345009801l5EKjXwWLaMR0E9E7fqbcwzGErbzmDtv+WnAam1R8yDbwULNFHocrPZUSpK/33SAK0uXDx8OS2BpB1i1Js4R6OgbZej9ijM9wqbjJf+1Bpj0fJJCEi302ofsh7i+jSkBki4nSHcomsw9R2zYenARJQ==51ffff'
2. the server issues a remote door opening command to the user side (such as the APP side of the mobile phone)
Issuing a remote door opening command: 0x 530 x45 DLen _2B 0x01 DevType DevNo Funcode payload chkSum 0xff
Data length: is not changed
And (3) encryption and decryption modes: 1Byte, mainly comprising AES, DES, RC4 and Rabbit;
the device type: 2Byte, including 1Byte data length and 1Byte detail content;
equipment numbering: the method comprises the steps of 1Byte data length and fixed length detail content;
function code: 2Byte, including 1Byte data length and 1Byte detail content;
original service data load:
(1) door lock ID: '863703012336456'
(2) Time for issuing a door opening command: 0x 370 x0c 0x1e 0x 170 x3b 0x3b
The server issues a remote door opening protocol encryption example to the client:
step 1: the intelligent door lock is in a working mode, a non-sleep mode and the server self-organizes the following protocol contents
The device type: 0x 010 x53
Equipment numbering: '234562059766825'
Function code: 0x 010 x22
Original service data load:
(1) door lock ID: '863703012336456'
(2) Time for issuing a door opening instruction: 0x 370 x0c 0x1e 0x 170 x3b 0x3b
Step 2: uniformly coding the protocol content
The device type: '0153'
Equipment numbering: '0f 3233343536323035393736383235'
Function code: '0122'
Original service data load:
(3) door lock ID: '0f383633373033303132333336343536'
(4) Time for issuing a door opening instruction: '06370c1e173b3b'
The overall service data after unified coding is as follows:
’01530f32333435363230353937363638323501220f38363337303330313233333634353606370c1e173b3b'
and 3, step 3: key generation
Equipment number: '863703012336456'
(1) Acquiring an IMEI number of the intelligent door lock;
(2) firstly, converting an IMEI number character string of the intelligent door lock into a 15-byte array;
(3) performing exclusive or operation on the 15bytes IMEI number and the 15bytes 0xFF, and indicating B with 15bytes as a result;
(4) carrying out byte-by-byte summation operation on the 15bytes of B to obtain 1byte of C; taking C as the highest byte of the key;
(5) the key result is:
Figure BDA0003286575330000131
and 4, step 4: encrypting the uniformly coded data (AES is taken as an example)
'l5EKjXwWLaMR0E9E7fqbcwzGErbzmDtv+WnAam1R8yCElEQWYDsJGIAC1OxSrR4hK0uXDx8OS2BpB1i1Js4R6OgbZej9ijM9wqbjJf+1Bpg/a4hINUs9P6CsbwygvJowffff'
And 5, step 5: packaging the encrypted content and reporting
The packaged frame content:
'5345008001l5EKjXwWLaMR0E9E7fqbcwzGErbzmDtv+WnAam1R8yCElEQWYDsJGIAC1OxSrR4hK0uXDx8OS2BpB1i1Js4R6OgbZej9ijM9wqbjJf+1Bpg/a4hINUs9P6CsbwygvJowb9ffff'
3. the user end generates a tenant registration instruction and sends the registration instruction to the rental house management system platform
A registration instruction: 0x4d 0x53 DLen _2B 0x01 DevType DevNo Funcode payload chkSum 0xff
Data length: variable
And (3) encryption and decryption modes: 1Byte, mainly comprising AES, DES, RC4 and Rabbit;
the device type: 2Byte, including 1Byte data length and 1Byte detail content;
equipment numbering: the method comprises the steps of 1Byte data length and fixed length detail content;
function code: 2Byte, including 1Byte data length and 1Byte detail content;
loading: the tenant information comprises 1Byte data length and indefinite length detailed contents;
(1) identification card number: the method comprises the steps of 1Byte data length and fixed length detail content;
(1) identity card UID: including 1Byte data length, fixed length details (optional: for opening door in IC)
(2) The user name: containing 1Byte data length, indefinite length details
(3) The mobile phone number is as follows: containing 1Byte data length, fixed length details
(4) Address information: containing 1Byte data length, indefinite length details
(5) Applying for housing time: containing 1Byte data length, fixed length details
(6) House renting days: containing 1Byte data length, fixed length details
(7) Including the IMEI number of the customer premise equipment (such as the IMEI number of the mobile phone): containing 1Byte data length, fixed length details
Example registration tenant information service data protocol encryption:
step 1: obtaining key data and original service data input by tenant from App tenant registration interface
The device type: 0x 010 x4d
Equipment numbering: '864202051465273'
Function code: 0x31
Original service data load:
identification card number: '32012419830404323X'
(1) Identity card UID: 0x 110 x 220 x 330 x 440 x 550 x 660 x 770 x88
(2) The user name: 'Zhongsheng'
(3) The mobile phone number is as follows: '13921405118'
(4) Address information: 'Yuhuatai district Yuanheng city of Nanjing city, Jiangsu province 9-layer 999 room'
(5) Applying for housing time: 0x 370 x0c 0x1e 0x 170 x3b 0x3b
(6) House renting days: 0x 020 xba
Step 2: uniformly coding key data and original service data input by tenant
The device type: '014 d'
Equipment numbering: '0f 383634323032303543635323733'
Function code: '0131'
Original service data load:
(1) identification card number: '12333230313234313938333034303433323358'
(2) Identity card UID: '0800000000a5c727ec'
(3) The user name: '04d6dcc9fa'
(4) The mobile phone number is as follows: '0b3133393231343035313138'
(5) Address information:
'25bdadcbd5caa1c4cfbea9cad0d3eabba8cca8c7f8d4c6c3dcb3c75ab6b039b2e3393939cad2'
(6) applying for housing time: '06370c1e173b3b'
(7) House renting days: '0202ba'
The overall service data after unified coding is as follows:
’014d0f3836343230323035313436353237330131123332303132343139383330343034333233580800000000a5c727ec04d6dcc9fa0b313339323134303531313825bdadcbd5caa1c4cfbea9cad0d3eabba8cca8c7f8d4c6c3dcb3c75ab6b039b2e3393939cad206370c1e173b3b0202ba'
and 3, step 3: key generation
Equipment number: '864202051465273'
(1) Acquiring an IMEI number of the mobile phone equipment;
(2) firstly, converting a mobile phone number character string into a 15-byte array;
(3) performing exclusive or operation on the 15bytes IMEI number and the 15bytes 0xFF, and indicating B with 15bytes as a result;
(4) carrying out byte-by-byte summation operation on the 15bytes of B to obtain 1byte of C; taking C as the highest byte of the key;
(5) the key result is:
Figure BDA0003286575330000161
and 4, step 4: encrypting the uniformly coded data (AES is taken as an example)
‘LJs/8ddyDIEGK7j+MHXsl/65Vx4A2r5i1trcz6iuqDt9oo9iiUhHqpQF92tZQSam/mwAF2jHobys5eyWFuL7uWTtrLpY1OVU8XH9Z0oTYpGv+yg3AYZ2n1X+iHjb18Ym4iwWOnBu39VRBvwgpBRXIB8Hokp7Cdir9ItvRtE70iXMhNO14jbg5JbGb675VtrMQ/CYUB7csqyP+cSpo+Qeqki0eL7Cy2O7a190gm9dKOn21dLNA8g7n0O5J0FHL2AWtL7AtlAZYAbOCoqN4Js6IF6pugzxxrOJ8qLlWMM/p8dKz4467/dNRZqHxiwOAn5c’
And 5, step 5: packaging the encrypted content and reporting
The packaged frame content:
‘4d53014001LJs/8ddyDIEGK7j+MHXsl/65Vx4A2r5i1trcz6iuqDt9oo9iiUhHqpQF92tZQSam/mwAF2jHobys5eyWFuL7uWTtrLpY1OVU8XH9Z0oTYpGv+yg3AYZ2n1X+iHjb18Ym4iwWOnBu39VRBvwgpBRXIB8Hokp7Cdir9ItvRtE70iXMhNO14jbg5JbGb675VtrMQ/CYUB7csqyP+cSpo+Qeqki0eL7Cy2O7a190gm9dKOn21dLNA8g7n0O5J0FHL2AWtL7AtlAZYAbOCoqN4Js6IF6pugzxxrOJ8qLlWMM/p8dKz4467/dNRZqHxiwOAn5cc6ffff’
4, the user (such as a mobile phone) applies for issuing the service configuration parameters of the door lock to a server (a server, namely a rental-house management system platform)
A user side applies for issuing service configuration parameters to a rental house management system platform to obtain door opening permission; acquiring a door opening permission command: 0x4d 0x53 DLen _2B 0x01 DevType DevNo Funcode payload chkSum 0xff
Data length: is not changed
And (3) encryption and decryption modes: 1Byte, mainly comprising AES, DES, RC4 and Rabbit;
the device type: 2Byte, including 1Byte data length and 1Byte detail content;
equipment numbering: the method comprises the steps of 1Byte data length and fixed length detail content;
function code: 2Byte, including 1Byte data length and 1Byte detail content;
loading: is free of
A user side (such as a mobile phone APP) applies to a server for issuing a service configuration parameter protocol encryption example:
step 1: the intelligent door lock is in a working mode, a non-sleep mode and the following protocol contents of the mobile phone App self-organization
The device type: 0x 010 x4d
Equipment numbering: '864202051465273'
Function code: 0x32
Original service data load: is free of
Step 2: uniformly coding the protocol content
The device type: '014 d'
Equipment numbering: '0f 383634323032303543635323733'
Function code: '0132'
The overall service data after unified coding is as follows:
’014d0f3836343230323035313436353237330132'
and 3, step 3: key generation
Equipment number: '864202051465273'
(1) Acquiring an IMEI number of the mobile phone equipment;
(2) firstly, converting a mobile phone number character string into a 15-byte array;
(3) performing exclusive or operation on the 15bytes IMEI number and the 15bytes 0xFF, and indicating B with 15bytes as a result;
(4) carrying out byte-by-byte summation operation on the 15bytes of B to obtain 1byte of C; taking C as the highest byte of the key;
(5) secret keyThe key result is:
Figure BDA0003286575330000181
and 4, step 4: encrypting the uniformly coded data (AES is taken as an example)
'LJs/8ddyDIEGK7j+MHXsl/65Vx4A2r5i1trcz6iuqDtQzNxqqvDKKVfeWCGu3bKw'
And 5, step 5: packaging the encrypted content and reporting
The packaged frame content:
'4d53004001LJs/8ddyDIEGK7j+MHXsl/65Vx4A2r5i1trcz6iuqDtQzNxqqvD KKVfeWCGu3bKw8effff'
5 the tenant mobile phone end sends an application door opening command to the server
Applying for a door opening command: 0x4d 0x53 DataLen _2B 0x01 DevType DevNo Funcode payload chksum 0xff
Data length: is not changed
And (3) encryption and decryption modes: 1Byte, mainly comprising AES, DES, RC4 and Rabbit;
the device type: 2Byte, including 1Byte data length and 1Byte detail content;
equipment numbering: the method comprises the steps of 1Byte data length and fixed length detail content;
function code: 2Byte, including 1Byte data length and 1Byte detail content;
original service data load:
(1) applying for door opening time: 6Bytes (year, month, day, hour, minute)
The tenant sends an example of applying for door opening command protocol encryption to the server:
step 1: the intelligent door lock is in a working mode and a non-sleep mode, and the intelligent door lock self-organizes the following protocol contents
The device type: 0x 010 x4d
Equipment numbering: '864202051465273'
Function code: 0x 010 x33
Original service data load:
(1) applying for door opening time: 0x 370 x0c 0x1e 0x 170 x3b 0x3b
Step 2: uniformly coding the protocol content
The device type: '014 d'
Equipment numbering: '0f 383634323032303543635323733'
Function code: '0133'
Original service data load:
(1) applying for door opening time: '06370c1e173b3b'
The overall service data after unified coding is as follows:
’014d0f383634323032303531343635323733013306370c1e173b3b'
and 3, step 3: key generation
Equipment number: '864202051465273'
(1) Acquiring an IMEI number of the intelligent door lock;
(2) firstly, converting an IMEI number character string of the intelligent door lock into a 15-byte array;
(3) performing exclusive or operation on the 15bytes IMEI number and the 15bytes 0xFF, and indicating B with 15bytes as a result;
(4) carrying out byte-by-byte summation operation on the 15bytes of B to obtain 1byte of C; taking C as the highest byte of the key;
(5) the key result is:
Figure BDA0003286575330000201
and 4, step 4: encrypting the uniformly coded data (AES is taken as an example)
'LJs/8ddyDIEGK7j+MHXsl/65Vx4A2r5i1trcz6iuqDsd7T2g1ZfranPcxzyaUxBQPF6ZG2LQyiOB7IXNoVicaA=='
And 5, step 5: packaging the encrypted content and reporting
The packaged frame content:
'4d53005801LJs/8ddyDIEGK7j+MHXsl/65Vx4A2r5i1trcz6iuqDsd7T2g1ZfranPcxzyaUxBQPF6ZG2LQyiOB7IXNoVicaA==17ffff'
6. door lock information reporting command
Door lock information reporting command: 0x 450 x53 DataLen _2B 0x01 DevType DevNo Funcode payload chksum 0xFF
Data length: is not changed
And (3) encryption and decryption modes: 1Byte, mainly comprising AES, DES, RC4 and Rabbit;
the device type: 2Byte, including 1Byte data length and 1Byte detail content;
equipment numbering: the method comprises the steps of 1Byte data length and fixed length detail content;
function code: 2Byte, including 1Byte data length and 1Byte detail content;
original service data load:
(1) the information reporting time is as follows: 6Bytes (year, month, day, hour, minute)
(2) Electric quantity: 2Bytes
(3) Early warning information: 1Byte, as shown in Table 2
TABLE 2 early warning information
Figure BDA0003286575330000211
The intelligent door lock reports the data protocol encryption illustration to the server:
step 1: the intelligent door lock is in a working mode, a non-sleep mode and self-organizes the following protocol contents
The device type: 0x 010 x45
Equipment numbering: '863703012336456'
Function code: 0x 010 x41
Original service data load:
(1) the information reporting time is as follows: 0x 370 x0C 0x1E 0x 170 x3B 0x3B
(3) Electric quantity information: 0x 020 xBA
(4) Early warning information: 0x 010 x1F
Step 2: uniformly coding the protocol content
The device type: '0145'
Equipment numbering: '0f383633373033303132333336343536'
Function code: '0141'
Original service data load:
(1) the information reporting time is as follows: '06370c1e173b3b'
(2) Electric quantity information: '0202ba'
(3) Early warning information: '02011f'
The overall service data after unified coding is as follows:
’01450f383633373033303132333336343536014106370c1e173b3b0202ba02011f'
and 3, step 3: key generation
Equipment number: '863703012336456'
(1) Acquiring an IMEI number of the intelligent door lock;
(2) firstly, converting an IMEI number character string of the intelligent door lock into a 15-byte array;
(3) performing exclusive or operation on the 15bytes IMEI number and the 15bytes 0xFF, and indicating B with 15bytes as a result;
(4) carrying out byte-by-byte summation operation on the 15bytes of B to obtain 1byte of C; taking C as the highest byte of the key;
(5) the key result is:
Figure BDA0003286575330000231
and 4, step 4: encrypting the uniformly coded data (AES is taken as an example)
'/AsWxM7EtmUtKqwRPyyAZJ4e990x8YOjALpmzNvKy4oQaEYV8bl1nAJmjd7q1nAY5YEbnvnnQ3zhBC4g6mIYvBOFUGq6jAtIepRcU6nvMGs='
And 5, step 5: packaging the encrypted content and reporting
The packaged frame content:
'4553006c01/AsWxM7EtmUtKqwRPyyAZJ4e990x8YOjALpmzNvKy4oQaEYV8bl1nAJmjd7q1nAY5YEbnvnnQ3zhBC4g6mIYvBOFUGq6jAtIepRcU6nvMGs=c4ffff'
in a specific embodiment, a process of registering tenant information encryption and decryption by a user side (i.e., a mobile phone side) to a platform (i.e., a rental-house management system platform) is shown in the drawing, and includes:
the mobile phone terminal user fills out tenant information (including identity card number, identity card UID, user name, mobile phone number, mobile phone IMEI number, address information, house application time, house renting days and the like) on the mobile phone through the user side; after the completion of the filling, clicking a 'registration' button on a corresponding interface of the mobile phone, selecting an encryption and decryption algorithm by a mobile phone terminal to encrypt tenant information, adding a frame head and a frame tail to perform grouping (including a decryption mechanism) after encryption, and sending an encrypted tenant information data packet to a platform (namely a rental house management system platform);
detecting frame headers after the rental house management system platform determines that data exists, and selecting a corresponding decryption algorithm to analyze service data if the frame headers exist;
performing corresponding operation according to the function code, and writing the service data into a database;
sending confirmation information to the mobile phone terminal;
and the mobile phone terminal completes registration after receiving the confirmation information.
In a specific embodiment, the user side unlocking process comprises two modes of Bluetooth wireless unlocking and IC card unlocking.
As shown in fig. 2, the unlocking method through a wireless channel (such as bluetooth) includes the following steps: after the user side finishes the registration on the platform, the intelligent door lock is awakened by opening a remote wireless channel (such as Bluetooth);
after the intelligent door lock is awakened, regularly reporting door lock information to a platform through a door lock information reporting instruction;
the user side Bluetooth and the intelligent door lock Bluetooth are successfully paired, and after the user side Bluetooth and the intelligent door lock Bluetooth are successfully connected in a remote mode, the tenant mobile phone user side sends a door opening application command to the server;
the platform sends a remote door opening instruction to the user side after receiving a door opening application command sent by the user side;
the method comprises the steps that a user side receives a remote door opening instruction, and the user side can unlock the mobile phone through platform authentication, and then sends an encrypted unlocking instruction to the intelligent mobile phone through a Bluetooth channel, wherein the unlocking instruction adopts the protocol format and comprises a mobile phone IMEI number read by the user side;
the intelligent door lock receives an encrypted unlocking instruction, and whether the door lock EEPROM has user configuration information (mainly an IMEI number of a mobile phone) or not is checked;
if no user configuration information exists, the user side sends a service configuration parameter instruction for applying for issuing the door lock to the platform; after receiving the command of applying for issuing the service configuration parameters, the platform sends the service configuration parameters of the door lock to the intelligent door lock end,
if the user configuration information exists, the unlocking instruction is decrypted, the IMEI number of the mobile phone sending the unlocking instruction is compared with the user configuration information, if the comparison is successful, the unlocking is carried out, and otherwise, the door lock does not act.
The IC card unlocking process comprises the following steps:
after the intelligent door lock in the dormant state is awakened, the rental-house management system platform sends service configuration information to the intelligent door lock through a service configuration parameter instruction;
the user utilizes the IC card to send a radio frequency signal, optionally, the IC card adopts an identity card, the intelligent door lock obtains an identity card UID by reading an unlocking instruction through the RFID, the identity card UID is compared with service configuration information in the door lock EEPROM, the door lock is unlocked if the comparison is successful, and otherwise, the door lock does not act.
It should be noted that, the hardware structure of the intelligent door lock can be implemented by using the prior art, including the intelligent door lock comprising: the system comprises a battery and protection circuit, an MCU and peripheral circuit, a battery electric quantity detection module, an RFID reading module, a communication module, a Bluetooth module and a motor module;
the battery module is used for providing working voltage, and the protection circuit is connected with the battery module and used for protecting the battery module;
the battery electric quantity detection module is used for being connected with the battery module and detecting the electric quantity of the battery module;
the MCU is used for reading the data of the battery electric quantity detection module and the RFID reading module and controlling the motor module to act;
the RFID reading module is used for reading the unlocking verification information of the IC card;
the communication module is connected with the MCU and used for receiving the door lock configuration data, and uploading the decryption data, the door lock state data and the door opening data;
the Bluetooth module is connected with the MCU and used for realizing Bluetooth connection with a mobile phone;
the motor module is used for the motor action and executing the door opening action.
Embodiment 2 on the basis of the above embodiments, in a specific embodiment, a hardware architecture of the secure intelligent door lock is shown in fig. 4. The safe intelligent door lock mainly comprises a battery, a protection circuit, an MCU, a peripheral circuit, an NB module, a UWB module, a battery electric quantity detection module, a sound intensity detection module, a vibration detection module, an RFID recognition module, a motor module and the like.
Battery and protection circuit: the battery and protection circuit mainly comprises a battery 1 and a protection circuit, a battery 2 and a protection circuit; and voltage is provided for normal work of each module of the safe intelligent door lock. The battery 1 is mainly used for providing voltage required by normal work for the domestic MCU-1 Bluetooth module, the communication module, the RFID reading module, the UWB module and the motor module, and the battery 2 is mainly used for providing voltage required by normal work for the MCU-2, the vibration detection module and the sound intensity detection module.
MCU and peripheral circuit: a domestic microprocessor GD32F103 series MCU-1 and a domestic operating system RT-Thread are adopted to carry out data interaction with an NB (narrow band) module and a UWB module; reading data of the battery electric quantity detection module and the RFID reading module; and controlling the motor module to act. And reading the data of the sound intensity detection module and the vibration module by adopting the MCU-2 microprocessor, reasoning the data, and predicting whether the door lock is illegally opened, whether potential safety hazards exist indoors or not and other safety events.
A communication module: the system is used for receiving and decrypting the door lock configuration data, uploading the door lock state data and the door opening data.
A UWB module: the method is used for detecting the number of people around the door lock.
Battery power detection module: and a signal conditioning circuit before battery power acquisition.
The sound intensity detection module: and a signal conditioning circuit before sound intensity signal acquisition.
A vibration detection module: and the signal conditioning circuit is used before the vibration intensity signal is acquired.
RFID recognition module: used for reading the ID card UID of the IC card.
A motor module: the driving motor acts to execute the door opening action.
In this embodiment, the UWB module is used to predict the number of people around the door lock, and the prior art door lock does not have this technical feature. The method specifically comprises the following steps: when a tenant picks up a mobile phone and uses Bluetooth to open a door or uses an IC card to open the door, a built-in UWB module of a door lock is awakened, the MCU-1 controls the UWB module to monitor whether the mobile phone or other mobile equipment exists in the peripheral range of the door lock in a time-sharing scanning mode (the UWB module is built in the mobile phone or other mobile equipment, the intelligent door lock sends radio frequency signals to the mobile phone or other mobile equipment through the UWB module and monitors whether the mobile phone or other mobile equipment exists in the peripheral range of the door lock according to received return signals), if yes, the distance between the mobile phone or other mobile equipment and the intelligent door lock is calculated, and when the number of the mobile phones or mobile terminals with the distance smaller than a set distance is larger than or equal to 2, the intelligent door lock reports early warning information to a platform through a communication module. The distance calculation formula is as follows:
Figure BDA0003286575330000271
as shown in fig. 5, DisA_B1The distance between the intelligent door lock A and the mobile phone or other mobile equipment B1 is represented, X _ Loop represents the difference between the time when the ultra-bandwidth module of the intelligent door lock A sends a signal and the time when a return signal is received, and X1Loop is the processing time from receiving a signal to sending a signal by the ultra-bandwidth module of the mobile phone or other mobile equipment B1, and C is the speed of light.
Through the UWB module, the security and the reliability that intelligent lock unblanked have been improved.
In this embodiment, optionally, the intelligent door lock realizes vibration and a sound intensity detection mechanism by setting the sound intensity detection module and the vibration module. When the intelligent door lock works normally, a door opening signal is detected, the MCU2 starts a function of collecting a sound signal, and regularly wakes up (wake-up interval time can be configured) to collect the indoor sound signal intensity, if the sound intensity is normal, the intelligent door lock continues to sleep, and continues to collect the sound signal after the sound intensity is awakened up at the interval time; if the sound intensity is higher, sound intensity data of a certain time are continuously collected (the time for collecting the sound data can be configured), and the sound intensity data are locally compressed and then transmitted to a rear platform for analysis, so that whether the risk of the occurrence of the public security incident exists or not is judged.
The intelligent door lock vibration signal acquisition and reporting awakening mechanism comprises: when the intelligent door lock works normally, the MCU2 wakes up (wake-up interval time is configurable) regularly to collect the intensity of the vibration signal, if the vibration intensity is normal, the intelligent door lock continues to sleep, and after the intelligent door lock wakes up at the interval time, the intelligent door lock continues to collect the vibration signal; if the vibration intensity is high, continuously collecting vibration intensity data for a certain time (the time for collecting the sound data can be configured), transmitting the vibration intensity data to a rear platform for analysis, and judging whether the risk of the occurrence of the security incident exists or not.
Note: the intelligent door lock vibration and sound intensity detection mechanism is realized based on an AI intelligent algorithm, firstly, sound intensity and vibration data are collected, a model of sound intensity detection and vibration detection is trained, the model is put into the MCU2, and inference is carried out through the MCU2, so that whether a public security incident occurs or not is reflected. This is partly an innovation not present in the prior art and systems.
Example 3: on the basis of the foregoing embodiment, in order to ensure the working time consistency between the intelligent door lock and the server, the time synchronization between the intelligent door lock and the platform server needs to be implemented, the intelligent door lock provided in this embodiment further includes a time calibration module, the time calibration module is configured to synchronize the time between the intelligent door lock and the platform server of the rental housing management system, and a specific calibration method (as shown in fig. 4) executed by the time calibration module includes: after the intelligent door lock is initialized, setting the time of the intelligent door lock; the intelligent door lock sends an intelligent door lock time calibration request instruction to the rental house management system platform, and records the current time T1 of sending the request;
the rental shop management system platform starts a thread for processing an intelligent door lock time synchronization request, and sends a response signal to the intelligent door lock if the time synchronization request is received, wherein the response signal comprises time T2 for sending response information;
and after receiving the response information, the intelligent door lock calculates the time difference between the time T1 of the current sending request and the time T2 of sending the response information, and completes time synchronization according to the time difference.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
While the present invention has been described with reference to the embodiments shown in the drawings, the present invention is not limited to the embodiments, which are illustrative and not restrictive, and it will be apparent to those skilled in the art that various changes and modifications can be made therein without departing from the spirit and scope of the invention as defined in the appended claims.

Claims (9)

1. A rental-room management system, comprising: the system comprises a rental-house management system platform, a user side and an intelligent door lock; the rental shop management system platform, the user side and the intelligent door lock generate instructions according to a set protocol format;
the client is used for acquiring tenant information, generating a registration instruction according to the tenant information and sending the registration instruction to the rental house management system platform; the taxi renting system is also used for sending a service configuration parameter instruction for applying for issuing a door lock to the taxi renting management system platform; the client is further used for sending a door opening application instruction to the rental housing management system platform and receiving a remote door opening instruction sent by the rental housing management system platform, and the client generates an unlocking instruction according to the remote door opening instruction and sends the unlocking instruction to the intelligent door lock;
the intelligent door lock is used for sending a door lock information reporting instruction to the rental housing management system platform, receiving a service configuration parameter instruction sent by the rental housing management system platform, receiving an unlocking instruction sent by a user side, verifying, and completing unlocking after verification is passed;
the rental house management system platform is used for receiving a registration instruction sent by a user end to complete the registration of a tenant, responding to a service configuration parameter instruction which is sent by the user end and applies for issuing a door lock, and issuing the service configuration parameter instruction of the door lock to the intelligent door lock; and the remote door opening device is also used for responding to a door opening application instruction sent by the user side and sending a remote door opening instruction to the user side.
2. A rental housing managing system according to claim 1, wherein the set protocol format includes: frame header, data length, encryption mode, equipment type, equipment number, functional code, load, check bit and frame tail;
the data length describes the sum of the equipment type, the equipment number, the function code and the data length of the load;
the equipment types comprise a rental house management system platform, a user side and an intelligent door lock;
the equipment number describes the numbers of the rental house management system platform, the user side and the intelligent door lock;
the payload is used to identify the various types of service data bytes.
3. The rental housing management system of claim 1, wherein the client-side acquired tenant information includes an identification number, a user name of a client-side device IMEI number, a mobile phone number, address information, a housing application time, and a number of days of housing rental.
4. The rental-house management system of claim 1, wherein the issuing of the service configuration parameter instruction of the door lock to the intelligent door lock by the rental-house management system platform comprises: door lock ID, time of applying for housing, days of renting housing and IMEI number of customer premise equipment.
5. A rental housing management system as in claim 1, wherein the smart door lock includes an ultra-bandwidth module;
the ultra-bandwidth module is used for detecting the number of people around the door lock, and when the detected number of people exceeds a preset value, an alarm signal is sent out and unlocking action is not executed;
the method for detecting the number of surrounding people comprises the following steps:
monitoring whether a mobile phone or other mobile equipment exists in the peripheral range of the door lock in a time-sharing scanning mode, if so, calculating the distance between the mobile phone or other mobile equipment and the intelligent door lock, and reporting early warning information to the rental house management system platform when the number of the mobile phones or mobile terminals with the distance smaller than a set distance is larger than or equal to N, wherein N is a preset value, and the distance calculation formula is as follows:
Figure FDA0003286575320000021
DisA_B1the distance between the intelligent door lock A and the mobile phone or other mobile equipment B1 is represented, X _ Loop represents the difference between the time when the ultra-bandwidth module of the intelligent door lock A sends a signal and the time when a return signal is received, and X1Loop is the processing time from receiving a signal to sending a signal by the ultra-bandwidth module of the mobile phone or other mobile equipment B1, and C is the speed of light.
6. The rental-room management system of claim 1, wherein the smart door lock further comprises a time calibration module for time synchronization of the smart door lock with the rental-room management system platform server, and the time calibration module performs a specific calibration method comprising: after the intelligent door lock is initialized, setting the time of the intelligent door lock; the intelligent door lock sends an intelligent door lock time calibration request instruction to the rental house management system platform, and records the current time T1 of sending the request;
the rental shop management system platform starts a thread for processing an intelligent door lock time synchronization request, and sends a response signal instruction to the intelligent door lock if the time synchronization request is received, wherein the response signal instruction comprises time T2 for sending response information;
and after receiving the response signal instruction, the intelligent door lock calculates the time difference between the time T1 of the current sending request and the time T2 of sending the response information, and completes time synchronization according to the time difference.
7. A rental house managing system according to claim 1,
the user side is also used for awakening the intelligent door lock through a wireless channel so that the intelligent door lock exits the sleep mode and reports the door lock information at regular time or judges whether to receive the service configuration parameters.
8. The rental housing management system of claim 1, wherein the smart door lock receives an unlocking command sent by the user side, detects whether user configuration information exists in a storage unit of the smart door lock, receives the user configuration information if the user configuration information does not exist, stores the user configuration information in the door lock storage unit after verification is successful, compares the user configuration information in the unlocking command with the user configuration information in the door lock storage unit, executes an unlocking operation after the comparison is successful, and does not execute the unlocking operation if the comparison is failed.
9. The rental housing management system of claim 1, wherein the user terminal is further configured to send IC card unlocking verification information to the smart door lock via the IC card, and the smart card is configured to verify the read IC card unlocking verification information, and complete the unlocking operation after the verification is passed.
CN202111149205.2A 2021-09-29 2021-09-29 Renting house management system Active CN113920619B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111149205.2A CN113920619B (en) 2021-09-29 2021-09-29 Renting house management system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111149205.2A CN113920619B (en) 2021-09-29 2021-09-29 Renting house management system

Publications (2)

Publication Number Publication Date
CN113920619A true CN113920619A (en) 2022-01-11
CN113920619B CN113920619B (en) 2024-03-29

Family

ID=79236887

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111149205.2A Active CN113920619B (en) 2021-09-29 2021-09-29 Renting house management system

Country Status (1)

Country Link
CN (1) CN113920619B (en)

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102542649A (en) * 2012-03-11 2012-07-04 李凯 Method for controlling locking system by mobile equipment
JP2013109779A (en) * 2013-02-15 2013-06-06 Toshiba Corp Monitor system and method for monitoring tailgating intrusion
US20160180618A1 (en) * 2014-12-23 2016-06-23 Gate Labs Inc. Increased security electronic lock
WO2016184195A1 (en) * 2015-10-29 2016-11-24 中兴通讯股份有限公司 Door lock control method, apparatus and terminal
WO2016197330A1 (en) * 2015-06-09 2016-12-15 深圳市迈斯云门禁网络科技有限公司 Access control management method and system
CN107230139A (en) * 2017-06-01 2017-10-03 天网互联科技(深圳)有限公司 A kind of unattended Management System on Public Rooms based on arrowband Internet of Things
CN107274278A (en) * 2017-08-01 2017-10-20 成都科耐睿科技有限公司 A kind of system of renting a house based on Internet of Things intelligent door lock
CN108198016A (en) * 2017-12-21 2018-06-22 广东汇泰龙科技有限公司 A kind of rental housing based on cloud lock manages system
CN108734837A (en) * 2018-05-30 2018-11-02 广东能兴科技发展有限公司 A kind of rental house access control management method being managed with mobile terminal
CN110060400A (en) * 2019-04-29 2019-07-26 李佳怿 A kind of rental house gate inhibition real name moves in system and method
CN110634488A (en) * 2019-10-08 2019-12-31 北京小米智能科技有限公司 Information processing method, device and system and storage medium
TWI720903B (en) * 2020-06-03 2021-03-01 南開科技大學 Home life safety warning system for living alone and method thereof

Patent Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102542649A (en) * 2012-03-11 2012-07-04 李凯 Method for controlling locking system by mobile equipment
JP2013109779A (en) * 2013-02-15 2013-06-06 Toshiba Corp Monitor system and method for monitoring tailgating intrusion
US20160180618A1 (en) * 2014-12-23 2016-06-23 Gate Labs Inc. Increased security electronic lock
CN107615339A (en) * 2015-06-09 2018-01-19 深圳市迈斯云门禁网络科技有限公司 Access control management method and system
WO2016197330A1 (en) * 2015-06-09 2016-12-15 深圳市迈斯云门禁网络科技有限公司 Access control management method and system
WO2016184195A1 (en) * 2015-10-29 2016-11-24 中兴通讯股份有限公司 Door lock control method, apparatus and terminal
CN107230139A (en) * 2017-06-01 2017-10-03 天网互联科技(深圳)有限公司 A kind of unattended Management System on Public Rooms based on arrowband Internet of Things
CN107274278A (en) * 2017-08-01 2017-10-20 成都科耐睿科技有限公司 A kind of system of renting a house based on Internet of Things intelligent door lock
CN108198016A (en) * 2017-12-21 2018-06-22 广东汇泰龙科技有限公司 A kind of rental housing based on cloud lock manages system
CN108734837A (en) * 2018-05-30 2018-11-02 广东能兴科技发展有限公司 A kind of rental house access control management method being managed with mobile terminal
CN110060400A (en) * 2019-04-29 2019-07-26 李佳怿 A kind of rental house gate inhibition real name moves in system and method
CN110634488A (en) * 2019-10-08 2019-12-31 北京小米智能科技有限公司 Information processing method, device and system and storage medium
TWI720903B (en) * 2020-06-03 2021-03-01 南開科技大學 Home life safety warning system for living alone and method thereof

Also Published As

Publication number Publication date
CN113920619B (en) 2024-03-29

Similar Documents

Publication Publication Date Title
CN110462692B (en) Safety communication method based on intelligent lock system and intelligent lock system thereof
CN106898065B (en) Unlocking method of intelligent door lock
CN106373228B (en) A kind of passive lock system of intelligent and safe and its method for unlocking
CN102158473B (en) Remote entry system
CN106600757A (en) Wireless lock control system based on intelligent terminal and method
US20120002808A1 (en) Interleaving and deinterleaving method for preventing periodic position interference
CN202189405U (en) Short message password access control and alarming device
CN106340104B (en) A kind of coded lock, coded lock control system and method
CN205899637U (en) Wireless tool to lock control system based on intelligent terminal
CN108986278A (en) A kind of intelligent door lock off-line cipher authorization method and authoring system
CN103473844A (en) Intelligent control method and intelligent control system for public rental housing
WO2022002146A1 (en) Smart device control method and system
CN204463267U (en) A kind of intelligent access control system
US20200098208A1 (en) Security control device, security control method, security system and storage medium
CN108257266A (en) A kind of multi-functional smart lock
CN107967731A (en) Door-locking system based on two-dimensional code scanning unlock
CN112260275B (en) Non-invasive load decomposition method and system based on blockchain technology
CN111325881B (en) Lockset and two-dimension code control method thereof
US20030079141A1 (en) Method for securing the authenticity of hardware and software in a networked system
CN113920619B (en) Renting house management system
CN107480529A (en) A kind of information safety protection system and guard method
CN115600624B (en) Entity seal storage management system and method based on RFID technology
CN109246131B (en) Safety reinforcing method and system for electricity consumption information acquisition terminal
CN205302421U (en) Mobile terminal , gate host computer and entrance guard system of unblanking in entrance guard system of unblanking
CN207924771U (en) A kind of intelligent door lock system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant