CN114582053A - Control method and device of intelligent lock, electronic equipment and storage medium - Google Patents
Control method and device of intelligent lock, electronic equipment and storage medium Download PDFInfo
- Publication number
- CN114582053A CN114582053A CN202210179681.7A CN202210179681A CN114582053A CN 114582053 A CN114582053 A CN 114582053A CN 202210179681 A CN202210179681 A CN 202210179681A CN 114582053 A CN114582053 A CN 114582053A
- Authority
- CN
- China
- Prior art keywords
- intelligent lock
- target object
- determining
- security level
- lock
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 53
- 238000011217 control strategy Methods 0.000 claims abstract description 86
- 230000006870 function Effects 0.000 claims description 78
- 230000015654 memory Effects 0.000 claims description 35
- 230000001360 synchronised effect Effects 0.000 description 5
- 238000004891 communication Methods 0.000 description 4
- 238000010586 diagram Methods 0.000 description 4
- 238000012545 processing Methods 0.000 description 4
- 230000008859 change Effects 0.000 description 3
- 206010000369 Accident Diseases 0.000 description 1
- 230000004913 activation Effects 0.000 description 1
- 238000003491 array Methods 0.000 description 1
- 230000036772 blood pressure Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000008569 process Effects 0.000 description 1
- 239000007787 solid Substances 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00309—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07C—TIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
- G07C9/00—Individual registration on entry or exit
- G07C9/00174—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
- G07C9/00563—Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys using personal physical data of the operator, e.g. finger prints, retinal images, voicepatterns
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Lock And Its Accessories (AREA)
Abstract
The embodiment of the invention relates to a control method and a control device of an intelligent lock, electronic equipment and a storage medium, wherein the control method comprises the following steps: determining the opening state of a safety lock function in the intelligent lock; acquiring information of at least one target terminal, wherein the target terminal is located in a sensing range of the intelligent lock; determining the security level of at least one target object based on the information of at least one target terminal, wherein the target object is an object carrying the target terminal currently; determining a corresponding control strategy based on the opening state of the safety lock function and the safety level of at least one target object; and controlling the intelligent lock according to the control strategy. Therefore, the safety lock function opening state in the intelligent lock does not need to be changed frequently while the safety of the person under guardianship is guaranteed.
Description
Technical Field
The embodiment of the invention relates to the technical field of control, in particular to a control method and device of an intelligent lock, electronic equipment and a storage medium.
Background
In modern society, intelligent locks are increasingly popular, wherein many intelligent locks have a safety lock function to guarantee the safety of people under guardianship, such as children or the old.
The existing intelligent lock realizes the safety lock function basically by setting the opening state of the safety lock function through a function key on the intelligent lock or at a mobile phone application end. When the safety lock function is opened, the lock cannot be unlocked indoors, so that the lock cannot be unlocked only by manually closing the safety lock function in a scene that a guardian accompanies to unlock the lock; if the safety lock function is not opened, the safety of the person under guardianship cannot be guaranteed.
Therefore, how to ensure the safety of the person under guardianship and not need to frequently change the opening state of the safety lock function in the intelligent lock is a technical problem which needs to be solved at present.
Disclosure of Invention
In view of this, in order to solve the technical problem that the opening state of the safety lock function in the intelligent lock does not need to be frequently changed while the safety of the person under guardianship cannot be guaranteed in the prior art, embodiments of the present invention provide a control method and apparatus for the intelligent lock, an electronic device, and a storage medium.
In a first aspect, an embodiment of the present invention provides a method for controlling an intelligent lock, including:
determining the opening state of a safety lock function in the intelligent lock;
acquiring information of at least one target terminal, wherein the target terminal is located in a sensing range of the intelligent lock;
determining the security level of at least one target object based on the information of at least one target terminal, wherein the target object is an object carrying the target terminal currently;
determining a corresponding control strategy based on the opening state of the safety lock function and the safety level of at least one target object;
and controlling the intelligent lock according to the control strategy.
In a possible embodiment, the determining a security level of at least one target object based on information of at least one target terminal includes:
determining whether the information of the target terminal comprises living body information or not for each target terminal;
and under the condition that the information of the target terminal comprises living body information, determining an object carrying the target terminal as a target object, and searching a preset corresponding relation between a terminal identifier and a security level based on the terminal identifier in the information of the target terminal to obtain the security level of the target object.
In one possible embodiment, the determining the corresponding control policy based on the unlock state of the security lock function and the security level of the at least one target object includes:
if the opening state of the safety lock function is opened, determining whether a target object with a first safety level exists in a sensing range of the intelligent lock;
if the target object with the first security level exists, determining whether the target object with the second security level exists in the sensing range of the intelligent lock; if the target object with the second security level exists, determining that the control strategy of the intelligent lock is unlocking; if the target object with the second security level does not exist, determining that the control strategy of the intelligent lock is to keep locking;
and if the target object with the first security level does not exist, determining that the control strategy of the intelligent lock is unlocking.
In one possible embodiment, the determining the corresponding control policy based on the enabling state of the security lock function and the security level of the at least one target object comprises:
if the unlocking state of the safety lock function is not unlocked, determining whether a target object with a first safety level exists in a sensing range of the intelligent lock;
if the target object with the first security level exists, determining that the control strategy of the intelligent lock is to keep locking;
and if the target object with the first security level does not exist, determining that the control strategy of the intelligent lock is unlocking.
In one possible embodiment, the method further comprises:
if the target object with the second security level does not exist, sending an unlocking request to a preset client;
if the unlocking instruction from the preset client is not received within a first preset time length, the step of determining that the control strategy of the intelligent lock is to keep locking is executed;
and if the unlocking instruction from the preset client is received within a first preset time, determining that the control strategy of the intelligent lock is unlocking.
In one possible embodiment, the method further comprises:
if the target object with the first security level exists, sending an unlocking request to a preset client;
if the unlocking instruction from the preset client is not received within a second preset time length or the locking instruction from the preset client is received, executing the step of determining that the control strategy of the intelligent lock is to keep locking;
and if the unlocking instruction from the preset client is received within a second preset time, determining that the control strategy of the intelligent lock is unlocking.
In one possible embodiment, the method further comprises:
and when the unlocking operation of the intelligent lock is detected, the unlocking state of the safety lock function in the intelligent lock is determined, and all the following steps are executed.
In a second aspect, an embodiment of the present invention provides a control device for an intelligent lock, including:
the state determining module is used for determining the opening state of the safety lock function in the intelligent lock;
the intelligent lock comprises an information acquisition module, a storage module and a control module, wherein the information acquisition module is used for acquiring information of at least one target terminal, and the target terminal is positioned in a sensing range of the intelligent lock;
the level determining module is used for determining the security level of at least one target object based on the information of at least one target terminal, wherein the target object is an object carrying the target terminal currently;
the strategy determination module is used for determining a corresponding control strategy based on the opening state of the safety lock function and the safety level of at least one target object;
and the control module is used for controlling the intelligent lock according to the control strategy.
In a third aspect, an embodiment of the present invention provides an electronic device, including: a processor and a memory, wherein the processor is configured to execute a control program of the smart lock stored in the memory to implement the control method of the smart lock according to any one of the first aspect.
In a fourth aspect, an embodiment of the present invention provides a storage medium, where the storage medium stores one or more programs, and the one or more programs are executable by one or more processors to implement the method for controlling an intelligent lock according to any one of the first aspect.
According to the technical scheme provided by the embodiment of the invention, the information of at least one target terminal in a sensing range of the intelligent lock is obtained by determining the opening state of the safety lock function in the intelligent lock, the security level of at least one target object is determined based on the information of at least one target terminal, then, a corresponding control strategy is determined based on the opening state of the safety lock function and the security level of the at least one target object, and finally, the intelligent lock is controlled according to the currently determined control strategy. The corresponding control strategy is determined by combining the security level of the target object and the opening state of the security lock function, so that the unlocking can be realized without closing the security lock function of the intelligent lock under the condition that the security lock function is opened and the security risk does not exist according to the security level of the object, and the locking can be kept under the condition that the security risk exists according to the security level of the object under the condition that the security lock function is closed, so that the security of the person under guardianship is effectively guaranteed. Therefore, the technical scheme provided by the embodiment of the invention can ensure the safety of the person under guardianship and does not need to frequently change the opening state of the safety lock function in the intelligent lock.
Drawings
Fig. 1 is a flowchart of an embodiment of a control method of an intelligent lock according to an embodiment of the present invention;
FIG. 2 is a flowchart illustrating an embodiment of a method for controlling an intelligent lock according to another embodiment of the present invention;
FIG. 3 is a flowchart illustrating a control method of an intelligent lock according to another embodiment of the present invention;
FIG. 4 is a flowchart illustrating a control method of an intelligent lock according to another embodiment of the present invention;
fig. 5 is a flowchart of an embodiment of a control method of an intelligent lock according to an embodiment of the present invention;
fig. 6 is a block diagram of an embodiment of a control device of an intelligent lock according to an embodiment of the present invention;
fig. 7 is a schematic structural diagram of an electronic device according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The following further explains the control method of the intelligent lock provided by the present invention with specific embodiments in conjunction with the accompanying drawings, and the embodiments do not limit the embodiments of the present invention.
Referring to fig. 1, a flowchart of an embodiment of a control method of an intelligent lock according to an embodiment of the present invention is provided. As shown in fig. 1, the method may include the steps of:
The safety lock function is a function provided in an intelligent lock for securing the safety of a person under guardianship, such as a child or an old person. The unlocked state of the safety lock function includes: opened and unopened.
102, acquiring information of at least one target terminal, wherein the target terminal is in a sensing range of the intelligent lock.
In the embodiment of the present invention, the terminal refers to a terminal that can be carried by a user, and may be, for example, a smart phone, a smart watch, or a smart bracelet. In addition, in the embodiment of the present invention, the terminal can perform near field communication with the smart lock, so that when the terminal enters a sensing range of the smart lock, the smart lock can sense the terminal and acquire information of the terminal (for convenience of description, the terminal in the sensing range of the smart lock is referred to as a target terminal).
Optionally, the terminal and the smart lock perform Near Field Communication based on an NFC (Near Field Communication) technology, that is, both the terminal and the smart lock have an NFC function.
Optionally, the information of the terminal may include an identifier of the target terminal, location information of the terminal, and the like.
Optionally, when the terminal is a terminal with a data acquisition function, such as a smart watch or a smart bracelet, and is worn by an object, the information of the terminal may further include data acquired by the terminal, such as a heart rate and a blood pressure of the object wearing the terminal.
And 103, determining the security level of at least one target object based on the information of at least one target terminal, wherein the target object is an object carrying the target terminal currently.
In the embodiment of the invention, the security level can be set for the object in advance. Optionally, the security level includes a first security level and a second security level, where the first security level is higher than the second security level, where a high security level means that it is more necessary to improve security protection for the object at that level. For example, a first security level may be set for children or elderly people, and a second security level may be set for adults (adults herein do not include elderly people).
As an optional implementation manner, terminals and security levels associated with different objects may be set through a mobile phone APP (Application) corresponding to the smart lock. Specifically, the object can log in an APP corresponding to the intelligent lock at the mobile phone end, and data such as the corresponding relation between the terminal identifier and the security level of the terminal associated with one or more objects is input into the APP. And then, the APP sends the read data such as the corresponding relation between the terminal identification and the security level of the terminal associated with the one or more objects to the intelligent lock, and the intelligent lock stores the received data locally.
Based on the above description, in this step 103, the smart lock may determine the security level of the at least one target object based on the information of the at least one target terminal. Here, the target object is an object carrying the target terminal, and is not an object related to the target terminal. For example, in a case where a target terminal is merely placed within a sensible range of the smart lock and is not carried by an object, the object associated with the target terminal cannot be a target object.
Specifically, it may be determined, for each target terminal, whether living body information is included in the information of the target terminal, and in a case where the living body information is included in the information of the target terminal, it means that the target terminal is currently carried by the object, and thus the object carrying the target terminal may be determined as the target object. And then, searching a preset corresponding relation between the terminal identification and the security level based on the terminal identification included in the information of the target terminal to obtain the security level of the target object.
In addition, when the information of the target terminal does not include the living body information, it means that the target terminal is not currently carried by the subject, and the information of the target terminal may be discarded.
And 104, determining a corresponding control strategy based on the opening state of the safety lock function and the safety level of at least one target object.
And 105, controlling the intelligent lock according to the control strategy.
As can be seen from the description of step 104 and step 105, in the embodiment of the present invention, the smart lock is not controlled based on the unlocking state of the security lock function only, but is controlled based on the unlocking state of the security lock and the security level of the at least one target object.
As to how to determine the control strategy of the smart lock based on the unlocking status of the security lock and the security level of the at least one target object, the following description is made by the embodiments shown in fig. 2 and 3, and will not be detailed here.
So far, the description about the flow shown in fig. 1 is completed.
As can be seen from the flow shown in fig. 1, in the technical solution provided by the embodiment of the present invention, by determining the unlocking state of the security lock function in the smart lock, information of at least one target terminal within a sensing range of the smart lock is obtained, the security level of at least one target object is determined based on the information of the at least one target terminal, then, a corresponding control policy is determined based on the unlocking state of the security lock function and the security level of the at least one target object, and finally, the smart lock is controlled according to the currently determined control policy. The corresponding control strategy is determined by combining the security level of the target object and the opening state of the security lock function, so that the unlocking can be realized without closing the security lock function of the intelligent lock under the condition that the security lock function is opened and the security risk does not exist according to the security level of the object, and the locking can be kept under the condition that the security risk exists according to the security level of the object under the condition that the security lock function is closed, so that the security of the person under guardianship is effectively guaranteed. Therefore, the technical scheme provided by the embodiment of the invention can ensure the safety of the person under guardianship and does not need to frequently change the opening state of the safety lock function in the intelligent lock.
Referring to fig. 2, a flowchart of another embodiment of a method for controlling an intelligent lock according to an embodiment of the present invention is provided. As shown in fig. 2, the method may include the steps of:
Step 202, determining whether a target object with a second security level exists in a sensible range of the intelligent lock; if the target object with the second security level exists, executing step 203; if there is no target object with the second security level, step 204 is executed.
And step 203, determining that the control strategy of the intelligent lock is unlocking.
And step 204, determining the control strategy of the intelligent lock to be keeping locking.
Step 201 to step 204 are collectively described below:
in the embodiment of the invention, when the opening state of the safety lock function is opened, whether the target object with the first safety level exists in the sensible range of the intelligent lock can be determined according to the safety level of at least one target object.
If the target object with the first security level exists, whether the target object with the second security level exists in the sensing range of the intelligent lock is continuously determined. If the target object with the second security level exists, the fact that the target object with the first security level wants to unlock along with the target object with the second security level means that the control strategy of the intelligent lock is determined to be unlocking; if the target object with the second security level does not exist, the target object with the first security level currently wants to unlock the lock independently, and in order to guarantee the security of the target object with the first security level, the control strategy of the intelligent lock can be determined to be keeping the lock closed.
And if the target object with the first security level does not exist, determining that the control strategy of the intelligent lock is unlocking.
So far, the description about the flow shown in fig. 2 is completed.
As can be seen from the process shown in fig. 2, according to the technical solution provided in the embodiment of the present invention, when the security lock function is in the unlocked state, if only the target object with the first security level exists around the smart lock, that is, the target object with the first security level currently wants to unlock alone, then, to ensure the security of the target object with the first security level, the smart lock is controlled to remain locked, and if not only the target object with the first security level but also the target object with the second security level exists around the smart lock, that is, the target object with the first security level currently wants to unlock with the target object with the second security level, at this time, the security of the target object with the first security level is ensured, and the smart lock is controlled to unlock, which does not need to turn off the security lock function of the smart lock, thereby ensuring the security of the person under surveillance, and the opening state of the safety lock function in the intelligent lock does not need to be changed frequently.
Referring to fig. 3, a flowchart of another embodiment of a method for controlling an intelligent lock according to an embodiment of the present invention is provided. As shown in fig. 3, the method may include the steps of:
And step 303, determining that the control strategy of the intelligent lock is unlocking.
The following describes steps 301 to 303 collectively:
in the embodiment of the invention, when the opening state of the safety lock function is not opened, whether the target object with the first safety level exists in the sensing range of the intelligent lock can be determined according to the safety level of at least one target object.
If the target object with the first security level exists, the target object currently with the first security level is meant to be unlocked, and in order to guarantee the security of the target object with the first security level, the control strategy of the intelligent lock can be determined to be keeping the lock closed.
And if the target object with the first security level does not exist, determining that the control strategy of the intelligent lock is unlocking.
So far, the description about the flow shown in fig. 3 is completed.
As can be seen from the flow shown in fig. 3, according to the technical solution provided in the embodiment of the present invention, when the unlocking state of the safety lock function is not unlocked, if a target object with the first security level exists around the intelligent lock, that is, if a target object with the first security level wants to unlock, the intelligent lock is controlled to be kept locked in order to ensure the security of the target object with the first security level, and if a target object with the first security level does not exist around the intelligent lock, the intelligent lock is directly controlled to unlock. Therefore, under the condition that the safety lock function is not opened, the safety of the person under guardianship can be guaranteed, and the opening state of the safety lock function does not need to be changed frequently.
Referring to fig. 4, a flowchart of another embodiment of a method for controlling an intelligent lock according to an embodiment of the present invention is provided. As shown in fig. 4, the method may include the steps of:
For the detailed description of steps 401 to 406, reference may be made to the related description in the above embodiments, and details are not repeated herein.
And step 409, determining that the control strategy of the intelligent lock is unlocking.
And step 410, determining the control strategy of the intelligent lock to be keeping the lock closed.
And step 411, controlling the intelligent lock according to the control strategy.
The following is a unified description of steps 407 to 411:
in one embodiment, if the target object of the first security level exists and the target object of the second security level does not exist in the unlocked state of the security lock function, it means that the target object of the first security level is to be unlocked alone, and at this time, in order to ensure the security of the target object of the first security level and avoid that the target object of the first security level cannot exit in a special situation (e.g., an emergency fire), an unlocking request may be sent to a predetermined client.
Then, if the unlocking instruction from the preset client is not received within a first preset time length, the target object with the first security level is not allowed to be unlocked at this time, and the step of determining the control strategy of the intelligent lock as the step of keeping the lock closed can be executed; if the unlocking instruction from the preset client is received within the first preset time length, the target object with the first security level is allowed to be unlocked at this time, and the control strategy of the intelligent lock can be determined to be unlocking.
The preset client can be set by the actual use object of the intelligent lock. For example, a terminal associated with a locally stored target object with a second security level or a corresponding APP binding the smart lock is selected.
The first preset time period can also be set by the actual use object of the intelligent lock or a designer. For example 5 seconds or 10 seconds. The embodiment of the present invention is not limited thereto.
To facilitate understanding of the technical solution illustrated in fig. 4, the following application scenarios are shown:
as an exemplary application scenario, the object with the first security level may be a child, the object with the second security level may be a parent, and the terminal refers to a smart watch.
In practice, the situation of unlocking the smart lock may include, but is not limited to, the following situations:
in the first case, only parents unlock the lock;
in the second case, only children unlock the lock;
the situation is that only children unlock, but a parent smart watch exists in the sensing range of the smart lock, but the parent does not exist;
and in case four, the child and the parent unlock together.
In this case, the smart lock may only acquire information of the smart watch carried by the parent, and the information includes living body information, so that the smart lock may determine the parent as the target object, and search for a correspondence between a preset terminal identifier and a security level based on the terminal identifier included in the smart watch information, and obtain that the security level of the target object is the second security level. Therefore, the control strategy of the intelligent lock is determined to be unlocking, and finally the intelligent lock is controlled according to the control strategy.
In the second case, the smart lock can only obtain information of the smart watch carried by the child, and the information includes living body information, so that the smart lock can determine the child as the target object, and search for a corresponding relationship between a preset terminal identifier and a security level based on the terminal identifier included in the information of the smart watch, and the security level of the target object is the first security level. Then sending an unlocking request to the mobile phone APP of the parent, and if an unlocking instruction from the mobile phone APP of the parent is received within 5 seconds, determining that the control strategy of the intelligent lock is unlocking; and if the unlocking instruction from the mobile phone APP of the parent is not received within 5 seconds, determining that the control strategy of the intelligent lock is to keep the lock closed. And finally, controlling the intelligent lock according to the control strategy.
Under the third condition, the intelligent lock can acquire information of the intelligent watch carried by the child and information of the intelligent watch associated with the parent, but only the information of the intelligent watch of the child contains living body information, and the information of the intelligent watch of the parent does not contain the living body information, so that the intelligent lock only determines the child as a target object, and searches for a corresponding relation between a preset terminal identifier and a security level based on the terminal identifier contained in the information of the intelligent watch, and the security level of the target object is the first security level. Then sending an unlocking request to the mobile phone APP of the parent, and if an unlocking instruction from the mobile phone APP of the parent is received within 5 seconds, determining that the control strategy of the intelligent lock is unlocking; and if the unlocking instruction from the mobile phone APP of the parent is not received within 5 seconds, determining that the control strategy of the intelligent lock is to keep locking. And finally, controlling the intelligent lock according to the control strategy.
Under the fourth condition, the intelligent lock can acquire the information of the intelligent watch carried by the child and the information of the intelligent watch carried by the parent, and the information contains living body information, so that the intelligent lock can determine the child and the parent as a target object, and the corresponding relation between the preset terminal identifier and the security level is searched based on the terminal identifier included in the information of the intelligent watch, the security level of the child is obtained as the first security level, and the security level of the parent is obtained as the second security level. Therefore, the control strategy of the intelligent lock is determined to be unlocking, and finally the intelligent lock is controlled according to the control strategy.
So far, the description about the flow shown in fig. 4 is completed.
As can be seen from the flow shown in fig. 4, according to the technical solution provided by the embodiment of the present invention, when the unlocking state of the security lock function is already unlocked, if only the target object with the first security level exists around the smart lock, an unlocking request is sent to the preset client. If the unlocking instruction from a preset client is not received within a first preset time length, executing a step of determining that the control strategy of the intelligent lock is to keep locking; and if the unlocking instruction from the preset client is received within the first preset time, determining that the control strategy of the intelligent lock is unlocking. And finally, controlling the intelligent lock according to the control strategy. By additionally sending the unlocking request and the like, the early warning can be provided for the situation that the target object with the first security level is unlocked independently, the security of the intelligent lock is improved, and meanwhile, the target object with the first security level can be unlocked independently under the allowed situation, so that the intelligent lock is more humanized to use.
Referring to fig. 5, a flowchart of an embodiment of a control method of an intelligent lock according to an embodiment of the present invention is provided. As shown in fig. 5, the method may include the steps of:
For the detailed description of steps 501 to 505, reference may be made to the related description in the above embodiments, which is not repeated herein.
And step 506, sending an unlocking request to a preset client.
And step 508, determining that the control strategy of the intelligent lock is unlocking.
And step 510, controlling the intelligent lock according to the control strategy.
The following is a general description of steps 506 to 510:
in an embodiment, when the security lock function is not turned on, if there is a target object with the first security level, it means that the target object with the first security level wants to unlock, and at this time, in order to ensure the security of the target object with the first security level and avoid that the target object with the first security level cannot exit in a special situation (e.g. fire accident), an unlocking request is sent to a preset client.
Then, if an unlocking instruction from the preset client is received within a second preset time, it means that the target object with the first security level is allowed to be unlocked this time, and at this time, it can be determined that the control strategy of the intelligent lock is unlocking; if the unlocking instruction from the preset client is not received within the second preset time length or the locking instruction from the preset client is received, it means that the target object with the first security level is not allowed to be unlocked at this time, and at this time, the step of determining the control strategy of the intelligent lock as the locking keeping step can be executed.
The second preset time period can be set by an actual use object of the intelligent lock or a designer. For example 5 seconds or 10 seconds. The embodiment of the present invention is not limited thereto.
To facilitate understanding of the technical solution illustrated in fig. 5, the following description is made with reference to the application scenario shown in fig. 4:
in the above situation, the smart lock may only acquire information of the smart watch carried by the parent, and the information includes living body information, so that the smart lock may determine the parent as the target object, and search for a corresponding relationship between a preset terminal identifier and a security level based on the terminal identifier included in the smart watch information, and obtain that the security level of the target object is the second security level. Therefore, the control strategy of the intelligent lock is determined to be unlocking, and finally the intelligent lock is controlled according to the control strategy.
In the second case, the smart lock can only obtain information of the smart watch carried by the child, and the information includes living body information, so that the smart lock can determine the child as the target object, and search for a corresponding relationship between a preset terminal identifier and a security level based on the terminal identifier included in the information of the smart watch, and the security level of the target object is the first security level. Then sending an unlocking request to the mobile phone APP of the parent, and if an unlocking instruction from the mobile phone APP of the parent is received within 5 seconds, determining that the control strategy of the intelligent lock is unlocking; and if the unlocking instruction from the mobile phone APP of the parent is not received or the locking instruction from the mobile phone APP of the parent is received within 5 seconds, determining that the control strategy of the intelligent lock is to keep locking. And finally, controlling the intelligent lock according to the control strategy.
In the above cases three and four, the steps are substantially the same as those in the case two, and the present invention is not described herein again.
As can be seen from the flow shown in fig. 5, in the technical solution provided in the embodiment of the present invention, when the unlocking state of the safety lock function is not unlocked, if a target object of a first security level exists around the intelligent lock, an unlocking request is sent to a preset client, and if an unlocking instruction from the preset client or a locking instruction from the preset client is not received within a second preset time period, a step of determining that the control policy of the intelligent lock is to maintain locking is performed; and if the unlocking instruction from the preset client is received within the second preset time, determining that the control strategy of the intelligent lock is unlocking. And finally, controlling the intelligent lock according to the control strategy. By additionally sending the unlocking request and the like, the early warning can be provided for the situation that the target object with the first security level is unlocked independently, the security of the intelligent lock is improved, and meanwhile, the target object with the first security level can be unlocked independently under the allowed situation, so that the intelligent lock is more humanized to use.
Corresponding to the embodiment of the control method of the intelligent lock, the invention also provides an embodiment of a control device of the intelligent lock.
Referring to fig. 6, a block diagram of an embodiment of a control device of an intelligent lock according to an embodiment of the present invention is provided. As shown in fig. 6, the apparatus includes:
the state determining module 601 is used for determining the opening state of the safety lock function in the intelligent lock;
an information obtaining module 602, configured to obtain information of at least one target terminal, where the target terminal is located within a sensing range of the smart lock;
a level determining module 603, configured to determine a security level of at least one target object based on information of at least one target terminal, where the target object is an object currently carrying the target terminal;
a policy determination module 604 for determining a corresponding control policy based on the activation status of the security lock function and the security level of the at least one target object;
and the control module 605 is configured to control the smart lock according to the control policy.
In a possible implementation, the level determining module 603 is specifically configured to:
determining whether the information of the target terminal comprises living body information or not for each target terminal;
and under the condition that the information of the target terminal comprises living body information, determining an object carrying the target terminal as a target object, and searching a preset corresponding relation between a terminal identifier and a security level based on the terminal identifier in the information of the target terminal to obtain the security level of the target object.
In one possible embodiment, the policy determination module 604 includes (not shown):
a first determination unit, configured to determine whether a target object of a first security level exists within a sensible range of the smart lock when the security lock function is in an unlocked state;
the second determination unit is used for determining whether a target object with a second security level exists in the sensing range of the intelligent lock if the target object with the first security level exists; if the target object with the second security level exists, determining that the control strategy of the intelligent lock is unlocking; if the target object with the second security level does not exist, determining that the control strategy of the intelligent lock is to keep the lock closed;
and the third determining unit is used for determining that the control strategy of the intelligent lock is unlocking if the target object with the first security level does not exist.
In one possible embodiment, the policy determination module 604 includes (not shown):
a fourth determination unit, configured to determine whether a target object of the first security level is present within a sensible range of the smart lock when the security lock function is unlocked;
a fifth determining unit, configured to determine that the control policy of the intelligent lock is to remain locked if a target object of the first security level exists;
and the sixth determining unit is used for determining that the control strategy of the intelligent lock is unlocking if the target object with the first security level does not exist.
In a possible embodiment, the device further comprises (not shown in the figures):
the first sending module is used for sending an unlocking request to a preset client if the target object with the second security level does not exist;
the first execution module is used for executing the step of determining that the control strategy of the intelligent lock is to keep locking if the unlocking instruction from the preset client is not received within a first preset time length;
the first determining module is used for determining that the control strategy of the intelligent lock is unlocking if an unlocking instruction from the preset client side is received within a first preset time.
In a possible embodiment, the device further comprises (not shown in the figures):
the second sending module is used for sending an unlocking request to a preset client if the target object with the first security level exists;
the second execution module is used for executing the step of determining that the control strategy of the intelligent lock is the step of keeping the lock if the unlocking instruction from the preset client is not received or the locking instruction from the preset client is received within a second preset time length;
and the second determining module is used for determining that the control strategy of the intelligent lock is unlocking if an unlocking instruction from the preset client is received within a second preset time length.
In a possible embodiment, the device further comprises (not shown in the figures):
and the third execution module is used for executing the step of determining the opening state of the safety lock function in the intelligent lock and all the following steps when the unlocking operation of the intelligent lock is detected.
Fig. 7 is a schematic structural diagram of an electronic device according to an embodiment of the present invention, where the electronic device 700 shown in fig. 7 includes: at least one processor 701, memory 702, at least one network interface 704, and other user interfaces 703. The various components in the electronic device 700 are coupled together by a bus system 705. It is understood that the bus system 705 is used to enable communications among the components. The bus system 705 includes a power bus, a control bus, and a status signal bus in addition to a data bus. But for clarity of illustration the various busses are labeled in figure 7 as the bus system 705.
The user interface 703 may include, among other things, a display, a keyboard or a pointing device (e.g., a mouse, trackball), a touch pad or a touch screen, among others.
It is to be understood that the memory 702 in embodiments of the present invention may be either volatile memory or nonvolatile memory, or may include both volatile and nonvolatile memory. The non-volatile memory may be a Read-only memory (ROM), a programmable Read-only memory (PROM), an erasable programmable Read-only memory (erasabprom, EPROM), an electrically erasable programmable Read-only memory (EEPROM), or a flash memory. The volatile memory may be a Random Access Memory (RAM) which serves as an external cache. By way of example, and not limitation, many forms of RAM are available, such as static random access memory (StaticRAM, SRAM), dynamic random access memory (dynamic RAM, DRAM), synchronous dynamic random access memory (synchronous DRAM, SDRAM), Double Data Rate Synchronous Dynamic Random Access Memory (DDRSDRAM), Enhanced synchronous SDRAM (ESDRAM), synchronous link dynamic random access memory (synchlink DRAM, SLDRAM), and direct memory bus random access memory (DRRAM). The memory 702 described herein is intended to comprise, without being limited to, these and any other suitable types of memory.
In some embodiments, memory 702 stores the following elements, executable units or data structures, or a subset thereof, or an expanded set thereof: an operating system 7021 and application programs 7022.
The operating system 7021 includes various system programs, such as a framework layer, a core library layer, a driver layer, and the like, for implementing various basic services and processing hardware-based tasks. The application 7022 includes various applications, such as a media player (MediaPlayer), a Browser (Browser), and the like, for implementing various application services. Programs that implement methods in accordance with embodiments of the present invention can be included within application program 7022.
In the embodiment of the present invention, the processor 701 is configured to execute the method steps provided by the method embodiments by calling a program or an instruction stored in the memory 702, specifically, a program or an instruction stored in the application 7022, for example, and includes:
determining the opening state of a safety lock function in the intelligent lock;
acquiring information of at least one target terminal, wherein the target terminal is located in a sensing range of the intelligent lock;
determining the security level of at least one target object based on the information of at least one target terminal, wherein the target object is an object carrying the target terminal currently;
determining a corresponding control strategy based on the opening state of the safety lock function and the safety level of at least one target object;
and controlling the intelligent lock according to the control strategy.
The method disclosed in the above embodiments of the present invention may be applied to the processor 701, or implemented by the processor 701. The processor 701 may be an integrated circuit chip having signal processing capabilities. In implementation, the steps of the above method may be implemented by integrated logic circuits of hardware or instructions in the form of software in the processor 701. The processor 701 may be a general-purpose processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), an off-the-shelf programmable gate array (FPGA) or other programmable logic device, discrete gate or transistor logic device, or discrete hardware components. The various methods, steps and logic blocks disclosed in the embodiments of the present invention may be implemented or performed. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of the method disclosed in connection with the embodiments of the present invention may be directly implemented by a hardware decoding processor, or implemented by a combination of hardware and software elements in the decoding processor. The software elements may be located in ram, flash, rom, prom, or eprom, registers, etc. as is well known in the art. The storage medium is located in the memory 702, and the processor 701 reads the information in the memory 702 and performs the steps of the above method in combination with the hardware thereof.
It is to be understood that the embodiments described herein may be implemented in hardware, software, firmware, middleware, microcode, or any combination thereof. For a hardware implementation, the processing units may be implemented within one or more Application Specific Integrated Circuits (ASICs), Digital Signal Processors (DSPs), Digital Signal Processing Devices (DSPDs), Programmable Logic Devices (PLDs), Field Programmable Gate Arrays (FPGAs), general purpose processors, controllers, micro-controllers, microprocessors, other electronic units configured to perform the functions described herein, or a combination thereof.
For a software implementation, the techniques described herein may be implemented by means of units performing the functions described herein. The software codes may be stored in a memory and executed by a processor. The memory may be implemented within the processor or external to the processor.
The electronic device provided in this embodiment may be the electronic device shown in fig. 7, and may execute all the steps of the control method of the intelligent lock shown in fig. 1 to 5, so as to achieve the technical effects of the control method of the intelligent lock shown in fig. 1 to 5, which please refer to the related descriptions of fig. 1 to 5 for brevity, which is not described herein again.
The embodiment of the invention also provides a storage medium (computer readable storage medium). The storage medium herein stores one or more programs. Among others, the storage medium may include volatile memory, such as random access memory; the memory may also include non-volatile memory, such as read-only memory, flash memory, a hard disk, or a solid state disk; the memory may also comprise a combination of memories of the kind described above.
When one or more programs in the storage medium can be executed by one or more processors, the method for controlling the intelligent lock executed on the electronic device side is realized.
The processor is used for executing the control program of the intelligent lock stored in the memory so as to realize the following steps of the control method of the intelligent lock executed on the electronic equipment side:
determining the opening state of a safety lock function in the intelligent lock;
acquiring information of at least one target terminal, wherein the target terminal is located in a sensing range of the intelligent lock;
determining the security level of at least one target object based on the information of at least one target terminal, wherein the target object is an object carrying the target terminal currently;
determining a corresponding control strategy based on the opening state of the safety lock function and the safety level of at least one target object;
and controlling the intelligent lock according to the control strategy.
Those of skill would further appreciate that the various illustrative components and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, computer software, or combinations of both, and that the various illustrative components and steps have been described above generally in terms of their functionality in order to clearly illustrate this interchangeability of hardware and software. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
The steps of a method or algorithm described in connection with the embodiments disclosed herein may be embodied in hardware, a software module executed by a processor, or a combination of the two. A software module may reside in Random Access Memory (RAM), memory, read-only memory (ROM), electrically programmable ROM, electrically erasable programmable ROM, registers, hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art.
The above-mentioned embodiments are intended to illustrate the objects, technical solutions and advantages of the present invention in further detail, and it should be understood that the above-mentioned embodiments are merely exemplary embodiments of the present invention, and are not intended to limit the scope of the present invention, and any modifications, equivalent substitutions, improvements and the like made within the spirit and principle of the present invention should be included in the scope of the present invention.
Claims (10)
1. A control method of an intelligent lock is characterized by comprising the following steps:
determining the opening state of a safety lock function in the intelligent lock;
acquiring information of at least one target terminal, wherein the target terminal is located in a sensing range of the intelligent lock;
determining the security level of at least one target object based on the information of at least one target terminal, wherein the target object is an object carrying the target terminal currently;
determining a corresponding control strategy based on the opening state of the safety lock function and the safety level of at least one target object;
and controlling the intelligent lock according to the control strategy.
2. The method of claim 1, wherein determining the security level of at least one target object based on information of at least one target terminal comprises:
determining whether the information of the target terminal comprises living body information or not for each target terminal;
and under the condition that the information of the target terminal comprises living body information, determining an object carrying the target terminal as a target object, and searching a preset corresponding relation between a terminal identifier and a security level based on the terminal identifier in the information of the target terminal to obtain the security level of the target object.
3. The method according to claim 1, wherein determining a respective control strategy based on the unlock status of the security lock function and the security level of the at least one target object comprises:
if the opening state of the safety lock function is opened, determining whether a target object with a first safety level exists in a sensing range of the intelligent lock;
if the target object with the first security level exists, determining whether the target object with the second security level exists in the sensing range of the intelligent lock; if the target object with the second security level exists, determining that the control strategy of the intelligent lock is unlocking; if the target object with the second security level does not exist, determining that the control strategy of the intelligent lock is to keep locking;
and if the target object with the first security level does not exist, determining that the control strategy of the intelligent lock is unlocking.
4. The method according to claim 1, wherein determining a respective control strategy based on the unlock status of the security lock function and the security level of the at least one target object comprises:
if the unlocking state of the safety lock function is not unlocked, determining whether a target object with a first safety level exists in a sensing range of the intelligent lock;
if the target object with the first security level exists, determining that the control strategy of the intelligent lock is to keep locking;
and if the target object with the first security level does not exist, determining that the control strategy of the intelligent lock is unlocking.
5. The method of claim 3, further comprising:
if the target object with the second security level does not exist, sending an unlocking request to a preset client;
if the unlocking instruction from the preset client is not received within a first preset time length, the step of determining that the control strategy of the intelligent lock is to keep locking is executed;
and if the unlocking instruction from the preset client is received within a first preset time, determining that the control strategy of the intelligent lock is unlocking.
6. The method of claim 4, further comprising:
if the target object with the first security level exists, sending an unlocking request to a preset client;
if the unlocking instruction from the preset client is not received within a second preset time length or the locking instruction from the preset client is received, executing the step of determining that the control strategy of the intelligent lock is to keep locking;
and if the unlocking instruction from the preset client is received within a second preset time, determining that the control strategy of the intelligent lock is unlocking.
7. The method of claim 1, further comprising:
and when the unlocking operation of the intelligent lock is detected, the unlocking state of the safety lock function in the intelligent lock is determined, and all the following steps are executed.
8. A control device of an intelligent lock is characterized by comprising:
the state determining module is used for determining the opening state of the safety lock function in the intelligent lock;
the intelligent lock comprises an information acquisition module, a storage module and a control module, wherein the information acquisition module is used for acquiring information of at least one target terminal, and the target terminal is positioned in a sensing range of the intelligent lock;
the level determining module is used for determining the security level of at least one target object based on the information of at least one target terminal, wherein the target object is an object carrying the target terminal currently;
the strategy determination module is used for determining a corresponding control strategy based on the opening state of the safety lock function and the safety level of at least one target object;
and the control module is used for controlling the intelligent lock according to the control strategy.
9. An electronic device, comprising: the intelligent lock control system comprises a processor and a memory, wherein the processor is used for executing a control program of the intelligent lock stored in the memory so as to realize the intelligent lock control method of any one of claims 1-7.
10. A storage medium storing one or more programs executable by one or more processors to implement a method of controlling an intelligent lock according to any one of claims 1 to 7.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210179681.7A CN114582053B (en) | 2022-02-25 | 2022-02-25 | Control method and device of intelligent lock, electronic equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210179681.7A CN114582053B (en) | 2022-02-25 | 2022-02-25 | Control method and device of intelligent lock, electronic equipment and storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN114582053A true CN114582053A (en) | 2022-06-03 |
CN114582053B CN114582053B (en) | 2023-03-10 |
Family
ID=81773988
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210179681.7A Active CN114582053B (en) | 2022-02-25 | 2022-02-25 | Control method and device of intelligent lock, electronic equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114582053B (en) |
Citations (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2015156553A (en) * | 2014-02-20 | 2015-08-27 | シャープ株式会社 | Electronic apparatus |
US20170303094A1 (en) * | 2016-04-19 | 2017-10-19 | Siemens Industry, Inc. | System and method for passive building information discovery |
CN107492164A (en) * | 2017-07-07 | 2017-12-19 | 武汉因可尔健网络信息服务有限公司 | Smart lock control method, apparatus, terminal device and readable storage medium storing program for executing |
CN107845171A (en) * | 2017-11-13 | 2018-03-27 | 广东乐心医疗电子股份有限公司 | Method and system for unlocking Internet of things intelligent lock by using wearable device |
CN107861403A (en) * | 2017-09-19 | 2018-03-30 | 珠海格力电器股份有限公司 | Key locking control method and device for electric appliance, storage medium and electric appliance |
CN108042070A (en) * | 2017-12-28 | 2018-05-18 | 宁波美高厨具有限公司 | The control system of water basin dish-washing machine child lock |
CN108540844A (en) * | 2018-03-28 | 2018-09-14 | 聚好看科技股份有限公司 | The method and device of remote control TV |
CN108565023A (en) * | 2018-03-16 | 2018-09-21 | 夏伟 | A kind of children disease prevention and control monitoring method, device and system |
CN108985726A (en) * | 2018-09-19 | 2018-12-11 | 李招兵 | A kind of students'growth culture system and its method |
CN110620708A (en) * | 2018-06-20 | 2019-12-27 | 佛山市顺德区美的电热电器制造有限公司 | Control method and device of household appliance, household appliance and storage medium |
WO2020000637A1 (en) * | 2018-06-27 | 2020-01-02 | 平安科技(深圳)有限公司 | Sound-based equipment control method, apparatus, and device, and storage medium |
CN111046365A (en) * | 2019-12-16 | 2020-04-21 | 腾讯科技(深圳)有限公司 | Face image transmission method, numerical value transfer method, device and electronic equipment |
CN111223269A (en) * | 2019-12-30 | 2020-06-02 | 维沃移动通信有限公司 | Safety protection method and electronic equipment |
US20200241128A1 (en) * | 2019-01-25 | 2020-07-30 | Renesas Electronics Corporation | Apparatus control system and control method |
CN111568246A (en) * | 2020-02-28 | 2020-08-25 | 佛山市云米电器科技有限公司 | Control method of water dispenser, water dispenser and computer readable storage medium |
AU2020102216A4 (en) * | 2020-09-11 | 2020-10-22 | Dev, Satya MR | A smart door lock safety system to monitor the door continuously over the cloud |
CN112749363A (en) * | 2020-02-27 | 2021-05-04 | 腾讯科技(深圳)有限公司 | Network advertisement publishing and acquiring method, device, storage medium and computer equipment |
CN112907788A (en) * | 2021-01-25 | 2021-06-04 | 珠海格力电器股份有限公司 | Door lock control method and device, door lock and storage medium |
CN113012330A (en) * | 2021-02-20 | 2021-06-22 | 南京云巅电子科技有限公司 | Remote automatic access control and anti-following system based on Bluetooth AOA |
CN113870461A (en) * | 2021-09-15 | 2021-12-31 | 珠海格力电器股份有限公司 | Intelligent door lock control method and device, electronic equipment and storage medium |
-
2022
- 2022-02-25 CN CN202210179681.7A patent/CN114582053B/en active Active
Patent Citations (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2015156553A (en) * | 2014-02-20 | 2015-08-27 | シャープ株式会社 | Electronic apparatus |
US20170303094A1 (en) * | 2016-04-19 | 2017-10-19 | Siemens Industry, Inc. | System and method for passive building information discovery |
CN107492164A (en) * | 2017-07-07 | 2017-12-19 | 武汉因可尔健网络信息服务有限公司 | Smart lock control method, apparatus, terminal device and readable storage medium storing program for executing |
CN107861403A (en) * | 2017-09-19 | 2018-03-30 | 珠海格力电器股份有限公司 | Key locking control method and device for electric appliance, storage medium and electric appliance |
CN107845171A (en) * | 2017-11-13 | 2018-03-27 | 广东乐心医疗电子股份有限公司 | Method and system for unlocking Internet of things intelligent lock by using wearable device |
CN108042070A (en) * | 2017-12-28 | 2018-05-18 | 宁波美高厨具有限公司 | The control system of water basin dish-washing machine child lock |
CN108565023A (en) * | 2018-03-16 | 2018-09-21 | 夏伟 | A kind of children disease prevention and control monitoring method, device and system |
CN108540844A (en) * | 2018-03-28 | 2018-09-14 | 聚好看科技股份有限公司 | The method and device of remote control TV |
CN110620708A (en) * | 2018-06-20 | 2019-12-27 | 佛山市顺德区美的电热电器制造有限公司 | Control method and device of household appliance, household appliance and storage medium |
WO2020000637A1 (en) * | 2018-06-27 | 2020-01-02 | 平安科技(深圳)有限公司 | Sound-based equipment control method, apparatus, and device, and storage medium |
CN108985726A (en) * | 2018-09-19 | 2018-12-11 | 李招兵 | A kind of students'growth culture system and its method |
US20200241128A1 (en) * | 2019-01-25 | 2020-07-30 | Renesas Electronics Corporation | Apparatus control system and control method |
CN111046365A (en) * | 2019-12-16 | 2020-04-21 | 腾讯科技(深圳)有限公司 | Face image transmission method, numerical value transfer method, device and electronic equipment |
CN111223269A (en) * | 2019-12-30 | 2020-06-02 | 维沃移动通信有限公司 | Safety protection method and electronic equipment |
CN112749363A (en) * | 2020-02-27 | 2021-05-04 | 腾讯科技(深圳)有限公司 | Network advertisement publishing and acquiring method, device, storage medium and computer equipment |
CN111568246A (en) * | 2020-02-28 | 2020-08-25 | 佛山市云米电器科技有限公司 | Control method of water dispenser, water dispenser and computer readable storage medium |
AU2020102216A4 (en) * | 2020-09-11 | 2020-10-22 | Dev, Satya MR | A smart door lock safety system to monitor the door continuously over the cloud |
CN112907788A (en) * | 2021-01-25 | 2021-06-04 | 珠海格力电器股份有限公司 | Door lock control method and device, door lock and storage medium |
CN113012330A (en) * | 2021-02-20 | 2021-06-22 | 南京云巅电子科技有限公司 | Remote automatic access control and anti-following system based on Bluetooth AOA |
CN113870461A (en) * | 2021-09-15 | 2021-12-31 | 珠海格力电器股份有限公司 | Intelligent door lock control method and device, electronic equipment and storage medium |
Non-Patent Citations (3)
Title |
---|
侯贤辰;: "关于智能儿童安全锁的设计" * |
方斌;: "奥迪门锁系统" * |
郑毅夫;: "一种实现彩电"童锁"功能的新方法" * |
Also Published As
Publication number | Publication date |
---|---|
CN114582053B (en) | 2023-03-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102542649B (en) | Method for controlling locking system by mobile equipment | |
KR101622300B1 (en) | Limiting the functionality of a software program based on a security model | |
USRE50053E1 (en) | Methods and apparatus to monitor permission-controlled hidden sensitive application behavior at run-time | |
US9609119B2 (en) | Disablement of lost or stolen device | |
WO2017185457A1 (en) | Control method and apparatus for access control lock, and terminal | |
US9560527B2 (en) | Version protection method and apparatus for mobile terminal | |
US11128751B2 (en) | Retailer device binding in mobile devices | |
CN109670293A (en) | Information processing method and electronic equipment | |
US10437978B2 (en) | Enhancing security of a mobile device based on location or proximity to another device | |
CN112907788A (en) | Door lock control method and device, door lock and storage medium | |
KR20220032191A (en) | vehicle, and controlling method thereof | |
CN114582053B (en) | Control method and device of intelligent lock, electronic equipment and storage medium | |
KR102383792B1 (en) | Door Lock Device and Controlling Method Thereof | |
US10437979B2 (en) | Enhancing security of a mobile device based on location or proximity to another device | |
CN108256298A (en) | A kind of resource access method and device | |
US20110107395A1 (en) | Method and apparatus for providing a fast and secure boot process | |
CN109727601B (en) | Information processing method and device | |
CN114926922A (en) | Control method and control device of intelligent door lock, intelligent door lock and storage medium | |
CN107154999B (en) | Terminal and unlocking method and storage device based on environmental information | |
CN114706691A (en) | Multitask mutual exclusion method and system based on file lock | |
CN113870461A (en) | Intelligent door lock control method and device, electronic equipment and storage medium | |
CN111161456A (en) | Setting method of intelligent lock, intelligent lock and storage medium | |
CN111340986A (en) | Intelligent lock abnormity alarm method, intelligent lock and storage medium | |
CN113838230B (en) | Door lock control method and device, door lock and storage medium | |
CN114202833B (en) | Intelligent door lock alarm method, device, equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |