CN114049700B - Configuration method of door lock label information and computer equipment - Google Patents

Configuration method of door lock label information and computer equipment Download PDF

Info

Publication number
CN114049700B
CN114049700B CN202010717605.8A CN202010717605A CN114049700B CN 114049700 B CN114049700 B CN 114049700B CN 202010717605 A CN202010717605 A CN 202010717605A CN 114049700 B CN114049700 B CN 114049700B
Authority
CN
China
Prior art keywords
door lock
identification information
information
service
service identification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010717605.8A
Other languages
Chinese (zh)
Other versions
CN114049700A (en
Inventor
高斯
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen TCL New Technology Co Ltd
Original Assignee
Shenzhen TCL New Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen TCL New Technology Co Ltd filed Critical Shenzhen TCL New Technology Co Ltd
Priority to CN202010717605.8A priority Critical patent/CN114049700B/en
Publication of CN114049700A publication Critical patent/CN114049700A/en
Application granted granted Critical
Publication of CN114049700B publication Critical patent/CN114049700B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00817Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00896Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • H04L67/125Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks involving control of end-device applications over a network
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00817Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed
    • G07C2009/00825Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed remotely by lines or wireless communication
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00817Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed
    • G07C2009/00841Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed by a portable device

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Computing Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Medical Informatics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The application relates to a configuration method of door lock label information and computer equipment, wherein the configuration method comprises the following steps: the terminal responds to service selection operation and determines service identification information corresponding to the service selection operation; the terminal sends the service identification information to the door lock so that the door lock configures tag information corresponding to the service identification information based on the service identification information. The terminal responds to the service selection operation to determine service identification information corresponding to the service selection operation, and the terminal sends the service identification information to the door lock so that the door lock configures tag information corresponding to the service identification information based on the service identification information. It should be noted that, the terminal sends service identification information to the door lock, and the door lock can configure tag information corresponding to the service identification information according to the service identification information. Therefore, the door lock label information is modified through the configuration of the door lock label information, so that the door lock executes different services.

Description

Configuration method of door lock label information and computer equipment
Technical Field
The application relates to the technical field of intelligent household appliances, in particular to a door lock label information configuration method and computer equipment.
Background
With the development of intelligent home appliances, the technology of controlling the intelligent home appliances through the control end (such as a mobile phone) of the intelligent home appliances is becoming mature. The intelligent door lock is used as an important device of the intelligent household appliance, and after being bound with the mobile phone, the mobile phone can control the intelligent door lock to execute the following services, such as unlocking, voice call opening, video call opening and the like. NFC technology evolved from RFID, a short-range high-frequency radio technology. However, in the prior art, after the NFC tag is configured in the smart door lock, the tag information of the NFC tag is fixed and cannot be modified, that is, the smart door lock can only be used to execute a service.
Accordingly, the prior art is in need of improvement.
Disclosure of Invention
The invention aims to solve the technical problem of providing a configuration method and computer equipment of door lock label information so as to modify the door lock label information.
In a first aspect, an embodiment of the present invention provides a method for configuring door lock tag information, which is applied to an intelligent door lock system, where the intelligent door lock system includes a door lock and a terminal corresponding to the door lock;
The configuration method comprises the following steps:
The terminal responds to service selection operation and determines service identification information corresponding to the service selection operation;
the terminal sends the service identification information to the door lock so that the door lock configures tag information corresponding to the service identification information based on the service identification information.
In a second aspect, an embodiment of the present invention provides a method for configuring door lock tag information, where the method includes:
The door lock receives service identification information;
The door lock configures tag information corresponding to the service identification information based on the service identification information.
In a third aspect, an embodiment of the present invention provides a computer device, including a memory and a processor, where the memory stores a computer program and is applied to an intelligent door lock system, where the intelligent door lock system includes a door lock and a terminal corresponding to the door lock; the processor, when executing the computer program, performs the steps of:
The terminal responds to service selection operation and determines service identification information corresponding to the service selection operation;
the terminal sends the service identification information to the door lock so that the door lock configures tag information corresponding to the service identification information based on the service identification information.
In a fourth aspect, an embodiment of the present invention provides a computer-readable storage medium having stored thereon a computer program for application to an intelligent door lock system including a door lock and a terminal corresponding to the door lock; the computer program when executed by a processor performs the steps of:
The terminal responds to service selection operation and determines service identification information corresponding to the service selection operation;
the terminal sends the service identification information to the door lock so that the door lock configures tag information corresponding to the service identification information based on the service identification information.
Compared with the prior art, the embodiment of the invention has the following advantages:
the terminal responds to the service selection operation to determine service identification information corresponding to the service selection operation, and the terminal sends the service identification information to the door lock so that the door lock configures tag information corresponding to the service identification information based on the service identification information. It should be noted that, the terminal sends service identification information to the door lock, and the door lock can configure tag information corresponding to the service identification information according to the service identification information. Therefore, the door lock label information is modified through the configuration of the door lock label information, so that the door lock executes different services.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings that are required to be used in the embodiments or the description of the prior art will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments described in the present invention, and other drawings may be obtained according to the drawings without inventive effort to those skilled in the art.
FIG. 1 is an application environment diagram of a method for configuring door lock tag information in an embodiment of the present invention;
FIG. 2 is a first flowchart of a method for configuring door lock tag information according to an embodiment of the present invention;
FIG. 3 is a second flowchart of a method for configuring door lock tag information according to an embodiment of the present invention;
FIG. 4 is a timing diagram of a method for configuring door lock tag information according to an embodiment of the present invention;
fig. 5 is an internal structural diagram of a computer device in an embodiment of the present invention.
Detailed Description
In order to make the present invention better understood by those skilled in the art, the following description will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings, and it is apparent that the described embodiments are only some embodiments of the present invention, not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
The inventor finds that with the development of door lock technology, the door lock is more intelligent, and the door lock can execute various other services, such as security and protection services, besides the basic services of switching. And when the door lock is controlled to execute the service, the door lock can be controlled based on the NFC technology. However, after the NFC tag is configured in the door lock and tag information is written into the NFC tag, the tag information of the NFC tag is fixed and cannot be modified after the NFC tag is configured in the intelligent door lock, that is, the intelligent door lock can only be used for executing a service.
In order to solve the above-mentioned problems, as shown in fig. 1 and fig. 2, in an embodiment of the present invention, in order to implement configuration of door lock tag information, service identification information corresponding to a service selection operation is determined by a terminal in response to the service selection operation, and the service identification information is sent to a door lock by the terminal, so that the door lock configures tag information corresponding to the service identification information based on the service identification information. It should be noted that, the terminal sends service identification information to the door lock, and the door lock can configure tag information corresponding to the service identification information according to the service identification information. Therefore, the door lock label information is modified through the configuration of the door lock label information, so that the door lock executes different services.
After the door lock label information is configured through the terminal, the terminal is close to the door lock, connection is established between the terminal and the door lock, interaction occurs, and if the corresponding relation exists between the service identification information determined in the terminal and the label information configured in the door lock, the door lock executes the service corresponding to the label information.
For example, the terminal determines service identification information of the door opening service in response to the service selection operation, and sends the service identification information of the door opening service to the door lock, and the door lock configures tag information corresponding to the service identification information of the door opening service based on the service identification information of the door opening service. When the user approaches the terminal to the door lock, the door lock executes the door opening service because the label information of the door lock corresponds to the service identification information determined in the terminal, and particularly, the door lock is opened by controlling the movement of the door bolt through the controller.
It should be noted that the above application scenario is only shown for the convenience of understanding the present invention, and embodiments of the present invention are not limited in this respect. Rather, embodiments of the invention may be applied to any scenario where applicable.
Various non-limiting embodiments of the present invention are described in detail below with reference to the attached drawing figures.
As shown in fig. 2, in an embodiment of the present invention, there is provided an intelligent door lock system including: a door lock 30 and a terminal 10 corresponding to the door lock 30; the terminal 10 and the door lock 30 are connected through a network. The door lock 30 is a device that can be controlled by the terminal 10. The door lock 30 is a device mounted on a door and used for opening and closing the door, and the door lock 30 may be a building door lock or an equipment door lock, and the building door lock may be at least one door lock selected from a large door lock, an entrance door lock, an indoor door lock, and the like. The equipment door lock can be at least one door lock of a car door lock, a safe door lock, a locker door lock and the like. The terminal 10 may be a mobile terminal, and the mobile terminal may be at least one of a mobile phone, a tablet computer, a notebook computer, and the like.
The intelligent door lock system further comprises: and a server 20 communicatively connected to the terminal 10, wherein the server 20 is communicatively connected to the door lock 30.
In an embodiment of the present invention, there is provided a terminal 10, where the terminal 10 includes a processor, a nonvolatile storage medium, an internal memory, a network interface, a sound collecting device, a speaker, a display screen, and an input device connected through a system bus. The nonvolatile storage medium of the terminal 10 stores therein an operating system and a configuration device of door lock tag information for implementing a configuration method of the door lock tag information. The processor is operative to provide computing and control capabilities to support the operation of the entire terminal 10. An internal memory in the terminal 10 provides an environment for the operation of the configuration means of door lock tag information in a non-volatile storage medium, and may store computer readable instructions that, when executed by a processor, cause the processor to perform a method of configuring door lock tag information. The network interface is used for network communication with the server 20, such as receiving a voice call request and controlled device data transmitted from the server 20, transmitting a device binding request to the server 20, and the like. The display screen of the terminal 10 may be a liquid crystal display screen or an electronic ink display screen, etc., and the input device may be a touch layer covered on the display screen, or may be a key, a track ball or a touch pad arranged on the housing of the terminal 10, or may be an external keyboard, a touch pad or a mouse, etc. The terminal 10 may be a mobile terminal, which may be a cell phone, tablet, personal digital assistant, or wearable device, among others.
In an embodiment of the present invention, a server 20 is provided, where the server 20 includes a processor, a nonvolatile storage medium, an internal memory, and a network interface connected by a system bus. The nonvolatile storage medium of the server 20 stores therein an operating system and a configuration device of door lock tag information for implementing a configuration method of the door lock tag information. The processor is used to provide computing and control capabilities, supporting the operation of the entire server 20. The internal memory of the server 20 provides an environment for the operation of the configuration means of door lock tag information in a non-volatile storage medium, and may store computer readable instructions that, when executed by a processor, cause the processor to perform a method of configuring door lock tag information. The network interface is used for connecting to a network for communication, such as receiving a registration request transmitted from the door lock 30, transmitting an alarm to the terminal 10, receiving a door lock binding request transmitted from the terminal 10, and the like. The server 20 may be implemented as a stand-alone server or as a cluster of servers 20 comprising a plurality of servers 20.
Referring to fig. 2, a method for configuring door lock tag information in an embodiment of the present invention is shown, and this embodiment is exemplified by the method applied to the terminal 10. In this embodiment, the configuration method may include the following steps:
s1, the terminal responds to service selection operation and determines service identification information corresponding to the service selection operation.
Specifically, the service refers to a transaction that can be processed by the door lock 30, and the service may specifically be at least one of a door opening service, a door locking service, a security service, and the like, where the door opening service and the door locking service are two most basic services of the door lock 30. The security service is a service of giving an alarm when the door lock 30 has a security problem including being damaged, illegally intruded, etc. In particular, a camera may be provided by which it is monitored whether the door lock 30 has a security problem, such as someone hovering in front of the door lock 30 or attempting to unlock. An inductor may also be provided, and when the key is inserted into the door lock 30 for a preset time, the key is not yet unlocked, and thus a safety problem exists.
For example, when the door lock 30 performs the door opening operation, the door lock 30 receives a door opening command and performs the door opening operation. For another example, when the door lock 30 executes security service, the door lock 30 receives a security instruction, and then performs security operation, specifically, opens the camera of the door lock 30, and monitors the door lock 30 in real time.
The service identification information refers to information for identifying a service, each service has service identification information uniquely corresponding to the service, for example, a door opening service has service identification information of a door opening service, and a security service has service identification information of a security service. That is, the service identification information is information for distinguishing each service.
The service of the door lock 30 is determined according to the user's need, the user can select the service of the door lock 30 on the terminal 10, the terminal 10 responds to the service selection operation of the user, and determines the service identification information corresponding to the service selection operation according to the service selection operation, where the service identification information is the identification information of the selected service.
Specifically, step S1, the terminal responding to a service selection operation, determining service identification information corresponding to the service selection operation, includes:
s11, the terminal outputs the service to be selected.
Specifically, the terminal 10 outputs the service to be selected for the user to select on the user interface, the service to be selected includes at least two services, and the user can select one service from the services to be selected. That is, the user selects a service that needs the door lock 30 to perform from the services to be selected.
For example, the terminal 10 outputs a service to be selected, such as a door opening service, a door locking service, and a security service. Three services to be selected are output on the user interface of the terminal 10 for selection by the user. For example, when a user is ready to go out in the morning, the door lock 30 is required to perform security services after the user goes out. The door lock 30 is required to perform the door opening operation when the user arrives home, and it is seen that the user requires the door lock 30 to perform different operations in different periods. The terminal 10 may output the service to be selected to meet the user's needs at different times.
S12, the terminal responds to the service selection operation, and service identification information corresponding to the selected service is used as service identification information corresponding to the service selection operation.
Specifically, after the terminal 10 outputs the service to be selected, the user selects one service and performs a service selection operation according to the need, for example, the user triggers a touch point corresponding to a certain service on the user interface of the terminal 10 through a triggering operation, so as to implement service selection. The trigger operation may be a single click operation, a double click operation, a long press operation, a slide operation, a multi-touch operation, or the like. The feature of the triggering operation, such as the feature of the clicking operation, may be that the touch point is detected and disappears within a first preset time, the feature of the long pressing operation may be that the touch point is detected and does not disappear within a second preset time, and the feature of the sliding operation may be that the touch point is detected and moves to generate a specific touch track.
The service selection may of course be performed in other ways, for example, by speaking the selected service through voice, the terminal 10 responds to the service selection operation of the user by recognizing the voice of the user, and takes the service identification information corresponding to the selected service as the service identification information corresponding to the service selection operation.
S2, the terminal sends the service identification information to the door lock, so that the door lock configures tag information corresponding to the service identification information based on the service identification information.
Specifically, after determining the service identification information, the terminal 10 sends the service identification information to the door lock 30, so that the door lock 30 configures tag information according to the service identification information, and specifically, the door lock 30 configures tag information corresponding to the service identification information. Since the service identification information is used to identify the selected service in the service selection operation, the tag information corresponding to the service identification information is used to execute the selected service.
For example, when the user goes out in the morning, the door lock 30 is required to execute the security service, that is, the user selects the security service on the terminal 10, the terminal 10 determines the service identification information of the security service in response to the service selection operation of the security service, and sends the service identification information of the security service to the door lock 30, and the door lock 30 configures the tag information of the security service according to the service identification information of the security service. When a user goes out, the terminal 10 and the door lock 30 are close, the terminal 10 and the door lock 30 are connected and interacted, security service is selected on the terminal 10, service identification information of the security service is determined, and the door lock 30 is configured with tag information of the security service, so that the door lock 30 executes the security service, for example, a camera can be opened, and the door lock 30 is in a security state. Once a person approaches the door lock 30 or remains in front of the door, captured by the camera, an alarm may be raised, in particular, an alarm may be raised to the terminal 10 to prompt the user.
For another example, since the door lock 30 performs security service when going out, the door lock 30 is configured with tag information of the security service, and when the user returns home, if the terminal 10 is close to the door lock 30, the security service of the door lock 30 can only be closed. The door cannot be opened. The user may reconfigure the door lock tag information through the terminal 10 before arriving at home. Specifically, the door opening service is selected on the terminal 10, the terminal 10 determines service identification information of the door opening service in response to a service selection operation of the door opening service, and sends the service identification information of the door opening service to the door lock 30, and the door lock 30 configures tag information of the door opening service based on the service identification information of the door opening service. When the user approaches the terminal 10 to the door lock 30, since the service identification information of the door opening service is determined in the terminal 10 and the configuration of the door lock 30 is also the tag information of the door opening service, after the terminal 10 is connected to the door lock 30 and interaction occurs, the door lock 30 performs the door opening service to unlock the door.
In particular, the tag information refers to information stored in an electronic tag, which is a data carrier in a radio frequency identification system. The radio frequency identification system refers to a system for transmitting and identifying wireless contact information by using the coupling of space signals, and the radio frequency identification system further comprises: the reader refers to a device in a radio frequency identification system that transmits a read signal to an electronic tag and receives tag information from the electronic tag. The label information stored in the electronic label can be repeatedly erased and written.
Specifically, the electronic tag includes: RFID tag and NFC tag. NFC technology originates from RFID technology, but NFC technology differs from RFID technology to some extent: 1. the operating frequency of NFC is 13.56MHz, while the operating frequency of RFID is low frequency, high frequency (13.56 MHz) and ultra-high frequency. 2. Working distance of NFC is theoretically 0-20 cm, and generally, working distance is only 0-10 cm, so that service safety is better guaranteed. Since RFID has different frequencies, its working distance varies from several centimeters to several tens of meters. 3. In the working mode, NFC supports both a read-write mode and a card mode. In RFID, however, the reader and the contactless card are independent entities and cannot be switched. 4. Point-to-point communication, NFC supports P2P mode, RFID does not support P2P mode.
The NFC tag has smaller working distance and can perform point-to-point communication, so that the security is higher, the NFC supports a read-write mode and a card mode at the same time, and the application range is wider. In this embodiment, an NFC tag is taken as an example for explanation.
In one implementation manner of the embodiment of the present invention, the door lock 30 includes an NFC tag, the tag information is stored in the NFC tag, and only one tag information is stored in the NFC tag. After receiving the service identification information, the door lock 30 determines tag information corresponding to the service identification information according to the service identification information, and writes the tag information into the NFC tag to complete configuration of the door lock tag information.
Specifically, when the door lock 30 receives the service identification information, tag information corresponding to the service identification information may be determined according to the service identification information. For example, the door lock 30 is preset with a correspondence between service identification information and tag information, and in the correspondence between service identification information and tag information, the service identification information and tag information are in one-to-one correspondence, that is, unique corresponding tag information can be determined according to the service identification information. After the label information corresponding to the service identification information is determined, the label information is written into the NFC label, so that the configuration of the door lock label information is completed.
In one implementation of this embodiment, the terminal 10 includes an NFC module, where the NFC is configured to connect with the NFC tag and read tag information in the NFC tag. After the door lock 30 completes the door lock tag information configuration, the terminal 10 may control the door lock 30 as follows.
The terminal 10 is close to the door lock 30, so that NFC connection is established between the terminal 10 and the door lock 30, the NFC module exchanges information with the NFC tag, the NFC tag sends stored tag information to the NFC module, the NFC module compares the received tag information with service identification information determined in the terminal 10, and if the tag information is matched with the service identification information, the terminal 10 sends a first control instruction to the door lock 30 so that the door lock 30 executes a service corresponding to the tag information.
For example, when the terminal 10 is close to the door lock 30 and NFC connection is established, the NFC tag sends stored tag information of the security service to the NFC module, if the tag information of the security service and the service identification information of the security service are determined to be the service identification information of the security service in the terminal 10, the terminal 10 sends a first control instruction to the door lock 30, so that the door lock 30 executes the security service.
Specifically, as shown in fig. 4, the intelligent door lock system further includes a server 20 communicatively connected to the terminal 10, and the server 20 is communicatively connected to the door lock 30. That is, the terminal 10 is connected to the door lock 30 through the server 20, but the terminal 10 may be connected to the door lock 30 through other means, for example, when the terminal 10 and the door lock 30 are located close to each other, for example, the door lock 30 is a house door lock 30, the terminal 10 is located in a house, and the terminal 10 and the door lock 30 may be connected in communication through a local area network. For another example, the door lock 30 is a door lock 30, the terminal 10 is near the vehicle, and the terminal 10 and the door lock 30 can be connected by bluetooth communication.
In one implementation of the present invention, the terminal 10 is communicatively connected to the door lock 30 through the server 20, so that information transmission between the terminal 10 and the door lock 30 is achieved. That is, communication connection is established with the terminal 10 and the door lock 30 through the server 20, respectively.
Specifically, the door lock 30 is communicatively connected to the server 20 by:
(1) The door lock 30 initiates a background service program.
(2) The door lock 30 acquires door lock information including a door lock 30 signal, a door lock key (key), and the like through a background service program.
(3) The door lock 30 initiates a thread that interfaces with the server 20 using the HTTP protocol. The door lock 30 acquires the IP address and port number of the distribution server 20 in the server 20.
(4) The door lock 30 transmits a connection request to the distribution server 20 according to the IP address and port number of the distribution server 20. After receiving the connection request, the server 20 feeds back a connection success message to the door lock 30. In particular several handshakes may be performed, for example three handshakes: 1. the door lock 30 needs to send a SYN (establish connection) code first, and the door lock 30 requests and server 20 to establish connection; 2. the server 20 receives the SYN code and then sends the syn+ack (acknowledgement) code to the client to determine that the connection is established; 3. the door lock 30 receives the ACK code, verifies whether the ACK is correct, and establishes data connection with the server if the ACK is correct; both data transmission channels will be on. For example, messages may be communicated with each other and registered for authentication in accordance with mqtt (Message Queuing Telemetry Transport, message queue telemetry transport protocol) protocols to establish a mqtt long connection.
(5) After the door lock 30 receives the server 20 connection success message, the door lock 30 transmits door lock information to the server 20, and acquires the registered device ID (device ID) and an assigned hash value.
(6) The door lock 30 is connected to the server 20 according to the device ID and the hash value based on the protocol. Specifically, encryption processing may be performed during the information transmission process to ensure the security of the information transmission.
The background service in the door lock 30 is always running in the background, and the mqtt long connection between the door lock 30 and the server 20 is maintained, and once the door lock 30 is offline, the login is automatically performed by the device ID and the hash value, so that the connection between the door lock 30 and the server 20 is ensured. After the door lock 30 is connected to the server 20, both can communicate based on the mqtt protocol.
Step S2, the terminal sends the service identification information to the door lock, so that the door lock configures tag information corresponding to the service identification information based on the service identification information, and the method includes:
s21, the terminal sends the service identification information to the door lock through the server.
Specifically, the terminal 10 transmits the service identification information to the server 20, and the server 20 transmits the service identification information to the door lock 30. The server 20 may simply forward the service identification information received from the terminal 10 to the door lock 30. That is, the information sent from the terminal 10 to the server 20 is not processed by the server 20 but directly sent to the door lock 30, so that the door lock 30 configures tag information corresponding to the service identification information based on the service identification information.
For example, the terminal 10 sends the service identification information of the security service to the server 20, the server 20 receives the service identification information of the security service, and then the server 20 sends the received service identification information of the security service to the door lock 30, and the door lock 30 configures tag information of the security service according to the service identification information of the security service.
Of course, the server 20 may also determine tag information corresponding to the service identification information according to the service identification information after receiving the service identification information from the terminal 10, so as to send the tag information to the door lock 30, so that the door lock 30 configures the tag information.
In an implementation manner of the embodiment of the present invention, in step S1, before the terminal responds to a service selection operation and determines service identification information corresponding to the service selection operation, the configuration method further includes the following steps:
S0, binding the terminal with the door lock.
Specifically, the terminal 10 binds with the door lock 30, that is, an association is established between the terminal 10 and the door lock 30, so that access and control of the door lock 30 by the terminal 10 can be achieved. In the binding operation of the door lock 30, one binding mode is that the user connects the terminal 10 and the door lock 30 in a point-to-point mode, and obtains the unique identification of the door lock 30 from the door lock 30, so that the user account number and the identification of the door lock 30 are uploaded to the server 20 through the terminal 10 for binding. In still another binding manner, the terminal 10 sends binding request information to the server 20, the server 20 returns a binding code according to the binding request information, and the terminal 10 sends the binding code to the door lock 30, so that the door lock 30 confirms the binding code and sends a confirmation signal to the server 20, so that the server 20 completes binding processing according to the binding request information.
Step S0, binding the terminal with the door lock, including:
and S01, the terminal sends binding request information to the server and receives a binding code fed back by the server based on the binding request information.
Specifically, the binding request information carries door lock information and a user identifier corresponding to the terminal 10. After the terminal 10 obtains the response instruction, the above door lock information and the user identifier corresponding to the terminal 10 are obtained according to the response instruction, and binding request information carrying the door lock information and the user identifier is generated, so that the binding request information is sent to the server 20.
Specifically, after receiving the binding request information, the server 20 extracts the door lock information and the user identifier from the binding request information, thereby generating a binding code according to the door lock information and the user identifier. The server 20 transmits the generated binding code to the terminal 10.
S02, the terminal is bound with the door lock 30 based on the binding code.
Specifically, the terminal 10 transmits the binding code to the door lock 30 after receiving the binding code transmitted from the server 20, and the door lock 30 confirms after receiving the binding code and transmits confirmation information to the server 20 to determine the binding relationship between the terminal 10 and the door lock 30.
Specifically, as shown in fig. 4, after the terminal 10 is bound to the door lock 30 through the server 20, the terminal 10 may further control the door lock 30 as follows:
the terminal 10 sends a second control instruction to the door lock 30 through the server 20, so that the door lock 30 executes a service corresponding to the second control instruction.
For example, the terminal 10 sends a control instruction of the door opening service to the server 20 through mqtt protocol, the server 20 sends the control instruction of the door opening service to the door lock 30, and the door lock 30 executes the door opening service after receiving the control instruction of the door opening service.
Specifically, the manufacturer may store the service identification information of each service of the door lock in the server in advance, after the terminal binds with the door lock, the service identification information of each service of the door lock may be obtained from the server, and then the terminal stores the service identification information of each service in the NFC record. Of course, not every service's service identification information is stored in the NFC record (record), and the user may store the service identification information of the service that needs to be used in the NFC record.
As shown in fig. 3, a method for configuring door lock tag information in an embodiment of the present invention is applied to a door lock 30 for illustration. In this embodiment, the configuration method may include the following steps:
A1, the door lock 30 receives service identification information.
Specifically, the door lock 30 receives service identification information, which may be transmitted from the terminal 10 or the server 20, that is, in one case, the service identification information may be directly transmitted from the terminal 10 to the door lock 30. Another case is that the door lock is connected to a server, and the service identification information is sent to the server, specifically, the terminal 10 is sent to the door lock 30 through the server 20. When the terminal 10 directly transmits the service identification information to the door lock 30, it is necessary that the terminal 10 directly establishes a communication connection with the door lock 30, that is, a distance between the terminal 10 and the door lock 30 is relatively short, so that the service identification information can be directly transmitted to the door lock 30. When the terminal 10 sends the service identification information to the door lock 30 through the server 20, the terminal 10 is in communication connection with the door lock 30 through the server 20, and the distance between the terminal 10 and the door lock 30 is long, so that the terminal 10 can remotely send the service identification information to the door lock 30.
For example, the terminal 10 sends the service identification information of the security service to the server 20, the server 20 receives the service identification information of the security service, and then the server 20 sends the received service identification information of the security service to the door lock 30, and the door lock 30 configures tag information of the security service according to the service identification information of the security service.
A2, the door lock 30 configures tag information corresponding to the service identification information based on the service identification information.
Specifically, after the door lock 30 receives the service identification information, the tag information corresponding to the service identification information is determined, and then the tag information is configured to complete the configuration of the door lock tag information.
For example, the door lock 30 receives the service identification information of the security service, the door lock 30 determines the tag information of the security service according to the service identification information of the security service, and then the door lock 30 configures the tag information of the security service, thereby completing the configuration of the tag information of the door lock.
In one implementation of this embodiment, the door lock 30 includes an NFC tag, where the tag information is stored in the NFC tag, and only one tag information is stored in the NFC tag. After receiving the service identification information, the door lock 30 determines tag information corresponding to the service identification information according to the service identification information, and writes the tag information into the NFC tag to complete configuration of the door lock tag information.
Step A2, the door lock 30 configures tag information corresponding to the service identification information based on the service identification information, including:
A21, the door lock 30 determines label information corresponding to the service identification information according to the service identification information.
Specifically, when the door lock 30 receives the service identification information, tag information corresponding to the service identification information may be determined according to the service identification information. For example, the door lock 30 is preset with a correspondence between service identification information and tag information, and in the correspondence between service identification information and tag information, the service identification information and tag information are in one-to-one correspondence, that is, unique corresponding tag information can be determined according to the service identification information.
For example, the door lock 30 stores a correspondence between service identification information and tag information, where the correspondence between service identification information and tag information includes all service identification information and tag information corresponding to all service identification information, respectively, such as service identification information of security service and tag information of security service corresponding to service identification information of security service, service identification information of door opening service and tag information of door opening service corresponding to service identification information of door opening service. The door lock 30 receives the service identification information of the security service, and can find the tag information of the security service corresponding to the service identification information of the security service in the corresponding relationship between the service identification information and the tag information according to the service identification information of the security service.
A22, the door lock writes the tag information into the NFC tag to complete configuration of the door lock tag information.
In one implementation of the embodiment of the present invention, the door lock 30 includes an NFC tag, and tag information is stored in the NFC tag. After receiving the service identification information, the door lock 30 determines tag information corresponding to the service identification information according to the service identification information, and writes the tag information into the NFC tag to complete configuration of the door lock tag information.
For example, the door lock 30 determines tag information of the security service, erases original tag information in the NFC tag, and writes the tag information of the security service to the NFC tag.
Of course, after receiving the service identification information, the door lock 30 may determine the tag information corresponding to the service identification information according to the service identification information, compare the determined tag information with the original tag information stored in the NFC tag, and if the determined tag information is the same as the original tag information, it is not necessary to rewrite the original tag information in the NFC tag. And if the determined tag information is different from the original tag information, wiping the original tag information in the NFC tag, and writing the determined tag information into the NFC tag information.
For example, when the user goes out in the morning, the door lock 30 does not open the security service, and still retains the door opening service, that is, the original tag information stored in the NFC tag of the door lock 30 is the tag information of the door opening service. When the user returns home at night, the service identification information of the door opening service is sent to the door lock 30 through the terminal 10, after the door lock 30 receives the service identification information of the door opening service, the tag information of the door opening service is determined according to the service identification information of the door opening service, and the determined tag information is identical to the original tag information, so that the configuration of the tag information of the door lock can be completed without operation.
For another example, when the user goes out in the morning, the door lock 30 opens the security service, that is, the original tag information stored in the NFC tag of the door lock 30 is the tag information of the security service. When the user returns home at night, the service identification information of the door opening service is sent to the door lock 30 through the terminal 10, after the door lock 30 receives the service identification information of the door opening service, the tag information of the door opening service is determined according to the service identification information of the door opening service, and then the determined tag information is different from the original tag information, so that the original tag information in the NFC tag is wiped off, and the determined tag information of the door opening service is written into the NFC tag, and the configuration of the tag information of the door lock can be completed.
In one embodiment, the present invention provides a computer device, which may be a terminal, with an internal structure as shown in fig. 5. The computer device includes a processor, a memory, a network interface, a display screen, and an input device connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device includes a non-volatile storage medium and an internal memory. The non-volatile storage medium stores an operating system and a computer program. The internal memory provides an environment for the operation of the operating system and computer programs in the non-volatile storage media. The network interface of the computer device is for communication with an external terminal 10 via a network connection. The computer program, when executed by the processor, implements a method of configuring door lock tag information or said animated image generating method. The display screen of the computer equipment can be a liquid crystal display screen or an electronic ink display screen, and the input device of the computer equipment can be a touch layer covered on the display screen, can also be keys, a track ball or a touch pad arranged on the shell of the computer equipment, and can also be an external keyboard, a touch pad or a mouse and the like.
It will be appreciated by those skilled in the art that the block diagram of FIG. 5 is merely a partial structure associated with the present inventive arrangements and is not limiting of the computer device to which the present inventive arrangements are applied, and that a particular computer device may include more or less components than those shown, or may combine some of the components, or have a different arrangement of components.
In one embodiment, a computer device is provided, comprising a memory and a processor, the memory storing a computer program for application to an intelligent door lock system comprising a door lock 30 and a terminal 10 corresponding to the door lock 30; the processor, when executing the computer program, performs the steps of:
the terminal 10 responds to the service selection operation and determines service identification information corresponding to the service selection operation;
The terminal 10 transmits the service identification information to the door lock 30 so that the door lock 30 configures tag information corresponding to the service identification information based on the service identification information.
In one embodiment, a computer readable storage medium having a computer program stored thereon is provided for use in an intelligent door lock system including a door lock 30 and a terminal 10 corresponding to the door lock 30; the computer program when executed by a processor performs the steps of:
the terminal 10 responds to the service selection operation and determines service identification information corresponding to the service selection operation;
The terminal 10 transmits the service identification information to the door lock 30 so that the door lock 30 configures tag information corresponding to the service identification information based on the service identification information.
Those skilled in the art will appreciate that implementing all or part of the processes of the methods of the embodiments described above may be accomplished by computer programs stored on a computer readable storage medium, such as a computer system, and executed by at least one processor in the computer system to implement processes including embodiments of the methods described above. The storage medium may be a magnetic disk, an optical disk, a Read-Only Memory (ROM), a random-access Memory (Random Access Memory, RAM), or the like.
The technical features of the above embodiments may be arbitrarily combined, and all possible combinations of the technical features in the above embodiments are not described for brevity of description, however, as long as there is no contradiction between the combinations of the technical features, they should be considered as the scope of the description.

Claims (8)

1. The configuration method of the door lock label information is characterized by being applied to an intelligent door lock system, wherein the intelligent door lock system comprises a door lock and a terminal corresponding to the door lock;
The configuration method comprises the following steps:
The terminal responds to service selection operation and determines service identification information corresponding to the service selection operation;
the terminal sends the service identification information to the door lock so that the door lock configures tag information corresponding to the service identification information based on the service identification information; the door lock comprises an NFC tag, and the tag information is stored in the NFC tag;
the intelligent door lock system further comprises a server in communication connection with the terminal, and the server is in communication connection with the door lock;
the terminal sends the service identification information to the door lock, and the method comprises the following steps:
The terminal sends the service identification information to the door lock through the server, so that the door lock determines tag information corresponding to the service identification information according to the service identification information, and writes the tag information into the NFC tag to complete configuration of the door lock tag information; and the terminal is close to the door lock, so that the NFC module of the terminal and the door lock are in information interchange, the NFC label sends stored label information to the NFC module, the NFC module compares the received label information with service identification information determined in the terminal, and if the label information is matched with the service identification information, the terminal sends a first control instruction to the door lock so that the door lock executes a service corresponding to the label information.
2. The method for configuring door lock tag information according to claim 1, wherein before the terminal determines service identification information corresponding to the service selection operation in response to the service selection operation, the method further comprises:
the terminal sends binding request information to the server and receives a binding code fed back by the server based on the binding request information;
The terminal is bound with the door lock based on the binding code.
3. The method for configuring door lock tag information according to claim 1, wherein the terminal includes an NFC module, and the NFC module is configured to connect with the NFC tag and read tag information in the NFC tag.
4. The method of claim 1, wherein the tag information comprises at least one of: door opening label information, door locking label information and security label information.
5. The configuration method of the door lock label information is characterized by being applied to an intelligent door lock system, wherein the intelligent door lock system comprises a door lock and a terminal corresponding to the door lock; the configuration method comprises the following steps:
The door lock receives service identification information;
the door lock configures label information corresponding to the service identification information based on the service identification information; the door lock is connected with a server, and the service identification information is sent by the server; the door lock comprises an NFC tag, and the tag information is stored in the NFC tag;
the door lock configures tag information corresponding to the service identification information based on the service identification information, and comprises:
the door lock determines label information corresponding to the service identification information according to the service identification information;
The door lock writes the tag information into the NFC tag to complete configuration of the door lock tag information; and the terminal is close to the door lock, so that the NFC module of the terminal and the door lock are in information interchange, the NFC label sends stored label information to the NFC module, the NFC module compares the received label information with service identification information determined in the terminal, and if the label information is matched with the service identification information, the terminal sends a first control instruction to the door lock so that the door lock executes a service corresponding to the label information.
6. The method of claim 5, wherein the tag information comprises at least one of: door opening label information, door locking label information and security label information.
7. Computer device comprising a memory and a processor, the memory storing a computer program, characterized in that the processor, when executing the computer program, carries out the steps of the method of configuring door lock tag information according to any one of claims 1 to 4 and/or the steps of the method of configuring door lock tag information according to any one of claims 5 to 6.
8. A computer-readable storage medium, on which a computer program is stored, characterized in that the computer program, when being executed by a processor, realizes the steps of the method of configuring door lock tag information according to any one of claims 1 to 4 and/or the steps of the method of configuring door lock tag information according to any one of claims 5 to 6.
CN202010717605.8A 2020-07-23 2020-07-23 Configuration method of door lock label information and computer equipment Active CN114049700B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010717605.8A CN114049700B (en) 2020-07-23 2020-07-23 Configuration method of door lock label information and computer equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010717605.8A CN114049700B (en) 2020-07-23 2020-07-23 Configuration method of door lock label information and computer equipment

Publications (2)

Publication Number Publication Date
CN114049700A CN114049700A (en) 2022-02-15
CN114049700B true CN114049700B (en) 2024-09-17

Family

ID=80204285

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010717605.8A Active CN114049700B (en) 2020-07-23 2020-07-23 Configuration method of door lock label information and computer equipment

Country Status (1)

Country Link
CN (1) CN114049700B (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104978781A (en) * 2014-04-02 2015-10-14 深圳市方卡科技股份有限公司 Electronic lock system, electronic lock and unlocking method based on NFC
CN110533800A (en) * 2019-05-10 2019-12-03 深圳爱根斯通科技有限公司 Intelligent door lock control method, device, electronic equipment and storage medium

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150170448A1 (en) * 2012-07-06 2015-06-18 Fingi Inc. Entry lock control and operation system
KR20170079049A (en) * 2015-12-30 2017-07-10 에스케이플래닛 주식회사 User equipment, service providing device, payment system comprising the same, control method thereof and computer readable medium having computer program recorded thereon
CN106130981A (en) * 2016-06-28 2016-11-16 努比亚技术有限公司 The self-defined device and method of digital label of augmented reality equipment
CN106447836B (en) * 2016-08-01 2019-01-25 厦门中控智慧信息技术有限公司 A kind of door control terminal binding method and relevant device
CN106683245B (en) * 2016-12-22 2020-06-09 贵州航天计量测试技术研究所 NFC mobile intelligent terminal safety access control system and control method thereof
KR20180089004A (en) * 2017-01-31 2018-08-08 권형석 Multi-service system identification information through a NFC Tag And How to Use
CN108282471B (en) * 2018-01-12 2020-11-03 创新先进技术有限公司 Electronic certificate transmission method, device and equipment
CN111413883A (en) * 2020-03-31 2020-07-14 广东美的制冷设备有限公司 Control method and control device for household electrical appliance and computer storage medium

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104978781A (en) * 2014-04-02 2015-10-14 深圳市方卡科技股份有限公司 Electronic lock system, electronic lock and unlocking method based on NFC
CN110533800A (en) * 2019-05-10 2019-12-03 深圳爱根斯通科技有限公司 Intelligent door lock control method, device, electronic equipment and storage medium

Also Published As

Publication number Publication date
CN114049700A (en) 2022-02-15

Similar Documents

Publication Publication Date Title
EP2041691B1 (en) Method, system and smart card reader for management of access to a smart card
EP3116161B1 (en) Security unit management method and terminal
US7766243B2 (en) Method, system and smart card reader for management of access to a smart card
CN101771754B (en) Mobile terminal and method for near-field communication thereof
CN104637131B (en) A kind of access control system authorization method, device and access control system
US20230054157A1 (en) Near field communication nfc communication method and apparatus, and electronic device
CN103647587A (en) Method and system for unlocking mobile terminal, mobile terminal and wearable electronic device
CN109979047B (en) Multi-network intelligent door lock control method, storage medium, controller and fingerprint lock
EP2377291B1 (en) Portable mobile communication device and method of controlling near field communication
US8700827B2 (en) Matching method, system and device for data exchange between a communication object and a processing unit
CN105227516A (en) The access method of Smart Home, control centre's equipment and dress terminal
CN104794780A (en) Smart door, smart door control system and control method
CN113207034B (en) Method, device, equipment and medium for processing mobile phone and television screen casting
CN101635071A (en) Method, system and device for installing/updating e-wallet
US11727741B2 (en) Reader and a method for controlling the reader
US20220253819A1 (en) Multi-use near field communication front end on a point of sale system
AU2021273648B2 (en) Multi-use near field communication front end on a point of sale system
CN108665595A (en) A kind of Intelligent visible access control system
CN114049700B (en) Configuration method of door lock label information and computer equipment
CN104951678A (en) Unlocking method and device
JP5690927B2 (en) Method and system for processing a plurality of wireless communication streams by an integrated circuit card
CN102361512B (en) Device, method and system for binding terminal
US20110125885A1 (en) Method for setting network environment and storage device applying the same
EP3751749B1 (en) Multi-use near field communication front end on a point of sale system
CA2658422C (en) Method, system and smart card reader for management of access to a smart card

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant