CN114445939A - Unlocking method and device, electronic equipment and storage medium - Google Patents

Unlocking method and device, electronic equipment and storage medium Download PDF

Info

Publication number
CN114445939A
CN114445939A CN202210233694.8A CN202210233694A CN114445939A CN 114445939 A CN114445939 A CN 114445939A CN 202210233694 A CN202210233694 A CN 202210233694A CN 114445939 A CN114445939 A CN 114445939A
Authority
CN
China
Prior art keywords
unlocking
verification
information
picture
preset
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210233694.8A
Other languages
Chinese (zh)
Inventor
刘志伟
唐杰
陈道远
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Gree Electric Appliances Inc of Zhuhai
Zhuhai Lianyun Technology Co Ltd
Original Assignee
Gree Electric Appliances Inc of Zhuhai
Zhuhai Lianyun Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Gree Electric Appliances Inc of Zhuhai, Zhuhai Lianyun Technology Co Ltd filed Critical Gree Electric Appliances Inc of Zhuhai
Priority to CN202210233694.8A priority Critical patent/CN114445939A/en
Publication of CN114445939A publication Critical patent/CN114445939A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks

Abstract

The application provides an unlocking method, an unlocking device, electronic equipment and a storage medium, and belongs to the technical field of smart home. The application includes: receiving an unlocking signal sent by unlocking equipment through a near field communication module, wherein the unlocking signal carries object information of an unlocking object; when the object information is consistent with preset target object information, generating and displaying a verification picture so that the unlocking object inputs verification information through the verification picture; receiving the verification information through the verification picture; and when the verification information is consistent with preset target verification information, executing unlocking operation. Thereby, the safety of the door lock can be improved.

Description

Unlocking method and device, electronic equipment and storage medium
Technical Field
The application relates to the technical field of smart homes, in particular to an unlocking method, an unlocking device, electronic equipment and a storage medium.
Background
Near Field Communication (NFC for short) is an emerging technology, devices (such as mobile phones) using the NFC technology can exchange data when they are close to each other, and is integrated and evolved from a non-contact Radio Frequency Identification (RFID) and an interconnection technology, and by integrating functions of an induction card reader, an induction card and point-to-point Communication on a single chip, applications such as mobile payment, electronic ticketing, door access, mobile identity identification, anti-counterfeiting and the like are realized by using a mobile terminal. At present, the NFC technology is often applied to the scene of unblanking of intelligence lock, namely puts into the NFC module in cell-phone and lock, and the user can realize unblanking through NFC near field communication through being close to the lock with the cell-phone. However, it is not secure to unlock directly using NFC technology, since NFC is easily copied and hacked.
Disclosure of Invention
An object of the embodiments of the present application is to provide an unlocking method, an unlocking apparatus, an electronic device, and a storage medium, so as to solve the problem that unlocking directly through NFC near field communication is not safe. The specific technical scheme is as follows:
in a first aspect, a method of unlocking is provided, the method comprising:
receiving an unlocking signal sent by unlocking equipment through a near field communication module, wherein the unlocking signal carries object information of an unlocking object;
when the object information is consistent with preset target object information, generating and displaying a verification picture so that the unlocking object inputs verification information through the verification picture;
receiving the verification information through the verification picture;
and when the verification information is consistent with preset target verification information, executing unlocking operation.
In one possible embodiment, the presentation verification screen includes:
sending the verification picture to a preset projection device;
and controlling the projection device to project the verification picture to a preset area so that the unlocking object passes through the verification picture in the preset area to input verification information.
In one possible embodiment, the receiving the verification information through the verification screen includes:
and identifying operation information input by the unlocking object through the verification picture in the preset area through a preset identification device, and determining the verification information based on the operation information.
In one possible embodiment, the presentation verification screen includes:
and sending the verification picture to the unlocking equipment so that the unlocking equipment displays the verification picture, and inputting the verification information into the unlocking object through the verification picture displayed by the unlocking equipment.
In one possible embodiment, the method further comprises:
when the verification information is inconsistent with preset target verification information, determining that the input is an error input, and recording input time and input times corresponding to the error input;
and when the input times exceed a preset time threshold value, sending first prompt information to first management equipment, wherein the first prompt information comprises the input time and the input times, and the first management equipment is used for managing unlocking authority.
In one possible embodiment, the method further comprises:
and when the input times exceed a preset time threshold value, closing the verification picture and closing the near field communication module.
In one possible embodiment, the method further comprises:
when the verification information is inconsistent with preset target verification information, acquiring attribute information of the unlocking object through a preset acquisition device;
and sending the attribute information to a second management device, wherein the second management device is used for managing unlocking authority.
In a second aspect, there is provided an unlocking device, the device comprising:
the signal receiving module is used for receiving an unlocking signal sent by unlocking equipment through the near field communication module, wherein the unlocking signal carries object information of an unlocking object;
the display module is used for generating and displaying a verification picture when the object information is consistent with preset target object information so that the unlocking object inputs verification information through the verification picture;
the information receiving module is used for receiving the verification information through the verification picture;
and the unlocking module is used for executing unlocking operation when the verification information is consistent with preset target verification information.
In a possible embodiment, the display module is specifically configured to:
sending the verification picture to a preset projection device;
and controlling the projection device to project the verification picture to a preset area so that the unlocking object passes through the verification picture in the preset area to input verification information.
In a possible implementation manner, the information receiving module is specifically configured to:
and identifying operation information input by the unlocking object through the verification picture in the preset area through a preset identification device, and determining the verification information based on the operation information.
In one possible embodiment, the display module is further configured to:
and sending the verification picture to the unlocking equipment so that the unlocking equipment displays the verification picture, and inputting the verification information into the unlocking object through the verification picture displayed by the unlocking equipment.
In one possible embodiment, the apparatus further comprises a recording module, configured to:
when the verification information is inconsistent with preset target verification information, determining that the input is an error input, and recording input time and input times corresponding to the error input;
and when the input times exceed a preset time threshold value, sending first prompt information to first management equipment, wherein the first prompt information comprises the input time and the input times, and the first management equipment is used for managing unlocking authority.
In one possible embodiment, the apparatus further comprises a shutdown module configured to:
and when the input times exceed a preset time threshold value, closing the verification picture and closing the near field communication module.
In one possible embodiment, the apparatus further comprises an acquisition module configured to:
when the verification information is inconsistent with preset target verification information, acquiring attribute information of the unlocking object through a preset acquisition device;
and sending the attribute information to a second management device, wherein the second management device is used for managing unlocking authority.
In a third aspect, an electronic device is provided, which includes a processor, a communication interface, a memory and a communication bus, wherein the processor, the communication interface and the memory complete communication with each other through the communication bus;
a memory for storing a computer program;
a processor for implementing the method steps of any of the first aspect when executing a program stored in the memory.
In a fourth aspect, a computer-readable storage medium is provided, wherein a computer program is stored in the computer-readable storage medium, and when executed by a processor, the computer program implements the method steps of any of the first aspects.
In a fifth aspect, a computer program product containing instructions is provided, which when run on a computer causes the computer to perform any of the unlocking methods described above.
The embodiment of the application has the following beneficial effects:
the embodiment of the application provides an unlocking method, an unlocking device, electronic equipment and a storage medium, wherein firstly, an unlocking signal sent by unlocking equipment is received through a near field communication module, and the unlocking signal carries object information of an unlocking object; when the object information is consistent with preset target object information, generating and displaying a verification picture so that the unlocking object inputs verification information through the verification picture; then, receiving the verification information through the verification picture; and finally, when the verification information is consistent with preset target verification information, executing unlocking operation. That is, in the application, after the verification by the near field communication module is successful, the lock is not unlocked directly, but a verification picture is generated and displayed for secondary verification, and the lock is unlocked only when the verification information input by the user through the verification picture is also verified successfully, so that the safety of the door lock is improved.
Of course, not all advantages described above need to be achieved at the same time in the practice of any one product or method of the present application.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly described below, and it is obvious for those skilled in the art to obtain other drawings without inventive exercise.
Fig. 1 is a flowchart of an unlocking method provided in an embodiment of the present application;
fig. 2 is a flowchart of another unlocking method provided in the embodiment of the present application;
fig. 3 is a schematic diagram illustrating an authentication screen according to an embodiment of the present disclosure;
fig. 4 is a schematic structural diagram of an unlocking device provided in the embodiment of the present application;
fig. 5 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
Because NFC is easily copied and cracked, the problem of low safety exists in the direct unlocking of NFC technology. Therefore, the embodiment of the application provides an unlocking method.
The following will explain an unlocking method provided by the embodiments of the present application in detail with reference to the specific embodiments, as shown in fig. 1, the specific steps are as follows:
s101, receiving an unlocking signal sent by unlocking equipment through a near field communication module, wherein the unlocking signal carries object information of an unlocking object.
The unlocking method provided by the embodiment of the application can be applied to the intelligent door lock, and the Near Field Communication (NFC) module is arranged in the intelligent door lock, so that the intelligent door lock can be communicated with unlocking equipment which is also provided with the NFC module, wherein the unlocking equipment is a mobile phone and the like. Here, the object to be unlocked is a user who holds the unlocking device, and the object information is used to identify the identity (e.g., user ID) of the object to be unlocked.
In this application embodiment, when equipment of unblanking is close to intelligent lock, then can send the signal of unblanking to the NFC module in the intelligent lock through the NFC module of self, wherein, the signal of unblanking carries the object information of the object of unblanking, consequently, the signal of unblanking that equipment of unblanking sent can be received through the NFC module of self to the intelligent lock.
S102, when the object information is consistent with preset target object information, generating and displaying a verification picture so that the unlocking object inputs verification information through the verification picture.
In the embodiment of the application, correct user information, namely target object information is preset in the intelligent door lock, and the target object information is used for comparing with object information sent by the unlocking equipment so as to perform first-step verification on the unlocking equipment.
When the object information is consistent with the preset target object information, the first-step verification is successful, and at the moment, the intelligent door lock can generate and display a verification picture for inputting the verification information, so that the unlocking object inputs the verification information through the verification picture. Wherein, the verification picture is a digital code disc, a graphic code disc or a character code disc, etc.
As an embodiment, the verification picture may be displayed through a display screen of the smart door lock.
Furthermore, a program for generating an authentication picture can be preset in the intelligent door lock, and when the authentication picture is a digital code disc, the program can enable the digital code disc generated each time to be different, namely, the position of a number on the authentication picture is disturbed each time, so that the unlocking safety is improved.
S103, receiving the verification information through the verification picture.
And S104, when the verification information is consistent with preset target verification information, executing unlocking operation.
In the embodiment of the application, target verification information is stored in the intelligent door lock in advance, and the target verification information is correct information which is input by a user in advance and used for verification, wherein the target verification information can be numbers, figures, fingerprints or the like. When the unlocking object passes through the verification picture and inputs verification information, the intelligent door lock can receive the verification information and carry out second-step authentication by comparing whether the verification information is consistent with the target verification information. And when the verification information is consistent with the preset target verification information, unlocking operation can be executed.
In the embodiment of the application, firstly, an unlocking signal which is sent by unlocking equipment and carries object information of an unlocking object is received through a near field communication module; when the object information is consistent with preset target object information, generating and displaying a verification picture so that the unlocking object inputs verification information through the verification picture; then, receiving the verification information through the verification picture; and finally, when the verification information is consistent with preset target verification information, executing unlocking operation. In other words, in the application, after the verification is successfully performed by using the near field communication module, the lock is not unlocked directly, but the verification picture is generated and displayed for secondary verification, and the lock is unlocked only when the verification information input by the user through the verification picture is also successfully verified, so that the safety of the door lock is improved.
In another embodiment of the present application, as shown in fig. 2, the S102 may include the following steps:
s201, sending the verification picture to a preset projection device;
s202, controlling the projection device to project the verification picture to a preset area so that the unlocking object passes through the verification picture in the preset area to input verification information.
In the embodiment of the application, the projection device may be preset in the intelligent door lock, or the intelligent door lock may be associated with the projection device in advance, wherein the projection device may include an optical element and a picture display element. After the intelligent door lock generates the verification picture, the verification picture can be sent to the projection device, and the projection device is controlled to project the verification picture to the preset area, so that the unlocking object can input verification information through the verification picture in the preset area.
As shown in fig. 3, which is a schematic diagram illustrating an authentication screen, light from an optical device is irradiated onto a picture display device, and the display device generally uses a transmission type device which transmits light to generate an image, and the light is divided into three primary colors of red, green, and blue, and then projected onto a predetermined area (e.g., a display panel of a door lock) by synthesizing through a prism.
Through the scheme, the verification picture is displayed, so that when a user inputs verification information, the equipment is not abraded, input traces are not easy to leave, and the use safety is improved.
In another embodiment of the present application, the S103 may include the following steps: and identifying operation information input by the unlocking object through the verification picture in the preset area through a preset identification device, and determining the verification information based on the operation information.
In the embodiment of the present application, as shown in fig. 3, an infrared projection device and a camera may be preset on the intelligent door lock, or may be associated with the infrared projection device and the camera. Aiming at a projection type verification picture, when a finger of a user is pressed in a preset area to operate, if a certain number is clicked, infrared laser is reflected to produce a light spot due to the fact that the finger is shielded, at the moment, an image is captured through a camera, the captured image is processed through preset image processing software, the outline of the finger, the position of the finger and the position of the image curved surface distortion can be located, the position of a password input by the user, namely operation information, can be determined, and therefore input verification information can be determined.
Through the scheme, when the user inputs the verification information, the equipment is not abraded, and an input trace is not easy to leave, so that the use safety can be improved.
In another embodiment of the present application, the S102 may further include the following steps:
and sending the verification picture to the unlocking equipment so that the unlocking equipment displays the verification picture, and inputting the verification information into the unlocking object through the verification picture displayed by the unlocking equipment.
In the embodiment of the application, the verification picture can be sent to the unlocking equipment, so that the unlocking equipment can display the verification picture. For example, when the unlocking device is a mobile phone, the mobile phone can be displayed on the display screen after receiving the verification picture, and the scheme can facilitate the operation of a user.
In yet another embodiment of the present application, the method may further comprise the steps of:
step one, when the verification information is inconsistent with preset target verification information, determining that the input is an error input, and recording input time and input times corresponding to the error input.
And step two, when the input times exceed a preset time threshold, sending first prompt information to first management equipment, wherein the first prompt information comprises the input time and the input times, and the first management equipment is used for managing unlocking permission.
In the embodiment of the present application, the first management device is used for managing the unlocking authority, and the first management device and the unlocking device are generally different devices. Specifically, when the verification information is inconsistent with the preset target verification information, it means that the input is an error input, at this time, input time and input times corresponding to the error input are recorded, and when the input times exceed a preset time threshold, first prompt information may be sent to the first management device, where the first prompt information includes the input time and the input times.
As an embodiment, when the user receives the first prompt message through the first management device, the mode of the intelligent door lock can be modified through the first management device, and the intelligent door lock can enter the mode after receiving the mode modified by the user, so that the safety of the intelligent door lock is ensured.
Through this scheme, when other people utilize equipment of unblanking to try to unblank to verify failure many times, intelligent lock can send first suggestion information to first management equipment, in order to indicate that the user has someone to try to unblank, thereby improves the security.
In yet another embodiment of the present application, the method may further comprise the steps of: and when the input times exceed a preset time threshold value, closing the verification picture and closing the near field communication module. According to the scheme, when someone tries to unlock and the verification fails for many times, the verification picture can be closed and the near field communication module can be closed, so that the unlocking is prevented from being tried again, and the safety is improved.
In yet another embodiment of the present application, the method may further comprise the steps of:
step one, when the verification information is inconsistent with preset target verification information, acquiring attribute information of the unlocking object through a preset acquisition device;
and step two, sending the attribute information to a second management device, wherein the second management device is used for managing unlocking authority.
In the embodiment of the application, the acquisition device is an image acquisition device or a sound acquisition device, the attribute information is image information or sound information, and the second management device is used for managing unlocking authority and can be the same device as the first management device. When the verification information is inconsistent with the preset target verification information, the intelligent door lock can acquire the attribute information of the unlocking object through the preset acquisition device and send the attribute information to the second management equipment. Thereby enabling the user to view the attribute information of the person who attempts to unlock through the second management device.
Based on the same technical concept, the embodiment of the present application further provides an unlocking device, as shown in fig. 4, the unlocking device includes:
the signal receiving module 301 is configured to receive an unlocking signal sent by an unlocking device through the near field communication module, where the unlocking signal carries object information of an unlocking object;
a display module 302, configured to generate and display a verification picture when the object information is consistent with preset target object information, so that the unlocking object inputs verification information through the verification picture;
an information receiving module 303, configured to receive the verification information through the verification screen;
and the unlocking module 304 is configured to execute an unlocking operation when the verification information is consistent with preset target verification information.
In a possible embodiment, the display module is specifically configured to:
sending the verification picture to a preset projection device;
and controlling the projection device to project the verification picture to a preset area so that the unlocking object passes through the verification picture in the preset area to input verification information.
In a possible implementation manner, the information receiving module is specifically configured to:
and identifying operation information input by the unlocking object through the verification picture in the preset area through a preset identification device, and determining the verification information based on the operation information.
In one possible embodiment, the display module is further configured to:
and sending the verification picture to the unlocking equipment so that the unlocking equipment displays the verification picture, and inputting the verification information into the unlocking object through the verification picture displayed by the unlocking equipment.
In one possible embodiment, the apparatus further comprises a recording module, configured to:
when the verification information is inconsistent with preset target verification information, determining that the input is an error input, and recording input time and input times corresponding to the error input;
and when the input times exceed a preset time threshold value, sending first prompt information to first management equipment, wherein the first prompt information comprises the input time and the input times, and the first management equipment is used for managing unlocking authority.
In one possible embodiment, the apparatus further comprises a shutdown module configured to:
and when the input times exceed a preset time threshold value, closing the verification picture and closing the near field communication module.
In one possible embodiment, the apparatus further comprises an acquisition module configured to:
when the verification information is inconsistent with preset target verification information, acquiring attribute information of the unlocking object through a preset acquisition device;
and sending the attribute information to a second management device, wherein the second management device is used for managing unlocking authority.
In the embodiment of the application, firstly, an unlocking signal which is sent by unlocking equipment and carries object information of an unlocking object is received through a near field communication module; when the object information is consistent with preset target object information, generating and displaying a verification picture so that the unlocking object inputs verification information through the verification picture; then, receiving the verification information through the verification picture; and finally, when the verification information is consistent with preset target verification information, executing unlocking operation. That is, in the present application, after the verification by the near field communication module is successful, the lock is not directly unlocked, but a verification picture is generated and displayed for secondary verification, and the lock is unlocked only when the verification information input by the user through the verification picture is also successful, thereby improving the security of the door lock.
Based on the same technical concept, the embodiment of the present application further provides an electronic device, as shown in fig. 5, including a processor 111, a communication interface 112, a memory 113, and a communication bus 114, where the processor 111, the communication interface 112, and the memory 113 complete mutual communication through the communication bus 114,
a memory 113 for storing a computer program;
the processor 111, when executing the program stored in the memory 113, implements the following steps:
receiving an unlocking signal sent by unlocking equipment through a near field communication module, wherein the unlocking signal carries object information of an unlocking object;
when the object information is consistent with preset target object information, generating and displaying a verification picture so that the unlocking object inputs verification information through the verification picture;
receiving the verification information through the verification picture;
and when the verification information is consistent with preset target verification information, executing unlocking operation.
In one possible embodiment, the presentation verification screen includes:
sending the verification picture to a preset projection device;
and controlling the projection device to project the verification picture to a preset area so that the unlocking object passes through the verification picture in the preset area to input verification information.
In one possible embodiment, the receiving the verification information through the verification screen includes:
and identifying operation information input by the unlocking object through the verification picture in the preset area through a preset identification device, and determining the verification information based on the operation information.
In one possible embodiment, the presentation verification screen includes:
and sending the verification picture to the unlocking equipment so that the unlocking equipment displays the verification picture, and inputting the verification information into the unlocking object through the verification picture displayed by the unlocking equipment.
In one possible embodiment, the method further comprises:
when the verification information is inconsistent with preset target verification information, determining that the input is an error input, and recording input time and input times corresponding to the error input;
and when the input times exceed a preset time threshold value, sending first prompt information to first management equipment, wherein the first prompt information comprises the input time and the input times, and the first management equipment is used for managing unlocking authority.
In one possible embodiment, the method further comprises:
and when the input times exceed a preset time threshold value, closing the verification picture and closing the near field communication module.
In one possible embodiment, the method further comprises:
when the verification information is inconsistent with preset target verification information, acquiring attribute information of the unlocking object through a preset acquisition device;
and sending the attribute information to a second management device, wherein the second management device is used for managing unlocking authority.
The communication bus mentioned in the electronic device may be a Peripheral Component Interconnect (PCI) bus, an Extended Industry Standard Architecture (EISA) bus, or the like. The communication bus may be divided into an address bus, a data bus, a control bus, etc. For ease of illustration, only one thick line is shown, but this is not intended to represent only one bus or type of bus.
The communication interface is used for communication between the electronic equipment and other equipment.
The Memory may include a Random Access Memory (RAM) or a Non-Volatile Memory (NVM), such as at least one disk Memory. Optionally, the memory may also be at least one memory device located remotely from the processor.
The Processor may be a general-purpose Processor, including a Central Processing Unit (CPU), a Network Processor (NP), and the like; but also Digital Signal Processors (DSPs), Application Specific Integrated Circuits (ASICs), Field Programmable Gate Arrays (FPGAs) or other Programmable logic devices, discrete Gate or transistor logic devices, discrete hardware components.
In yet another embodiment provided by the present application, a computer-readable storage medium is further provided, in which a computer program is stored, and the computer program realizes the steps of any one of the unlocking methods described above when being executed by a processor.
In yet another embodiment provided by the present application, there is also provided a computer program product containing instructions which, when run on a computer, cause the computer to perform any of the unlocking methods of the above embodiments.
In the above embodiments, the implementation may be wholly or partially realized by software, hardware, firmware, or any combination thereof. When implemented in software, may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. When loaded and executed on a computer, cause the processes or functions described in accordance with the embodiments of the application to occur, in whole or in part. The computer may be a general purpose computer, a special purpose computer, a network of computers, or other programmable device. The computer instructions may be stored in a computer readable storage medium or transmitted from one computer readable storage medium to another, for example, from one website site, computer, server, or data center to another website site, computer, server, or data center via wired (e.g., coaxial cable, fiber optic, Digital Subscriber Line (DSL)) or wireless (e.g., infrared, wireless, microwave, etc.). The computer-readable storage medium can be any available medium that can be accessed by a computer or a data storage device, such as a server, a data center, etc., that incorporates one or more of the available media. The usable medium may be a magnetic medium (e.g., floppy Disk, hard Disk, magnetic tape), an optical medium (e.g., DVD), or a semiconductor medium (e.g., Solid State Disk (SSD)), among others.
It is noted that, in this document, relational terms such as "first" and "second," and the like, may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
The above description is merely exemplary of the present application and is presented to enable those skilled in the art to understand and practice the present application. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the application. Thus, the present application is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.

Claims (10)

1. A method of unlocking, the method comprising:
receiving an unlocking signal sent by unlocking equipment through a near field communication module, wherein the unlocking signal carries object information of an unlocking object;
when the object information is consistent with preset target object information, generating and displaying a verification picture so that the unlocking object inputs verification information through the verification picture;
receiving the verification information through the verification picture;
and when the verification information is consistent with preset target verification information, executing unlocking operation.
2. The method of claim 1, wherein the presentation verification screen comprises:
sending the verification picture to a preset projection device;
and controlling the projection device to project the verification picture to a preset area so that the unlocking object passes through the verification picture in the preset area to input verification information.
3. The method of claim 2, wherein the receiving the authentication information via the authentication screen comprises:
and identifying operation information input by the unlocking object through the verification picture in the preset area through a preset identification device, and determining the verification information based on the operation information.
4. The method of claim 1, wherein the presentation verification screen comprises:
and sending the verification picture to the unlocking equipment so that the unlocking equipment displays the verification picture, and inputting the verification information into the unlocking object through the verification picture displayed by the unlocking equipment.
5. The method of claim 1, further comprising:
when the verification information is inconsistent with preset target verification information, determining that the input is an error input, and recording input time and input times corresponding to the error input;
and when the input times exceed a preset time threshold value, sending first prompt information to first management equipment, wherein the first prompt information comprises the input time and the input times, and the first management equipment is used for managing unlocking authority.
6. The method of claim 5, further comprising:
and when the input times exceed a preset time threshold value, closing the verification picture and closing the near field communication module.
7. The method of claim 1, further comprising:
when the verification information is inconsistent with preset target verification information, acquiring attribute information of the unlocking object through a preset acquisition device;
and sending the attribute information to a second management device, wherein the second management device is used for managing unlocking authority.
8. An unlocking device, characterized in that the device comprises:
the signal receiving module is used for receiving an unlocking signal sent by unlocking equipment through the near field communication module, wherein the unlocking signal carries object information of an unlocking object;
the display module is used for generating and displaying a verification picture when the object information is consistent with preset target object information so that the unlocking object inputs verification information through the verification picture;
the information receiving module is used for receiving the verification information through the verification picture;
and the unlocking module is used for executing unlocking operation when the verification information is consistent with preset target verification information.
9. An electronic device is characterized by comprising a processor, a communication interface, a memory and a communication bus, wherein the processor and the communication interface are used for realizing mutual communication by the memory through the communication bus;
a memory for storing a computer program;
a processor for implementing the method steps of any of claims 1 to 7 when executing a program stored in the memory.
10. A computer-readable storage medium, characterized in that a computer program is stored in the computer-readable storage medium, which computer program, when being executed by a processor, carries out the method steps of any one of claims 1 to 7.
CN202210233694.8A 2022-03-10 2022-03-10 Unlocking method and device, electronic equipment and storage medium Pending CN114445939A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210233694.8A CN114445939A (en) 2022-03-10 2022-03-10 Unlocking method and device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210233694.8A CN114445939A (en) 2022-03-10 2022-03-10 Unlocking method and device, electronic equipment and storage medium

Publications (1)

Publication Number Publication Date
CN114445939A true CN114445939A (en) 2022-05-06

Family

ID=81360069

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210233694.8A Pending CN114445939A (en) 2022-03-10 2022-03-10 Unlocking method and device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN114445939A (en)

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120271723A1 (en) * 2011-04-22 2012-10-25 Penilla Angel A Electric vehicle (ev) range extending charge systems, distributed networks of charge kiosks, and charge locating mobile apps
CN103116919A (en) * 2012-12-31 2013-05-22 广州杰赛科技股份有限公司 On-off control system and access control system
CN106327652A (en) * 2016-09-14 2017-01-11 深圳市欧瑞博电子有限公司 System and method for protecting electronic intelligent door locks and fingerprint locks
CN208010099U (en) * 2018-03-21 2018-10-26 邓承泰 A kind of intelligent door lock
CN110287661A (en) * 2019-06-20 2019-09-27 珠海格力电器股份有限公司 The unlocking method and electronic equipment of a kind of electronic equipment
CN110920563A (en) * 2018-09-18 2020-03-27 阿里巴巴集团控股有限公司 Vehicle unlocking method and device and electronic equipment
CN113781686A (en) * 2021-09-10 2021-12-10 青岛海信智慧生活科技股份有限公司 Verification method, generation method and device for temporary password of intelligent door lock
CN113870468A (en) * 2021-12-02 2021-12-31 云丁网络技术(北京)有限公司 Control method and system of intelligent lock

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120271723A1 (en) * 2011-04-22 2012-10-25 Penilla Angel A Electric vehicle (ev) range extending charge systems, distributed networks of charge kiosks, and charge locating mobile apps
CN103116919A (en) * 2012-12-31 2013-05-22 广州杰赛科技股份有限公司 On-off control system and access control system
CN106327652A (en) * 2016-09-14 2017-01-11 深圳市欧瑞博电子有限公司 System and method for protecting electronic intelligent door locks and fingerprint locks
CN208010099U (en) * 2018-03-21 2018-10-26 邓承泰 A kind of intelligent door lock
CN110920563A (en) * 2018-09-18 2020-03-27 阿里巴巴集团控股有限公司 Vehicle unlocking method and device and electronic equipment
CN110287661A (en) * 2019-06-20 2019-09-27 珠海格力电器股份有限公司 The unlocking method and electronic equipment of a kind of electronic equipment
CN113781686A (en) * 2021-09-10 2021-12-10 青岛海信智慧生活科技股份有限公司 Verification method, generation method and device for temporary password of intelligent door lock
CN113870468A (en) * 2021-12-02 2021-12-31 云丁网络技术(北京)有限公司 Control method and system of intelligent lock

Similar Documents

Publication Publication Date Title
KR20200003379A (en) Resource transfer method, fund payment method, and electronic device
CN103907328A (en) Mobile device-based authentication
CN105631254B (en) Unlocking method and tripper
CN106506496A (en) A kind of methods, devices and systems that withdraws the money without card
US20200036525A1 (en) Method for determining approval for access to gate through network, and server and computer-readable recording media using the same
US11915241B2 (en) Systems and methods for the secure entry and authentication of confidential access codes for access to a user device
CN111414605B (en) Unlocking method and device of embedded security unit, electronic equipment and storage medium
US20220076239A1 (en) Delegated administration of permissions using a contactless card
US11301862B2 (en) Secure transfer of tokens between devices
US20170068946A1 (en) User equipment, service providing device, pos terminal, payment system including the same, control method thereof, and non-transitory computer-readable storage medium storing computer program recorded thereon
JP2008199618A (en) Method, system, and computer program for using personal communication device to obtain additional information
US10129266B2 (en) Identity information systems and methods
US11941621B2 (en) Secure authentication based on passport data stored in a contactless card
WO2018098699A1 (en) Transaction processing method and device
US20230185898A1 (en) Systems and methods for authentication code entry using mobile electronic devices
CN116596097A (en) Ticket booking processing method and device based on block chain and electronic equipment
CN114445939A (en) Unlocking method and device, electronic equipment and storage medium
KR101266415B1 (en) System for authorizing electronic payment
CN110766840A (en) Access control password setting method and device
KR101210501B1 (en) System and method for authorizing electronic payment
US9530014B2 (en) Method and a device for making a computer application secure
CN113383527B (en) Method for authenticating terminal user on trusted device
EP4075360A1 (en) Method for controlling a smart card
US20230385418A1 (en) Information processing device, information processing method, program, mobile terminal, and information processing system
CN112862489A (en) Transaction auditing method and device, electronic equipment and computer-readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20220506