CN114999030A - Unlocking method, system, electronic equipment and storage medium - Google Patents

Unlocking method, system, electronic equipment and storage medium Download PDF

Info

Publication number
CN114999030A
CN114999030A CN202210577411.1A CN202210577411A CN114999030A CN 114999030 A CN114999030 A CN 114999030A CN 202210577411 A CN202210577411 A CN 202210577411A CN 114999030 A CN114999030 A CN 114999030A
Authority
CN
China
Prior art keywords
unlocking
intelligent lock
terminal
client
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210577411.1A
Other languages
Chinese (zh)
Inventor
董佳
陈代远
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Ezviz Network Co Ltd
Original Assignee
Hangzhou Ezviz Network Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Ezviz Network Co Ltd filed Critical Hangzhou Ezviz Network Co Ltd
Priority to CN202210577411.1A priority Critical patent/CN114999030A/en
Publication of CN114999030A publication Critical patent/CN114999030A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00563Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys using personal physical data of the operator, e.g. finger prints, retinal images, voicepatterns
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00571Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by interacting with a central unit

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Lock And Its Accessories (AREA)

Abstract

The application discloses an unlocking method, a system, an electronic device and a storage medium, wherein the method comprises the following steps: sending a key request to an intelligent lock, wherein the intelligent lock is in communication connection with a camera, the camera is integrated on the intelligent lock or independent of the intelligent lock and is located in the same physical space with the intelligent lock, and the key request is used for indicating to obtain an unlocking key for unlocking the intelligent lock; receiving an unlocking key sent by the intelligent lock based on the key request, wherein the unlocking key comprises image data shot by a camera within a preset time period; responding to an unlocking operation input by a user, and sending an unlocking signaling to the intelligent lock, wherein the unlocking signaling comprises an unlocking key and terminal information corresponding to the client; and receiving first response information which is sent after the intelligent lock is unlocked successfully and is unlocked based on the unlocking secret key and the terminal information, wherein the first response information is used for indicating that the intelligent lock is successfully unlocked. This embodiment has solved the easy problem by the simulation of unlocking password in the current mode of unblanking, and the security is lower.

Description

Unlocking method, system, electronic equipment and storage medium
Technical Field
The application belongs to the technical field of intelligent locks, and particularly relates to an unlocking method, an unlocking system, electronic equipment and a storage medium.
Background
With the development of technology, more and more users use smart locks at present, and smart locks can be unlocked through biological characteristics and can be connected to a network platform through a network, and the biological characteristics include fingerprint information, face information and the like.
However, in the process of unlocking through the intelligent lock, the unlocking password is fixed, for example, a householder sets a 6-digit password, and a temporary visitor at a doorway needs to inquire the 6-digit password and then input the password into the intelligent lock to achieve the purpose of unlocking, so that the unlocking password is easy to simulate, the risk is high, and the security is low.
Disclosure of Invention
The embodiment of the application provides an unlocking method, an unlocking system, electronic equipment and a storage medium, and aims to solve the problems that a password is easy to simulate and the safety is low in the existing unlocking mode.
In a first aspect, an embodiment of the present application provides an unlocking method, which is applied to a client, and includes:
sending a key request to an intelligent lock, wherein the intelligent lock is in communication connection with a camera, the camera is integrated on the intelligent lock or independent of the intelligent lock and is located in the same physical space with the intelligent lock, and the key request is used for indicating to obtain an unlocking key for unlocking the intelligent lock;
receiving the unlocking key sent by the intelligent lock based on the key request, wherein the unlocking key comprises image data shot by the camera within a preset time period;
responding to an unlocking operation input by a user, and sending an unlocking signaling to the intelligent lock, wherein the unlocking signaling comprises the unlocking key and terminal information corresponding to the client;
and receiving first response information which is sent after the intelligent lock is unlocked based on the unlocking secret key and the terminal information and the unlocking is successful, wherein the first response information is used for indicating that the intelligent lock is successfully unlocked.
In a second aspect, an embodiment of the present application further provides an unlocking method applied to an intelligent lock, including:
receiving a key request sent by a client, wherein the intelligent lock is in communication connection with a camera, the camera is integrated on the intelligent lock or independent of the intelligent lock and is located in the same physical space with the intelligent lock, and the key request is used for indicating to obtain an unlocking key for unlocking the intelligent lock;
sending the unlocking key to the client based on the key request, wherein the unlocking key comprises image data shot by the camera within a preset time period;
receiving an unlocking signaling sent by the client in response to an unlocking operation input by a user, wherein the unlocking signaling comprises the unlocking key and terminal information corresponding to the client;
and unlocking based on the unlocking key and the terminal information, and sending first response information to the client after unlocking is successful, wherein the first response information is used for indicating that the intelligent lock is successfully unlocked.
In a third aspect, an embodiment of the present application further provides an unlocking system, where the unlocking system includes a terminal equipped with a client, a server, an intelligent lock, and a camera, where the intelligent lock is in communication connection with the camera, and the camera is integrated with the intelligent lock or is independent of the intelligent lock, and is located in the same physical space as the intelligent lock;
the client sends a key request to the intelligent lock, wherein the key request is used for indicating to obtain an unlocking key for unlocking the intelligent lock;
the intelligent lock receives a key request sent by the client and sends the unlocking key to the client based on the key request, wherein the unlocking key comprises image data shot by the camera within a preset time period;
the client side responds to an unlocking operation input by a user and sends an unlocking request to the server, wherein the server is synchronized with a terminal list corresponding to the intelligent lock, the terminal list comprises terminal binding codes of terminals bound with the intelligent lock, the unlocking request comprises the unlocking key, terminal information corresponding to the client side and equipment information of the intelligent lock, the terminal information corresponding to the client side and the terminal list are used for verifying whether the terminal corresponding to the client side is the terminal bound with the intelligent lock, and the equipment information of the intelligent lock is used for determining a communication address of the intelligent lock;
when the terminal corresponding to the client is verified to be the terminal bound by the intelligent lock based on the unlocking request, an unlocking signaling is sent to the intelligent lock based on the equipment information, wherein the unlocking signaling comprises the unlocking key and the terminal information corresponding to the client;
and unlocking based on the unlocking key and the terminal information, and sending first response information to the client after unlocking is successful, wherein the first response information is used for indicating that the intelligent lock is successfully unlocked.
In a fourth aspect, embodiments of the present application provide an electronic device, which includes a processor, a memory, and a program or instructions stored on the memory and executable on the processor, and when executed by the processor, implement the steps of the method according to the first aspect or the second aspect.
In a fifth aspect, the present embodiments provide a readable storage medium, on which a program or instructions are stored, which when executed by a processor implement the steps of the method according to the first or second aspect.
The client side sends a key request to the intelligent lock, the intelligent lock is in communication connection with the camera, the camera is integrated on the intelligent lock or independent of the intelligent lock and located in the same physical space with the intelligent lock, and the key request is used for indicating to obtain an unlocking key for unlocking the intelligent lock; receiving the unlocking key sent by the intelligent lock based on the key request, wherein the unlocking key comprises image data shot by the camera within a preset time period; responding to an unlocking operation input by a user, and sending an unlocking signaling to the intelligent lock, wherein the unlocking signaling comprises the unlocking key and terminal information corresponding to the client; and receiving first response information which is sent after the intelligent lock is unlocked based on the unlocking secret key and the terminal information and the unlocking is successful, wherein the first response information is used for indicating that the intelligent lock is successfully unlocked. The unlocking key is generated by the intelligent lock, the picture in front of the intelligent lock is the unlocking key, and a user can completely see the scene during unlocking in the whole unlocking process, so that the unlocking key has real-time property and unfixed property, is not easy to simulate and can not be lost, the safety of the unlocking key is ensured, an accessor does not need to input the unlocking key, and the unlocking process of the accessor is simplified; in addition, the unlocking key is generated by the intelligent lock and does not need to be set by the user, so that the process of setting the key by the user is omitted, the user is prevented from memorizing the key set by the user, the unlocking operation of the user is simplified, and convenience is brought to the unlocking of the user.
Drawings
Fig. 1 is a schematic flowchart of an unlocking method applied to a client in an embodiment of the present application;
FIG. 2 is a schematic flowchart of an unlocking method applied to an intelligent lock in the embodiment of the present application;
FIG. 3 is a schematic flow chart of another unlocking method in the embodiment of the present application;
FIG. 4 is a schematic structural diagram of an unlocking system in an embodiment of the application;
fig. 5 is a schematic block diagram of an unlocking device applied to a client in an embodiment of the present application;
FIG. 6 is a block diagram of an unlocking device applied to an intelligent lock in an embodiment of the present application;
fig. 7 is a schematic structural diagram of an electronic device provided in an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some, but not all, embodiments of the present application. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The terms first, second and the like in the description and in the claims of the present application are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It will be appreciated that the data so used may be interchanged under appropriate circumstances such that embodiments of the application may be practiced in sequences other than those illustrated or described herein, and that the terms "first," "second," and the like are generally used herein in a generic sense and do not limit the number of terms, e.g., the first term can be one or more than one. In addition, "and/or" in the specification and claims means at least one of connected objects, a character "/" generally means that a preceding and succeeding related objects are in an "or" relationship.
The distributed modeling system and method provided by the embodiments of the present application are described in detail below with reference to the accompanying drawings through specific embodiments and application scenarios thereof.
Fig. 1 illustrates an unlocking method applied to a client according to an embodiment of the present invention, where the unlocking method includes:
step 101: a key request is sent to the smart lock.
The intelligent lock is in communication connection with the camera, and the camera is integrated on the intelligent lock, independent of the intelligent lock and located in the same physical space with the intelligent lock.
Specifically, the smart lock refers to an electronic lock that can be unlocked by biometric features and can communicate with other network devices through a network.
The camera can be integrated on the intelligent lock, or the camera is independent of the intelligent lock and is located in the same physical space with the intelligent lock, so that the camera can shoot image data of the intelligent lock within a certain range. In addition, the camera is connected with the intelligent lock in a communication mode, so that the camera can transmit shot image data to the intelligent lock, the intelligent lock can transmit the image data to other network equipment in the communication connection, such as a client, a server and the like, a user can view a picture in front of the intelligent lock in real time through the shot image data of the camera, and the safety of unlocking operation performed by the user is ensured.
And the key request is used for indicating to acquire an unlocking key for unlocking the intelligent lock. In addition, the key request can be sent to the smart lock through the processes of direct connection of devices, Peer-to-Peer technology (Peer-to-Peer, p2p), streaming media forwarding and the like.
Certainly, when the client sends the key request to the smart lock, the key request may carry terminal information corresponding to the client, so that the smart lock can verify whether the terminal corresponding to the client is the terminal pre-bound by the smart lock through the terminal information, if so, the next operation may be performed, and if not, the unlocking process is terminated, so as to improve the unlocking security.
Step 102: and receiving the unlocking key sent by the intelligent lock based on the key request.
The unlocking key comprises image data shot by the camera within a preset time period, so that a client can display an image picture corresponding to the image data, and the camera is integrated on the intelligent lock, is independent of the intelligent lock and is located in the same physical space with the intelligent lock, namely the image data shot by the camera is an image picture within a certain range of the intelligent lock, so that the instantaneity of the unlocking key is realized, and a user can see the picture scene during unlocking in the whole unlocking process through the image data.
Specifically, the preset time period may be within the first N seconds of the current time, and the value of N may be set according to an actual situation, for example, the value may be 1s or 2s, that is, the unlocking key is not fixed but changes in real time along with time, and certainly, the smaller the value of N is, the higher the instantaneity of the unlocking key is.
Therefore, the intelligent lock needs an unlocking key when unlocking signaling is executed, the unlocking key in the related technology is generally set by a user and comprises fingerprint information, face information, a 6-bit digital key and the like, the unlocking keys are set and fixed by the user, so that the intelligent lock is easy to lose or be simulated, and the safety is low. The unlocking key comprises image data shot by the camera within a preset time period, so that the unlocking key is generated by the intelligent lock, and an image picture in front of the intelligent lock is the unlocking key, and the unlocking key has real-time property and unfixed property, so that the unlocking key is not easy to be simulated and is not lost, and the safety of the unlocking key is ensured; in addition, the unlocking key is generated by the intelligent lock and does not need to be set by the user, so that the process of setting the key by the user is omitted, the user is prevented from memorizing the key set by the user, the unlocking operation of the user is simple and convenient, and convenience is brought to unlocking of the user.
In addition, specifically, the unlocking key may further include an authentication identifier (token) to further improve the security of the unlocking key.
Step 103: and responding to the unlocking operation input by the user, and sending unlocking signaling to the intelligent lock.
Specifically, after the client acquires the unlocking key, if the unlocking operation input by the user is received, the unlocking signaling can be sent to the intelligent lock in response to the unlocking operation input by the user.
And the unlocking signaling comprises the unlocking key and terminal information corresponding to the client. The terminal information is used for verifying whether the terminal corresponding to the client is the terminal pre-bound by the intelligent lock.
The process of binding the terminal by the intelligent lock is a process of storing the terminal information of the terminal into a safety check device list of the intelligent lock, the safety check device list can be a terminal list maintained by the intelligent lock, and the terminal information in the terminal list is the terminal information of the terminal bound with the intelligent lock.
Specifically, the terminal information may be a mobile phone number of the terminal, user identification information, and the like, and may also be a character string composed of a hardware feature code of the terminal and the user identification information. For example, the hardware feature code may be a 32-bit universal Unique Identifier (uuid) generated by the client, and a length of a character string formed by the hardware feature code and the user identification information may not exceed 64 bits, so as to ensure that the terminal information is Unique and non-repetitive.
Step 104: and receiving first response information which is sent after the intelligent lock is unlocked based on the unlocking secret key and the terminal information and the unlocking is successful.
The first response information is used for indicating that the intelligent lock is successfully unlocked.
The intelligent lock is unlocked based on the unlocking key and the terminal information, in the process, the intelligent lock can verify whether the terminal corresponding to the client is the terminal bound by the intelligent lock or not through the terminal information and the terminal binding code of the terminal bound by the intelligent lock in advance stored in the intelligent lock, if the terminal corresponding to the client is determined to be the terminal bound by the intelligent lock, whether the unlocking key is correct or not is verified, if the unlocking key is correct, unlocking operation is carried out, and first response information used for indicating successful unlocking is sent to the client after the unlocking is successful. At this time, the user may determine the unlocking result through the first response information received by the client.
In this way, the client in this embodiment sends a key request to the smart lock, the smart lock is in communication connection with the camera, the camera is integrated on the smart lock or is independent of the smart lock and is located in the same physical space as the smart lock, and the key request is used to instruct to obtain an unlocking key for unlocking the smart lock; receiving the unlocking key sent by the intelligent lock based on the key request, wherein the unlocking key comprises image data shot by the camera within a preset time period; responding to an unlocking operation input by a user and sending an unlocking signaling to the intelligent lock, wherein the unlocking signaling comprises the unlocking key and terminal information corresponding to the client; and receiving first response information which is sent after the intelligent lock is unlocked based on the unlocking secret key and the terminal information and the unlocking is successful, wherein the first response information is used for indicating that the intelligent lock is successfully unlocked. The unlocking key is generated by the intelligent lock, and a picture in front of the intelligent lock is the unlocking key, so that the real-time property and the unfixed property are realized, the unlocking key is not easy to simulate and lose, the safety of the unlocking key is ensured, an visitor does not need to input the unlocking key, and the unlocking process of the visitor is simplified; in addition, the unlocking key is generated by the intelligent lock and does not need to be set by the user, so that the process of setting the key by the user is omitted, the user is prevented from memorizing the key set by the user, the unlocking operation of the user is simplified, and convenience is brought to the unlocking of the user.
In one implementation, before sending a key request to the smart lock, the client may further receive identity information input by the user; and after the user is verified to be a legal user through the identity information, the step of sending a key request to the intelligent lock is carried out.
The identity information of the user can be biological information such as fingerprints and human faces of the user, and can also be information such as passwords preset by the user. By verifying whether the user is a legal user, the unlocking operation is initiated only under the authorization operation of the user, and the remote unlocking by other people is prevented under the condition that the terminal corresponding to the client is lost, so that the unlocking safety is ensured.
In addition, in an implementation manner, after the receiving the smart lock and unlocking the smart lock based on the unlocking key and the terminal information, the method further includes:
receiving second response information sent after the unlocking failure of the intelligent lock, wherein the second response information is used for indicating that the reason of the unlocking failure of the intelligent lock is that a terminal corresponding to the client side is not bound with the intelligent lock;
sending a binding signaling to the intelligent lock through a server based on the second response information, wherein the binding signaling comprises terminal information corresponding to the client and is used for indicating the intelligent lock to execute the binding operation of the terminal and the intelligent lock;
and receiving third response information sent by the intelligent lock through the server, wherein the third response information is used for indicating that the intelligent lock is successfully bound based on the binding signaling.
Specifically, the smart lock needs to be bound with the terminal to generate a valid key. If the intelligent lock is unlocked based on the unlocking key and the terminal information and the unlocking is failed, the reason of the unlocking failure can be judged, and the reason can be that the terminal corresponding to the client is not bound with the intelligent lock or the unlocking key is abnormal.
If the reason for the unlocking failure of the intelligent lock is that the unlocking key is abnormal, the intelligent lock can send a key abnormal message to the client, and the client can send a key request to the intelligent lock again based on the key abnormal message.
If the reason for the unlocking failure of the intelligent lock is that the terminal corresponding to the client is not bound with the intelligent lock, the intelligent lock can send second response information indicating that the reason for the unlocking failure of the intelligent lock is that the terminal corresponding to the client is not bound with the intelligent lock to the client; at this time, the client can send a binding signaling to the server based on the second response information, and then the server sends the binding signaling to the intelligent lock, wherein the binding signaling comprises terminal information corresponding to the client and is used for indicating the intelligent lock to execute the binding operation between the terminal and the intelligent lock; then the intelligent lock executes the binding operation between the terminal and the intelligent lock, namely, the terminal information is stored in a terminal list corresponding to the intelligent lock, and a third response message indicating the successful binding of the intelligent lock is sent to the server after the successful binding, at the moment, the server sends the third response message to the client and stores an updated terminal list of the intelligent lock, wherein the terminal list comprises the terminal binding code of the terminal bound with the intelligent lock; after the client receives the third response message, the user can send the unlocking signaling to the intelligent lock again to continue the unlocking operation.
Therefore, after the unlocking is failed, the client side and the intelligent lock are bound, so that the unlocking operation can be continuously performed through the client side.
In addition, in an implementation manner, the sending an unlocking signaling to the smart lock includes:
sending an unlocking request to a server, and sending the unlocking signaling to the intelligent lock when the server verifies that the terminal corresponding to the client is the terminal bound by the intelligent lock based on the unlocking request; the server synchronizes a terminal list corresponding to the intelligent lock, the terminal list comprises terminal binding codes of terminals bound with the intelligent lock, the unlocking request comprises the unlocking key, terminal information of the client and equipment information of the intelligent lock, the terminal information of the client and the terminal list are used for verifying whether the client is the terminal bound by the intelligent lock, and the equipment information of the intelligent lock is used for determining a communication address of the intelligent lock.
Specifically, in the process of sending an unlocking signaling to the intelligent lock, the client may send an unlocking request to the server, where the unlocking request includes the unlocking key, the terminal information of the client, and the device information of the intelligent lock, and the server synchronizes a terminal list corresponding to the intelligent lock, where the terminal list includes the terminal binding code of the terminal bound to the intelligent lock; at this time, the server may determine, based on the terminal list, whether a terminal binding code that is consistent with the terminal information corresponding to the client exists in the terminal binding codes of the terminals that have been bound to the smart lock, and if so, it indicates that the terminal that corresponds to the client is included in the terminals that have been bound to the smart lock, and may send an unlocking signaling to the smart lock based on the device information of the smart lock. Therefore, the verification process of the server to the terminal corresponding to the client is realized, and the unlocking safety is further ensured.
Optionally, after the client sends the unlocking request to the server, the method may further include the following steps:
receiving indication information sent by the server, wherein the indication information is used for indicating that the number of the terminal binding codes stored in the terminal list reaches a preset value;
sending a deleting instruction to the intelligent lock through the server based on the indication information, wherein the deleting instruction is used for indicating the intelligent lock to delete at least one terminal binding code stored in the terminal list;
and receiving fourth response information sent by the intelligent lock through the server, wherein the fourth response information is used for indicating that at least one terminal binding code is successfully deleted, and the server and the intelligent lock synchronously update a terminal list.
Specifically, if the server determines that a terminal binding code consistent with the terminal information corresponding to the client does not exist in the terminal binding codes of the terminals bound with the intelligent lock based on the terminal list, that is, the terminal list does not include the terminal corresponding to the client, and the number of the terminal binding codes included in the terminal list reaches a preset value, the server may send, to the client, indication information for indicating that the number of the terminal binding codes stored in the terminal list reaches the preset value; at this time, the client may send a deletion instruction for instructing the smart lock to delete at least one terminal binding code stored in the terminal list to the server based on the instruction information, and the server forwards the deletion instruction to the smart lock; after receiving the deleting instruction, the intelligent lock may delete at least one terminal binding code stored in the terminal list, specifically, the intelligent lock may perform a deleting operation according to a binding time sequence of the terminal binding codes and a time sequence from far to near, and send fourth response information indicating that the at least one terminal binding code is successfully deleted to the server after the deleting is successful; the server can forward the fourth response information to the client and synchronize the updated terminal list of the intelligent lock; and after receiving the fourth response message, the client can send a binding signaling to the intelligent lock through the server so as to perform a binding process between the terminal corresponding to the client and the intelligent lock, thereby ensuring a smooth unlocking process of the intelligent lock.
Thus, the embodiment realizes that the unlocking key is generated by the intelligent lock, and the picture in front of the intelligent lock is the unlocking key, so that the unlocking key has real-time property and unfixed property, is not easy to be simulated and is not lost, and the safety of the unlocking key is ensured; in addition, the unlocking key is generated by the intelligent lock and does not need to be set by the user, so that the process of setting the key by the user is omitted, the user is prevented from memorizing the key set by the user, the unlocking operation of the user is simple and convenient, and convenience is brought to unlocking of the user.
As shown in fig. 2, a flowchart of steps of an unlocking method applied to an intelligent lock in the embodiment of the present application is shown, where the method includes the following steps:
step 201; and receiving a key request sent by the client.
Wherein, the intelligent lock receives the key request sent by the client. And the key request is used for indicating to acquire an unlocking key for unlocking the intelligent lock.
The intelligent lock is in communication connection with the camera, and the camera is integrated on the intelligent lock or independent of the intelligent lock and located in the same physical space with the intelligent lock.
Step 202: and sending the unlocking key to the client based on the key request.
The unlocking key comprises image data in a preset time period shot by the camera.
It should be noted that, for specific contents of the unlocking key, reference may be made to relevant contents of the client-side embodiment, and details are not described herein again.
Step 203: and receiving unlocking signaling sent by the client in response to the unlocking operation input by the user.
In this step, the smart lock receives the unlocking signaling sent by the client. And the unlocking signaling comprises the unlocking key and terminal information corresponding to the client.
It should be noted that, for specific contents of the unlocking signaling, reference may be made to related contents of the client-side embodiment, and details are not described herein again.
Step 204: and unlocking based on the unlocking key and the terminal information, and sending first response information to the client after unlocking is successful.
The first response information is used for indicating that the intelligent lock is successfully unlocked.
The intelligent lock can be unlocked based on the unlocking secret key and the terminal information, and first response information is sent to the client after unlocking is successful, wherein the first response information is used for indicating that the intelligent lock is successfully unlocked.
In this way, in this embodiment, by receiving a key request sent by a client, the smart lock is in communication connection with a camera, the camera is integrated on the smart lock or is independent of the smart lock and located in the same physical space as the smart lock, and the key request is used to instruct to obtain an unlocking key for unlocking the smart lock; sending the unlocking key to the client based on the key request, wherein the unlocking key comprises image data shot by the camera within a preset time period; receiving an unlocking signaling sent by the client, wherein the unlocking signaling comprises the unlocking key and terminal information corresponding to the client; and unlocking based on the unlocking key and the terminal information, and sending first response information to the client after unlocking is successful, wherein the first response information is used for indicating that the intelligent lock is successfully unlocked. The unlocking key is generated by the intelligent lock, real-time performance and unfixed performance are realized, and the picture in front of the intelligent lock is the unlocking key, so that a user can see a live broadcast scene in front of the intelligent lock in the whole unlocking process, the unlocking key is not easy to simulate and lose, the safety of the unlocking key is ensured, an accessor does not need to acquire the key for unlocking, and the unlocking process of the accessor is simplified; in addition, the unlocking key is generated by the intelligent lock and does not need to be set by the user, so that the process of setting the key by the user is omitted, the user is prevented from memorizing the key set by the user, the unlocking operation of the user is simple and convenient, and convenience is brought to unlocking of the user.
In one implementation, the unlocking based on the unlocking key and the terminal information includes:
verifying whether the terminal corresponding to the client is the terminal bound by the intelligent lock or not based on the terminal information and the terminal binding code of the terminal, which is stored in the intelligent lock in advance and is bound by the intelligent lock in advance;
if the terminal corresponding to the client is determined to be the terminal bound by the intelligent lock, verifying whether the unlocking secret key is correct;
and if the unlocking secret key is determined to be correct, carrying out unlocking operation and determining that the unlocking is successful.
Specifically, the intelligent lock is preset with a terminal list, and the terminal list comprises terminal binding codes of terminals to which the intelligent lock is bound in advance. When the intelligent lock verifies whether the terminal corresponding to the client is the terminal bound by the intelligent lock, whether the terminal binding code consistent with the terminal information corresponding to the client exists in the terminal binding codes of the terminals bound with the intelligent lock can be judged, and if the terminal binding code exists, the terminal corresponding to the client is determined to be the terminal bound by the intelligent lock. And then, if the unlocking key is determined to be correct, unlocking and successfully unlocking.
The unlocking process is verified through the terminal information and the unlocking key together, the problem that the terminal which is not bound with the intelligent lock is successful in remote unlocking when the unlocking key is obtained is avoided, and the unlocking safety is guaranteed.
In one implementation, after the unlocking is performed based on the unlocking key and the terminal information, the method further includes the following steps:
if the unlocking fails, sending second response information to the client, wherein the second response information is used for indicating that the reason for the unlocking failure of the intelligent lock is that a terminal corresponding to the client is not bound with the intelligent lock;
receiving a binding signaling sent by a server, wherein the binding signaling is sent by the client based on the second response information and comprises terminal information corresponding to the client, and the binding signaling is used for indicating the intelligent lock to execute a binding operation of the terminal and the intelligent lock;
and executing the binding operation between the terminal and the intelligent lock based on the binding signaling, and sending third response information to the client through the server after the binding is successful, wherein the third response information is used for indicating that the intelligent lock is successfully bound.
Specifically, if the reason for the unlocking failure of the intelligent lock is that the terminal corresponding to the client is not bound to the intelligent lock, the intelligent lock may send, to the client, second response information indicating that the reason for the unlocking failure of the intelligent lock is that the terminal corresponding to the client is not bound to the intelligent lock; at this time, the client can send a binding signaling to the server based on the second response information, and then the server sends the binding signaling to the intelligent lock, wherein the binding signaling comprises the terminal information of the client and is used for indicating the intelligent lock to execute the binding operation between the terminal and the intelligent lock; then the intelligent lock executes the binding operation between the terminal and the intelligent lock, namely, the terminal information is stored in a terminal list corresponding to the intelligent lock as a terminal binding code, and a third response message indicating the successful binding of the intelligent lock is sent to the server after the successful binding, at the moment, the server sends the third response message to the client and stores a terminal list after the updating of the intelligent lock, wherein the terminal list comprises the terminal binding code of the terminal bound with the intelligent lock; after the client receives the third response message, the user can send the unlocking signaling to the intelligent lock again to continue the unlocking operation.
In one implementation, the receiving the unlocking signaling sent by the client in response to the unlocking operation input by the user includes:
receiving an unlocking signaling sent by the client through a server, wherein the unlocking signaling is sent when the server receives an unlocking request sent by the client and verifies that a terminal corresponding to the client is a terminal bound by the intelligent lock based on the unlocking request; the server synchronizes a terminal list corresponding to the intelligent lock, the terminal list comprises terminal binding codes of terminals bound with the intelligent lock, the unlocking request comprises the unlocking key, terminal information corresponding to the client and equipment information of the intelligent lock, the terminal information of the client and the terminal list are used for verifying whether the terminal corresponding to the client is the terminal bound by the intelligent lock, and the equipment information of the intelligent lock is used for determining a communication address of the intelligent lock.
It should be noted that, the process may refer to relevant contents of the client-side embodiment, and is not described herein again.
In one implementation, before receiving the unlocking signaling sent by the client through the server, the method further includes:
receiving a deleting instruction sent by the client through the server, wherein the deleting instruction is used for instructing the intelligent lock to delete at least one terminal binding code stored in the terminal list, and the deleting instruction is sent after the client receives indicating information sent by the server, and the indicating information is used for indicating that the number of the terminal binding codes of the terminals stored in the terminal list reaches a preset value;
deleting at least one terminal binding code stored in the terminal list based on the deleting instruction, and synchronizing the updated terminal list to the server;
and sending fourth response information to the client through the server, wherein the fourth response information is used for indicating that the deletion of at least one terminal binding code is successful.
It should be noted that, the process may refer to relevant contents of the client-side embodiment, and is not described herein again.
An embodiment of the present application is explained below with reference to fig. 3. Specifically, the embodiment includes the following steps:
step 1, the client sends a key request to the intelligent lock.
The client can be an APP corresponding to the intelligent lock and used for unlocking the intelligent lock, and certainly, the client can also be a terminal provided with the APP, and here, the client is taken as the APP corresponding to the intelligent lock as an example.
The intelligent lock is in communication connection with the camera, the camera is integrated on the intelligent lock or independent of the intelligent lock and located in the same physical space with the intelligent lock, so that the camera can shoot image data of the intelligent lock within a certain range, and the shot image data are transmitted to the intelligent lock.
In this step, the key request may be a streaming request (i.e., a request for acquiring a video stream). The stream fetching mode may include the processes of device direct connection, p2p, stream media forwarding and the like, and certainly, the key request may also carry terminal information corresponding to the client, so that the intelligent lock can verify whether the terminal corresponding to the client is a terminal to which the intelligent lock is bound in advance through the terminal information.
And 2, the intelligent lock sends an unlocking key to the client.
Specifically, if the intelligent lock supports remote unlocking, the unlocking key can be sent to the intelligent lock. At this time, the camera transmits the shot image data in a preset time period, for example, video frame data of the first N seconds of the current time, to the smart lock, and the smart lock uses the image data as an unlocking key and sends the unlocking key to the client.
Of course the unlocking key may also include an unlocking token or the like.
In addition, the key request can also carry terminal information corresponding to the client. Specifically, the intelligent lock needs to be bound with the terminal to generate an effective key, so that the intelligent lock can judge whether effective remote unlocking operation exists or not through terminal information carried in a key request, if yes, the unlocking key can be sent, and if not, the unlocking key is not sent.
And 3, verifying the user validity by the local system of the client.
In the process, the client can receive the identity information input by the user, and the legality of the user is verified through the identity information.
The identity information may include biological characteristics such as fingerprints and human faces, and may also include a set password.
The step is to ensure that the user can only send out unlocking operation under the authorization operation of the user, and the remote unlocking by other people is prevented under the condition that the client is lost.
And 4, after the client passes the verification, sending an unlocking request to the server, wherein the unlocking request comprises terminal information, an unlocking secret key and equipment information of the intelligent lock, which correspond to the client.
And 5, the server judges the binding of the terminal.
In the process, the server synchronizes a terminal list corresponding to the intelligent lock, the terminal list comprises terminal binding codes of the terminals bound with the intelligent lock, and the terminal binding codes correspond to the terminals one to one. The server judges whether a terminal binding code consistent with the terminal information corresponding to the client exists in the terminal binding codes of the terminals bound with the intelligent lock based on the terminal list; if the terminal exists, the terminal which is bound with the intelligent lock contains the terminal corresponding to the client, and then the step 6 is carried out; if the number of the terminal binding codes does not exist and the number of the terminal binding codes included in the terminal list reaches the preset value, the step 14 is entered.
And 6, the server sends an unlocking signaling to the intelligent lock, wherein the unlocking signaling comprises an unlocking key and terminal information corresponding to the client.
And 7, detecting whether the unlocking process is legal or not by the intelligent lock.
In the process, the intelligent lock can verify whether the terminal corresponding to the client is the terminal bound by the intelligent lock or not through the terminal information and the terminal binding code of the terminal, which is stored in the intelligent lock in advance and is bound by the intelligent lock in advance, if the terminal corresponding to the client is determined to be the terminal bound by the intelligent lock, verify whether the unlocking key is correct, and if the unlocking key is determined to be correct, determine that the unlocking process is legal, and then carry out unlocking operation.
And 8, after the intelligent lock determines that the unlocking process is legal and performs unlocking operation, sending response information of successful unlocking to the client.
And 9, if the unlocking of the intelligent lock fails and the reason of the unlocking failure is that the terminal corresponding to the client is not bound with the intelligent lock, sending response information indicating that the unlocking fails and the terminal is not bound to the client.
Of course, if the reason for the failure of unlocking is that the unlocking key is abnormal, the procedure may be re-entered to step 3, that is, the unlocking procedure may be restarted.
Step 10, the client sends a binding signaling to the server, wherein the binding signaling comprises terminal information corresponding to the client.
And step 11, the server forwards the binding signaling to the intelligent lock.
And step 12, after the terminal binding is successful, the intelligent lock refreshes the terminal list, synchronizes the updated terminal list to the server, and sends response information indicating the successful binding to the server.
And step 13, the server updates the terminal list and sends response information indicating successful binding to the client.
And step 14, the server sends indication information indicating that the number of the terminal binding codes reaches a preset value, namely that the terminal list is full to the client.
And step 15, the client sends a deleting instruction for indicating to delete the terminal binding code to the server.
And step 16, the server forwards the deleting instruction to the intelligent lock.
Step 17, after the intelligent lock successfully deletes the bound terminal, refreshing the terminal list, synchronizing the updated terminal list to the server, and sending response information indicating successful deletion to the server;
and step 18, the server forwards response information indicating successful deletion to the client.
Through the process, the whole remote unlocking process of the client is realized.
Therefore, the scene of unlocking can be completely seen in the whole unlocking process through the embodiment, an unlocking key does not need to be input by an accessor, the unlocking process of the accessor is simplified, and the real-time safety of a user can be guaranteed.
Fig. 4 shows an unlocking system provided by an embodiment of the present invention, where the unlocking system includes a terminal 41 installed with a client, a server 42, a smart lock 43, and a camera 44, the smart lock 43 is in communication connection with the camera 44, and the camera 44 is integrated on the smart lock 43 or is independent of the smart lock 43 and is located in the same physical space as the smart lock 43; wherein,
the client sends a key request to the intelligent lock, wherein the key request is used for indicating to obtain an unlocking key for unlocking the intelligent lock;
the intelligent lock receives a key request sent by the client and sends the unlocking key to the client based on the key request, wherein the unlocking key comprises image data shot by the camera within a preset time period;
the client side responds to an unlocking operation input by a user and sends an unlocking request to the server, wherein the server is synchronized with a terminal list corresponding to the intelligent lock, the terminal list comprises terminal binding codes of terminals bound with the intelligent lock, the unlocking request comprises the unlocking key, terminal information corresponding to the client side and equipment information of the intelligent lock, the terminal information corresponding to the client side and the terminal list are used for verifying whether the terminal corresponding to the client side is the terminal bound with the intelligent lock, and the equipment information of the intelligent lock is used for determining a communication address of the intelligent lock;
when the terminal corresponding to the client is verified to be the terminal bound by the intelligent lock based on the unlocking request, an unlocking signaling is sent to the intelligent lock based on the equipment information, wherein the unlocking signaling comprises the unlocking key and the terminal information corresponding to the client;
unlocking based on the unlocking secret key and the terminal information, and sending first response information to the client after unlocking is successful, wherein the first response information is used for indicating that the intelligent lock is successfully unlocked
The unlocking system provided by the embodiment of the application can implement each process implemented by the embodiments of fig. 1 to 3, and is not described herein again to avoid repetition.
Fig. 5 shows an unlocking device applied to a client according to an embodiment of the present invention, where the unlocking device includes:
a first sending module 501, configured to send a key request to an intelligent lock, where the intelligent lock is in communication connection with a camera, the camera is integrated on the intelligent lock or is independent of the intelligent lock and located in the same physical space as the intelligent lock, and the key request is used to instruct to obtain an unlocking key for unlocking the intelligent lock;
a first receiving module 502, configured to receive the unlocking key sent by the smart lock based on the key request, where the unlocking key includes image data captured by the camera within a preset time period;
a second sending module 503, configured to send an unlocking signaling to the smart lock in response to an unlocking operation input by a user, where the unlocking signaling includes the unlocking key and terminal information corresponding to the client;
a second receiving module 504, configured to receive first response information that is sent after the intelligent lock is unlocked based on the unlocking key and the terminal information and the unlocking is successful, where the first response information is used to indicate that the intelligent lock is successfully unlocked.
The unlocking device provided in the embodiment of the present application can implement each process implemented in the embodiments of fig. 1 and fig. 3, and is not described here again to avoid repetition.
Fig. 6 shows an unlocking apparatus applied to an intelligent lock according to an embodiment of the present invention, where the unlocking apparatus includes:
a first receiving module 601, configured to receive a key request sent by a client, where the smart lock is in communication connection with a camera, the camera is integrated on the smart lock or is independent of the smart lock and located in the same physical space as the smart lock, and the key request is used to instruct to obtain an unlocking key for unlocking the smart lock;
a first sending module 602, configured to send the unlocking key to the client based on the key request, where the unlocking key includes image data within a preset time period captured by the camera;
a second receiving module 603, configured to receive an unlocking signaling sent by the client in response to an unlocking operation input by a user, where the unlocking signaling includes the unlocking key and terminal information corresponding to the client;
a second sending module 604, configured to unlock based on the unlocking key and the terminal information, and send first response information to the client after unlocking is successful, where the first response information is used to indicate that the intelligent lock is successfully unlocked.
The unlocking device provided by the embodiment of the application can implement each process implemented by the embodiments of fig. 2 to 3, and is not described herein again to avoid repetition.
It should be noted that the embodiment of the unlocking device in this specification and the embodiment of the unlocking method in this specification are based on the same inventive concept, and therefore, for specific implementation of the embodiment of the unlocking device, reference may be made to the implementation of the corresponding embodiment of the unlocking method, and repeated parts are not described again.
The unlocking device in the embodiment of the present application may be a device, or may be a component, an integrated circuit, or a chip in a terminal. The device can be mobile electronic equipment or non-mobile electronic equipment. By way of example, the mobile electronic device may be a mobile phone, a tablet computer, a notebook computer, a palm top computer, a vehicle-mounted electronic device, a wearable device, an ultra-mobile personal computer (UMPC), a netbook or a Personal Digital Assistant (PDA), and the like, and the non-mobile electronic device may be a server, a Network Attached Storage (NAS), a Personal Computer (PC), a Television (TV), a teller machine or a self-service machine, and the like, and the embodiments of the present application are not particularly limited.
The unlocking device in the embodiment of the present application may be a device having an operating system. The operating system may be an Android (Android) operating system, an ios operating system, or other possible operating systems, and embodiments of the present application are not limited specifically.
Based on the same technical concept, an electronic device is further provided in the embodiments of the present application, and the electronic device is configured to execute the distributed modeling method, and fig. 7 is a schematic structural diagram of an electronic device implementing various embodiments of the present application. Electronic devices may have a large difference due to different configurations or performances, and may include a processor (processor)710, a communication Interface (Communications Interface)720, a memory (memory)730, and a communication bus 740, where the processor 710, the communication Interface 720, and the memory 730 communicate with each other through the communication bus 740. The processor 710 may invoke a computer program stored on the memory 730 and executable on the processor 710 to perform the following steps: sending a key request to an intelligent lock, wherein the intelligent lock is in communication connection with a camera, the camera is integrated on the intelligent lock or independent of the intelligent lock and is located in the same physical space with the intelligent lock, and the key request is used for indicating to obtain an unlocking key for unlocking the intelligent lock;
receiving the unlocking key sent by the intelligent lock based on the key request, wherein the unlocking key comprises image data shot by the camera within a preset time period;
responding to an unlocking operation input by a user, and sending an unlocking signaling to the intelligent lock, wherein the unlocking signaling comprises the unlocking key and terminal information corresponding to the client;
and receiving first response information which is sent after the intelligent lock is unlocked based on the unlocking secret key and the terminal information and the unlocking is successful, wherein the first response information is used for indicating the intelligent lock to be successfully unlocked.
Or performing the following operations:
receiving a key request sent by a client, wherein the intelligent lock is in communication connection with a camera, the camera is integrated on the intelligent lock or independent of the intelligent lock and is located in the same physical space with the intelligent lock, and the key request is used for indicating to obtain an unlocking key for unlocking the intelligent lock;
sending the unlocking key to the client based on the key request, wherein the unlocking key comprises image data shot by the camera within a preset time period;
receiving an unlocking signaling sent by the client in response to an unlocking operation input by a user, wherein the unlocking signaling comprises the unlocking key and terminal information corresponding to the client;
and unlocking based on the unlocking key and the terminal information, and sending first response information to the client after unlocking is successful, wherein the first response information is used for indicating that the intelligent lock is successfully unlocked.
For specific execution steps, reference may be made to each step of the above-described unlocking method embodiment, and the same technical effect may be achieved, and for avoiding repetition, details are not described here again.
It should be noted that the electronic device in the embodiment of the present application includes: a server, a terminal, or other device besides a terminal.
The above electronic device structure does not constitute a limitation of the electronic device, the electronic device may include more or less components than those shown, or some components may be combined, or different component arrangements, for example, the input Unit may include a Graphics Processing Unit (GPU) and a microphone, and the display Unit may configure the display panel in the form of a liquid crystal display, an organic light emitting diode, or the like. The user input unit includes at least one of a touch panel and other input devices. The touch panel is also referred to as a touch screen. Other input devices may include, but are not limited to, a physical keyboard, function keys (e.g., volume control keys, switch keys, etc.), a trackball, a mouse, and a joystick, which are not described in detail herein.
The memory may be used to store software programs as well as various data. The memory may mainly include a first storage area storing a program or an instruction and a second storage area storing data, wherein the first storage area may store an operating system, an application program or an instruction (such as a sound playing function, an image playing function, etc.) required for at least one function, and the like. Further, the memory may include volatile memory or nonvolatile memory, or the memory may include both volatile and nonvolatile memory. The non-volatile Memory may be a Read-Only Memory (ROM), a Programmable ROM (PROM), an Erasable PROM (EPROM), an Electrically Erasable PROM (EEPROM), or a flash Memory. The volatile Memory may be a Random Access Memory (RAM), a Static Random Access Memory (Static RAM, SRAM), a Dynamic Random Access Memory (Dynamic RAM, DRAM), a Synchronous Dynamic Random Access Memory (Synchronous DRAM, SDRAM), a Double Data Rate Synchronous Dynamic Random Access Memory (Double Data Rate SDRAM, ddr SDRAM), an Enhanced Synchronous SDRAM (ESDRAM), a Synchronous Link DRAM (SLDRAM), and a Direct bus RAM (DRRAM).
A processor may include one or more processing units; optionally, the processor integrates an application processor, which mainly handles operations related to the operating system, user interface, application programs, etc., and a modem processor, which mainly handles wireless communication signals, such as a baseband processor. It will be appreciated that the modem processor described above may not be integrated into the processor.
The embodiment of the present application further provides a readable storage medium, where a program or an instruction is stored on the readable storage medium, and when the program or the instruction is executed by a processor, the process of the embodiment of the unlocking method is implemented, and the same technical effect can be achieved, and in order to avoid repetition, details are not repeated here.
The processor is the processor in the electronic device described in the above embodiment. The readable storage medium includes a computer readable storage medium, such as a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and so on.
The embodiment of the present application further provides a chip, where the chip includes a processor and a communication interface, the communication interface is coupled to the processor, and the processor is configured to execute a program or an instruction to implement each process of the foregoing method embodiments, and can achieve the same technical effect, and in order to avoid repetition, the details are not repeated here.
It should be understood that the chips mentioned in the embodiments of the present application may also be referred to as system-on-chip, system-on-chip or system-on-chip, etc.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element. Further, it should be noted that the scope of the methods and apparatuses in the embodiments of the present application is not limited to performing the functions in the order illustrated or discussed, but may include performing the functions in a substantially simultaneous manner or in a reverse order based on the functions recited, e.g., the described methods may be performed in an order different from that described, and various steps may be added, omitted, or combined. In addition, features described with reference to certain examples may be combined in other examples.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solutions of the present application or portions thereof that contribute to the prior art may be embodied in the form of a software product, which is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal (which may be a mobile phone, a computer, a server, an air conditioner, or a network device) to execute the method according to the embodiments of the present application.
While the present embodiments have been described with reference to the accompanying drawings, it is to be understood that the invention is not limited to the precise embodiments described above, which are meant to be illustrative and not restrictive, and that various changes may be made therein by those skilled in the art without departing from the spirit and scope of the invention as defined by the appended claims.

Claims (13)

1. An unlocking method is applied to a client side, and is characterized by comprising the following steps:
sending a key request to an intelligent lock, wherein the intelligent lock is in communication connection with a camera, the camera is integrated on the intelligent lock or independent of the intelligent lock and is located in the same physical space with the intelligent lock, and the key request is used for indicating to obtain an unlocking key for unlocking the intelligent lock;
receiving the unlocking key sent by the intelligent lock based on the key request, wherein the unlocking key comprises image data shot by the camera within a preset time period;
responding to an unlocking operation input by a user, and sending an unlocking signaling to the intelligent lock, wherein the unlocking signaling comprises the unlocking key and terminal information corresponding to the client;
and receiving first response information which is sent after the intelligent lock is unlocked based on the unlocking secret key and the terminal information and the unlocking is successful, wherein the first response information is used for indicating that the intelligent lock is successfully unlocked.
2. The unlocking method according to claim 1, wherein before sending the key request to the smart lock, the method further comprises:
receiving identity information input by the user;
and after the user is verified to be a legal user through the identity information, the step of sending a key request to the intelligent lock is carried out.
3. The unlocking method according to claim 1, wherein after receiving the unlocking of the smart lock based on the unlocking key and the terminal information, the method further comprises:
receiving second response information sent after the unlocking failure of the intelligent lock, wherein the second response information is used for indicating that the reason of the unlocking failure of the intelligent lock is that a terminal corresponding to the client side is not bound with the intelligent lock;
sending a binding signaling to the intelligent lock through a server based on the second response information, wherein the binding signaling comprises terminal information corresponding to the client and is used for indicating the intelligent lock to execute the binding operation of the terminal and the intelligent lock;
and receiving third response information sent by the intelligent lock through the server, wherein the third response information is used for indicating that the intelligent lock is successfully bound based on the binding signaling.
4. The unlocking method according to claim 1, wherein the sending of the unlocking signaling to the intelligent lock comprises:
sending an unlocking request to a server, and sending the unlocking signaling to the intelligent lock when the server verifies that the terminal corresponding to the client is the terminal bound by the intelligent lock based on the unlocking request; the server synchronizes a terminal list corresponding to the intelligent lock, the terminal list comprises terminal binding codes of terminals bound with the intelligent lock, the unlocking request comprises the unlocking key, terminal information corresponding to the client and equipment information of the intelligent lock, the terminal information corresponding to the client and the terminal list are used for verifying whether the terminal corresponding to the client is the terminal bound by the intelligent lock, and the equipment information of the intelligent lock is used for determining a communication address of the intelligent lock.
5. The unlocking method according to claim 4, wherein after sending the unlocking request to the server, the method further comprises:
receiving indication information sent by the server, wherein the indication information is used for indicating that the number of the terminal binding codes stored in the terminal list reaches a preset value;
sending a deleting instruction to the intelligent lock through the server based on the indication information, wherein the deleting instruction is used for indicating the intelligent lock to delete at least one terminal binding code stored in the terminal list;
and receiving fourth response information sent by the intelligent lock through the server, wherein the fourth response information is used for indicating that at least one terminal binding code is successfully deleted, and the server and the intelligent lock synchronously update a terminal list.
6. An unlocking method is applied to an intelligent lock and is characterized by comprising the following steps:
receiving a key request sent by a client, wherein the intelligent lock is in communication connection with a camera, the camera is integrated on the intelligent lock or independent of the intelligent lock and is located in the same physical space with the intelligent lock, and the key request is used for indicating to obtain an unlocking key for unlocking the intelligent lock;
sending the unlocking key to the client based on the key request, wherein the unlocking key comprises image data shot by the camera within a preset time period;
receiving an unlocking signaling sent by the client in response to an unlocking operation input by a user, wherein the unlocking signaling comprises the unlocking key and terminal information corresponding to the client;
and unlocking based on the unlocking key and the terminal information, and sending first response information to the client after unlocking is successful, wherein the first response information is used for indicating that the intelligent lock is successfully unlocked.
7. The unlocking method according to claim 6, wherein the unlocking based on the unlocking key and the terminal information includes:
verifying whether the terminal corresponding to the client is the terminal bound by the intelligent lock or not based on the terminal information and the terminal binding code of the terminal, which is stored in the intelligent lock in advance and is bound by the intelligent lock in advance;
if the terminal corresponding to the client is determined to be the terminal bound by the intelligent lock, verifying whether the unlocking secret key is correct;
and if the unlocking secret key is determined to be correct, carrying out unlocking operation and determining that unlocking is successful.
8. The unlocking method according to claim 6 or 7, wherein after the unlocking based on the unlocking key and the terminal information, the method further comprises:
if the unlocking fails, sending second response information to the client, wherein the second response information is used for indicating that the reason for the unlocking failure of the intelligent lock is that a terminal corresponding to the client is not bound with the intelligent lock;
receiving a binding signaling sent by a server, wherein the binding signaling is sent by the client based on the second response information and includes terminal information corresponding to the client, and is used for instructing the intelligent lock to execute a binding operation between the terminal and the intelligent lock;
and executing the binding operation between the terminal and the intelligent lock based on the binding signaling, and sending third response information to the client through the server after the binding is successful, wherein the third response information is used for indicating that the intelligent lock is successfully bound.
9. The unlocking method according to claim 6, wherein the receiving of the unlocking signaling sent by the client in response to the unlocking operation input by the user comprises:
receiving an unlocking signaling sent by the client through a server, wherein the unlocking signaling is sent by the server when the server receives an unlocking request sent by the client and verifies that a terminal corresponding to the client is a terminal bound by the intelligent lock based on the unlocking request; the server synchronizes a terminal list corresponding to the intelligent lock, the terminal list comprises terminal binding codes of terminals bound with the intelligent lock, the unlocking request comprises the unlocking key, terminal information corresponding to the client and equipment information of the intelligent lock, the terminal information of the client and the terminal list are used for verifying whether the terminal corresponding to the client is the terminal bound by the intelligent lock, and the equipment information of the intelligent lock is used for determining a communication address of the intelligent lock.
10. The unlocking method according to claim 9, wherein before receiving the unlocking signaling sent by the client through the server, the method further comprises:
receiving a deleting instruction sent by the client through the server, wherein the deleting instruction is used for instructing the intelligent lock to delete at least one terminal binding code stored in the terminal list, and the deleting instruction is sent after the client receives indicating information sent by the server, and the indicating information is used for indicating that the number of the terminal binding codes of the terminals stored in the terminal list reaches a preset value;
deleting at least one terminal binding code stored in the terminal list based on the deleting instruction, and synchronizing the updated terminal list to the server;
and sending fourth response information to the client through the server, wherein the fourth response information is used for indicating that the deletion of at least one terminal binding code is successful.
11. An unlocking system is characterized by comprising a terminal provided with a client, a server, an intelligent lock and a camera, wherein the intelligent lock is in communication connection with the camera, and the camera is integrated on the intelligent lock or independent of the intelligent lock and located in the same physical space with the intelligent lock; wherein,
the client sends a key request to the intelligent lock, wherein the key request is used for indicating to obtain an unlocking key for unlocking the intelligent lock;
the intelligent lock receives a key request sent by the client and sends the unlocking key to the client based on the key request, wherein the unlocking key comprises image data shot by the camera within a preset time period;
the client responds to an unlocking operation input by a user and sends an unlocking request to the server, wherein the server is synchronized with a terminal list corresponding to the intelligent lock, the terminal list comprises terminal binding codes of terminals bound with the intelligent lock, the unlocking request comprises the unlocking key, terminal information corresponding to the client and equipment information of the intelligent lock, the terminal information corresponding to the client and the terminal list are used for verifying whether the terminal corresponding to the client is the terminal bound with the intelligent lock, and the equipment information of the intelligent lock is used for determining a communication address of the intelligent lock;
when the terminal corresponding to the client is verified to be the terminal bound by the intelligent lock based on the unlocking request, an unlocking signaling is sent to the intelligent lock based on the equipment information, wherein the unlocking signaling comprises the unlocking key and the terminal information corresponding to the client;
and unlocking based on the unlocking key and the terminal information, and sending first response information to the client after unlocking is successful, wherein the first response information is used for indicating that the intelligent lock is successfully unlocked.
12. An electronic device comprising a processor, a memory and a program or instructions stored on the memory and executable on the processor, the program or instructions, when executed by the processor, implementing the steps of the unlocking method according to any one of claims 1 to 5 or implementing the steps of the unlocking method according to any one of claims 6 to 10.
13. A readable storage medium, characterized in that it stores thereon a program or instructions which, when executed by a processor, implement the steps of the unlocking method according to any one of claims 1 to 5, or implement the steps of the unlocking method according to any one of claims 6 to 10.
CN202210577411.1A 2022-05-25 2022-05-25 Unlocking method, system, electronic equipment and storage medium Pending CN114999030A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210577411.1A CN114999030A (en) 2022-05-25 2022-05-25 Unlocking method, system, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210577411.1A CN114999030A (en) 2022-05-25 2022-05-25 Unlocking method, system, electronic equipment and storage medium

Publications (1)

Publication Number Publication Date
CN114999030A true CN114999030A (en) 2022-09-02

Family

ID=83028510

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210577411.1A Pending CN114999030A (en) 2022-05-25 2022-05-25 Unlocking method, system, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN114999030A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116563985A (en) * 2023-07-10 2023-08-08 深圳市旭子科技有限公司 Task processing method and system based on Internet of things lock

Citations (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN204791226U (en) * 2015-06-08 2015-11-18 山东沣瑞置业发展有限公司 Wisdom people from community face access control system
CN105429959A (en) * 2015-11-02 2016-03-23 北京旷视科技有限公司 Image processing method, client equipment, image verification method and server
CN106097492A (en) * 2016-06-03 2016-11-09 深圳大学 A kind of gate inhibition's access control method and gate control system
CN106157408A (en) * 2016-07-05 2016-11-23 重庆蓝岸通讯技术有限公司 Smart lock with video monitoring remote unlocking system
CN106815906A (en) * 2016-11-29 2017-06-09 深圳智乐信息科技有限公司 A kind of intelligent entrance guard management method and system based on optic communication
CN106815907A (en) * 2016-11-29 2017-06-09 深圳智乐信息科技有限公司 A kind of method and intelligent access control system based on picture password management intelligent entrance guard
CN107241364A (en) * 2017-08-10 2017-10-10 广州杰之良软件有限公司 Document down loading method and device
CN207115523U (en) * 2017-06-27 2018-03-16 江苏保千里视像科技集团股份有限公司 Intelligent door lock and access control system
CN108427911A (en) * 2018-01-30 2018-08-21 阿里巴巴集团控股有限公司 A kind of auth method, system, device and equipment
CN108447149A (en) * 2018-02-05 2018-08-24 西安太极航空科技有限公司 A kind of unlocking method and device in shared house
CN109389727A (en) * 2018-10-30 2019-02-26 南昌努比亚技术有限公司 Method for unlocking, system and computer readable storage medium
CN110766839A (en) * 2018-11-01 2020-02-07 上海掌门科技有限公司 Entrance guard device and using method thereof
CN111508111A (en) * 2020-04-13 2020-08-07 广东科徕尼智能科技有限公司 Method, equipment and storage medium for binding intelligent lock
CN112164163A (en) * 2020-11-11 2021-01-01 四川为民科技有限公司 Automatic cage entrance guard control system and method based on animal identification
CN112330855A (en) * 2020-10-15 2021-02-05 成都市以太节点科技有限公司 Electronic lock safety management method, equipment and system
CN112995137A (en) * 2021-02-03 2021-06-18 深圳市凯迪仕智能科技有限公司 Binding method of intelligent lock and intelligent lock system
US11138820B1 (en) * 2020-04-29 2021-10-05 I-Ting Shen Unlocking method for an electronic lock
CN113538739A (en) * 2021-06-09 2021-10-22 杭州华橙软件技术有限公司 Pairing method of intelligent lock, electronic device and storage medium
CN113728621A (en) * 2019-04-09 2021-11-30 麦克赛尔株式会社 Head-mounted information processing device
CN113971852A (en) * 2021-10-25 2022-01-25 珠海格力电器股份有限公司 Door lock control method and device, storage medium, processor and terminal equipment

Patent Citations (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN204791226U (en) * 2015-06-08 2015-11-18 山东沣瑞置业发展有限公司 Wisdom people from community face access control system
CN105429959A (en) * 2015-11-02 2016-03-23 北京旷视科技有限公司 Image processing method, client equipment, image verification method and server
CN106097492A (en) * 2016-06-03 2016-11-09 深圳大学 A kind of gate inhibition's access control method and gate control system
CN106157408A (en) * 2016-07-05 2016-11-23 重庆蓝岸通讯技术有限公司 Smart lock with video monitoring remote unlocking system
CN106815906A (en) * 2016-11-29 2017-06-09 深圳智乐信息科技有限公司 A kind of intelligent entrance guard management method and system based on optic communication
CN106815907A (en) * 2016-11-29 2017-06-09 深圳智乐信息科技有限公司 A kind of method and intelligent access control system based on picture password management intelligent entrance guard
CN207115523U (en) * 2017-06-27 2018-03-16 江苏保千里视像科技集团股份有限公司 Intelligent door lock and access control system
CN107241364A (en) * 2017-08-10 2017-10-10 广州杰之良软件有限公司 Document down loading method and device
CN108427911A (en) * 2018-01-30 2018-08-21 阿里巴巴集团控股有限公司 A kind of auth method, system, device and equipment
CN108447149A (en) * 2018-02-05 2018-08-24 西安太极航空科技有限公司 A kind of unlocking method and device in shared house
CN109389727A (en) * 2018-10-30 2019-02-26 南昌努比亚技术有限公司 Method for unlocking, system and computer readable storage medium
CN110766839A (en) * 2018-11-01 2020-02-07 上海掌门科技有限公司 Entrance guard device and using method thereof
CN113728621A (en) * 2019-04-09 2021-11-30 麦克赛尔株式会社 Head-mounted information processing device
CN111508111A (en) * 2020-04-13 2020-08-07 广东科徕尼智能科技有限公司 Method, equipment and storage medium for binding intelligent lock
US11138820B1 (en) * 2020-04-29 2021-10-05 I-Ting Shen Unlocking method for an electronic lock
CN112330855A (en) * 2020-10-15 2021-02-05 成都市以太节点科技有限公司 Electronic lock safety management method, equipment and system
CN112164163A (en) * 2020-11-11 2021-01-01 四川为民科技有限公司 Automatic cage entrance guard control system and method based on animal identification
CN112995137A (en) * 2021-02-03 2021-06-18 深圳市凯迪仕智能科技有限公司 Binding method of intelligent lock and intelligent lock system
CN113538739A (en) * 2021-06-09 2021-10-22 杭州华橙软件技术有限公司 Pairing method of intelligent lock, electronic device and storage medium
CN113971852A (en) * 2021-10-25 2022-01-25 珠海格力电器股份有限公司 Door lock control method and device, storage medium, processor and terminal equipment

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116563985A (en) * 2023-07-10 2023-08-08 深圳市旭子科技有限公司 Task processing method and system based on Internet of things lock
CN116563985B (en) * 2023-07-10 2023-09-05 深圳市旭子科技有限公司 Task processing method and system based on Internet of things lock

Similar Documents

Publication Publication Date Title
US11294993B2 (en) Identity authentication using biometrics
EP3346660B1 (en) Authentication information update method and device
CN111836085B (en) Television screen projection method and device, cloud server and terminal equipment
US20160371475A1 (en) Enhanced alternative multifactor authentication
CN111991813B (en) Method and device for logging in game, electronic equipment and storage medium
US9294474B1 (en) Verification based on input comprising captured images, captured audio and tracked eye movement
CN111899029A (en) Identity verification method and device for electronic payment
WO2017206524A1 (en) Electronic device control method, terminal and control system
CN110535809B (en) Identification code pulling method, storage medium, terminal device and server
CN114999030A (en) Unlocking method, system, electronic equipment and storage medium
CN111405016A (en) User information acquisition method and related equipment
CN110598469A (en) Information processing method and device and computer storage medium
CN107818252B (en) Face recognition information synchronization method and related product
KR101333006B1 (en) System and method of confirming a login
CN109150880B (en) Data transmission method, device and computer readable storage medium
TWI661367B (en) Method, system for transaction authentication using a self-defined picture and a computer-readable storage device
CN110738759A (en) fingerprint storage method, identity verification method, device and system
JP7100334B2 (en) Authentication device, authentication method, and program
CN111179522B (en) Self-service equipment program installation method, device and system
CN113778359A (en) Wireless screen projection method and device, wearable device and storage medium
CN110636493B (en) Information backup method, device and equipment of virtual SIM card and storage medium
CN115943623A (en) Techniques for managing telephone number-based user accounts
CN107977564A (en) A kind of transaction authentication processing method, certificate server, terminal and traction equipment
CN106559390B (en) Method and apparatus for enhancing device security
CN114978742B (en) Verification information generation method, verification method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination