CN114463879A - Unlocking method, intelligent terminal and computer readable storage medium - Google Patents

Unlocking method, intelligent terminal and computer readable storage medium Download PDF

Info

Publication number
CN114463879A
CN114463879A CN202210088707.7A CN202210088707A CN114463879A CN 114463879 A CN114463879 A CN 114463879A CN 202210088707 A CN202210088707 A CN 202210088707A CN 114463879 A CN114463879 A CN 114463879A
Authority
CN
China
Prior art keywords
unlocking
unlocked
equipment
broadcast information
intelligent terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210088707.7A
Other languages
Chinese (zh)
Inventor
李重阳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Tuya Information Technology Co Ltd
Original Assignee
Hangzhou Tuya Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Tuya Information Technology Co Ltd filed Critical Hangzhou Tuya Information Technology Co Ltd
Priority to CN202210088707.7A priority Critical patent/CN114463879A/en
Publication of CN114463879A publication Critical patent/CN114463879A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/021Services related to particular areas, e.g. point of interest [POI] services, venue services or geofences
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/06Selective distribution of broadcast services, e.g. multimedia broadcast multicast service [MBMS]; Services to user groups; One-way selective calling services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/80Services using short range communication, e.g. near-field communication [NFC], radio-frequency identification [RFID] or low energy communication

Abstract

The application discloses an unlocking method, an intelligent terminal and a computer readable storage medium, wherein the unlocking method is applied to the intelligent terminal and comprises the following steps: acquiring first broadcast information and second broadcast information sent by equipment to be unlocked based on near field communication; the method comprises the steps that an application program installed on an intelligent terminal is used for sending an unlocking request to a cloud server according to first broadcast information, so that the cloud server generates an unlocking instruction, the unlocking instruction sent by the cloud server is obtained, and the equipment to be unlocked is unlocked according to the unlocking instruction; and restoring the application program by using the second broadcast information in response to the application program entering the background dormant state. Through the mode, the first broadcast information is used as the unlocking information, the second broadcast information is used as the keep-alive tool for preventing the intelligent terminal from being hung in the unlocking process, so that the purpose of unlocking the equipment to be unlocked is achieved, the unlocking flow is optimized, and the unlocking cost is reduced.

Description

Unlocking method, intelligent terminal and computer readable storage medium
Technical Field
The application relates to the technical field of internet of things, in particular to an unlocking method, an intelligent terminal and a computer readable storage medium.
Background
The intelligent home is a product combining modern electronic technology, automation technology and communication technology. The household appliance control system can automatically control and manage household appliances, detect and apply the household environment, and provide safe, comfortable, efficient and convenient learning, living and working environments for residents. Compared with the traditional home, the intelligent home has the traditional living function, and an intelligent concept is provided by using the internet of things technology on the basis, so that the life style of people is optimized, and the work efficiency of people is improved.
In the middle of people's life work has been applied to more and more to intelligent product, the mode such as fingerprint, password, card is also had through bluetooth unblock to opening door of present intelligent lock mostly. The principle of burglary-resisting door unblock at present generally does, when the people is close to the burglary-resisting door, unlocks through modes such as bluetooth through pressing fingerprint, input password or opening mobile device's APP, and whole process is more loaded down with trivial details. The user can only realize the purpose after needing to draw out the mobile device operation, and the user can not recognize the mobile device conveniently when having other objects in the operation recognition process.
Aiming at the problem that manual intervention is needed for unlocking at present, the technical problem to be solved urgently in the industry is to develop a solution for unlocking the anti-theft door based on the Bluetooth in a non-contact manner, and the user experience needs to be further improved.
Disclosure of Invention
In order to solve the above problems, the present application provides an unlocking method, an intelligent terminal, and a computer-readable storage medium, which can optimize an unlocking process of a device to be unlocked and reduce an unlocking cost.
The technical scheme adopted by the application is as follows: an unlocking method is provided, the unlocking method is applied to an intelligent terminal, and the method comprises the following steps: acquiring first broadcast information and second broadcast information sent by equipment to be unlocked based on near field communication; sending an unlocking request to a cloud server by using an application program installed in the intelligent terminal according to the first broadcast information so as to enable the cloud server to generate an unlocking instruction, acquiring the unlocking instruction sent by the cloud server, and unlocking the equipment to be unlocked according to the unlocking instruction; and restoring the application program by using the second broadcast information in response to the application program entering the background dormant state.
Before acquiring first broadcast information and second broadcast information sent by equipment to be unlocked, the method further comprises the following steps: acquiring third broadcast information sent by equipment to be unlocked based on near field communication; analyzing the third broadcast information to obtain equipment information of equipment to be unlocked; performing information authentication on the equipment to be unlocked according to the equipment information so as to identify whether the equipment to be unlocked is legal or not; responding to the successful information authentication, uploading the equipment information to the gateway equipment and/or the cloud server, so that the gateway equipment and/or the cloud server bind the equipment information; and triggering the equipment to be unlocked to join the configured gateway network.
Before acquiring first broadcast information and second broadcast information sent by equipment to be unlocked, the method further comprises the following steps: setting a regional geofence in the application according to the device information;
acquiring first broadcast information and second broadcast information sent by equipment to be unlocked, wherein the acquiring comprises the following steps: in response to entering the area geofence, a synchronous scan of broadcast information is initiated to obtain the first broadcast information and the second broadcast information.
The method includes the steps that an application program installed in an intelligent terminal is used for sending an unlocking request to a cloud server according to first broadcast information, so that the cloud server generates an unlocking instruction, and the method includes the following steps: according to the first broadcast signal, performing communication connection with equipment to be unlocked; the method comprises the steps of obtaining a communication signal transmitted by equipment to be unlocked and determining the signal intensity corresponding to the communication signal; and responding to the situation that the signal intensity is larger than a preset threshold value, and sending an unlocking request to the cloud server so that the cloud server generates an unlocking instruction.
Wherein, according to the first broadcast signal, before carrying out communication connection with the equipment to be unlocked, still include: determining whether the equipment to be unlocked is connected with a gateway network; and responding to the connection gateway network, and sending a network disconnection signal to the equipment to be unlocked so as to enable the equipment to be unlocked to disconnect the gateway network.
Wherein, acquire the unblock instruction that high in the clouds server sent to for waiting to unlock equipment unblock according to the unblock instruction, include: acquiring an unlocking instruction, and generating an unlocking parameter according to the unlocking instruction; and sending the unlocking parameters to the equipment to be unlocked so as to unlock the equipment to be unlocked.
Wherein, after waiting to unlock equipment unblock, still include: acquiring an unlocking success signal sent by equipment to be unlocked; generating an unlocking success indication according to the unlocking success signal; based on the application, an unlocking success indication is displayed.
Wherein, the method further comprises: in response to the situation that the unlocking instruction is not obtained after the first preset time length is exceeded, at least one unlocking request is sent to the cloud server again; and/or in response to the unlocking success signal sent by the equipment to be unlocked is not obtained after the second preset time length is exceeded, at least one unlocking parameter is sent to the equipment to be unlocked again; and/or responding to at least one of the first broadcast information, the second broadcast information, the unlocking instruction, the communication signal strength transmitted by the equipment to be unlocked which is greater than the preset threshold value and the unlocking success signal sent by the equipment to be unlocked which is not acquired after the third preset time length is exceeded, and correspondingly generating an unlocking error indication; based on the application, an unlock error indication is displayed.
Another technical scheme adopted by the application is as follows: the intelligent terminal comprises a processor and a memory connected with the processor; the processor calls the program data stored in the memory to execute the unlocking method.
Another technical scheme adopted by the application is as follows: there is provided a computer readable storage medium having stored therein program data which, when executed by a processor, is adapted to implement the unlocking method as described above.
The unlocking method provided by the application is applied to the intelligent terminal, and comprises the following steps: acquiring first broadcast information and second broadcast information sent by equipment to be unlocked based on near field communication; sending an unlocking request to a cloud server by using an application program installed in the intelligent terminal according to the first broadcast information so as to enable the cloud server to generate an unlocking instruction, acquiring the unlocking instruction sent by the cloud server, and unlocking the equipment to be unlocked according to the unlocking instruction; and restoring the application program by using the second broadcast information in response to the application program entering the background dormant state. Through the method, on one hand, only the acquired first broadcast information is used as unlocking information for acquiring the unlocking instruction from the cloud server, namely, the unlocking is performed through the first broadcast information; on the other hand, the second broadcast information is used as a keep-alive tool for preventing the intelligent terminal from being hung in the unlocking process, namely, the intelligent terminal entering the background dormant state is recovered through the second broadcast information, so that the purpose of unlocking the equipment to be unlocked is achieved, the unlocking flow is optimized, and the unlocking cost is reduced.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts. Wherein:
fig. 1 is a schematic flowchart of a first embodiment of an unlocking method provided in the present application;
FIG. 2 is a schematic flowchart of an embodiment of configuring a device to be unlocked;
FIG. 3 is a schematic diagram of a human-machine interface of an embodiment of setting a regional geofence in an application of a smart terminal;
fig. 4 is a flowchart illustrating an embodiment of causing the cloud server to generate an unlocking instruction;
FIG. 5 is a schematic flow chart diagram illustrating another embodiment of configuring a device to be unlocked;
FIG. 6 is a flowchart illustrating an embodiment of unlocking a device to be unlocked according to an unlock command;
FIG. 7 is a flowchart illustrating an embodiment in which a device to be unlocked sends an unlocking success signal to an intelligent terminal;
fig. 8 is a schematic flowchart of a second embodiment of an unlocking method provided in the present application;
fig. 9 is a schematic structural diagram of an intelligent terminal provided in the present application;
FIG. 10 is a schematic structural diagram of an embodiment of a computer-readable storage medium provided in the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application. It is to be understood that the specific embodiments described herein are merely illustrative of the application and are not limiting of the application. It should be further noted that, for the convenience of description, only some of the structures related to the present application are shown in the drawings, not all of the structures. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
Reference in the application to "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment can be included in at least one embodiment of the application. The appearances of the phrase in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. It is explicitly and implicitly understood by one skilled in the art that the embodiments described herein can be combined with other embodiments.
The steps in the embodiments of the present application are not necessarily processed according to the described step sequence, and may be optionally rearranged in a random manner, or steps in the embodiments may be deleted, or steps in the embodiments may be added according to requirements.
The term "and/or" in embodiments of the present application refers to any and all possible combinations including one or more of the associated listed items. It is also to be noted that: when used in this specification, the term "comprises/comprising" specifies the presence of stated features, integers, steps, operations, elements and/or components but does not preclude the presence or addition of one or more other features, integers, steps, operations, elements and/or components and/or groups thereof.
The terms "first", "second", etc. in this application are used to distinguish between different objects and not to describe a particular order. Furthermore, the terms "include" and "have," as well as any variations thereof, are intended to cover non-exclusive inclusions. For example, a process, method, system, article, or apparatus that comprises a list of steps or elements is not limited to only those steps or elements listed, but may alternatively include other steps or elements not listed, or inherent to such process, method, article, or apparatus.
In addition, although the terms "first", "second", etc. are used several times in this application to describe various operations (or various thresholds or various applications or various instructions or various elements), etc., these operations (or thresholds or applications or instructions or elements) should not be limited by these terms. These terms are only used to distinguish one operation (or threshold or application or instruction or element) from another operation (or threshold or application or instruction or element). For example, the first preset duration may be referred to as a second preset duration, and the second preset duration may also be referred to as a first preset duration, without departing from the scope of the present application, where the first preset duration and the second preset duration are both a time range of the intelligent terminal responding to the task, but they are not the same time range.
The intelligent terminal (e.g., mobile terminal) of the embodiments of the present application may be implemented in various forms. The smart terminal may be a mobile terminal capable of storing information and accessing or transmitting instruction information, such as a collection recognition device (e.g., a video camera and a video recorder), a mobile phone, a smart phone, a notebook computer, a Personal Digital Assistant (PDA), a tablet computer (PAD), and the like, or a fixed terminal capable of storing information and accessing or transmitting instruction information, such as a Digital broadcast transmitter, a Digital TV, a desktop computer, and the like. In the following, it is assumed that the smart terminal is a mobile terminal. However, it will be understood by those skilled in the art that the configuration according to the embodiment of the present application can be applied to a fixed type terminal in addition to elements particularly used for moving purposes.
Referring to fig. 1, fig. 1 is a schematic flowchart of a first embodiment of an unlocking method provided in the present application, where the method is applied to an intelligent terminal, and the method includes:
step 11: and acquiring first broadcast information and second broadcast information sent by the equipment to be unlocked based on the near field communication.
Optionally, the near field communication is a near field communication protocol, such as ethernet, bluetooth, Zigbee, Z-Wave, or the Matter standard supporting IPv6 network, i.e. Project Connected Home over IP (CHIP, now called Matter) and so on. The equipment to be unlocked can be intelligent equipment such as a sweeping robot, a camera, an intelligent television and an intelligent door lock. The intelligent terminal is a mobile terminal which can store network information and be accessed or sent instructions, such as a smart watch, a smart phone, a notebook computer, a Personal Digital Assistant (PDA), a tablet computer (PAD) and the like.
In one embodiment, the short-distance communication protocol mode is bluetooth, the device to be unlocked is an intelligent door lock, and the intelligent terminal is an intelligent mobile phone. In step 11, the mobile phone starts bluetooth scanning to acquire the first broadcast information and the second broadcast information sent by the smart door lock. The first broadcast information is a ble (bluetooth Low energy) signal, and the second broadcast information is an iBeacon signal.
The device to be unlocked is personalized according to the requirements of the customer, so that the device to be unlocked needs to be configured before the method for unlocking the device to be unlocked is applied, namely before the first broadcast information and the second broadcast information sent by the device to be unlocked are acquired.
If the intelligent terminal scans the first broadcast information and the second broadcast information, the system automatically enters a background dormant state because the intelligent terminal is in the same state for a long time, namely, an application program installed on the intelligent terminal is suspended by the system, and an unlocked program enters a pause state. The intelligent terminal wakes up the application program by using the acquired second broadcast information to restore the unlocked program.
Referring to fig. 2, fig. 2 is a schematic flowchart of an embodiment of configuring a device to be unlocked, where before the method is applied to obtain first broadcast information and second broadcast information sent by the device to be unlocked, the method includes:
step 21: and acquiring third broadcast information sent by the equipment to be unlocked based on the near field communication.
Optionally, the near field communication method may be the same as the near field communication method in the foregoing embodiment, and the third broadcast information may be initialized first broadcast information and second broadcast information.
Step 22: and analyzing the third broadcast information to obtain the equipment information of the equipment to be unlocked.
Optionally, the initialized first broadcast information and the initialized second broadcast information are analyzed to obtain the device information of the device to be unlocked.
The device information includes time, date and time zone information (for example, the time is unified to beijing time) of the device to be unlocked, supported communication protocol information (for example, the mate standard supporting the IPv6 network), available node information, and other device information.
Step 23: and performing information authentication on the equipment to be unlocked according to the equipment information so as to identify whether the equipment to be unlocked is legal or not.
Specifically, the intelligent terminal identifies whether the equipment to be unlocked is matched with the self setting according to the equipment information. For example, the intelligent terminal identifies the device information according to the supported communication protocol information (such as the Matter standard supporting IPv6 network). In the process of identifying the equipment information by the intelligent terminal, the intelligent terminal records the ID, the address, the authority information and the like of the equipment to be unlocked, the equipment data is mapped through the ID, the address and the generated secret key of the equipment to be unlocked, and the intelligent terminal authenticates the mapped equipment data according to the existing authentication information, namely the equipment to be unlocked is authenticated to be a legal product to be unlocked which meets the standard. If the information authentication is successful, entering step 24; if the information authentication fails, the process is ended.
Step 24: and responding to the successful information authentication, uploading the equipment information to the gateway equipment and/or the cloud server, so that the gateway equipment and/or the cloud server bind the equipment information.
Specifically, the intelligent terminal responds to the successful information authentication, and sends the permission token and the permission key to the equipment to be distributed so as to authorize the equipment to be distributed. And the intelligent terminal binds the equipment information to accelerate the close-range communication connection speed of the intelligent terminal and the equipment to be unlocked in the subsequent unlocking process, and uploads the equipment information to the gateway equipment and/or the cloud server so that the gateway equipment and/or the cloud server binds the equipment information to accelerate the close-range communication connection speed of the equipment to be unlocked and the gateway equipment and/or the cloud server in the subsequent unlocking process.
Step 25: and triggering the equipment to be unlocked to join the configured gateway network.
Specifically, the gateway device acquires the device information, and triggers the device to be unlocked to join the configured gateway network of the gateway device according to the acquired device information.
Optionally, the gateway device in this embodiment may be a gateway, and may also be a set top box, a router, and other control devices that support a communication protocol (e.g., a Matter standard that supports an IPv6 network).
In another embodiment, after the device to be unlocked joins the configured gateway network and before the method for unlocking the device to be unlocked is applied, that is, before the first broadcast information and the second broadcast information sent by the device to be unlocked are acquired, geographic information also needs to be configured in the intelligent terminal.
Specifically, the intelligent terminal sets a regional geo-fence in an application program of the intelligent terminal according to the device information of the device to be unlocked, so that the intelligent terminal can automatically acquire first broadcast information and second broadcast information sent by the device to be unlocked.
Referring to fig. 3, fig. 3 is a schematic diagram of a human-machine interface of an embodiment of setting a regional geofence in an application of an intelligent terminal. And the man-machine interface of the intelligent terminal displays an application program corresponding to the unlocking method to obtain a display interface. And a GPS positioning map is included in the display interface. The point A is the geographic position of the equipment to be unlocked obtained according to the equipment information of the equipment to be unlocked, and the point B is the current geographic position of the intelligent terminal. In the application program, according to the point A, a user sets a circular area with the radius of 50 meters by taking the point A as a circle center according to the requirement of the user, wherein the circular area is an area geo-fence of the application program, and the distance between the point A and the point B is 21 meters. The user can also adjust the location and size of the geofence through function identification in the return application.
Further, the intelligent terminal obtains the first broadcast information and the second broadcast information sent by the device to be unlocked, and the method specifically includes:
and the intelligent terminal responds to the situation that the intelligent terminal enters the regional geographic fence, and then synchronous scanning broadcast information is started to acquire the first broadcast information and the second broadcast information. The equipment to be unlocked broadcasts the first broadcast information and the second broadcast information in real time or at intervals of a discontinuous time according to the configuration of the equipment to be unlocked.
Step 12: and sending an unlocking request to the cloud server by using the application program installed in the intelligent terminal according to the first broadcast information so as to enable the cloud server to generate an unlocking instruction.
Referring to fig. 4, fig. 4 is a schematic flowchart of an embodiment of generating an unlocking instruction by the cloud server, where step 12 specifically includes the following steps:
step 121: and according to the first broadcast signal, performing communication connection with the equipment to be unlocked.
Specifically, the intelligent terminal is in communication connection with the equipment to be unlocked according to the first broadcast signal. For example, the smart phone establishes a bluetooth connection with the smart door lock according to the ble bluetooth signal sent by the smart door lock.
Step 122: the method comprises the steps of obtaining a communication signal transmitted by equipment to be unlocked, and determining the signal intensity corresponding to the communication signal.
Specifically, an application installed in the intelligent terminal acquires a communication signal transmitted by the device to be unlocked in real time, and determines the signal intensity corresponding to the communication signal.
In one embodiment, the distance calculation formula for the bluetooth signal strength RSSI is:
d=10(ABS(RSSI)-A)/(10×η)
wherein d is distance in m; RSSI is the RSSI signal strength of the Bluetooth, which is a negative number; a is an absolute value of an rssi value when the distance of the equipment to be unlocked is detected to be 1m, eta is an environment attenuation factor, the A and eta values need to be corrected according to different quadrants, and a specific coefficient needs to be acquired and calculated through a large number of experiments.
Step 123: and responding to the situation that the signal intensity is larger than a preset threshold value, and sending an unlocking request to the cloud server so that the cloud server generates an unlocking instruction.
Specifically, when the RSSI of the bluetooth signal strength is greater than a preset threshold, the intelligent terminal sends an unlocking request to the cloud server, so that the cloud server generates an unlocking instruction. And the unlocking request comprises the equipment information of the equipment to be unlocked.
In another embodiment, when the device to be unlocked is unlocked from the intelligent terminal, the device to be unlocked can only be in communication connection with the intelligent terminal, so that the unlocking instruction sent by the cloud server can be acquired more quickly and safely. Namely, the device to be unlocked can only be in network connection with one of the gateway device and the intelligent terminal in the using process.
Referring to fig. 5, fig. 5 is a schematic flowchart of another embodiment of configuring a device to be unlocked, where before the method is applied to an intelligent terminal to perform communication connection with the device to be unlocked according to a first broadcast signal, the method includes:
step 31: and determining whether the equipment to be unlocked is connected with the gateway network.
Specifically, after the intelligent terminal acquires first broadcast information and second broadcast information sent by the equipment to be unlocked, the intelligent terminal determines whether the equipment to be unlocked is connected with the gateway network or not according to the first broadcast signal. The first broadcast signal comprises network information and a network state of the equipment to be unlocked.
Step 32: and responding to the connection gateway network, and sending a network disconnection signal to the equipment to be unlocked so as to enable the equipment to be unlocked to disconnect the gateway network.
Specifically, if the intelligent terminal responds that the equipment to be unlocked is connected with the gateway network, the network disconnection signal is sent to the equipment to be unlocked. The network disconnection signal is used for enabling the equipment to be unlocked to disconnect the gateway network. After the device to be unlocked disconnects the gateway network, the intelligent terminal is in Bluetooth connection with the device to be unlocked according to the first broadcast information. And if the intelligent terminal responds to the equipment to be unlocked and is not connected with the gateway network, the intelligent terminal is directly connected with the equipment to be unlocked through Bluetooth according to the first broadcast information. The above embodiments are referred to as a method for performing bluetooth connection between the intelligent terminal and the device to be unlocked, and details are not repeated here.
Step 13: and acquiring an unlocking instruction sent by the cloud server, and unlocking the equipment to be unlocked according to the unlocking instruction.
Referring to fig. 6, fig. 6 is a schematic flowchart of an embodiment of unlocking an apparatus to be unlocked according to an unlocking instruction, where step 13 specifically includes the following steps:
step 131: and acquiring an unlocking instruction, and generating an unlocking parameter according to the unlocking instruction.
Specifically, the intelligent terminal obtains an unlocking instruction of the device to be unlocked from the cloud server, wherein the unlocking instruction comprises unlocking information of the device to be unlocked. And the intelligent terminal extracts unlocking parameters of the equipment to be unlocked according to the unlocking information.
If the intelligent terminal does not receive the unlocking instruction sent by the cloud server after exceeding the preset first preset time, the intelligent terminal repeatedly sends the unlocking request to the cloud server at least once so as to enhance the reliability of sending the unlocking request and receiving the unlocking instruction. The number of times that the intelligent terminal repeatedly sends the unlocking request to the cloud server can be set through the unlocking application program, such as twice, three times and the like.
Step 132: and sending the unlocking parameters to the equipment to be unlocked so as to unlock the equipment to be unlocked.
Specifically, the intelligent terminal sends the unlocking parameters to the equipment to be unlocked, and the equipment to be unlocked is unlocked according to the unlocking parameters. The specific process of unlocking the device to be unlocked according to the unlocking parameters is the prior art, and is not described herein again.
In another embodiment, after the device to be unlocked is successfully unlocked, an unlocking success signal needs to be sent to the intelligent terminal, so that the user can know that the device to be unlocked is unlocked through the intelligent terminal.
Referring to fig. 7, fig. 7 is a schematic flowchart of an embodiment in which a device to be unlocked sends an unlocking success signal to an intelligent terminal, and the method is applied to successful unlocking of the device to be unlocked and specifically includes the following steps:
step 41: and acquiring an unlocking success signal sent by the equipment to be unlocked.
Step 42: and generating an unlocking success indication according to the unlocking success signal.
Step 43: based on the application, an unlocking success indication is displayed.
Specifically, the intelligent terminal obtains an unlocking success signal to be unlocked and sent. The device to be unlocked further sends an unlocking success signal to the cloud server, so that the cloud server updates the unlocking state of the device to be unlocked. After receiving the unlocking signal, the intelligent terminal generates an unlocking success indication of the equipment to be unlocked and displays the unlocking success indication in an application program of a human-computer interface of the intelligent terminal so as to remind a user that the equipment to be unlocked is unlocked.
If the intelligent terminal does not receive the unlocking success information sent by the equipment to be unlocked beyond the second preset time length, the intelligent terminal sends the unlocking parameters to the equipment to be unlocked once again so as to ensure the reliability of sending the parameters and receiving the information. The number of times that the intelligent terminal repeatedly sends the unlocking parameters to the device to be unlocked can be set by the unlocking application program, such as twice or three times.
In another embodiment, if the intelligent terminal does not receive the unlocking success information sent by the equipment to be unlocked after exceeding a preset third preset time, the intelligent terminal generates an unlocking error indication and displays a popup prompt of the unlocking error on a human-computer interface corresponding to the application program so as to remind a user that the intelligent terminal cannot acquire the unlocking success information of the equipment to be unlocked, so that the user experience is improved.
In another embodiment, if the intelligent terminal does not receive the first broadcast information or the second broadcast information sent by the device to be unlocked after exceeding a preset third preset time, the intelligent terminal generates an unlocking error indication without a broadcast signal and displays a popup prompt of the unlocking error on a human-computer interface corresponding to the application program to remind a user that the intelligent terminal cannot acquire the first broadcast information or the second broadcast information of the device to be unlocked, so as to improve user experience.
In another embodiment, if the intelligent terminal does not receive the unlocking instruction sent by the cloud server after exceeding a preset third preset time, the intelligent terminal generates an unlocking error indication without the unlocking instruction, and displays a popup prompt of the unlocking error on a human-computer interface corresponding to the application program to remind a user that the intelligent terminal cannot acquire the unlocking instruction sent by the cloud server, so as to improve user experience.
In another embodiment, if the intelligent terminal does not detect that the signal intensity of the communication signal transmitted by the device to be unlocked is greater than the preset threshold value after exceeding a preset third preset duration, the intelligent terminal generates an unlocking error indication with insufficient signal intensity, and displays a popup window prompt of the unlocking error on a human-computer interface corresponding to the application program to remind a user that the distance between the intelligent terminal and the device to be unlocked does not meet the unlocking condition, so as to improve user experience.
Referring to fig. 8, fig. 8 is a schematic flowchart of a second embodiment of an unlocking method provided in the present application, where the method includes:
the first step is as follows: the intelligent terminal enters a range of the geo-fence configured according to the equipment to be unlocked so as to trigger the geo-fence. At this moment, the intelligent terminal starts the Bluetooth broadcast and the iBeacon broadcast which scan the equipment to be unlocked simultaneously in the unlocking application program. Before the first step, the intelligent terminal needs to be matched with the equipment to be unlocked and a geographic fence needs to be set.
The second step is that: and responding to the Bluetooth broadcast and the iBeacon broadcast of the equipment to be unlocked scanned by the intelligent terminal, and determining whether the equipment to be unlocked is connected with the gateway network or not by the intelligent terminal according to the Bluetooth broadcast and the iBeacon broadcast. And the intelligent terminal sends a network disconnection instruction to the equipment to be unlocked in response to the fact that the equipment to be unlocked is connected with the gateway network, so that the equipment to be unlocked is disconnected with the gateway network.
If the intelligent terminal scans the Bluetooth broadcast and the iBeacon broadcast, the system automatically enters a dormant state due to the fact that the intelligent terminal is in the same state for a long time, namely the unlocking application program of the intelligent terminal is hung up by the system, and the unlocking program enters a pause state. And the intelligent terminal awakens the unlocking application program by using the acquired iBeacon broadcast so as to restore the unlocking program. Or if the time for scanning the Bluetooth broadcast and the iBeacon broadcast Bluetooth by the intelligent terminal exceeds a preset time threshold, the intelligent terminal displays a popup prompt of scanning error on a human-computer interface corresponding to the unlocking application program so as to remind a user that the intelligent terminal cannot acquire a broadcast signal sent by the equipment to be unlocked.
The third step: the intelligent terminal establishes Bluetooth connection with the equipment to be unlocked according to Bluetooth broadcast and acquires a Bluetooth signal sent by the equipment to be unlocked in real time.
The fourth step: the intelligent terminal determines whether the RSSI value of the Bluetooth signal sent by the unlocking equipment is larger than a preset value or not so as to determine the distance between the intelligent terminal and the equipment to be unlocked. When the RSSI value is not greater than the preset value, the intelligent terminal continues to determine the change of the RSSI value. And when the RSSI value changes to be larger than a preset value, the intelligent terminal sends an unlocking request to the cloud server.
If the time that the RSSI value of the Bluetooth signal inquired by the intelligent terminal changes to be greater than the preset value exceeds the preset time threshold value, the intelligent terminal displays a popup prompt for wrong inquiry on a human-computer interface corresponding to the unlocking program so as to remind a user that the RSSI value of the Bluetooth signal of the equipment to be unlocked cannot be inquired by the intelligent terminal.
The fifth step: and the cloud server sends an unlocking instruction about the equipment to be unlocked to the intelligent terminal according to the unlocking request.
If the intelligent terminal does not receive the unlocking instruction sent by the cloud server after exceeding the preset time threshold, the intelligent terminal sends an unlocking request to the cloud server once again so as to enhance the reliability of sending the request and receiving the instruction. The number of times that the intelligent terminal repeatedly sends the unlocking request to the cloud server can be set through the unlocking application program, such as twice, three times and the like.
And a sixth step: the intelligent terminal analyzes the unlocking parameters of the equipment to be unlocked according to the unlocking instruction and sends the unlocking parameters to the equipment to be unlocked, so that the equipment to be unlocked is unlocked according to the unlocking parameters.
The seventh step: and after the unlocking device is successfully unlocked, successfully unlocking information is respectively sent to the cloud server and the intelligent terminal, and the unlocking process is ended.
If the intelligent terminal does not receive the unlocking success information sent by the equipment to be unlocked after exceeding the preset time threshold, the intelligent terminal sends the unlocking parameters to the equipment to be unlocked once again so as to ensure the reliability of sending the parameters and receiving the information. The number of times that the intelligent terminal repeatedly sends the unlocking parameters to the device to be unlocked can be set by the unlocking application program, such as twice or three times. Or if the intelligent terminal does not receive the unlocking success information sent by the equipment to be unlocked after exceeding a preset time threshold, the intelligent terminal displays a popup prompt of an unlocking error on a human-computer interface corresponding to the unlocking application program so as to remind a user that the intelligent terminal cannot acquire the unlocking success information of the equipment to be unlocked, and therefore user experience is improved.
Different from the prior art, the unlocking method provided by the embodiment is applied to the intelligent terminal, and the unlocking method includes: acquiring first broadcast information and second broadcast information sent by equipment to be unlocked based on near field communication; sending an unlocking request to a cloud server by using an application program installed in the intelligent terminal according to the first broadcast information so as to enable the cloud server to generate an unlocking instruction, acquiring the unlocking instruction sent by the cloud server, and unlocking the equipment to be unlocked according to the unlocking instruction; and restoring the application program by using the second broadcast information in response to the application program entering the background dormant state. Through the method, on one hand, only the acquired first broadcast information is used as unlocking information for acquiring the unlocking instruction from the cloud server, namely, the unlocking is performed through the first broadcast information; the second broadcast information is used as a keep-alive tool for preventing the intelligent terminal from being hung in the unlocking process, namely the intelligent terminal entering the background dormant state is recovered through the second broadcast information, so that the situation that the first broadcast information is acquired only after the second broadcast information needs to be acquired and identified in the prior art is distinguished, the unlocking flow can be optimized, and the unlocking cost is reduced; on the other hand, a retry mechanism is set in each unlocking stage, namely, corresponding information is retransmitted to the device to be unlocked or the cloud server to ensure that corresponding information is obtained, and an application program prompting mechanism is set in each unlocking stage, namely, the intelligent terminal or the device to be unlocked does not complete corresponding tasks within a preset time, and then the user is prompted through the application program, so that the friendliness of the intelligent terminal is enhanced and the user experience is improved.
Referring to fig. 9, fig. 9 is a schematic structural diagram of an intelligent terminal provided by the present application, where the intelligent terminal 100 includes a processor 101 and a memory 102 connected to the processor 101, where the memory 102 stores program data, and the processor 101 calls the program data stored in the memory 102 to execute the unlocking method of the device to be unlocked.
Optionally, in an embodiment, the processor 101 is configured to execute the sequence data to implement the following method: acquiring first broadcast information and second broadcast information sent by equipment to be unlocked based on near field communication; the method comprises the steps that an application program installed on an intelligent terminal is used for sending an unlocking request to a cloud server according to first broadcast information, so that the cloud server generates an unlocking instruction, the unlocking instruction sent by the cloud server is obtained, and the equipment to be unlocked is unlocked according to the unlocking instruction; and restoring the application program by using the second broadcast information in response to the application program entering the background dormant state.
The processor 101 may also be referred to as a Central Processing Unit (CPU). The processor 101 may be an electronic chip having signal processing capabilities. The processor 101 may also be a general purpose processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other programmable logic device, discrete gate or transistor logic, discrete hardware components. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The storage 102 may be a memory bank, a TF card, etc., and may store all information in the smart terminal 100, including input raw data, computer programs, intermediate operation results, and final operation results, all of which are stored in the storage 102. Which stores and retrieves information based on the location specified by the processor 101. With the memory 102, the intelligent terminal 100 has a memory function, and can work normally. The storage 102 of the intelligent terminal 100 may be classified into a main storage (internal storage) and an auxiliary storage (external storage) according to the purpose, and there is a classification method into an external storage and an internal storage. The external memory is usually a magnetic medium, an optical disk, or the like, and can store information for a long period of time. The memory refers to a storage component on the main board, which is used for storing data and programs currently being executed, but is only used for temporarily storing the programs and the data, and the data is lost when the power is turned off or the power is cut off.
In the several embodiments provided in the present application, it should be understood that the disclosed method and apparatus may be implemented in other ways. For example, the above-described embodiment of the intelligent terminal 100 is only illustrative, for example, the correspondence between the broadcast information and the distance information of the device to be unlocked, the sending of the broadcast information of the device to be unlocked, etc. are only one set, and in an actual implementation, there may be another division manner, which may be combined or may be set into another system, or some features may be omitted or not executed.
In addition, in each embodiment of the present application, each functional unit (such as the smart terminal 100, the cloud server, the gateway device, and the like) may be integrated in one processing unit, or each unit may exist alone physically, or two or more units are integrated in one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
Referring to fig. 10, fig. 10 is a schematic structural diagram of an embodiment of a computer-readable storage medium provided by the present application, and the computer-readable storage medium 110 stores therein program instructions 111 capable of implementing all the methods described above.
The unit in which the functional units in the embodiments of the present application are integrated may be stored in the computer-readable storage medium 110 if it is implemented in the form of a software functional unit and sold or used as a separate product. Based on such understanding, the technical solution of the present application may be embodied in the form of a software product, and the computer-readable storage medium 110 includes several instructions in a program instruction 111 to enable a computer device (which may be a personal computer, a system server, or a network device, etc.), an electronic device (such as MP3, MP4, etc., and may also be a mobile terminal such as a mobile phone, a tablet computer, a wearable device, etc., or a desktop computer, etc.), or a processor (processor) to execute all or part of the steps of the method of the embodiments of the present application.
Optionally, in an embodiment, the program instructions 111, when executed by the processor, are configured to implement the following method: acquiring first broadcast information and second broadcast information sent by equipment to be unlocked based on near field communication; sending an unlocking request to a cloud server by using an application program installed in the intelligent terminal according to the first broadcast information so as to enable the cloud server to generate an unlocking instruction, acquiring the unlocking instruction sent by the cloud server, and unlocking the equipment to be unlocked according to the unlocking instruction; and restoring the application program by using the second broadcast information in response to the application program entering the background dormant state.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-readable storage media 110 (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the application. It is to be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by the computer-readable storage medium 110. These computer-readable storage media 110 may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the program instructions 111, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer-readable storage media 110 may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the program instructions 111 stored in the computer-readable storage media 110 produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer-readable storage media 110 may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the program instructions 111 that execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In one embodiment, these programmable data processing devices include a processor and memory thereon. The processor may also be referred to as a CPU (Central Processing Unit). The processor may be an electronic chip having signal processing capabilities. The processor may also be a general purpose processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other programmable logic device, discrete gate or transistor logic, discrete hardware components. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The memory may be a memory stick, TF card, etc. that stores and retrieves information according to the location specified by the processor. The memory is classified into a main memory (internal memory) and an auxiliary memory (external memory) according to the purpose, and also into an external memory and an internal memory. The external memory is usually a magnetic medium, an optical disk, or the like, and can store information for a long period of time. The memory refers to a storage component on the main board, which is used for storing data and programs currently being executed, but is only used for temporarily storing the programs and the data, and the data is lost when the power is turned off or the power is cut off.
The above description is only for the purpose of illustrating embodiments of the present application and is not intended to limit the scope of the present application, and all modifications of equivalent structures and equivalent processes, which are made according to the content of the present specification and the accompanying drawings, or which are directly or indirectly applied to other related technical fields, are also included in the scope of the present application.

Claims (10)

1. An unlocking method is applied to an intelligent terminal and comprises the following steps:
acquiring first broadcast information and second broadcast information sent by equipment to be unlocked based on near field communication;
sending an unlocking request to a cloud server by using an application program installed in the intelligent terminal according to the first broadcast information so as to enable the cloud server to generate an unlocking instruction, acquiring the unlocking instruction sent by the cloud server, and unlocking the equipment to be unlocked according to the unlocking instruction;
and restoring the application program by using the second broadcast information in response to the application program entering a background dormant state.
2. The method of claim 1,
before the obtaining of the first broadcast information and the second broadcast information sent by the device to be unlocked, the method further includes:
acquiring third broadcast information sent by the equipment to be unlocked based on near field communication;
analyzing the third broadcast information to obtain the equipment information of the equipment to be unlocked;
performing information authentication on the equipment to be unlocked according to the equipment information so as to identify whether the equipment to be unlocked is legal or not;
responding to the information authentication success, uploading the equipment information to a gateway device and/or the cloud server, so that the gateway device and/or the cloud server binds the equipment information;
and triggering the equipment to be unlocked to join the configured gateway network.
3. The method of claim 2,
before the obtaining of the first broadcast information and the second broadcast information sent by the device to be unlocked, the method further includes:
setting a regional geofence in the application according to the device information;
the acquiring of the first broadcast information and the second broadcast information sent by the device to be unlocked includes:
in response to entering the regional geofence, initiate a synchronous scan of broadcast information to obtain the first broadcast information and the second broadcast information.
4. The method of claim 1,
the method for sending an unlocking request to a cloud server by using an application installed in the intelligent terminal according to the first broadcast information so as to enable the cloud server to generate an unlocking instruction includes:
according to the first broadcast signal, performing communication connection with the equipment to be unlocked;
acquiring a communication signal transmitted by the equipment to be unlocked, and determining the signal intensity corresponding to the communication signal;
and responding to the situation that the signal intensity is larger than a preset threshold value, and sending the unlocking request to the cloud server so as to enable the cloud server to generate an unlocking instruction.
5. The method of claim 4,
before the communication connection with the device to be unlocked is performed according to the first broadcast signal, the method further includes:
determining whether the equipment to be unlocked is connected with a gateway network;
and responding to the connection of the gateway network, and sending a network disconnection signal to the equipment to be unlocked so as to enable the equipment to be unlocked to disconnect the gateway network.
6. The method of claim 1,
the acquiring the unlocking instruction sent by the cloud server, and unlocking the device to be unlocked according to the unlocking instruction, includes:
acquiring the unlocking instruction, and generating an unlocking parameter according to the unlocking instruction;
and sending the unlocking parameters to the equipment to be unlocked so as to unlock the equipment to be unlocked.
7. The method of claim 6,
after the device to be unlocked is unlocked, the method further comprises the following steps:
acquiring an unlocking success signal sent by the equipment to be unlocked;
generating an unlocking success indication according to the unlocking success signal;
displaying the unlocking success indication based on the application program.
8. The method of claim 1,
the method further comprises the following steps:
in response to the fact that the unlocking instruction is not obtained after the first preset time length is exceeded, at least one time of unlocking request is sent to the cloud server again; and/or
In response to that an unlocking success signal sent by the equipment to be unlocked is not obtained after the unlocking success signal exceeds a second preset time, at least one time of the unlocking parameter is sent to the equipment to be unlocked again; and/or
Responding to at least one of the first broadcast information, the second broadcast information, the unlocking instruction, the signal intensity of the communication signal transmitted by the equipment to be unlocked being greater than a preset threshold value and the unlocking success signal sent by the equipment to be unlocked which is not acquired after a third preset time length is exceeded, and correspondingly generating an unlocking error indication;
displaying the unlock error indication based on the application.
9. An intelligent terminal, characterized in that the intelligent terminal comprises a processor and a memory connected with the processor, wherein the memory stores program data, and the processor calls the program data stored in the memory to execute the unlocking method according to any one of claims 1 to 8.
10. A computer-readable storage medium, in which program instructions are stored, which program instructions, when executed by a processor, are adapted to carry out the unlocking method according to any one of claims 1 to 8.
CN202210088707.7A 2022-01-25 2022-01-25 Unlocking method, intelligent terminal and computer readable storage medium Pending CN114463879A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210088707.7A CN114463879A (en) 2022-01-25 2022-01-25 Unlocking method, intelligent terminal and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210088707.7A CN114463879A (en) 2022-01-25 2022-01-25 Unlocking method, intelligent terminal and computer readable storage medium

Publications (1)

Publication Number Publication Date
CN114463879A true CN114463879A (en) 2022-05-10

Family

ID=81410627

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210088707.7A Pending CN114463879A (en) 2022-01-25 2022-01-25 Unlocking method, intelligent terminal and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN114463879A (en)

Citations (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103532803A (en) * 2013-10-12 2014-01-22 广东美的制冷设备有限公司 Networking method and system for Internet of Things
CN103971435A (en) * 2014-05-22 2014-08-06 广东欧珀移动通信有限公司 Unlocking method, server, mobile terminal, electronic lock and unlocking system
CN105069344A (en) * 2015-07-23 2015-11-18 小米科技有限责任公司 Mobile terminal locking method and apparatus
CN105744479A (en) * 2016-03-09 2016-07-06 深圳微自然创新科技有限公司 Device control method and related device based on self-adaption Geo-fencing technique
CN106127890A (en) * 2016-06-17 2016-11-16 北京千丁互联科技有限公司 Control of bluetooth access equipment, Bluetooth terminal, control of bluetooth access management system and method
CN106507299A (en) * 2016-10-31 2017-03-15 乐视控股(北京)有限公司 A kind of networking control method of terminal, device and electronic equipment
CN107481356A (en) * 2017-06-30 2017-12-15 广州智富电子智能装备有限公司 The acquisition methods and device of a kind of unlocking method of smart lock, unlocking instruction
CN109671192A (en) * 2018-12-12 2019-04-23 歌尔科技有限公司 A kind of method and earphone using earphone unlock intelligent door lock
CN109712278A (en) * 2018-11-27 2019-05-03 深圳市小石安防科技有限公司 Intelligent door lock identity identifying method, system, readable storage medium storing program for executing and mobile terminal
CN109712301A (en) * 2019-02-01 2019-05-03 Oppo广东移动通信有限公司 Method of payment, device, system, electronic equipment and storage medium
CN110276574A (en) * 2019-03-27 2019-09-24 比奥香港有限公司 A kind of safe delivery system, method, cloud server and electronic equipment
CN110740424A (en) * 2019-10-28 2020-01-31 杭州涂鸦信息技术有限公司 networking method and system, readable storage medium and device
CN110995665A (en) * 2019-11-15 2020-04-10 北京小米移动软件有限公司 Network distribution method and device, electronic equipment and storage medium
CN111093192A (en) * 2019-12-24 2020-05-01 珠海格力电器股份有限公司 Device binding method, device, terminal device and network side device
CN112242996A (en) * 2020-09-28 2021-01-19 成都长虹网络科技有限责任公司 Intelligent gateway control method and device and readable storage medium
CN112419543A (en) * 2019-08-22 2021-02-26 国民科技(深圳)有限公司 Unlocking method, mobile terminal, intelligent door lock, unlocking system and storage medium
CN112532607A (en) * 2020-11-23 2021-03-19 杭州涂鸦信息技术有限公司 Intelligent device communication method, system, computer device and readable storage medium
CN113066202A (en) * 2019-12-13 2021-07-02 纳恩博(北京)科技有限公司 Vehicle unlocking method and device
CN113271579A (en) * 2021-05-24 2021-08-17 杭州涂鸦信息技术有限公司 Bluetooth device control method, client, computer device and readable storage medium

Patent Citations (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103532803A (en) * 2013-10-12 2014-01-22 广东美的制冷设备有限公司 Networking method and system for Internet of Things
CN103971435A (en) * 2014-05-22 2014-08-06 广东欧珀移动通信有限公司 Unlocking method, server, mobile terminal, electronic lock and unlocking system
CN105069344A (en) * 2015-07-23 2015-11-18 小米科技有限责任公司 Mobile terminal locking method and apparatus
CN105744479A (en) * 2016-03-09 2016-07-06 深圳微自然创新科技有限公司 Device control method and related device based on self-adaption Geo-fencing technique
CN106127890A (en) * 2016-06-17 2016-11-16 北京千丁互联科技有限公司 Control of bluetooth access equipment, Bluetooth terminal, control of bluetooth access management system and method
CN106507299A (en) * 2016-10-31 2017-03-15 乐视控股(北京)有限公司 A kind of networking control method of terminal, device and electronic equipment
CN107481356A (en) * 2017-06-30 2017-12-15 广州智富电子智能装备有限公司 The acquisition methods and device of a kind of unlocking method of smart lock, unlocking instruction
CN109712278A (en) * 2018-11-27 2019-05-03 深圳市小石安防科技有限公司 Intelligent door lock identity identifying method, system, readable storage medium storing program for executing and mobile terminal
CN109671192A (en) * 2018-12-12 2019-04-23 歌尔科技有限公司 A kind of method and earphone using earphone unlock intelligent door lock
CN109712301A (en) * 2019-02-01 2019-05-03 Oppo广东移动通信有限公司 Method of payment, device, system, electronic equipment and storage medium
CN110276574A (en) * 2019-03-27 2019-09-24 比奥香港有限公司 A kind of safe delivery system, method, cloud server and electronic equipment
CN112419543A (en) * 2019-08-22 2021-02-26 国民科技(深圳)有限公司 Unlocking method, mobile terminal, intelligent door lock, unlocking system and storage medium
CN110740424A (en) * 2019-10-28 2020-01-31 杭州涂鸦信息技术有限公司 networking method and system, readable storage medium and device
CN110995665A (en) * 2019-11-15 2020-04-10 北京小米移动软件有限公司 Network distribution method and device, electronic equipment and storage medium
CN113066202A (en) * 2019-12-13 2021-07-02 纳恩博(北京)科技有限公司 Vehicle unlocking method and device
CN111093192A (en) * 2019-12-24 2020-05-01 珠海格力电器股份有限公司 Device binding method, device, terminal device and network side device
CN112242996A (en) * 2020-09-28 2021-01-19 成都长虹网络科技有限责任公司 Intelligent gateway control method and device and readable storage medium
CN112532607A (en) * 2020-11-23 2021-03-19 杭州涂鸦信息技术有限公司 Intelligent device communication method, system, computer device and readable storage medium
CN113271579A (en) * 2021-05-24 2021-08-17 杭州涂鸦信息技术有限公司 Bluetooth device control method, client, computer device and readable storage medium

Similar Documents

Publication Publication Date Title
CN105138254B (en) Electronic equipment close to unlock and lock operation
CN104866750B (en) Using startup method and apparatus
CN110535732B (en) Equipment control method and device, electronic equipment and storage medium
CN108462697B (en) Data processing method and device, electronic equipment and computer readable storage medium
CN103617659A (en) Wireless unlocking method
CN104635539A (en) Intelligent hardware remote voice security control method and system thereof
CN104346548A (en) Wearable equipment and authentication method thereof
CN109361642B (en) Remote authorization unlocking method and system
KR20200132942A (en) Method for quickly opening an application or application function, and a terminal
CN109979047B (en) Multi-network intelligent door lock control method, storage medium, controller and fingerprint lock
CN110166439B (en) Equipment sharing method, terminal, router and server
CN107979830B (en) Bluetooth connection method, device, equipment and storage medium for intelligent rearview mirror
CN110335386B (en) Identity authentication method, device, terminal and storage medium
CN110932944A (en) Method and system for controlling intelligent household equipment by visitor terminal
US20160065383A1 (en) Home control gateway and gateway connection method thereof
CN109816830B (en) Unlocking method and device
CN106656985B (en) Backup account login method, device and system
CN108156537B (en) Remote operation method of mobile terminal and mobile terminal
CN107396283A (en) A kind of router wireless connection authentication method and system
CN110335378B (en) Unlocking mode distribution method, device and system
CN107580132B (en) Information sending method, information sending device, storage medium and electronic equipment
CN105227579A (en) Access rights method to set up and device
CN103345828A (en) Method and system for controlling computer through intelligent terminal
CN111966991A (en) Equipment unlocking method, device, equipment and storage medium
CN108665595B (en) Intelligent visual access control system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination