CN113920619B - Renting house management system - Google Patents

Renting house management system Download PDF

Info

Publication number
CN113920619B
CN113920619B CN202111149205.2A CN202111149205A CN113920619B CN 113920619 B CN113920619 B CN 113920619B CN 202111149205 A CN202111149205 A CN 202111149205A CN 113920619 B CN113920619 B CN 113920619B
Authority
CN
China
Prior art keywords
door lock
intelligent door
management system
user
house management
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202111149205.2A
Other languages
Chinese (zh)
Other versions
CN113920619A (en
Inventor
吴伟
张嵘
周兴
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing Institute Of Jindun Public Security Technology Co ltd
Original Assignee
Nanjing Institute Of Jindun Public Security Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing Institute Of Jindun Public Security Technology Co ltd filed Critical Nanjing Institute Of Jindun Public Security Technology Co ltd
Priority to CN202111149205.2A priority Critical patent/CN113920619B/en
Publication of CN113920619A publication Critical patent/CN113920619A/en
Application granted granted Critical
Publication of CN113920619B publication Critical patent/CN113920619B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00944Details of construction or manufacture

Abstract

The invention discloses a renting house management system, which comprises a renting house management system platform, a user and an intelligent door lock; and the renting house management system platform, the user and the intelligent door lock generate instructions according to the set protocol format. The invention provides a set of security protocols compatible with a renting house management system platform, a user side and an intelligent door lock side, which not only ensures the security of data interaction, but also ensures the high efficiency of protocol transmission.

Description

Renting house management system
Technical Field
The invention relates to a management system for a taxi, belonging to the technical field of public security and public security management and security protection.
Background
The existing renting house management system in the market mainly comprises three components, namely a renting house management system platform, a user and an intelligent door lock. The system comprises a management system platform, a control system platform and a control system platform, wherein the management system platform has networking and control functions with an intelligent door lock, tenant data, door opening information and door lock state data can be timely reported to the management system platform of the taxi, the management system platform of the taxi can also disable and enable the intelligent door lock, in summary, the existing management system platform of the taxi solves the basic problems of house renting, borrowing and defaulting to rent to a great extent, but along with the importance of countries on the taxi, the body quantity of the taxi is gradually increased, the management pressure and difficulty of governments on the entering of the tenant of the taxi are also increased, and security management problems and epidemic situation prevention and control problems become important problems of current and future taxi management; as a core of data interaction, the renting house management system platform needs to further improve the real-time performance and safety of the interaction, so that the problems of door lock password leakage and abnormal door lock unlocking caused by multiplication of intelligent door lock concurrency and unsafe interaction protocol are avoided.
Disclosure of Invention
Aiming at the problems that the current renting house management system possibly causes the leakage of a door lock password and the abnormal unlocking of the door lock due to the multiplication of the concurrency of the intelligent door lock and the unsafe interaction protocol, the invention provides the renting house management system.
In order to achieve the technical purpose, the invention adopts the following technical scheme.
Provided is a rental house management system including: a renting house management system platform, a user and an intelligent door lock; the renting house management system platform, the user and the intelligent door lock generate instructions according to a set protocol format;
the user terminal is used for acquiring the tenant information, generating a registration instruction according to the tenant information and sending the registration instruction to the rental house management system platform; the system is also used for sending a service configuration parameter instruction for applying to issue a door lock to the renting house management system platform; the user side is also used for sending an application door opening instruction to the renting house management system platform and receiving a remote door opening instruction sent by the renting house management system platform, and the user side generates an unlocking instruction according to the remote door opening instruction and sends the unlocking instruction to the intelligent door lock;
the intelligent door lock is used for sending a door lock information reporting instruction to the rental house management system platform, receiving a service configuration parameter instruction sent by the rental house management system platform, receiving an unlocking instruction sent by a user side, verifying, and completing unlocking action after verification is passed;
the renting house management system platform is used for receiving a registration instruction sent by a user side to finish the registration of a tenant, responding to a service configuration parameter instruction sent by the user side for issuing a door lock, and issuing the service configuration parameter instruction of the door lock to the intelligent door lock; and the remote door opening instruction is also used for responding to the door opening application instruction sent by the user side and sending the remote door opening instruction to the user side.
Further, the set protocol format includes: frame head, data length, encryption mode, equipment type, equipment number, function code, load, check bit and frame tail;
the data length describes the sum of the data length of the device type, the device number, the function code and the load;
the equipment type comprises a renting house management system platform, a user and an intelligent door lock;
the equipment number describes the numbers of the rental house management system platform, the user and the intelligent door lock;
the payload is used to identify each type of traffic data byte.
Further, the tenant information acquired by the user side comprises an identity card number, an IMEI number of user equipment, a user name, a mobile phone number, address information, a housing time application and a number of days of renting, and optionally further comprises IC card unlocking verification information.
Further, the rental house management system platform issues the configuration parameter instruction to the intelligent door lock, including: the system comprises a door lock ID, a housing time application, a house renting day and an IMEI number of user equipment, and optionally further comprises IC card unlocking verification information.
Still further, the intelligent door lock comprises an ultra-bandwidth module,
the ultra-bandwidth module is used for detecting the number of people around the door lock, and sending out an alarm signal and not executing unlocking actions when the detected number of people exceeds a preset value;
the method for detecting the number of the surrounding personnel comprises the following steps:
monitoring whether mobile phones or other mobile equipment exist in the peripheral range of the door lock in a time-sharing scanning mode, if so, calculating the distance between the mobile phones or other mobile equipment and the intelligent door lock, and reporting early warning information to a platform through a communication module by the intelligent door lock under the condition that the number of the mobile phones or the mobile terminals with the distance being smaller than a set distance is more than or equal to N, wherein N is a preset value, and the distance calculation formula is as follows:
Dis A_B1 X_Loop represents the difference between the time when the ultra-bandwidth module of the intelligent door lock A sends a signal and the time when the ultra-bandwidth module receives a return signal, X 1 Loop is the processing time between when the handset or other mobile device B1 receives the signal and when it sends the signal, and C is the speed of light.
Further, the intelligent door lock further comprises a time calibration module, the time calibration module is used for synchronizing the time of the intelligent door lock and the platform server of the taxi management system, and the specific calibration method executed by the time calibration module comprises the following steps: after the intelligent door lock is initialized, setting the time of the intelligent door lock; the intelligent door lock sends an intelligent door lock time calibration request instruction to the renting house management system platform, and records the time T1 of the current sending request;
the renting house management system platform starts a thread for processing the intelligent door lock time synchronization request, and if the time synchronization request is received, a response signal instruction is sent to the intelligent door lock, wherein the response signal instruction comprises time T2 for sending response information;
and after receiving the response signal instruction, the intelligent door lock calculates the time difference between the current request sending time T1 and the response information sending time T2, and completes time synchronization according to the time difference.
Further, the user side is further configured to call the intelligent door lock through the wireless channel, so that the intelligent door lock exits from the sleep mode and reports door lock information at regular time.
Further, the intelligent door lock receives an unlocking instruction sent by the user side, detects whether user configuration information exists in a storage unit of the intelligent door lock, if not, receives the user configuration information, stores the user configuration information into the door lock storage unit after verification is successful, compares the user configuration information in the unlocking instruction with the user configuration information in the door lock storage unit, executes unlocking action after the comparison is successful, and does not execute unlocking action after the comparison is failed.
The beneficial technical effects obtained by the invention are as follows: the invention provides a set of security protocols compatible with a renting house management system platform, a user side and an intelligent door lock side, which not only ensures the security of data interaction, but also ensures the high efficiency of protocol transmission.
The intelligent door lock adopted by the invention is provided with the ultra-bandwidth module (namely the UWB module), and the number of personnel around the door lock is predicted through the UWB module, so that the unlocking safety and reliability of the intelligent door lock are improved.
According to the invention, the time synchronization of the intelligent door lock and the platform server is realized, and the working time consistency of the intelligent door lock and the server is ensured.
Drawings
Fig. 1 is a flowchart of encrypting and decrypting tenant information registered by a mobile phone terminal to a platform in a specific embodiment;
fig. 2 is a flowchart of unlocking a user terminal through bluetooth in an embodiment;
FIG. 3 is a flow chart of the synchronization of the intelligent door lock and the platform time in the embodiment;
FIG. 4 is a hardware architecture of a secure smart door lock in an embodiment;
fig. 5 is a schematic diagram of the UWB module predicting the number of people around the door lock in an embodiment.
Detailed Description
The invention is further described below with reference to the drawings and specific examples.
Example 1: a rental house management system, comprising: a renting house management system platform, a user and an intelligent door lock; the renting house management system platform, the user and the intelligent door lock generate instructions according to a set protocol format;
the user terminal is used for acquiring the tenant information, generating a registration instruction according to the tenant information and sending the registration instruction to the rental house management system platform; the system is also used for sending a service configuration parameter instruction for applying to issue a door lock to the renting house management system platform; the user side is also used for sending an application door opening instruction to the renting house management system platform and receiving a remote door opening instruction sent by the renting house management system platform, and the user side generates an unlocking instruction according to the remote door opening instruction and sends the unlocking instruction to the intelligent door lock;
the intelligent door lock is used for sending a door lock information reporting instruction to the renting house management system platform, receiving a service configuration parameter instruction sent by the renting house management system platform and completing unlocking action according to an unlocking instruction sent by the user side;
the renting house management system platform is used for receiving a registration instruction sent by a user side to finish the registration of a tenant, responding to a service configuration parameter instruction sent by the user side for issuing a door lock, and issuing the service configuration parameter instruction of the door lock to the intelligent door lock; and the remote door opening instruction is also used for responding to the door opening application instruction sent by the user side and sending the remote door opening instruction to the user side.
In particular embodiments, the instructions are optionally encrypted and decrypted according to a selected encryption and decryption algorithm. The optional encryption and decryption algorithm includes: AES (Advanced Encryption Standard, advanced encryption standard, which is the most common symmetric encryption algorithm), DES (Data Encryption Standard, data encryption standard, which is a block algorithm using key encryption), RC4 (abbreviation from Rivest Cipher 4, which is a stream encryption algorithm, and key length variable or rabit (rabit encryption algorithm is a high-performance stream Cipher encryption scheme).
The protocol format set by the invention is a set of safe interaction protocol with strong compatibility, and is simultaneously applicable to three components of a rental house management system, and the protocol comprises: frame head, data length, encryption mode, equipment type, equipment number, function code, load, check bit and frame tail; the data length describes the sum of the data length of the device type, the device number, the function code and the load;
the equipment type comprises a renting house management system platform, a user and an intelligent door lock;
the equipment number describes the numbers of the rental house management system platform, the user and the intelligent door lock; the payload is used to identify each type of traffic data byte.
The details of this example are shown in Table 1.
Table 1 protocol format
Protocol Format description
Frame header: the root is different from the receiving and transmitting parties, and is specific. The data type is byte type, the number of bytes is 2 bytes;
data length: data length=device type+device number+function code+load, data type is byte type, byte number 2 bytes;
encryption mode: 1byte,0x00 indicates that encryption and decryption are not performed; 0x01 represents encryption and decryption by adopting an AES mode; 0x02 represents encryption and decryption by adopting a DES mode; 0x03 represents encryption and decryption by adopting an RC4 mode; 0x04 represents encryption and decryption by adopting a Rabbit mode; the data type is byte type, and the byte number is 1 byte;
device type: the system mainly comprises a platform end, a user end and an intelligent door lock end, wherein the data type is byte type, and the number of bytes is 1 byte;
(1) Platform end (i.e. rental house management system platform): 0x53 represents a platform end server;
(2) The user terminal: 0x4d represents a user mobile phone;
(3) Intelligent door lock end: 0x45 represents an intelligent door lock end;
device number: equipment number describing renting house management system platform, user and intelligent door lock
Function code: describing specific functions to be realized by a renting house management system platform, a mobile phone and an intelligent door lock
(1) Platform end of taxi management system: 0x21: issuing service configuration parameters of the door lock; 0x22: issuing a remote door opening command;
(2) The user terminal: 0x31: registering tenant information; 0x32: applying for issuing service configuration parameters of the door lock to the server; 0x33: applying for opening a door;
(3) Intelligent door lock end: 0x41: reporting door lock information;
load: variable length
And checking: 1Byte, variable load, device type, device number, function code, variable load, and
checking that the data type is byte type, and the byte number is 1byte
End of frame: 0xff, the data type is byte type, and the number of bytes is 2 bytes.
The core instructions are described below.
1. The renting house management system platform server issues service configuration parameters of the door lock to the intelligent door lock,
the service configuration parameter command of the door lock is issued as follows: 0x53 0x45 DLen_2B 0x01 DevType DevNo Funcode payload chkSum 0xff 0xff
Data length: unchanged
Encryption and decryption modes: 1Byte, mainly comprising AES, DES, RC, rabbit;
device type: 2bytes containing 1Byte data length, 1Byte detail;
device number: the method comprises the steps of 1Byte data length and fixed-length detail content;
function code: 2bytes containing 1Byte data length, 1Byte detail;
original traffic data load:
(1) Door lock ID:15Bytes
(2) Applying for residence time: 6Bytes (year, month, day, time, minute)
(3) Days of renting
(4) User equipment (such as mobile phone) IMEI number: and identifying the user equipment applying for unlocking according to the IMEI number of the user equipment when unlocking through a wireless channel (such as Bluetooth).
Optionally, the method further comprises (5) IC card unlocking verification information: the IC card is unlocked, for example, an identity card IC serial number, namely an identity card UID (user identity card, user Identification) is needed to be provided for unlocking by the identity card;
the server issues configuration parameter protocol encryption instantiation to the intelligent door lock:
step 1: the intelligent door is locked in a working mode and a non-dormant mode, and the server self-organizes the following protocol contents
Device type: 0x01 x53
Device number: '234562059766825'
Function code: 0x01 and 0x21
Original traffic data load:
(1) Door lock ID: '863703012336456'
(2) Applying for residence time: 0x37 0x0c 0x1e 0x17 0x3b 0x3b
(3) Day of renting: 0x02 0xba
(4) IC card unlocking verification information: 0x11 0x22 0x33 0x44 0x55 0x66 0x77 0x88
Step 2: unified encoding of the protocol contents
Device type: '0153'
Device number: '0f323334353632303539373636383235'
Function code: '0121'
Original traffic data load:
(1) Door lock ID: '0f383633373033303132333336343536'
(2) Applying for residence time: '06370c1e173b3b'
(3) Day of renting: '0202ba'
(4) IC card unlocking verification information: '0800000000a5c727ec'
The overall business data after unified coding is as follows:
’01530f32333435363230353937363638323501210f38363337303330313233333634353606370c1e173b3b0202ba0800000000a5c727ec'
step 3: key generation
Device number: '863703012336456'
(1) Acquiring an IMEI number of an intelligent door lock;
(2) Firstly, converting an IMEI number character string of the intelligent door lock into a 15-byte array;
(3) Exclusive-or operation is carried out on the 15-byte IMEI number and the 15-byte 0xFF, and the result represents a bit B of 15 bytes;
(4) Performing byte-by-byte summation operation on the 15bytes of B to obtain 1byte of C; taking C as the highest byte of the key;
(5) The key result is:step 4: encrypting the uniformly encoded data (for example AES)
l5EKjXwWLaMR0E9E7fqbcwzGErbzmDtv+WnAam1R8yDbwULNFHocrPZUSpK/33SAK0uXDx8OS2BpB1i1Js4R6OgbZej9ijM9wqbjJf+1Bpj0fJJCEi302ofsh7i+jSkBki4nSHcomsw9R2zYenARJQ==
Step 5: packing and reporting the encrypted content
The frame content after the grouping:
'5345009801l5EKjXwWLaMR0E9E7fqbcwzGErbzmDtv+WnAam1R8yDbwULNFHocrPZUSpK/33SAK0uXDx8OS2BpB1i1Js4R6OgbZej9ijM9wqbjJf+1Bpj0fJJCEi302ofsh7i+jSkBki4nSHcomsw9R2zYenARJQ==51ffff'
2. the server issues a remote door opening command to a user terminal (such as a mobile phone APP terminal)
Issuing a remote door opening command: 0x53 0x45 DLen_2B 0x01 DevType DevNo Funcode payload chkSum 0xff 0xff
Data length: unchanged
Encryption and decryption modes: 1Byte, mainly comprising AES, DES, RC, rabbit;
device type: 2bytes containing 1Byte data length, 1Byte detail;
device number: the method comprises the steps of 1Byte data length and fixed-length detail content;
function code: 2bytes containing 1Byte data length, 1Byte detail;
original traffic data load:
(1) Door lock ID: '863703012336456'
(2) Time of issuing door opening command: 0x37 0x0c 0x1e 0x17 0x3b 0x3b
The server sends a remote door opening protocol encryption illustration to the user terminal:
step 1: the intelligent door is locked in a working mode and a non-dormant mode, and the server self-organizes the following protocol contents
Device type: 0x01 x53
Device number: '234562059766825'
Function code: 0x01 and 0x22
Original traffic data load:
(1) Door lock ID: '863703012336456'
(2) Time of issuing door opening command: 0x37 0x0c 0x1e 0x17 0x3b 0x3b
Step 2: unified encoding of the protocol contents
Device type: '0153'
Device number: '0f323334353632303539373636383235'
Function code: '0122'
Original traffic data load:
(3) Door lock ID: '0f383633373033303132333336343536'
(4) Time of issuing door opening command: '06370c1e173b3b'
The overall business data after unified coding is as follows:
’01530f32333435363230353937363638323501220f38363337303330313233333634353606370c1e173b3b'
step 3: key generation
Device number: '863703012336456'
(1) Acquiring an IMEI number of an intelligent door lock;
(2) Firstly, converting an IMEI number character string of the intelligent door lock into a 15-byte array;
(3) Exclusive-or operation is carried out on the 15-byte IMEI number and the 15-byte 0xFF, and the result represents a bit B of 15 bytes;
(4) Performing byte-by-byte summation operation on the 15bytes of B to obtain 1byte of C; taking C as the highest byte of the key;
(5) The key result is:
step 4: encrypting the uniformly encoded data (for example AES)
'l5EKjXwWLaMR0E9E7fqbcwzGErbzmDtv+WnAam1R8yCElEQWYDsJGIAC1OxSrR4hK0uXDx8OS2BpB1i1Js4R6OgbZej9ijM9wqbjJf+1Bpg/a4hINUs9P6CsbwygvJowffff'
Step 5: packing and reporting the encrypted content
The frame content after the grouping:
'5345008001l5EKjXwWLaMR0E9E7fqbcwzGErbzmDtv+WnAam1R8yCElEQWYDsJGIAC1OxSrR4hK0uXDx8OS2BpB1i1Js4R6OgbZej9ijM9wqbjJf+1Bpg/a4hINUs9P6CsbwygvJowb9ffff'
3. generating a tenant registration instruction by a user, and sending the registration instruction to a rental house management system platform
Registration instructions: 0x4d 0x53 DLen_2B 0x01 DevType DevNo Funcode payload chkSum 0xff 0xff
Data length: variable
Encryption and decryption modes: 1Byte, mainly comprising AES, DES, RC, rabbit;
device type: 2bytes containing 1Byte data length, 1Byte detail;
device number: the method comprises the steps of 1Byte data length and fixed-length detail content;
function code: 2bytes containing 1Byte data length, 1Byte detail;
load: the tenant information comprises 1Byte data length and detail content with indefinite length;
(1) Identification card number: the method comprises the steps of 1Byte data length and fixed-length detail content;
(1) Identity card UID: containing 1Byte data length, fixed length details (optional: for IC mode door opening)
(2) User name: containing 1Byte data length, indefinite length details
(3) Number of mobile phone: contains 1Byte data length and fixed length detail content
(4) Address information: containing 1Byte data length, indefinite length details
(5) Applying for residence time: contains 1Byte data length and fixed length detail content
(6) Day of renting: contains 1Byte data length and fixed length detail content
(7) The method comprises the steps of (1) user equipment IMEI number (such as mobile phone IMEI number): contains 1Byte data length and fixed length detail content
Registration tenant information service data protocol encryption illustration:
step 1: acquiring key data and original business data input by tenants from App tenant registration interface
Device type: 0x01 x4d
Device number: '864202051465273'
Function code: 0x31
Original traffic data load:
identification card number: '32012419830404323X'
(1) Identity card UID:0x11 0x22 0x33 0x44 0x55 0x66 0x77 0x88
(2) User name: 'Zhousheng'
(3) Number of mobile phone: '13921405118'
(4) Address information: 'Yuhua Tai region of Nanjing, jiangsu province, cloud Micheng J9 layers 999 Chambers'
(5) Applying for residence time: 0x37 0x0c 0x1e 0x17 0x3b 0x3b
(6) Day of renting: 0x02 0xba
Step 2: unified coding of key data and original business data input by tenants
Device type: '014d'
Device number: '0f383634323032303531343635323733'
Function code: '0131'
Original traffic data load:
(1) Identification card number: '12333230313234313938333034303433323358'
(2) Identity card UID: '0800000000a5c727ec'
(3) User name: '04d6dcc9fa'
(4) Number of mobile phone: '0b3133393231343035313138'
(5) Address information:
'25bdadcbd5caa1c4cfbea9cad0d3eabba8cca8c7f8d4c6c3dcb3c75ab6b039b2e3393939cad2'
(6) Applying for residence time: '06370c1e173b3b'
(7) Day of renting: '0202ba'
The overall business data after unified coding is as follows:
’014d0f3836343230323035313436353237330131123332303132343139383330343034333233580800000000a5c727ec04d6dcc9fa0b313339323134303531313825bdadcbd5caa1c4cfbea9cad0d3eabba8cca8c7f8d4c6c3dcb3c75ab6b039b2e3393939cad206370c1e173b3b0202ba'
step 3: key generation
Device number: '864202051465273'
(1) Acquiring the IMEI number of mobile phone equipment;
(2) Firstly, converting a mobile phone equipment number character string into a 15-byte array;
(3) Exclusive-or operation is carried out on the 15-byte IMEI number and the 15-byte 0xFF, and the result represents a bit B of 15 bytes;
(4) Performing byte-by-byte summation operation on the 15bytes of B to obtain 1byte of C; taking C as the highest byte of the key;
(5) The key result is:step 4: encrypting the uniformly encoded data (for example AES)
‘LJs/8ddyDIEGK7j+MHXsl/65Vx4A2r5i1trcz6iuqDt9oo9iiUhHqpQF92tZQSam/mwAF2jHobys5eyWFuL7uWTtrLpY1OVU8XH9Z0oTYpGv+yg3AYZ2n1X+iHjb18Ym4iwWOnBu39VRBvwgpBRXIB8Hokp7Cdir9ItvRtE70iXMhNO14jbg5JbGb675VtrMQ/CYUB7csqyP+cSpo+Qeqki0eL7Cy2O7a190gm9dKOn21dLNA8g7n0O5J0FHL2AWtL7AtlAZYAbOCoqN4Js6IF6pugzxxrOJ8qLlWMM/p8dKz4467/dNRZqHxiwOAn5c’
Step 5: packing and reporting the encrypted content
The frame content after the grouping:
‘4d53014001LJs/8ddyDIEGK7j+MHXsl/65Vx4A2r5i1trcz6iuqDt9oo9iiUhHqpQF92tZQSam/mwAF2jHobys5eyWFuL7uWTtrLpY1OVU8XH9Z0oTYpGv+yg3AYZ2n1X+iHjb18Ym4iwWOnBu39VRBvwgpBRXIB8Hokp7Cdir9ItvRtE70iXMhNO14jbg5JbGb675VtrMQ/CYUB7csqyP+cSpo+Qeqki0eL7Cy2O7a190gm9dKOn21dLNA8g7n0O5J0FHL2AWtL7AtlAZYAbOCoqN4Js6IF6pugzxxrOJ8qLlWMM/p8dKz4467/dNRZqHxiwOAn5cc6ffff’
4 user end (such as mobile phone) applies service configuration parameters of issuing door lock to server (server is management system platform of rented house)
The user applies for issuing service configuration parameters to the renting house management system platform to obtain the door opening authority; acquiring a door opening permission command: 0x4d 0x53 DLen_2B 0x01 DevType DevNo Funcode payload chkSum 0xff 0xff
Data length: unchanged
Encryption and decryption modes: 1Byte, mainly comprising AES, DES, RC, rabbit;
device type: 2bytes containing 1Byte data length, 1Byte detail;
device number: the method comprises the steps of 1Byte data length and fixed-length detail content;
function code: 2bytes containing 1Byte data length, 1Byte detail;
load: without any means for
The user (such as mobile phone APP) applies for the encryption and illustration of the service configuration parameter protocol to the server:
step 1: the intelligent door is locked in a working mode and a non-dormant mode, and the mobile phone App self-organizes the following protocol contents
Device type: 0x01 x4d
Device number: '864202051465273'
Function code: 0x32
Original traffic data load: without any means for
Step 2: unified encoding of the protocol contents
Device type: '014d'
Device number: '0f383634323032303531343635323733'
Function code: '0132'
The overall business data after unified coding is as follows:
’014d0f3836343230323035313436353237330132'
step 3: key generation
Device number: '864202051465273'
(1) Acquiring the IMEI number of mobile phone equipment;
(2) Firstly, converting a mobile phone equipment number character string into a 15-byte array;
(3) Exclusive-or operation is carried out on the 15-byte IMEI number and the 15-byte 0xFF, and the result represents a bit B of 15 bytes;
(4) Performing byte-by-byte summation operation on the 15bytes of B to obtain 1byte of C; taking C as the highest byte of the key;
(5) The key result is:step 4: encrypting the uniformly encoded data (for example AES)
'LJs/8ddyDIEGK7j+MHXsl/65Vx4A2r5i1trcz6iuqDtQzNxqqvDKKVfeWCGu3bKw'
Step 5: packing and reporting the encrypted content
The frame content after the grouping:
'4d53004001LJs/8ddyDIEGK7j+MHXsl/65Vx4A2r5i1trcz6iuqDtQzNxqqvD KKVfeWCGu3bKw8effff'
5 tenant mobile phone sends application door opening command to server
Apply for door opening command: 0x4d 0x53 DataLen_2B 0x01 DevType DevNo Funcode payload chksum 0xff 0xff
Data length: unchanged
Encryption and decryption modes: 1Byte, mainly comprising AES, DES, RC, rabbit;
device type: 2bytes containing 1Byte data length, 1Byte detail;
device number: the method comprises the steps of 1Byte data length and fixed-length detail content;
function code: 2bytes containing 1Byte data length, 1Byte detail;
original traffic data load:
(1) Application of door opening time: 6Bytes (year, month, day, time, minute)
The tenant sends a request for a door opening command protocol encryption instantiation to the server:
step 1: the intelligent door lock is in a working mode and a non-sleep mode, and the intelligent door lock self-organizes the following protocol contents
Device type: 0x01 x4d
Device number: '864202051465273'
Function code: 0x01 and 0x33
Original traffic data load:
(1) Application of door opening time: 0x37 0x0c 0x1e 0x17 0x3b 0x3b
Step 2: unified encoding of the protocol contents
Device type: '014d'
Device number: '0f383634323032303531343635323733'
Function code: '0133'
Original traffic data load:
(1) Application of door opening time: '06370c1e173b3b'
The overall business data after unified coding is as follows:
’014d0f383634323032303531343635323733013306370c1e173b3b'
step 3: key generation
Device number: '864202051465273'
(1) Acquiring an IMEI number of an intelligent door lock;
(2) Firstly, converting an IMEI number character string of the intelligent door lock into a 15-byte array;
(3) Exclusive-or operation is carried out on the 15-byte IMEI number and the 15-byte 0xFF, and the result represents a bit B of 15 bytes;
(4) Performing byte-by-byte summation operation on the 15bytes of B to obtain 1byte of C; taking C as the highest byte of the key;
(5) The key result is:step 4: encrypting the uniformly encoded data (for example AES)
'LJs/8ddyDIEGK7j+MHXsl/65Vx4A2r5i1trcz6iuqDsd7T2g1ZfranPcxzyaUxBQPF6ZG2LQyiOB7IXNoVicaA=='
Step 5: packing and reporting the encrypted content
The frame content after the grouping:
'4d53005801LJs/8ddyDIEGK7j+MHXsl/65Vx4A2r5i1trcz6iuqDsd7T2g1ZfranPcxzyaUxBQPF6ZG2LQyiOB7IXNoVicaA==17ffff'
6. door lock information reporting command
Door lock information reporting command: 0x45 0x53 DataLen_2B 0x01 DevType DevNo Funcode payload chksum 0xFF 0xFF
Data length: unchanged
Encryption and decryption modes: 1Byte, mainly comprising AES, DES, RC, rabbit;
device type: 2bytes containing 1Byte data length, 1Byte detail;
device number: the method comprises the steps of 1Byte data length and fixed-length detail content;
function code: 2bytes containing 1Byte data length, 1Byte detail;
original traffic data load:
(1) Information reporting time: 6Bytes (year, month, day, time, minute)
(2) Electric quantity: 2Bytes
(3) Early warning information: 1Byte, as shown in Table 2
TABLE 2 Pre-alarm information
/>
The intelligent door lock reports the data protocol encryption illustration to the server:
step 1: the intelligent door is locked in a working mode, a non-dormant mode and self-organizing the following protocol contents
Device type: 0x01 0x45
Device number: '863703012336456'
Function code: 0x01 0x41
Original traffic data load:
(1) Information reporting time: 0x37 0x0C 0x1E 0x17 0x3B 0x3B
(3) Electric quantity information: 0x02 0xBA
(4) Early warning information: 0x01 x1F
Step 2: unified encoding of the protocol contents
Device type: '0145'
Device number: '0f383633373033303132333336343536'
Function code: '0141'
Original traffic data load:
(1) Information reporting time: '06370c1e173b3b'
(2) Electric quantity information: '0202ba'
(3) Early warning information: '02011f'
The overall business data after unified coding is as follows:
’01450f383633373033303132333336343536014106370c1e173b3b0202ba02011f'
step 3: key generation
Device number: '863703012336456'
(1) Acquiring an IMEI number of an intelligent door lock;
(2) Firstly, converting an IMEI number character string of the intelligent door lock into a 15-byte array;
(3) Exclusive-or operation is carried out on the 15-byte IMEI number and the 15-byte 0xFF, and the result represents a bit B of 15 bytes;
(4) Performing byte-by-byte summation operation on the 15bytes of B to obtain 1byte of C; taking C as the highest byte of the key;
(5) The key result is:step 4: encrypting the uniformly encoded data (for example AES)
'/AsWxM7EtmUtKqwRPyyAZJ4e990x8YOjALpmzNvKy4oQaEYV8bl1nAJmjd7q1nAY5YEbnvnnQ3zhBC4g6mIYvBOFUGq6jAtIepRcU6nvMGs='
Step 5: packing and reporting the encrypted content
The frame content after the grouping:
'4553006c01/AsWxM7EtmUtKqwRPyyAZJ4e990x8YOjALpmzNvKy4oQaEYV8bl1nAJmjd7q1nAY5YEbnvnnQ3zhBC4g6mIYvBOFUGq6jAtIepRcU6nvMGs=c4ffff'
in a specific embodiment, a user side (i.e. a mobile phone side) registers tenant information encryption and decryption flow to a platform (i.e. a rental house management system platform), which comprises the following steps:
a mobile phone terminal user fills in tenant information (including an identity card number, an identity card UID, a user name, a mobile phone number, a mobile phone IMEI number, address information, residence time application, day of renting and the like) on a mobile phone through a user terminal; after filling, clicking a registration button on a corresponding interface of the mobile phone, selecting an encryption and decryption algorithm by the mobile phone terminal to encrypt the tenant information, adding a frame header and a frame tail to carry out package (including a decryption mechanism) after encryption, and sending the encrypted tenant information data package to a platform (namely a rental house management system platform);
the rental house management system platform detects a frame head after determining that the data exists, and if the frame head exists, a corresponding decryption algorithm is selected to analyze the service data;
corresponding operation is carried out according to the function code, and the service data is written into a database;
transmitting confirmation information to the mobile phone terminal;
and the mobile phone terminal completes registration after receiving the confirmation information.
In a specific embodiment, the unlocking process of the user side comprises two modes of Bluetooth wireless unlocking and IC card unlocking.
As shown in fig. 2, the unlocking method through a wireless channel (such as bluetooth) includes the following steps: after the user side finishes registering on the platform, the intelligent door lock is awakened by opening a remote wireless channel (such as Bluetooth);
after the intelligent door lock is awakened, the door lock information is reported to the platform at regular time through a door lock information reporting instruction;
after the Bluetooth of the user end and the Bluetooth of the intelligent door lock are successfully paired and are successfully connected with the platform remotely, the user end of the mobile phone of the tenant sends a door opening application command to the server;
the platform sends a remote door opening instruction to the user side after receiving the door opening application command sent by the user side;
the user side receives a remote door opening instruction to indicate that unlocking can be achieved through platform authentication, and then the encrypted unlocking instruction is sent to the intelligent device through a Bluetooth channel, wherein the unlocking instruction adopts the protocol format and comprises a mobile phone IMEI number read by the user side;
the intelligent door lock receives an encrypted unlocking instruction and checks whether the EEPROM of the door lock has user configuration information (mainly mobile phone IMEI number);
if the user configuration information is not available, the user side sends a service configuration parameter instruction for applying to issue a door lock to the platform; after receiving the instruction of issuing service configuration parameters, the platform sends the service configuration parameters of the door lock to the intelligent door lock end,
if the user configuration information exists, the unlocking instruction is decrypted, the mobile phone IMEI number of the mobile phone sending the unlocking instruction is compared with the user configuration information, the unlocking is performed if the comparison is successful, and otherwise, the door lock does not act.
The unlocking process of the IC card comprises the following steps:
after the intelligent door lock in the dormant state is awakened, the renting house management system platform sends service configuration information to the intelligent door lock through a service configuration parameter instruction;
the user sends a radio frequency signal by using the IC card, optionally the IC card adopts an identity card, the intelligent door lock reads an unlocking instruction through the RFID to obtain an identity card UID, the identity card UID is compared with service configuration information in the EEPROM of the door lock, the door lock is unlocked if the comparison is successful, and otherwise the door lock does not act.
It should be noted that, the hardware structure of the intelligent door lock may be implemented by using the prior art, including the intelligent door lock includes: the device comprises a battery and protection circuit, an MCU and peripheral circuit, a battery electric quantity detection module, an RFID reading module, a communication module, a Bluetooth module and a motor module;
the battery module is used for providing working voltage, and the protection circuit is connected with the battery module and used for protecting the battery module;
the battery electric quantity detection module is used for being connected with the battery module and detecting the electric quantity of the battery module;
the MCU is used for reading the data of the battery electric quantity detection module and the RFID reading module and controlling the motor module to act;
the RFID reading module is used for reading the unlocking verification information of the IC card;
the communication module is connected with the MCU and used for receiving door lock configuration data, decrypting the data and uploading door lock state data and door opening data;
the Bluetooth module is connected with the MCU and is used for realizing Bluetooth connection with a mobile phone;
and the motor module is used for motor action and executing door opening action.
Embodiment 2 based on the above embodiment, in a specific embodiment, a secure smart door lock hardware architecture is shown in fig. 4. The safe intelligent door lock mainly comprises a battery, a protection circuit, an MCU, a peripheral circuit, an NB module, a UWB module, a battery electric quantity detection module, a sound intensity detection module, a vibration detection module, an RFID reading module, a motor module and the like.
Battery and protection circuit: the battery and protection circuit mainly comprises a battery 1 and a protection circuit, and a battery 2 and a protection circuit; and voltage is provided for the normal operation of each module of the safe intelligent door lock. The battery 1 is mainly used for providing voltages required by normal operation for the domestic MCU-1 Bluetooth module, the communication module, the RFID reading module, the UWB module and the motor module, and the battery 2 is mainly used for providing voltages required by normal operation for the MCU-2, the vibration detection module and the sound intensity detection module.
MCU and peripheral circuitry: adopting a domestic microprocessor GD32F103 series MCU-1 and a domestic operating system RT-Thread to perform data interaction with a NB (Narrow Band) module and a UWB module; reading data of a battery electric quantity detection module and an RFID reading module; and controlling the motor module to act. And the MCU-2 microprocessor is used for reading the data of the sound intensity detection module and the vibration module, reasoning the data, and predicting whether safety events such as illegal unlocking of the door lock and potential safety hazards exist indoors or not.
And a communication module: the method is used for receiving and decrypting the door lock configuration data and uploading door lock state data and door opening data.
UWB module: the method is used for detecting the number of personnel around the door lock.
The battery electric quantity detection module: and a signal conditioning circuit before battery power collection.
Sound intensity detection module: and a signal conditioning circuit before sound intensity signal acquisition.
Vibration detection module: and a signal conditioning circuit before the vibration intensity signal is acquired.
And the RFID recognition module is used for: the method is used for reading the identity card UID of the IC card.
And a motor module: and driving the motor to act, and executing the door opening action.
In this embodiment, the UWB module is used to predict the number of people around the door lock, and the existing door lock technology does not have the technical feature. The method specifically comprises the following steps: when a tenant picks up a mobile phone and opens a door by using Bluetooth or uses an IC card, a built-in UWB module of the door lock is awakened, the MCU-1 controls the UWB module to monitor whether the mobile phone or other mobile equipment exists in the peripheral range of the door lock in a time-sharing scanning mode (the UWB module is built in the mobile phone or other mobile equipment, the intelligent door lock sends radio frequency signals to the mobile phone or other mobile equipment through the UWB module and monitors whether the mobile phone or other mobile equipment exists in the peripheral range of the door lock according to received return signals), if the mobile phone or other mobile equipment exists, the distance between the mobile phone or other mobile equipment and the intelligent door lock is calculated, and the intelligent door lock reports early warning information to a platform through a communication module when the number of the mobile phone or mobile terminal with the distance being smaller than the set distance is more than or equal to 2. The distance calculation formula is as follows:
as shown in FIG. 5, dis A_B1 X_Loop represents the difference between the time when the ultra-bandwidth module of the intelligent door lock A sends a signal and the time when the ultra-bandwidth module receives a return signal, X 1 Loop is the processing time between the receiving and sending of the signal by the ultra-bandwidth module of the mobile phone or other mobile equipment B1, and C is the speed of light.
Through UWB module, the security and the reliability that intelligent lock unblanked have been improved.
In this embodiment, optionally, the intelligent door lock realizes the vibration and sound intensity detection mechanism by setting a sound intensity detection module and a vibration module. When the intelligent door lock works normally, a door opening signal is detected, the MCU2 is started to collect sound signals, the indoor sound signal intensity is collected at regular time when the sound intensity is normal, and if the sound intensity is normal, the intelligent door lock is continuously dormant, and after the sound intensity is collected at interval time, the intelligent door lock is continuously collected; if the sound intensity is higher, continuously acquiring sound intensity data (the time for acquiring the sound data is configurable), locally compressing, and then transmitting to a later platform for analysis to judge whether the risk of the public security event exists.
And (3) an intelligent door lock vibration signal acquisition and reporting awakening mechanism: when the intelligent door lock works normally, the MCU2 wakes up regularly (the wake-up interval time is configurable) to collect the vibration signal intensity, if the vibration intensity is normal, the intelligent door lock continues to sleep, and after the interval time wakes up, the intelligent door lock continues to collect; if the vibration intensity is higher, continuously acquiring vibration intensity data (the time for acquiring the sound data is configurable) for a certain time, and transmitting the vibration intensity data to a rear platform for analysis to judge whether the risk of the public security event exists.
Note that: the intelligent door lock vibration and sound intensity detection mechanism is realized based on an AI intelligent algorithm, firstly, sound intensity and vibration data are collected, a sound intensity detection and vibration detection model is trained, the model is put into the MCU2, and reasoning is carried out through the MCU2 to reflect judgment of whether a public security event occurs or not. This is in part an innovation not possessed by the prior art and systems.
Example 3: on the basis of the above embodiment, in order to ensure the time consistency of the operation of the intelligent door lock and the server, it is necessary to implement time synchronization between the intelligent door lock and the platform server, and the intelligent door lock provided in this embodiment further includes a time calibration module, where the time calibration module is used to synchronize the time between the intelligent door lock and the platform server of the rental house management system, and a specific calibration method (as shown in fig. 4) executed by the time calibration module includes: after the intelligent door lock is initialized, setting the time of the intelligent door lock; the intelligent door lock sends an intelligent door lock time calibration request instruction to the renting house management system platform, and records the time T1 of the current sending request;
the renting house management system platform starts a thread for processing the intelligent door lock time synchronization request, and if the time synchronization request is received, a response signal is sent to the intelligent door lock, wherein the response information comprises time T2 for sending the response information;
and after receiving the response information, the intelligent door lock calculates the time difference between the time T1 of the current sending request and the time T2 of the sending response information, and completes time synchronization according to the time difference.
It will be appreciated by those skilled in the art that embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
The embodiments of the present invention have been described above with reference to the accompanying drawings, but the present invention is not limited to the above-described embodiments, which are merely illustrative and not restrictive, and many forms may be made by those having ordinary skill in the art without departing from the spirit of the present invention and the scope of the claims, which are all within the protection of the present invention.

Claims (7)

1. A rental house management system, comprising: a renting house management system platform, a user and an intelligent door lock; the renting house management system platform, the user and the intelligent door lock generate instructions according to a set protocol format;
the user terminal is used for acquiring the tenant information, generating a registration instruction according to the tenant information and sending the registration instruction to the rental house management system platform; the system is also used for sending a service configuration parameter instruction for applying to issue a door lock to the renting house management system platform; the user side is also used for sending an application door opening instruction to the renting house management system platform and receiving a remote door opening instruction sent by the renting house management system platform, and the user side generates an unlocking instruction according to the remote door opening instruction and sends the unlocking instruction to the intelligent door lock; the user side obtains the IMEI number of user side equipment;
the intelligent door lock is used for sending a door lock information reporting instruction to the rental house management system platform, receiving a service configuration parameter instruction sent by the rental house management system platform, receiving an unlocking instruction sent by a user side, verifying, and completing unlocking action after verification is passed; the unlocking instruction comprises a mobile phone IMEI number read by a user side; the intelligent door lock receives an encrypted unlocking instruction, whether the EEPROM of the door lock has user configuration information or not is checked, the user configuration information is the mobile phone IMEI number, and if the user configuration information does not exist, the user side sends a service configuration parameter instruction for applying to issue the door lock to the platform; after receiving the instruction of issuing service configuration parameters, the platform sends the service configuration parameters of the door lock to the intelligent door lock end,
if the user configuration information exists, decrypting the unlocking instruction, comparing the mobile phone IMEI number of the mobile phone sending the unlocking instruction with the user configuration information, unlocking if the comparison is successful, otherwise, the door lock does not act;
the renting house management system platform is used for receiving a registration instruction sent by a user side to finish the registration of a tenant, responding to a service configuration parameter instruction sent by the user side for issuing a door lock, and issuing the service configuration parameter instruction of the door lock to the intelligent door lock; the remote door opening device is also used for responding to the door opening application command sent by the user side and sending a remote door opening command to the user side;
the intelligent door lock comprises an RFID (radio frequency identification) reading module, a Bluetooth module, a super-bandwidth module, an MCU and a peripheral circuit, wherein the MCU and the peripheral circuit interact data with the super-bandwidth module, and the MCU and the peripheral circuit comprise MCU-1 adopting a domestic microprocessor GD32F103 series; the MCU is used for reading data of the RFID reading module, the intelligent door lock further comprises an RFID reading module, and the RFID reading module is used for reading an identity card UID of the IC card; the Bluetooth module is connected with the MCU and is used for realizing Bluetooth connection with a mobile phone; the user side is also used for sending IC card unlocking verification information to the intelligent door lock through the IC card, and the intelligent card is used for verifying the read IC card unlocking verification information, and unlocking actions are completed after verification is passed;
the ultra-bandwidth module is used for detecting the number of people around the door lock, and sending out an alarm signal and not executing unlocking actions when the detected number of people exceeds a preset value;
the method for detecting the number of the surrounding personnel comprises the following steps:
when a tenant picks up a mobile phone and opens a door by using Bluetooth or opens a door by using an IC card, waking up an ultra-bandwidth module arranged in a door lock, and controlling the ultra-bandwidth module to monitor whether the mobile phone or other mobile equipment exists in the peripheral range of the door lock by adopting a time-sharing scanning mode through the MCU-1; the intelligent door lock sends radio frequency signals to the mobile phone or other mobile equipment through the ultra-bandwidth module and monitors whether the mobile phone or other mobile equipment exists in the peripheral range of the door lock according to the received return signals; if the information exists, the distance between the mobile phone or other mobile equipment and the intelligent door lock is calculated, and the intelligent door lock reports early warning information to the platform through the communication module under the condition that the number of the mobile phones or mobile terminals with the distance being smaller than the set distance is more than or equal to N, wherein N is a preset value, and the distance calculation formula is as follows:
indicating the distance between the smart door lock and the mobile phone or other mobile device, < >>Indicating the difference between the time the ultra-wideband module of the intelligent door lock sends out a signal and the time the return signal is received,/->The processing time between the receiving of the signal and the sending of the signal is the ultra-bandwidth module of the mobile phone or other mobile equipment, and C is the light speed.
2. The rental house management system of claim 1, wherein the set protocol format comprises: frame head, data length, encryption mode, equipment type, equipment number, function code, load, check bit and frame tail;
the data length describes the sum of the data length of the device type, the device number, the function code and the load;
the equipment type comprises a renting house management system platform, a user and an intelligent door lock;
the equipment number describes the numbers of the rental house management system platform, the user and the intelligent door lock;
the payload is used to identify each type of traffic data byte.
3. The rental house management system according to claim 1, wherein the tenant information acquired by the user side includes an identification card number, a user name, a mobile phone number, address information, a residence time application, and a number of days of renting houses.
4. The rental house management system according to claim 1, wherein the service configuration parameter instruction for issuing the door lock to the intelligent door lock by the rental house management system platform comprises: door lock ID, residence time, day of renting, and IMEI number of user equipment.
5. The rental house management system of claim 1, wherein the intelligent door lock further comprises a time calibration module for synchronizing the time of the intelligent door lock with the rental house management system platform server, the specific calibration method performed by the time calibration module comprises: after the intelligent door lock is initialized, setting the time of the intelligent door lock; the intelligent door lock sends an intelligent door lock time calibration request instruction to the renting house management system platform, and records the time T1 of the current sending request;
the renting house management system platform starts a thread for processing the intelligent door lock time synchronization request, and if the time synchronization request is received, a response signal instruction is sent to the intelligent door lock, wherein the response signal instruction comprises time T2 for sending response information;
and after receiving the response signal instruction, the intelligent door lock calculates the time difference between the current request sending time T1 and the response information sending time T2, and completes time synchronization according to the time difference.
6. A rental house management system as claimed in claim 1, wherein,
the user is also used for waking up the intelligent door lock through a wireless channel, so that the intelligent door lock exits from the sleep mode and reports door lock information at regular time or judges whether to receive service configuration parameters.
7. The rental house management system according to claim 1, wherein the intelligent door lock receives an unlocking command sent by the user terminal, detects whether user configuration information exists in a storage unit of the intelligent door lock, if not, receives the user configuration information, stores the user configuration information in the door lock storage unit after verification is successful, compares the user configuration information in the unlocking command with the user configuration information in the door lock storage unit, and executes the unlocking action after the comparison is successful, and does not execute the unlocking action after the comparison is failed.
CN202111149205.2A 2021-09-29 2021-09-29 Renting house management system Active CN113920619B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111149205.2A CN113920619B (en) 2021-09-29 2021-09-29 Renting house management system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111149205.2A CN113920619B (en) 2021-09-29 2021-09-29 Renting house management system

Publications (2)

Publication Number Publication Date
CN113920619A CN113920619A (en) 2022-01-11
CN113920619B true CN113920619B (en) 2024-03-29

Family

ID=79236887

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111149205.2A Active CN113920619B (en) 2021-09-29 2021-09-29 Renting house management system

Country Status (1)

Country Link
CN (1) CN113920619B (en)

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102542649A (en) * 2012-03-11 2012-07-04 李凯 Method for controlling locking system by mobile equipment
JP2013109779A (en) * 2013-02-15 2013-06-06 Toshiba Corp Monitor system and method for monitoring tailgating intrusion
WO2016184195A1 (en) * 2015-10-29 2016-11-24 中兴通讯股份有限公司 Door lock control method, apparatus and terminal
WO2016197330A1 (en) * 2015-06-09 2016-12-15 深圳市迈斯云门禁网络科技有限公司 Access control management method and system
CN107230139A (en) * 2017-06-01 2017-10-03 天网互联科技(深圳)有限公司 A kind of unattended Management System on Public Rooms based on arrowband Internet of Things
CN107274278A (en) * 2017-08-01 2017-10-20 成都科耐睿科技有限公司 A kind of system of renting a house based on Internet of Things intelligent door lock
CN108198016A (en) * 2017-12-21 2018-06-22 广东汇泰龙科技有限公司 A kind of rental housing based on cloud lock manages system
CN108734837A (en) * 2018-05-30 2018-11-02 广东能兴科技发展有限公司 A kind of rental house access control management method being managed with mobile terminal
CN110060400A (en) * 2019-04-29 2019-07-26 李佳怿 A kind of rental house gate inhibition real name moves in system and method
CN110634488A (en) * 2019-10-08 2019-12-31 北京小米智能科技有限公司 Information processing method, device and system and storage medium
TWI720903B (en) * 2020-06-03 2021-03-01 南開科技大學 Home life safety warning system for living alone and method thereof

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9805534B2 (en) * 2014-12-23 2017-10-31 Gate Labs Inc. Increased security electronic lock

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102542649A (en) * 2012-03-11 2012-07-04 李凯 Method for controlling locking system by mobile equipment
JP2013109779A (en) * 2013-02-15 2013-06-06 Toshiba Corp Monitor system and method for monitoring tailgating intrusion
WO2016197330A1 (en) * 2015-06-09 2016-12-15 深圳市迈斯云门禁网络科技有限公司 Access control management method and system
CN107615339A (en) * 2015-06-09 2018-01-19 深圳市迈斯云门禁网络科技有限公司 Access control management method and system
WO2016184195A1 (en) * 2015-10-29 2016-11-24 中兴通讯股份有限公司 Door lock control method, apparatus and terminal
CN107230139A (en) * 2017-06-01 2017-10-03 天网互联科技(深圳)有限公司 A kind of unattended Management System on Public Rooms based on arrowband Internet of Things
CN107274278A (en) * 2017-08-01 2017-10-20 成都科耐睿科技有限公司 A kind of system of renting a house based on Internet of Things intelligent door lock
CN108198016A (en) * 2017-12-21 2018-06-22 广东汇泰龙科技有限公司 A kind of rental housing based on cloud lock manages system
CN108734837A (en) * 2018-05-30 2018-11-02 广东能兴科技发展有限公司 A kind of rental house access control management method being managed with mobile terminal
CN110060400A (en) * 2019-04-29 2019-07-26 李佳怿 A kind of rental house gate inhibition real name moves in system and method
CN110634488A (en) * 2019-10-08 2019-12-31 北京小米智能科技有限公司 Information processing method, device and system and storage medium
TWI720903B (en) * 2020-06-03 2021-03-01 南開科技大學 Home life safety warning system for living alone and method thereof

Also Published As

Publication number Publication date
CN113920619A (en) 2022-01-11

Similar Documents

Publication Publication Date Title
US11417159B2 (en) Methods and systems for controlling a smart lock
CN102158473B (en) Remote entry system
CN106600757A (en) Wireless lock control system based on intelligent terminal and method
CN202189405U (en) Short message password access control and alarming device
WO2022002146A1 (en) Smart device control method and system
CN101369353A (en) Anti-electricity theft unpacking recording instrument
CN108986278A (en) A kind of intelligent door lock off-line cipher authorization method and authoring system
CN205477103U (en) Intelligence thing networking safe deposit box
CN207526252U (en) A kind of door lock communicated using 2G, 3G, 4G, 5G, narrowband
CN204463267U (en) A kind of intelligent access control system
CN108257266A (en) A kind of multi-functional smart lock
US20200098208A1 (en) Security control device, security control method, security system and storage medium
CN203285181U (en) Mobile phone verification code intelligent lock based on GSM
CN103684774A (en) Power equipment safety protection method and device thereof
CN113920619B (en) Renting house management system
CN107967731A (en) Door-locking system based on two-dimensional code scanning unlock
CN202380832U (en) Intelligent door control system
CN111325881B (en) Lockset and two-dimension code control method thereof
CN109830027A (en) A kind of prison access way gate inhibition remote-control system
CN212256400U (en) Intelligent coded lock based on FPGA
CN112767578A (en) Authorization method, application method, unlocking method, terminal and storage medium
CN102982267A (en) Safety protection method and system and terminal
CN205302421U (en) Mobile terminal , gate host computer and entrance guard system of unblanking in entrance guard system of unblanking
CN1367465A (en) Vehicle antifalse wicrowave electronic card, detection system and method
CN107507307A (en) Building intelligent gate inhibition&#39;s PLC control system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant